Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22/12/2024, 08:46
Behavioral task
behavioral1
Sample
JaffaCakes118_366bbe6fce1ca7967c69bc2d0727e5d85db3410d0590322518aeccacc94be1a3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_366bbe6fce1ca7967c69bc2d0727e5d85db3410d0590322518aeccacc94be1a3.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_366bbe6fce1ca7967c69bc2d0727e5d85db3410d0590322518aeccacc94be1a3.exe
-
Size
1.3MB
-
MD5
776b7b5288172dc0d90e99b63fe7ea36
-
SHA1
38c663a2786bd633ec2671d8a4c9a95b8c12ac01
-
SHA256
366bbe6fce1ca7967c69bc2d0727e5d85db3410d0590322518aeccacc94be1a3
-
SHA512
34868b0ae3b1509de9f034c689e9decb24df2ec18d8a5434a272c5eba99362d642737f3af9a0db210fee301f79fb83f523978bd110f5a201c134a134747f7d0a
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 51 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3024 3016 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2452 3016 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1148 3016 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2548 3016 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2968 3016 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 524 3016 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1964 3016 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 852 3016 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1688 3016 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1956 3016 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1052 3016 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1932 3016 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2464 3016 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 332 3016 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2160 3016 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1416 3016 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1304 3016 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1492 3016 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1000 3016 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2440 3016 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3056 3016 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1740 3016 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2268 3016 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2340 3016 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1412 3016 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2104 3016 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1824 3016 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 960 3016 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1520 3016 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2096 3016 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 944 3016 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1800 3016 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1236 3016 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1556 3016 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1564 3016 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 856 3016 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1888 3016 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1640 3016 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2556 3016 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2472 3016 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2176 3016 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2912 3016 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2980 3016 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1176 3016 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 704 3016 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 900 3016 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1516 3016 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2660 3016 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2652 3016 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2812 3016 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1608 3016 schtasks.exe 34 -
resource yara_rule behavioral1/files/0x000700000001927a-9.dat dcrat behavioral1/memory/2592-13-0x0000000000180000-0x0000000000290000-memory.dmp dcrat behavioral1/memory/1308-150-0x0000000000AA0000-0x0000000000BB0000-memory.dmp dcrat behavioral1/memory/644-209-0x0000000000CD0000-0x0000000000DE0000-memory.dmp dcrat behavioral1/memory/1228-269-0x0000000000DC0000-0x0000000000ED0000-memory.dmp dcrat behavioral1/memory/1236-330-0x00000000012F0000-0x0000000001400000-memory.dmp dcrat behavioral1/memory/616-626-0x0000000001380000-0x0000000001490000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 18 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2824 powershell.exe 2840 powershell.exe 2692 powershell.exe 2700 powershell.exe 2576 powershell.exe 2656 powershell.exe 2616 powershell.exe 1612 powershell.exe 2632 powershell.exe 2696 powershell.exe 2952 powershell.exe 2684 powershell.exe 2604 powershell.exe 2672 powershell.exe 2704 powershell.exe 1900 powershell.exe 2644 powershell.exe 2816 powershell.exe -
Executes dropped EXE 11 IoCs
pid Process 2592 DllCommonsvc.exe 1308 spoolsv.exe 644 spoolsv.exe 1228 spoolsv.exe 1236 spoolsv.exe 1908 spoolsv.exe 1412 spoolsv.exe 1148 spoolsv.exe 564 spoolsv.exe 616 spoolsv.exe 1648 spoolsv.exe -
Loads dropped DLL 2 IoCs
pid Process 2836 cmd.exe 2836 cmd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 10 IoCs
flow ioc 31 raw.githubusercontent.com 34 raw.githubusercontent.com 4 raw.githubusercontent.com 5 raw.githubusercontent.com 20 raw.githubusercontent.com 24 raw.githubusercontent.com 9 raw.githubusercontent.com 12 raw.githubusercontent.com 16 raw.githubusercontent.com 27 raw.githubusercontent.com -
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files (x86)\Google\CrashReports\6cb0b6c459d5d3 DllCommonsvc.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\cmd.exe DllCommonsvc.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\ebf1f9fa8afd6d DllCommonsvc.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\images\services.exe DllCommonsvc.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\images\c5b4cb5e9653cc DllCommonsvc.exe File created C:\Program Files\7-Zip\Lang\audiodg.exe DllCommonsvc.exe File created C:\Program Files\7-Zip\Lang\42af1c969fbb7b DllCommonsvc.exe File created C:\Program Files (x86)\Google\CrashReports\dwm.exe DllCommonsvc.exe -
Drops file in Windows directory 10 IoCs
description ioc Process File created C:\Windows\Performance\WinSAT\spoolsv.exe DllCommonsvc.exe File created C:\Windows\Performance\WinSAT\f3b6ecef712a24 DllCommonsvc.exe File created C:\Windows\de-DE\7a0fd90576e088 DllCommonsvc.exe File created C:\Windows\Performance\WinSAT\DataStore\taskhost.exe DllCommonsvc.exe File created C:\Windows\DigitalLocker\fr-FR\csrss.exe DllCommonsvc.exe File created C:\Windows\DigitalLocker\fr-FR\886983d96e3d3e DllCommonsvc.exe File created C:\Windows\de-DE\explorer.exe DllCommonsvc.exe File created C:\Windows\Performance\WinSAT\DataStore\b75386f1303e64 DllCommonsvc.exe File created C:\Windows\Migration\WTR\winlogon.exe DllCommonsvc.exe File created C:\Windows\Migration\WTR\cc11b995f2a76d DllCommonsvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_366bbe6fce1ca7967c69bc2d0727e5d85db3410d0590322518aeccacc94be1a3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 51 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1520 schtasks.exe 1888 schtasks.exe 2556 schtasks.exe 2660 schtasks.exe 944 schtasks.exe 1236 schtasks.exe 2812 schtasks.exe 524 schtasks.exe 332 schtasks.exe 1304 schtasks.exe 2440 schtasks.exe 1176 schtasks.exe 2548 schtasks.exe 1740 schtasks.exe 2912 schtasks.exe 2980 schtasks.exe 2652 schtasks.exe 1412 schtasks.exe 1824 schtasks.exe 2968 schtasks.exe 852 schtasks.exe 1956 schtasks.exe 1492 schtasks.exe 3056 schtasks.exe 2340 schtasks.exe 1556 schtasks.exe 856 schtasks.exe 704 schtasks.exe 1516 schtasks.exe 1148 schtasks.exe 1932 schtasks.exe 2104 schtasks.exe 1800 schtasks.exe 2472 schtasks.exe 1640 schtasks.exe 900 schtasks.exe 1052 schtasks.exe 2464 schtasks.exe 2160 schtasks.exe 1416 schtasks.exe 1000 schtasks.exe 960 schtasks.exe 1608 schtasks.exe 1564 schtasks.exe 2176 schtasks.exe 3024 schtasks.exe 2452 schtasks.exe 1964 schtasks.exe 1688 schtasks.exe 2268 schtasks.exe 2096 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 2592 DllCommonsvc.exe 2824 powershell.exe 2696 powershell.exe 2616 powershell.exe 2700 powershell.exe 2644 powershell.exe 2704 powershell.exe 2816 powershell.exe 1612 powershell.exe 2576 powershell.exe 2632 powershell.exe 2840 powershell.exe 2684 powershell.exe 2952 powershell.exe 2656 powershell.exe 2604 powershell.exe 1900 powershell.exe 2672 powershell.exe 2692 powershell.exe 1308 spoolsv.exe 644 spoolsv.exe 1228 spoolsv.exe 1236 spoolsv.exe 1908 spoolsv.exe 1412 spoolsv.exe 1148 spoolsv.exe 564 spoolsv.exe 616 spoolsv.exe 1648 spoolsv.exe -
Suspicious use of AdjustPrivilegeToken 29 IoCs
description pid Process Token: SeDebugPrivilege 2592 DllCommonsvc.exe Token: SeDebugPrivilege 2824 powershell.exe Token: SeDebugPrivilege 2696 powershell.exe Token: SeDebugPrivilege 2616 powershell.exe Token: SeDebugPrivilege 2700 powershell.exe Token: SeDebugPrivilege 2644 powershell.exe Token: SeDebugPrivilege 2704 powershell.exe Token: SeDebugPrivilege 2816 powershell.exe Token: SeDebugPrivilege 1612 powershell.exe Token: SeDebugPrivilege 2576 powershell.exe Token: SeDebugPrivilege 2632 powershell.exe Token: SeDebugPrivilege 2840 powershell.exe Token: SeDebugPrivilege 2684 powershell.exe Token: SeDebugPrivilege 2952 powershell.exe Token: SeDebugPrivilege 2656 powershell.exe Token: SeDebugPrivilege 2604 powershell.exe Token: SeDebugPrivilege 1900 powershell.exe Token: SeDebugPrivilege 2672 powershell.exe Token: SeDebugPrivilege 2692 powershell.exe Token: SeDebugPrivilege 1308 spoolsv.exe Token: SeDebugPrivilege 644 spoolsv.exe Token: SeDebugPrivilege 1228 spoolsv.exe Token: SeDebugPrivilege 1236 spoolsv.exe Token: SeDebugPrivilege 1908 spoolsv.exe Token: SeDebugPrivilege 1412 spoolsv.exe Token: SeDebugPrivilege 1148 spoolsv.exe Token: SeDebugPrivilege 564 spoolsv.exe Token: SeDebugPrivilege 616 spoolsv.exe Token: SeDebugPrivilege 1648 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2724 2708 JaffaCakes118_366bbe6fce1ca7967c69bc2d0727e5d85db3410d0590322518aeccacc94be1a3.exe 30 PID 2708 wrote to memory of 2724 2708 JaffaCakes118_366bbe6fce1ca7967c69bc2d0727e5d85db3410d0590322518aeccacc94be1a3.exe 30 PID 2708 wrote to memory of 2724 2708 JaffaCakes118_366bbe6fce1ca7967c69bc2d0727e5d85db3410d0590322518aeccacc94be1a3.exe 30 PID 2708 wrote to memory of 2724 2708 JaffaCakes118_366bbe6fce1ca7967c69bc2d0727e5d85db3410d0590322518aeccacc94be1a3.exe 30 PID 2724 wrote to memory of 2836 2724 WScript.exe 31 PID 2724 wrote to memory of 2836 2724 WScript.exe 31 PID 2724 wrote to memory of 2836 2724 WScript.exe 31 PID 2724 wrote to memory of 2836 2724 WScript.exe 31 PID 2836 wrote to memory of 2592 2836 cmd.exe 33 PID 2836 wrote to memory of 2592 2836 cmd.exe 33 PID 2836 wrote to memory of 2592 2836 cmd.exe 33 PID 2836 wrote to memory of 2592 2836 cmd.exe 33 PID 2592 wrote to memory of 1612 2592 DllCommonsvc.exe 86 PID 2592 wrote to memory of 1612 2592 DllCommonsvc.exe 86 PID 2592 wrote to memory of 1612 2592 DllCommonsvc.exe 86 PID 2592 wrote to memory of 2816 2592 DllCommonsvc.exe 87 PID 2592 wrote to memory of 2816 2592 DllCommonsvc.exe 87 PID 2592 wrote to memory of 2816 2592 DllCommonsvc.exe 87 PID 2592 wrote to memory of 2692 2592 DllCommonsvc.exe 88 PID 2592 wrote to memory of 2692 2592 DllCommonsvc.exe 88 PID 2592 wrote to memory of 2692 2592 DllCommonsvc.exe 88 PID 2592 wrote to memory of 2952 2592 DllCommonsvc.exe 90 PID 2592 wrote to memory of 2952 2592 DllCommonsvc.exe 90 PID 2592 wrote to memory of 2952 2592 DllCommonsvc.exe 90 PID 2592 wrote to memory of 2700 2592 DllCommonsvc.exe 91 PID 2592 wrote to memory of 2700 2592 DllCommonsvc.exe 91 PID 2592 wrote to memory of 2700 2592 DllCommonsvc.exe 91 PID 2592 wrote to memory of 2696 2592 DllCommonsvc.exe 92 PID 2592 wrote to memory of 2696 2592 DllCommonsvc.exe 92 PID 2592 wrote to memory of 2696 2592 DllCommonsvc.exe 92 PID 2592 wrote to memory of 2684 2592 DllCommonsvc.exe 93 PID 2592 wrote to memory of 2684 2592 DllCommonsvc.exe 93 PID 2592 wrote to memory of 2684 2592 DllCommonsvc.exe 93 PID 2592 wrote to memory of 2604 2592 DllCommonsvc.exe 94 PID 2592 wrote to memory of 2604 2592 DllCommonsvc.exe 94 PID 2592 wrote to memory of 2604 2592 DllCommonsvc.exe 94 PID 2592 wrote to memory of 2576 2592 DllCommonsvc.exe 95 PID 2592 wrote to memory of 2576 2592 DllCommonsvc.exe 95 PID 2592 wrote to memory of 2576 2592 DllCommonsvc.exe 95 PID 2592 wrote to memory of 2840 2592 DllCommonsvc.exe 96 PID 2592 wrote to memory of 2840 2592 DllCommonsvc.exe 96 PID 2592 wrote to memory of 2840 2592 DllCommonsvc.exe 96 PID 2592 wrote to memory of 2672 2592 DllCommonsvc.exe 97 PID 2592 wrote to memory of 2672 2592 DllCommonsvc.exe 97 PID 2592 wrote to memory of 2672 2592 DllCommonsvc.exe 97 PID 2592 wrote to memory of 2656 2592 DllCommonsvc.exe 98 PID 2592 wrote to memory of 2656 2592 DllCommonsvc.exe 98 PID 2592 wrote to memory of 2656 2592 DllCommonsvc.exe 98 PID 2592 wrote to memory of 2704 2592 DllCommonsvc.exe 99 PID 2592 wrote to memory of 2704 2592 DllCommonsvc.exe 99 PID 2592 wrote to memory of 2704 2592 DllCommonsvc.exe 99 PID 2592 wrote to memory of 2824 2592 DllCommonsvc.exe 100 PID 2592 wrote to memory of 2824 2592 DllCommonsvc.exe 100 PID 2592 wrote to memory of 2824 2592 DllCommonsvc.exe 100 PID 2592 wrote to memory of 1900 2592 DllCommonsvc.exe 101 PID 2592 wrote to memory of 1900 2592 DllCommonsvc.exe 101 PID 2592 wrote to memory of 1900 2592 DllCommonsvc.exe 101 PID 2592 wrote to memory of 2616 2592 DllCommonsvc.exe 102 PID 2592 wrote to memory of 2616 2592 DllCommonsvc.exe 102 PID 2592 wrote to memory of 2616 2592 DllCommonsvc.exe 102 PID 2592 wrote to memory of 2632 2592 DllCommonsvc.exe 103 PID 2592 wrote to memory of 2632 2592 DllCommonsvc.exe 103 PID 2592 wrote to memory of 2632 2592 DllCommonsvc.exe 103 PID 2592 wrote to memory of 2644 2592 DllCommonsvc.exe 104 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_366bbe6fce1ca7967c69bc2d0727e5d85db3410d0590322518aeccacc94be1a3.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_366bbe6fce1ca7967c69bc2d0727e5d85db3410d0590322518aeccacc94be1a3.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\providercommon\1zu9dW.bat" "3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1612
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\209d6542-69f6-11ef-b491-62cb582c238c\csrss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2816
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\SendTo\WmiPrvSE.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2692
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\209d6542-69f6-11ef-b491-62cb582c238c\lsass.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2952
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Performance\WinSAT\spoolsv.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2700
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\de-DE\explorer.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2696
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\7-Zip\Lang\audiodg.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2684
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\lsm.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2604
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Google\CrashReports\dwm.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2576
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\cmd.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2840
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\taskhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2672
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\Start Menu\conhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2656
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\209d6542-69f6-11ef-b491-62cb582c238c\explorer.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2704
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Performance\WinSAT\DataStore\taskhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2824
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\DigitalLocker\fr-FR\csrss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1900
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Migration\WTR\winlogon.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2616
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\images\services.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2632
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\All Users\winlogon.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2644
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\HwLG1J8NPK.bat"5⤵PID:3024
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:304
-
-
C:\Windows\Performance\WinSAT\spoolsv.exe"C:\Windows\Performance\WinSAT\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1308 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\muCkezbCVz.bat"7⤵PID:2028
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:28⤵PID:1036
-
-
C:\Windows\Performance\WinSAT\spoolsv.exe"C:\Windows\Performance\WinSAT\spoolsv.exe"8⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:644 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\k2jNhBdkgg.bat"9⤵PID:316
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:210⤵PID:2600
-
-
C:\Windows\Performance\WinSAT\spoolsv.exe"C:\Windows\Performance\WinSAT\spoolsv.exe"10⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1228 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\pCY6B1XXru.bat"11⤵PID:1788
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:212⤵PID:1692
-
-
C:\Windows\Performance\WinSAT\spoolsv.exe"C:\Windows\Performance\WinSAT\spoolsv.exe"12⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1236 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\OZJpL0Zeaq.bat"13⤵PID:2988
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:214⤵PID:2528
-
-
C:\Windows\Performance\WinSAT\spoolsv.exe"C:\Windows\Performance\WinSAT\spoolsv.exe"14⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1908 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\PfMhC4n1i0.bat"15⤵PID:2616
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:216⤵PID:1000
-
-
C:\Windows\Performance\WinSAT\spoolsv.exe"C:\Windows\Performance\WinSAT\spoolsv.exe"16⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1412 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\d5cQTyHbvx.bat"17⤵PID:2716
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:218⤵PID:2748
-
-
C:\Windows\Performance\WinSAT\spoolsv.exe"C:\Windows\Performance\WinSAT\spoolsv.exe"18⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1148 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\PeSwWR6joe.bat"19⤵PID:1704
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:220⤵PID:2288
-
-
C:\Windows\Performance\WinSAT\spoolsv.exe"C:\Windows\Performance\WinSAT\spoolsv.exe"20⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:564 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\LdN2yJpTNi.bat"21⤵PID:1972
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:222⤵PID:1768
-
-
C:\Windows\Performance\WinSAT\spoolsv.exe"C:\Windows\Performance\WinSAT\spoolsv.exe"22⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:616 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\U04fYIssV3.bat"23⤵PID:3056
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:224⤵PID:2848
-
-
C:\Windows\Performance\WinSAT\spoolsv.exe"C:\Windows\Performance\WinSAT\spoolsv.exe"24⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1648
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\Recovery\209d6542-69f6-11ef-b491-62cb582c238c\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3024
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Recovery\209d6542-69f6-11ef-b491-62cb582c238c\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2452
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\Recovery\209d6542-69f6-11ef-b491-62cb582c238c\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1148
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 7 /tr "'C:\Users\Admin\SendTo\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2548
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Users\Admin\SendTo\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2968
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 13 /tr "'C:\Users\Admin\SendTo\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:524
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 11 /tr "'C:\Recovery\209d6542-69f6-11ef-b491-62cb582c238c\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1964
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Recovery\209d6542-69f6-11ef-b491-62cb582c238c\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:852
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 11 /tr "'C:\Recovery\209d6542-69f6-11ef-b491-62cb582c238c\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1688
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 10 /tr "'C:\Windows\Performance\WinSAT\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1956
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Windows\Performance\WinSAT\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1052
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 6 /tr "'C:\Windows\Performance\WinSAT\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1932
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 13 /tr "'C:\Windows\de-DE\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2464
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Windows\de-DE\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:332
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 9 /tr "'C:\Windows\de-DE\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2160
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 14 /tr "'C:\Program Files\7-Zip\Lang\audiodg.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1416
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Program Files\7-Zip\Lang\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1304
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 11 /tr "'C:\Program Files\7-Zip\Lang\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1492
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 6 /tr "'C:\providercommon\lsm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1000
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\providercommon\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2440
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 7 /tr "'C:\providercommon\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3056
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Google\CrashReports\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1740
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Program Files (x86)\Google\CrashReports\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2268
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Google\CrashReports\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2340
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\cmd.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1412
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2104
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1824
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 5 /tr "'C:\providercommon\taskhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:960
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\providercommon\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1520
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 10 /tr "'C:\providercommon\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2096
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 10 /tr "'C:\Users\Admin\Start Menu\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:944
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Users\Admin\Start Menu\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1800
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 6 /tr "'C:\Users\Admin\Start Menu\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1236
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 6 /tr "'C:\Recovery\209d6542-69f6-11ef-b491-62cb582c238c\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1556
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Recovery\209d6542-69f6-11ef-b491-62cb582c238c\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1564
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 14 /tr "'C:\Recovery\209d6542-69f6-11ef-b491-62cb582c238c\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:856
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 8 /tr "'C:\Windows\Performance\WinSAT\DataStore\taskhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1888
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Windows\Performance\WinSAT\DataStore\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1640
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 12 /tr "'C:\Windows\Performance\WinSAT\DataStore\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2556
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Windows\DigitalLocker\fr-FR\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2472
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\DigitalLocker\fr-FR\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2176
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\Windows\DigitalLocker\fr-FR\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2912
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 6 /tr "'C:\Windows\Migration\WTR\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2980
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Windows\Migration\WTR\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1176
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 8 /tr "'C:\Windows\Migration\WTR\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:704
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\images\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:900
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\images\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1516
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\images\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2660
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 5 /tr "'C:\Users\All Users\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2652
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Users\All Users\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2812
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 13 /tr "'C:\Users\All Users\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1608
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550f1eaf43cb769529e1f7f19068fa327
SHA1920c3d859a2bdb0324e026a7be8f9ca4804901dd
SHA2562ba75e2d729fc4336b4865f9cf477b08beaaa20df281e488a9afa0a81f4c48ba
SHA5120245a14e8f4ed368f93fd938317938ac8e90c4741558e10bd9f905c9d5e557b8694c7b2287a6afcfac54a2d6cfc66785373a63ff6ef602a1aa95dcd466823850
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52316cfbaa5e68dee8f28efc70681bcd0
SHA19acd7aed047eb73c4b04f2df3548a6df9afb7e08
SHA256eadc04ac003b150bb3078d75ea96a66e31d4cd1233395fd20151752111b5c5e2
SHA51281c4fc1e29431b4fe08280cb2ea764c2bc963df050d89542b6a032ad19de47bebb080d444b73515cca9cf661ff819ddf863d23676cfc00a79d724faedc385202
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50eb2fedcb28feea966b04af43ba4e461
SHA103c7999c65e73c880fbe81fa372b9341610a8b86
SHA25631d9591210c8f60ed81f2244fd4b9ae118a6ee5edbe3ba9edb6d191364b5a200
SHA512600bd74caf158dbdb355f2e8adc9ce93f1f782b65dc5b4d6b609303590ff70f5a2cf0a9de6beabf081e88c7c48b3fda1e4fa0ed93dcf9e68c261825518663721
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8d0de7377a4cf287f6869704427623b
SHA1e262193d75a07ae6ad11832a3eb2fbfcec9b35d9
SHA256c23f2cde81836b16d8f09af53c9ce761dc953271808c3c64d4463ca53c8aac7e
SHA5121e0ccebac0f34c950a72d8cb5f8d27df6c569a8b6d3f6f135e09ffa1720388105aa25ecfb58ea8167ccb92ff8d2a5970e6aae1c8d9048da3a55d210825bb6eb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5922ba578d11df661aac32450f2db57c3
SHA191e22aaf65ea363c9ab35458b8470cc183477803
SHA2562e152c42556fa0b633eadbc90f2c8fd0a927b2a321bc829ea2dfd919ae8bafad
SHA51213e26b470cab8e4364c00ed81de309b1b1f0191df6791d425df62903fee9fd7b45b4e308bce76e501debd6d0701162a494e80fb8d0fbcf4abfdb95624a872999
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c9fd59f0056080452e2e951c1480302
SHA1b32b33df36980ff347f2789894be161d1de123a7
SHA2565869bd83d23be71b86ed3aacd02535ed638c1221d4039e4c8065b6721ab2ccf4
SHA5120bfaa1d20109e65e3efebc4ac4193cff3a5fe546ac850545bd46b78c2a828c9de2fdd0b997142a19a1fdfa488590a49918ed4f60d1d28865f02bd19bbdb83a9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510bc35d1b0cafa02a52528b477894b43
SHA11332b1e7a766c1e8dffe7ffed651d27da18c051c
SHA256b8354f665892b55af0b93120d814c7cacc3f6630c087b234d8ace466beee2285
SHA512318c0598b791f3ccbe19aadbbaa121d9ef3d35d0e42b37ac315c69abf427eec368c386dd3fe4c2f11a062bdcc1b3bec42d07c2c44910662291eaa443488c4ec6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fd9f87826f037d34b096d32cca880f2
SHA1451f505cc9e06fa34d78b8d5070d035dd0571e5f
SHA2569e7e1e30f85ca14b647f870ab894efdbdebc3256d3131c451f43abd9fe1ca75f
SHA512b487c8f0f20fe193dcd09bf6979467649f29002b9f59b8da16636cbe46d87175588eb005ffea26a0f7e7a8a2db2d03a51913d8f25d1ae88bd7b54d93ed9f86cb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
206B
MD50449d8cc42e1110d3d43e17d1ba18510
SHA1ec0c1dee1e354667cc0bafd51eb1a23ed6c4a301
SHA2563bf602b08bfc1dcd49972ff9690a36440207b3a3538f99b642e8d79ea0fdacc0
SHA512c89bcba8704de304e70b87cc8c22b152a3d9bd7f615c39e78f31ab06bb0435156b119bb20e1b5b849fe12c7e4346cb155c0658e54d3ea590a5240330eafc4197
-
Filesize
206B
MD5e33f79471dc41049e1b069969efcec4e
SHA1fe807f5347832cf7054a2bcffe7e7985cdeea00c
SHA2564f35152c999e555121f12d5205af7b9a81137a1d7027902e477c1c3f3e1f4d22
SHA512a336df9f0b94ee591fb0830218bb24faf2d1d596a571b2ab5b4866a999826b0e5c00a3baff32204611db3a215c9b0ad334fa088ff51e88c59e18856a52c5142a
-
Filesize
206B
MD5258afb939d40b8bd6d5ce31610854b68
SHA1f5f3548c81989babc3bc57dca447b1e486fd6af4
SHA2569308df22e931e207590750e03081afbbcc69fa103974b199303f280c5b2fe11a
SHA512e6d50a0b03c0dfe1743a777aa4c60bf939035a0336a88e22830529983fc1559e7236b318a9989020838d30e6f5f9d84f67b1091151c2bf7d1176effedfaecbf7
-
Filesize
206B
MD5b72b644350b2e16273d486fa8e8c093d
SHA14303363ada83284f10b8ed786f7a60ee014ce791
SHA25688414ab5af85f005b97db51d685a7a249bfea8cdaf431407ab673341185dc537
SHA512452e83072ba0d1337457b4b5527b3cf217aad362e7c3bd53fa750e7a6f76d8e7e74e448c9920c5a790ce45190f7b3a8c2fe87850b72fdc4b907030039c7b7da9
-
Filesize
206B
MD532f2fc46b02a9e665e487f3117685c21
SHA180ccbe0aed433c3c177821848f28ea317db23e5c
SHA2563363d586600ce354f916277a53c458afad688e3cb602d482ed8509549f8299e4
SHA512053d34a4ab522f6be6bf81c1ca05ca3030fe6e546bbf7dbcd39506e56d466295a7649c1a4d1a4a1b3d85940a79b1311a02d9dbcc6a22af92fb4df60516e9858f
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
206B
MD54d8e8f870ac60926b6f4347b64ffefb5
SHA1a2d028e3a44fbd6f57599ef4e8f4710df2ffcd99
SHA2566ee0a4b4a94b3ce3361377e95b40dc3e2824d79b585dce1acf63a4cd32197fec
SHA512e8f9b28b815fd378d972f2ad19a94a21c173b5eabfd0ceadf817a1408554597940f2f59ad4f20c7e6ca445804dacc92096f56da1f050546855e8f3fbf96be6fb
-
Filesize
206B
MD506a67de02a704b2defeca2321f7df775
SHA188c56332392f608693d25412c5ae8cfe8d96b3c4
SHA2561c17a26d9ec43b003f6f3033286f4a0c478df6e6f0b25ce9527dc4e247ba4402
SHA512fdec8043b5186db18a3f29debaf4d46d5696c8db6534eeed420c02025ab34391f17fa9e44720610ad64036c14773092998d4c241c192729298db75ddb1a0b727
-
Filesize
206B
MD5412d390494353093875f4d2fd57a50d5
SHA1217ccce358f309184e2746543f67fdbdab1f7e25
SHA25630a90c1ecd712b7c403578251f352c22f6d7f0600eb3c9f2d7e25d8f5cd668ae
SHA5127472cb7af4546a654e20843ede753dacfaa2a15ef1e7594935ec7fa3574859bf1742e0d694ad76b4c6241aad3068ed7586e5ce7ea297fa822759ed9de0e8d1f3
-
Filesize
206B
MD5fa750408893e50804ad42ec77dee9d98
SHA1b5c84c547f5263c2c1bdfc808a435ca34fa4d88a
SHA256fd6edf8772792e1caf5b3df1d2f762be6eac04dcc210a32c572ec8e8f0ce7449
SHA512406f998396e4c139873e7f282813c9dba7ba0d8692e3e319b7441863126f3779ba31e47d2a9a6c82782ec5e4edf9b58c5bf78bb475304d59e4aa5a61afd81c24
-
Filesize
206B
MD5fa952596cdc2e433b0828aa312169df9
SHA104aed24ce8219256ff0d40fe694b289425ed9f9d
SHA2562f6eab65018fca3159aea2edc7fd7e2912744d2063ab1b06cf31663332a5637e
SHA5120bb96bb4eacc41472f748ab286a24173a6a6f7318887c948e871d901fbaf0f500cdd074da00cfb0ad778c3c1542b472088f5c20c3dfddbd280e95f780e69ca5e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD526529c648268263ec77e63860f52f896
SHA1cb488cef414c27a0f25e53c35588fa5a12a746ac
SHA2565b67350901adb46e341f53ce9bfddc7650da478d8f25615788b1ef0ae9de1dcf
SHA512ba5d1d1911c8f3c1d97370d9dcca0cd45eda33c033cc196a3e7b6a2923726581b087f5c7524d555a1e8b94b065349efca22c0893957a3a1caed605775b55b636
-
Filesize
36B
MD56783c3ee07c7d151ceac57f1f9c8bed7
SHA117468f98f95bf504cc1f83c49e49a78526b3ea03
SHA2568ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322
SHA512c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8
-
Filesize
197B
MD58088241160261560a02c84025d107592
SHA1083121f7027557570994c9fc211df61730455bb5
SHA2562072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1
SHA51220d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394