Analysis

  • max time kernel
    147s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    22-12-2024 07:50

General

  • Target

    JaffaCakes118_dc624a9ffa1cdd5b4d40980634e65492925ac8ece64fe27c0286afbefe19c2ed.exe

  • Size

    1.3MB

  • MD5

    50e8df05511bac051bdc1465a5b4def4

  • SHA1

    769f9bdee259f9dab87a38e6b183cc1db8a6cc3d

  • SHA256

    dc624a9ffa1cdd5b4d40980634e65492925ac8ece64fe27c0286afbefe19c2ed

  • SHA512

    e880152fcff870e9ade90820f7b6f9a126f24b73c031d56a6bf52d6ecb304e3bf6a0dac4fee1c60bb68578e3f06311b7a00e7033e85cb55b378d18f700b8c4ed

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 45 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 12 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 17 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Executes dropped EXE 13 IoCs
  • Loads dropped DLL 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 12 IoCs
  • Drops file in Program Files directory 19 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 45 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 40 IoCs
  • Suspicious use of AdjustPrivilegeToken 30 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_dc624a9ffa1cdd5b4d40980634e65492925ac8ece64fe27c0286afbefe19c2ed.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_dc624a9ffa1cdd5b4d40980634e65492925ac8ece64fe27c0286afbefe19c2ed.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2712
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2464
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\providercommon\1zu9dW.bat" "
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2264
        • C:\providercommon\DllCommonsvc.exe
          "C:\providercommon\DllCommonsvc.exe"
          4⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2320
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2288
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\dllhost.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2076
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\csrss.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1732
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\explorer.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2284
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows NT\Accessories\de-DE\lsm.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1932
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\lsass.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2208
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\fr-FR\cmd.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1980
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\de-DE\lsm.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2388
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Sidebar\wininit.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1112
          • C:\providercommon\DllCommonsvc.exe
            "C:\providercommon\DllCommonsvc.exe"
            5⤵
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:828
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1864
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\conhost.exe'
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1256
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\7-Zip\Lang\taskhost.exe'
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1696
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Photo Viewer\de-DE\winlogon.exe'
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:908
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\powershell.exe'
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2612
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Portable Devices\WmiPrvSE.exe'
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2216
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Uninstall Information\spoolsv.exe'
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:648
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\winlogon.exe'
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1756
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\51LR8ZxuJo.bat"
              6⤵
                PID:1212
                • C:\Windows\system32\w32tm.exe
                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                  7⤵
                    PID:2920
                  • C:\MSOCache\All Users\powershell.exe
                    "C:\MSOCache\All Users\powershell.exe"
                    7⤵
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1772
                    • C:\Windows\System32\cmd.exe
                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\LIqDUaLb8G.bat"
                      8⤵
                        PID:1792
                        • C:\Windows\system32\w32tm.exe
                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                          9⤵
                            PID:2724
                          • C:\MSOCache\All Users\powershell.exe
                            "C:\MSOCache\All Users\powershell.exe"
                            9⤵
                            • Executes dropped EXE
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2644
                            • C:\Windows\System32\cmd.exe
                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\zcjutnjrcv.bat"
                              10⤵
                                PID:2136
                                • C:\Windows\system32\w32tm.exe
                                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                  11⤵
                                    PID:2512
                                  • C:\MSOCache\All Users\powershell.exe
                                    "C:\MSOCache\All Users\powershell.exe"
                                    11⤵
                                    • Executes dropped EXE
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2292
                                    • C:\Windows\System32\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\lmMgPtgxf2.bat"
                                      12⤵
                                        PID:2160
                                        • C:\Windows\system32\w32tm.exe
                                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                          13⤵
                                            PID:580
                                          • C:\MSOCache\All Users\powershell.exe
                                            "C:\MSOCache\All Users\powershell.exe"
                                            13⤵
                                            • Executes dropped EXE
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:2600
                                            • C:\Windows\System32\cmd.exe
                                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Asmf6CRzTu.bat"
                                              14⤵
                                                PID:3012
                                                • C:\Windows\system32\w32tm.exe
                                                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                  15⤵
                                                    PID:2760
                                                  • C:\MSOCache\All Users\powershell.exe
                                                    "C:\MSOCache\All Users\powershell.exe"
                                                    15⤵
                                                    • Executes dropped EXE
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:468
                                                    • C:\Windows\System32\cmd.exe
                                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\SpZgFYZT4y.bat"
                                                      16⤵
                                                        PID:2228
                                                        • C:\Windows\system32\w32tm.exe
                                                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                          17⤵
                                                            PID:2912
                                                          • C:\MSOCache\All Users\powershell.exe
                                                            "C:\MSOCache\All Users\powershell.exe"
                                                            17⤵
                                                            • Executes dropped EXE
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:1616
                                                            • C:\Windows\System32\cmd.exe
                                                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\bhowVEGEG8.bat"
                                                              18⤵
                                                                PID:1716
                                                                • C:\Windows\system32\w32tm.exe
                                                                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                  19⤵
                                                                    PID:1608
                                                                  • C:\MSOCache\All Users\powershell.exe
                                                                    "C:\MSOCache\All Users\powershell.exe"
                                                                    19⤵
                                                                    • Executes dropped EXE
                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:1056
                                                                    • C:\Windows\System32\cmd.exe
                                                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\etpQuxQFPn.bat"
                                                                      20⤵
                                                                        PID:2648
                                                                        • C:\Windows\system32\w32tm.exe
                                                                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                          21⤵
                                                                            PID:2676
                                                                          • C:\MSOCache\All Users\powershell.exe
                                                                            "C:\MSOCache\All Users\powershell.exe"
                                                                            21⤵
                                                                            • Executes dropped EXE
                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:1684
                                                                            • C:\Windows\System32\cmd.exe
                                                                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ssDSZpddA3.bat"
                                                                              22⤵
                                                                                PID:2948
                                                                                • C:\Windows\system32\w32tm.exe
                                                                                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                  23⤵
                                                                                    PID:1740
                                                                                  • C:\MSOCache\All Users\powershell.exe
                                                                                    "C:\MSOCache\All Users\powershell.exe"
                                                                                    23⤵
                                                                                    • Executes dropped EXE
                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:2428
                                                                                    • C:\Windows\System32\cmd.exe
                                                                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\DegeIw2hse.bat"
                                                                                      24⤵
                                                                                        PID:1788
                                                                                        • C:\Windows\system32\w32tm.exe
                                                                                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                          25⤵
                                                                                            PID:2448
                                                                                          • C:\MSOCache\All Users\powershell.exe
                                                                                            "C:\MSOCache\All Users\powershell.exe"
                                                                                            25⤵
                                                                                            • Executes dropped EXE
                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                            PID:2364
                                                                                            • C:\Windows\System32\cmd.exe
                                                                                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\L9j9zErPDE.bat"
                                                                                              26⤵
                                                                                                PID:2820
                                                                                                • C:\Windows\system32\w32tm.exe
                                                                                                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                                  27⤵
                                                                                                    PID:2876
                                                                                                  • C:\MSOCache\All Users\powershell.exe
                                                                                                    "C:\MSOCache\All Users\powershell.exe"
                                                                                                    27⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:2744
                                                                                                    • C:\Windows\System32\cmd.exe
                                                                                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\12JaEZR6zX.bat"
                                                                                                      28⤵
                                                                                                        PID:2340
                                                                                                        • C:\Windows\system32\w32tm.exe
                                                                                                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                                          29⤵
                                                                                                            PID:1912
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 13 /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\dllhost.exe'" /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:3012
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\dllhost.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:2772
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 12 /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\dllhost.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:2512
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\csrss.exe'" /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:2664
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\csrss.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:2972
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\csrss.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:624
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "explorere" /sc MINUTE /mo 7 /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\explorer.exe'" /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:2872
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\explorer.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:2660
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "explorere" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\explorer.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:1332
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "lsml" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows NT\Accessories\de-DE\lsm.exe'" /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:2148
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows NT\Accessories\de-DE\lsm.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:2800
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "lsml" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows NT\Accessories\de-DE\lsm.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:276
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 12 /tr "'C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\lsass.exe'" /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:2924
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\lsass.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:2688
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 9 /tr "'C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\lsass.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:760
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 6 /tr "'C:\Windows\fr-FR\cmd.exe'" /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:1224
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Windows\fr-FR\cmd.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:1164
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 6 /tr "'C:\Windows\fr-FR\cmd.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:1312
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "lsml" /sc MINUTE /mo 10 /tr "'C:\Windows\de-DE\lsm.exe'" /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:2696
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Windows\de-DE\lsm.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:1968
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "lsml" /sc MINUTE /mo 9 /tr "'C:\Windows\de-DE\lsm.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:1784
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows Sidebar\wininit.exe'" /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:1816
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Program Files\Windows Sidebar\wininit.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:2276
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows Sidebar\wininit.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:2976
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 9 /tr "'C:\providercommon\conhost.exe'" /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:2736
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\providercommon\conhost.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:2776
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 13 /tr "'C:\providercommon\conhost.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:2220
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 6 /tr "'C:\Program Files\7-Zip\Lang\taskhost.exe'" /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:2656
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Program Files\7-Zip\Lang\taskhost.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:2624
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 11 /tr "'C:\Program Files\7-Zip\Lang\taskhost.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:3024
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Photo Viewer\de-DE\winlogon.exe'" /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:2140
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Photo Viewer\de-DE\winlogon.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:2644
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Photo Viewer\de-DE\winlogon.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:2728
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "powershellp" /sc MINUTE /mo 9 /tr "'C:\MSOCache\All Users\powershell.exe'" /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:1540
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "powershell" /sc ONLOGON /tr "'C:\MSOCache\All Users\powershell.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:320
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "powershellp" /sc MINUTE /mo 8 /tr "'C:\MSOCache\All Users\powershell.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:2628
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Portable Devices\WmiPrvSE.exe'" /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:2512
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Portable Devices\WmiPrvSE.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:1564
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows Portable Devices\WmiPrvSE.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:2948
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 11 /tr "'C:\Program Files\Uninstall Information\spoolsv.exe'" /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:2992
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files\Uninstall Information\spoolsv.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:2980
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 7 /tr "'C:\Program Files\Uninstall Information\spoolsv.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:2892
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\winlogon.exe'" /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:2000
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\winlogon.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:1000
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\winlogon.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:632

                                                  Network

                                                  MITRE ATT&CK Enterprise v15

                                                  Replay Monitor

                                                  Loading Replay Monitor...

                                                  Downloads

                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                    Filesize

                                                    342B

                                                    MD5

                                                    d516f0553652b1a21c362717a7968ea3

                                                    SHA1

                                                    6dfe851c6e7e30a02761aa3ec08a016ba81840f7

                                                    SHA256

                                                    af9dd96d244a85b5d1663aa6a114e8588a45aaf6b15c7201e8fc603fa4bc5304

                                                    SHA512

                                                    9ab0ef1bbec2c908282068a5a7801de480aa6bb58cef20f6f4fec870e9880b27254b08a1b688ab033afbc4417ca4802699ccdf80d0ab41ada61401f14a206189

                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                    Filesize

                                                    342B

                                                    MD5

                                                    01bf866fbf56a05502ed6b8f89fb8877

                                                    SHA1

                                                    46394a43ee09e09a3daee683e7b5f83d0fec620f

                                                    SHA256

                                                    f0f3277087e0a722d0e4d7a855c7a73578e8acbee9ddd87405f420c21a47f61d

                                                    SHA512

                                                    75c35d3c6f657b0e48e9dc0e8bdbb2c82597dc78c14c205b1a308794375f7df27b44e5566c0fa4f6515aecbf7eb61abe9534a04ee8b5d91346997e7e4d89e9c1

                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                    Filesize

                                                    342B

                                                    MD5

                                                    326a29ec2982f8a15f4093c670621679

                                                    SHA1

                                                    e6bbf1085f40315815fabbfd037ed20938d77443

                                                    SHA256

                                                    a222078432a15bf5a66fe339e3d0c5ca24987cda7be0f066a0e05e553992e8a5

                                                    SHA512

                                                    6141874d3366443fbe8fc143c08b8aa6272b2889968ff2cd249a43b8d05cab64667ad462e44f305f7a35c330660974f514fc5f8957ffd41d4cd528495efef867

                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                    Filesize

                                                    342B

                                                    MD5

                                                    cd4f0a88dc2f624a7c69a8b5b253715b

                                                    SHA1

                                                    e6cf0d585645f4b7224383299ccb529dc3228ca8

                                                    SHA256

                                                    888ce3b667929404408e6b75b0884bf11c74bbdbc7cc0f98b43f0e27f5441f70

                                                    SHA512

                                                    2aa5578f84e288c7776a6f62395839591b4248ea041d68fb6ae550e4d1a3e3ab53858cda4441cb191ac2f618cd15ca603fa94105957b7585975967258a162f94

                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                    Filesize

                                                    342B

                                                    MD5

                                                    1e63e786f6f719d9510042780f4e0313

                                                    SHA1

                                                    99ccd115738526471d46d4ef698e6ea28bddab71

                                                    SHA256

                                                    81d0cb8ccf2fbc88c6eb0baf322897fd67549b587a99f257771d117768621763

                                                    SHA512

                                                    1d53ac785748f0e8c7b3dfbb2c52bf0db38aa256ec6bef532f956faec84f18bdcedcde579100d1d2a6624f7a0da1e125f84dba8d47bf330536c5a9a529f9f1be

                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                    Filesize

                                                    342B

                                                    MD5

                                                    4db6217237cf9fcb731195982dacd123

                                                    SHA1

                                                    e1b505943b19672fde977fa6f1ef5108aa840d83

                                                    SHA256

                                                    96b66b0258a06196458ba66230f8d07cc8eb4516957933d7e7e60a5e8ff4402c

                                                    SHA512

                                                    e1a4d9051d7add36d8d8dde6cc5a8a74dc6e61b13ae147d592cc82ec943d32d602537019c9242e9faf054aaf5b607c28c093b64a53414caef3139957941b8091

                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                    Filesize

                                                    342B

                                                    MD5

                                                    d1da75f6799e816a29470051005e704c

                                                    SHA1

                                                    c3a459584373471302fdeb26114da7c81f7aec92

                                                    SHA256

                                                    b7d52230ce39ff401e7ce507e5c6bcb7325ef323d975f389736db15cb88045e1

                                                    SHA512

                                                    f97f1526e2aaf1a312dc51b719e212c1169bcb3f1775b64e9072f591baa2a0d794f7d4a054665788a1238d27c609384521094818193e1ed25793a8209d93a8b9

                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                    Filesize

                                                    342B

                                                    MD5

                                                    1565709f8ed7cc3cb6a3ac9726771c26

                                                    SHA1

                                                    377115ffbbcb1e13d937915c48d9ba4f40d0203a

                                                    SHA256

                                                    a14c391e9356202066e9ac43c95837c74a6be4c68bf5cd50ad5ed62b8c2572b9

                                                    SHA512

                                                    d1f0f437059b17907e2ae66eda58b3c83a32f10ffa39cdfd86b24ea3faf1b13073384ace52b9f48dcc1e4eb87b39c0947b3c30621170cdf3c443f5eeb6812448

                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                    Filesize

                                                    342B

                                                    MD5

                                                    cc437b16531ed1907d9095de4007422a

                                                    SHA1

                                                    97ed584474260dced70fd474f468f9d28f4f9898

                                                    SHA256

                                                    941d23eb2cc28b27462808d8a27efc57ff7213ad104469a1880e8081b60ac8fb

                                                    SHA512

                                                    0772b273392569aefc51189d6d51f82fec56aa83c43a188505d8726e43a9c9e34bf8eb39c142fbb73c0159c1300587a9b57083f43ec138696bddfa412fc484d6

                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                    Filesize

                                                    342B

                                                    MD5

                                                    4cf68f7eadf0e4b10f757d5ff07cab07

                                                    SHA1

                                                    2700e9aabefa9575f548515b1d47a354cad13a1d

                                                    SHA256

                                                    f01e5550f48f7160098770082161793c9f388b6a197a602d99001d1a39d7e2ee

                                                    SHA512

                                                    0562afe32994d5bd67141269a304df1b893941feddee8f5c40bcf9e63d6cb21463189b25f1ea4a0b8e1e3b366f80a024fa08ce1950eed669fd50bdc1417c9c68

                                                  • C:\Users\Admin\AppData\Local\Temp\12JaEZR6zX.bat

                                                    Filesize

                                                    201B

                                                    MD5

                                                    21420cfa625e6314f029214c6cef6413

                                                    SHA1

                                                    a064b8f1dfe5812ad10cfffc1e8f7581e3754a13

                                                    SHA256

                                                    f85910200e337bb2f2516255d6a378af8f9ea53863b33151ef5c89f983cad5c1

                                                    SHA512

                                                    66be5c3620da48a6191b03b67983fcdbb47b42a0e26ca6cc57c03dd4e87a1dec1ea5a12347c7cb02ec6043c9c8b1117a724576a0408f2494bd328a715e1726f7

                                                  • C:\Users\Admin\AppData\Local\Temp\51LR8ZxuJo.bat

                                                    Filesize

                                                    201B

                                                    MD5

                                                    565484dd03a594ee7762bf23290eec61

                                                    SHA1

                                                    529ae53433e9e41161fe42f85dd1be8484909e4f

                                                    SHA256

                                                    7a7b8838a2fb46aed61179955b4b04a11a010b7e448bb9a209bca9197c8339df

                                                    SHA512

                                                    85de07a8875ed18f73bd81b71d66e9d118d9e1a70368c4f9487f8d3c7dbf2ed6f409d44e5ce6eb9bef80c66a24cfe22230dbccc6b3f7a05ea4f82ecff910da25

                                                  • C:\Users\Admin\AppData\Local\Temp\Asmf6CRzTu.bat

                                                    Filesize

                                                    201B

                                                    MD5

                                                    18556368e60d675240f13c601d7371c6

                                                    SHA1

                                                    d03d9e66602cd972a46a514e57a186bd3115d955

                                                    SHA256

                                                    54090fd84bcc72590880de59637df58a1f3e3ccc1b01d2f5355f4c7c36dacbe9

                                                    SHA512

                                                    a98ccfb35807f1f35744c23d06ad861b979b5e8a708ba0397f0c43fa46a212fc4adcdc672c7a284dd9cb97ea8021e659dcd7a054a0e31cb69f9ce2463387f507

                                                  • C:\Users\Admin\AppData\Local\Temp\CabE497.tmp

                                                    Filesize

                                                    70KB

                                                    MD5

                                                    49aebf8cbd62d92ac215b2923fb1b9f5

                                                    SHA1

                                                    1723be06719828dda65ad804298d0431f6aff976

                                                    SHA256

                                                    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                                    SHA512

                                                    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                                  • C:\Users\Admin\AppData\Local\Temp\DegeIw2hse.bat

                                                    Filesize

                                                    201B

                                                    MD5

                                                    30bbbcd76d326211b1e0c96adc1468d0

                                                    SHA1

                                                    33c9db9811c4ff7b46522f5d2f654f5693ff0399

                                                    SHA256

                                                    776d7664182636d70aad896565e993a52f16ef2ceccfae5336cf5a266cea708a

                                                    SHA512

                                                    9768dc38dcf3dd7e5fa758fc56a40cf721b016e899d677d1d6d40e28461748277c122504e46c52c45be72d19c5dc437edb43e7b0542e599aa95e2f0b062829d3

                                                  • C:\Users\Admin\AppData\Local\Temp\L9j9zErPDE.bat

                                                    Filesize

                                                    201B

                                                    MD5

                                                    2a161febdea8c0d3d5adb0267816ceef

                                                    SHA1

                                                    2c25fca35613968b34697dfb8cdc90d7e6327018

                                                    SHA256

                                                    81c49d8d746f4c24653ff3716ccd8c116fb9de67ded6801e2647e6d205c065eb

                                                    SHA512

                                                    cf839b824147d22c900d9d81bd821d15ebb038a30ffb32b29e70a72ffc7f0da8eacc6e14c660fd56e0961bef0f1c0758b67c4db4e5ca7387d934aebb3da13232

                                                  • C:\Users\Admin\AppData\Local\Temp\LIqDUaLb8G.bat

                                                    Filesize

                                                    201B

                                                    MD5

                                                    e9e2a879dd8d25d7b91596b349db19d2

                                                    SHA1

                                                    fd9e753e1cf31ca078b9370c138c9ef3c7d0a5a6

                                                    SHA256

                                                    01bc924537ea0482834ebf17aaa4f0d4c53a7f414c8ca69f719c0a174b3f0bd7

                                                    SHA512

                                                    18d771d1b32621645f31fbd48e8770e9dc084f3971a0aa50c67daf9c9442972502a92c286d2ee528b2af8b3e2c2119d42ab05391af98fc3930b08f08a7ba356b

                                                  • C:\Users\Admin\AppData\Local\Temp\SpZgFYZT4y.bat

                                                    Filesize

                                                    201B

                                                    MD5

                                                    9c1ac1b9b8db0e74306e53ecc31c3a11

                                                    SHA1

                                                    ef15363f966a4e80dab6ace9690aeacbaecee44a

                                                    SHA256

                                                    d4a07ddaad812b9abaddbde26f5903ddc77cf7871f8b5b970a99184f31b177cf

                                                    SHA512

                                                    93a685efb689ee9f3ab444e8148a2c0722996554d49a77f1ac88692b9dad7c52e807adb3d8b63f613af5d2f4a7318856c2155baeb54dda5aea7ea1abae389dd3

                                                  • C:\Users\Admin\AppData\Local\Temp\TarE517.tmp

                                                    Filesize

                                                    181KB

                                                    MD5

                                                    4ea6026cf93ec6338144661bf1202cd1

                                                    SHA1

                                                    a1dec9044f750ad887935a01430bf49322fbdcb7

                                                    SHA256

                                                    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                                    SHA512

                                                    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                                  • C:\Users\Admin\AppData\Local\Temp\bhowVEGEG8.bat

                                                    Filesize

                                                    201B

                                                    MD5

                                                    45525ab7c6fe4a5c963ec88c000d2d17

                                                    SHA1

                                                    c7b5d3f70e3fd0e8446715601c6f615fbc9e8d21

                                                    SHA256

                                                    fe4de33c4a2dabf381ea0998b9b038120908aa8696484c651095502979193648

                                                    SHA512

                                                    e5523f98d49746b5cd3d914866c6301fa87cbd1321e72a47ca378b7a540c0bb6175ee955f187c5489c9ff5a1adc3ecea68f8aa086cc1024c05caffa6f347169c

                                                  • C:\Users\Admin\AppData\Local\Temp\etpQuxQFPn.bat

                                                    Filesize

                                                    201B

                                                    MD5

                                                    84463f6a5a9d9d121d7c084b82add9c7

                                                    SHA1

                                                    46c56d6e6a61f112d7185b29a70d2d4592bf76e6

                                                    SHA256

                                                    fa786dada1e4b929fd98fbd4134bf97bf5714991e0eafe7f96c541b645719bb9

                                                    SHA512

                                                    c818d9c3cc5be0610f4abb863a1174b1debc61465e9825fa76584fa43883a9282994b1264575350836cbf950330b77fc5710969b131b252ec0275d7a071874d3

                                                  • C:\Users\Admin\AppData\Local\Temp\lmMgPtgxf2.bat

                                                    Filesize

                                                    201B

                                                    MD5

                                                    89594de754635552c028a16db7bc5c75

                                                    SHA1

                                                    3cb5510427945e0ec9498c5f93713c050cc6a1cb

                                                    SHA256

                                                    ea3a3f7150597db70898ff1bee1f6368b2d64ac87ee92a9a60b19d9162ac1dd9

                                                    SHA512

                                                    5fe70ae2371c86596383cb002f844cccdedf18764134171111c9c1a0065e1aa44dad0f4c828fa8fd6e1b9562cb55cd7ec1caef22f8fa74694c1cd6e8d04d6c4c

                                                  • C:\Users\Admin\AppData\Local\Temp\ssDSZpddA3.bat

                                                    Filesize

                                                    201B

                                                    MD5

                                                    199b4d6d503527ae4a29c46061fea96b

                                                    SHA1

                                                    1f6ce601de668eb516b45bc8c32eec59706e498e

                                                    SHA256

                                                    cf54fbb94a1db2150ec679617c8de0bdcfe8cd106cb60361031aed234b04b223

                                                    SHA512

                                                    038dda80dd87ff233b020f6237652f87d98c19d82133552bab140d067a4c33bf682192878cf0789a888604e45288f5176f823af917dd995f655f306ce6d9fb3a

                                                  • C:\Users\Admin\AppData\Local\Temp\zcjutnjrcv.bat

                                                    Filesize

                                                    201B

                                                    MD5

                                                    a6f51b8599a777a599c3c0516ceb6392

                                                    SHA1

                                                    c63ce2c9abed3ed01530e33f4257b7f79b60648b

                                                    SHA256

                                                    813a094f2044d2becc4605cb5881bb60c027fb79587f9425418e40eae5b2d9b6

                                                    SHA512

                                                    b7be686caa06f2e59a0feae05b78bf9cb714700b28e17c0ff3d1bac3191b348fb6241501908c44b46779dd7a4bd55ff71601e77d35a6f6497513778b0295e97e

                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                    Filesize

                                                    7KB

                                                    MD5

                                                    a657c13315a5ad4bacd593f746f9f567

                                                    SHA1

                                                    17cc64d81a5c3734a28228af21d18d144105b08b

                                                    SHA256

                                                    314ab050270c7030ffd9202f2f1968460dc9ce88c977b2cc824cf3c6d3379c1f

                                                    SHA512

                                                    755e2ef25a688b50ff21a4b78e0e9f8f4340b6749084ba98ad7699ca8dba0408471431f54e32e4d1286ab9b4c82b1eb7cdefff42fc08e771de46c9a9ed3aeb3c

                                                  • C:\providercommon\1zu9dW.bat

                                                    Filesize

                                                    36B

                                                    MD5

                                                    6783c3ee07c7d151ceac57f1f9c8bed7

                                                    SHA1

                                                    17468f98f95bf504cc1f83c49e49a78526b3ea03

                                                    SHA256

                                                    8ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322

                                                    SHA512

                                                    c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8

                                                  • C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe

                                                    Filesize

                                                    197B

                                                    MD5

                                                    8088241160261560a02c84025d107592

                                                    SHA1

                                                    083121f7027557570994c9fc211df61730455bb5

                                                    SHA256

                                                    2072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1

                                                    SHA512

                                                    20d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478

                                                  • \providercommon\DllCommonsvc.exe

                                                    Filesize

                                                    1.0MB

                                                    MD5

                                                    bd31e94b4143c4ce49c17d3af46bcad0

                                                    SHA1

                                                    f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                                    SHA256

                                                    b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                                    SHA512

                                                    f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                                  • memory/468-383-0x0000000001210000-0x0000000001320000-memory.dmp

                                                    Filesize

                                                    1.1MB

                                                  • memory/828-79-0x0000000000350000-0x0000000000362000-memory.dmp

                                                    Filesize

                                                    72KB

                                                  • memory/1056-503-0x0000000000FD0000-0x00000000010E0000-memory.dmp

                                                    Filesize

                                                    1.1MB

                                                  • memory/1616-443-0x00000000000C0000-0x00000000001D0000-memory.dmp

                                                    Filesize

                                                    1.1MB

                                                  • memory/1684-563-0x00000000010D0000-0x00000000011E0000-memory.dmp

                                                    Filesize

                                                    1.1MB

                                                  • memory/1696-115-0x000000001B5E0000-0x000000001B8C2000-memory.dmp

                                                    Filesize

                                                    2.9MB

                                                  • memory/1732-68-0x0000000002280000-0x0000000002288000-memory.dmp

                                                    Filesize

                                                    32KB

                                                  • memory/1772-144-0x0000000000380000-0x0000000000490000-memory.dmp

                                                    Filesize

                                                    1.1MB

                                                  • memory/1932-57-0x000000001B6D0000-0x000000001B9B2000-memory.dmp

                                                    Filesize

                                                    2.9MB

                                                  • memory/2292-263-0x00000000011D0000-0x00000000012E0000-memory.dmp

                                                    Filesize

                                                    1.1MB

                                                  • memory/2320-17-0x0000000000680000-0x000000000068C000-memory.dmp

                                                    Filesize

                                                    48KB

                                                  • memory/2320-16-0x0000000000670000-0x000000000067C000-memory.dmp

                                                    Filesize

                                                    48KB

                                                  • memory/2320-15-0x0000000000550000-0x000000000055C000-memory.dmp

                                                    Filesize

                                                    48KB

                                                  • memory/2320-14-0x00000000001C0000-0x00000000001D2000-memory.dmp

                                                    Filesize

                                                    72KB

                                                  • memory/2320-13-0x00000000001D0000-0x00000000002E0000-memory.dmp

                                                    Filesize

                                                    1.1MB

                                                  • memory/2364-683-0x0000000000180000-0x0000000000290000-memory.dmp

                                                    Filesize

                                                    1.1MB

                                                  • memory/2428-623-0x0000000000010000-0x0000000000120000-memory.dmp

                                                    Filesize

                                                    1.1MB

                                                  • memory/2600-323-0x0000000000430000-0x0000000000442000-memory.dmp

                                                    Filesize

                                                    72KB

                                                  • memory/2612-121-0x0000000001FE0000-0x0000000001FE8000-memory.dmp

                                                    Filesize

                                                    32KB

                                                  • memory/2644-203-0x0000000000F10000-0x0000000001020000-memory.dmp

                                                    Filesize

                                                    1.1MB

                                                  • memory/2744-743-0x0000000000030000-0x0000000000140000-memory.dmp

                                                    Filesize

                                                    1.1MB