Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
22/12/2024, 18:15
Behavioral task
behavioral1
Sample
JaffaCakes118_747c9e38eb6ded3426cefefb85cf585f7a639640851e04f9ff6f9c51331a924f.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_747c9e38eb6ded3426cefefb85cf585f7a639640851e04f9ff6f9c51331a924f.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_747c9e38eb6ded3426cefefb85cf585f7a639640851e04f9ff6f9c51331a924f.exe
-
Size
1.3MB
-
MD5
9c4f6f49333b15641ee79cf7c8dfd68c
-
SHA1
fac67c433c46d05ac4b03b57f1a590a1cbe46ded
-
SHA256
747c9e38eb6ded3426cefefb85cf585f7a639640851e04f9ff6f9c51331a924f
-
SHA512
01714c967f8348b00c1073f82b41d0db41faeeabc8f04848bea6caad242501bb9e9ad13088151b68401281c4a5da33544592cf3e49c0f1b07aa002bb22daf02e
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 48 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2844 2808 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2904 2808 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2960 2808 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2796 2808 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2680 2808 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2700 2808 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2852 2808 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 552 2808 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 572 2808 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3000 2808 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1712 2808 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2772 2808 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2980 2808 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2992 2808 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 480 2808 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1464 2808 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3052 2808 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2008 2808 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2044 2808 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1568 2808 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1324 2808 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1948 2808 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2644 2808 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2332 2808 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2240 2808 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2052 2808 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1748 2808 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 404 2808 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1636 2808 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2476 2808 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 972 2808 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 944 2808 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1268 2808 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 376 2808 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 236 2808 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1476 2808 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1892 2808 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1232 2808 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1224 2808 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2116 2808 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2580 2808 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1316 2808 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2492 2808 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2860 2808 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1480 2808 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1876 2808 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 896 2808 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 628 2808 schtasks.exe 35 -
resource yara_rule behavioral1/files/0x00070000000186f1-10.dat dcrat behavioral1/memory/2508-13-0x0000000000EE0000-0x0000000000FF0000-memory.dmp dcrat behavioral1/memory/1424-143-0x00000000012B0000-0x00000000013C0000-memory.dmp dcrat behavioral1/memory/896-380-0x00000000002F0000-0x0000000000400000-memory.dmp dcrat behavioral1/memory/1288-440-0x0000000000840000-0x0000000000950000-memory.dmp dcrat behavioral1/memory/2640-500-0x0000000001340000-0x0000000001450000-memory.dmp dcrat behavioral1/memory/944-619-0x00000000001C0000-0x00000000002D0000-memory.dmp dcrat behavioral1/memory/2488-679-0x0000000000970000-0x0000000000A80000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 17 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2020 powershell.exe 1656 powershell.exe 1532 powershell.exe 1212 powershell.exe 2640 powershell.exe 2400 powershell.exe 2440 powershell.exe 1648 powershell.exe 2408 powershell.exe 892 powershell.exe 316 powershell.exe 1584 powershell.exe 2588 powershell.exe 2596 powershell.exe 2496 powershell.exe 1472 powershell.exe 2392 powershell.exe -
Executes dropped EXE 11 IoCs
pid Process 2508 DllCommonsvc.exe 1424 System.exe 2700 System.exe 2252 System.exe 316 System.exe 896 System.exe 1288 System.exe 2640 System.exe 940 System.exe 944 System.exe 2488 System.exe -
Loads dropped DLL 2 IoCs
pid Process 2084 cmd.exe 2084 cmd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 11 IoCs
flow ioc 9 raw.githubusercontent.com 16 raw.githubusercontent.com 22 raw.githubusercontent.com 26 raw.githubusercontent.com 29 raw.githubusercontent.com 36 raw.githubusercontent.com 4 raw.githubusercontent.com 5 raw.githubusercontent.com 33 raw.githubusercontent.com 12 raw.githubusercontent.com 19 raw.githubusercontent.com -
Drops file in Program Files directory 9 IoCs
description ioc Process File created C:\Program Files\Windows Photo Viewer\de-DE\spoolsv.exe DllCommonsvc.exe File created C:\Program Files\Microsoft Games\Chess\fr-FR\conhost.exe DllCommonsvc.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\sppsvc.exe DllCommonsvc.exe File created C:\Program Files (x86)\Windows Media Player\es-ES\DllCommonsvc.exe DllCommonsvc.exe File opened for modification C:\Program Files (x86)\Windows Media Player\es-ES\DllCommonsvc.exe DllCommonsvc.exe File created C:\Program Files\Microsoft Games\Chess\fr-FR\088424020bedd6 DllCommonsvc.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\0a1fd5f707cd16 DllCommonsvc.exe File created C:\Program Files (x86)\Windows Media Player\es-ES\a76d7bf15d8370 DllCommonsvc.exe File created C:\Program Files\Windows Photo Viewer\de-DE\f3b6ecef712a24 DllCommonsvc.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File created C:\Windows\L2Schemas\886983d96e3d3e DllCommonsvc.exe File created C:\Windows\Speech\conhost.exe DllCommonsvc.exe File created C:\Windows\Speech\088424020bedd6 DllCommonsvc.exe File created C:\Windows\PLA\System\System.exe DllCommonsvc.exe File created C:\Windows\PLA\System\27d1bcfc3c54e0 DllCommonsvc.exe File created C:\Windows\IME\IMESC5\HELP\lsass.exe DllCommonsvc.exe File created C:\Windows\IME\IMESC5\HELP\6203df4a6bafc7 DllCommonsvc.exe File created C:\Windows\L2Schemas\csrss.exe DllCommonsvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_747c9e38eb6ded3426cefefb85cf585f7a639640851e04f9ff6f9c51331a924f.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 48 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2580 schtasks.exe 2860 schtasks.exe 2904 schtasks.exe 1948 schtasks.exe 1224 schtasks.exe 2772 schtasks.exe 2980 schtasks.exe 480 schtasks.exe 2008 schtasks.exe 2044 schtasks.exe 2960 schtasks.exe 2700 schtasks.exe 3000 schtasks.exe 2240 schtasks.exe 896 schtasks.exe 628 schtasks.exe 1316 schtasks.exe 3052 schtasks.exe 2644 schtasks.exe 1748 schtasks.exe 236 schtasks.exe 1480 schtasks.exe 2844 schtasks.exe 1568 schtasks.exe 404 schtasks.exe 1892 schtasks.exe 552 schtasks.exe 1712 schtasks.exe 2332 schtasks.exe 1268 schtasks.exe 376 schtasks.exe 2116 schtasks.exe 2796 schtasks.exe 2992 schtasks.exe 944 schtasks.exe 2492 schtasks.exe 1876 schtasks.exe 572 schtasks.exe 2476 schtasks.exe 1232 schtasks.exe 1324 schtasks.exe 2052 schtasks.exe 1636 schtasks.exe 972 schtasks.exe 1476 schtasks.exe 2680 schtasks.exe 2852 schtasks.exe 1464 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 2508 DllCommonsvc.exe 2496 powershell.exe 2400 powershell.exe 2020 powershell.exe 2392 powershell.exe 892 powershell.exe 2596 powershell.exe 1656 powershell.exe 1648 powershell.exe 1212 powershell.exe 2408 powershell.exe 1472 powershell.exe 1532 powershell.exe 2440 powershell.exe 1584 powershell.exe 2640 powershell.exe 316 powershell.exe 2588 powershell.exe 1424 System.exe 2700 System.exe 2252 System.exe 316 System.exe 896 System.exe 1288 System.exe 2640 System.exe 940 System.exe 944 System.exe 2488 System.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
description pid Process Token: SeDebugPrivilege 2508 DllCommonsvc.exe Token: SeDebugPrivilege 2496 powershell.exe Token: SeDebugPrivilege 2400 powershell.exe Token: SeDebugPrivilege 2020 powershell.exe Token: SeDebugPrivilege 2392 powershell.exe Token: SeDebugPrivilege 892 powershell.exe Token: SeDebugPrivilege 2596 powershell.exe Token: SeDebugPrivilege 1656 powershell.exe Token: SeDebugPrivilege 1648 powershell.exe Token: SeDebugPrivilege 1212 powershell.exe Token: SeDebugPrivilege 2408 powershell.exe Token: SeDebugPrivilege 1472 powershell.exe Token: SeDebugPrivilege 1532 powershell.exe Token: SeDebugPrivilege 2440 powershell.exe Token: SeDebugPrivilege 1584 powershell.exe Token: SeDebugPrivilege 2640 powershell.exe Token: SeDebugPrivilege 316 powershell.exe Token: SeDebugPrivilege 2588 powershell.exe Token: SeDebugPrivilege 1424 System.exe Token: SeDebugPrivilege 2700 System.exe Token: SeDebugPrivilege 2252 System.exe Token: SeDebugPrivilege 316 System.exe Token: SeDebugPrivilege 896 System.exe Token: SeDebugPrivilege 1288 System.exe Token: SeDebugPrivilege 2640 System.exe Token: SeDebugPrivilege 940 System.exe Token: SeDebugPrivilege 944 System.exe Token: SeDebugPrivilege 2488 System.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2584 wrote to memory of 2640 2584 JaffaCakes118_747c9e38eb6ded3426cefefb85cf585f7a639640851e04f9ff6f9c51331a924f.exe 30 PID 2584 wrote to memory of 2640 2584 JaffaCakes118_747c9e38eb6ded3426cefefb85cf585f7a639640851e04f9ff6f9c51331a924f.exe 30 PID 2584 wrote to memory of 2640 2584 JaffaCakes118_747c9e38eb6ded3426cefefb85cf585f7a639640851e04f9ff6f9c51331a924f.exe 30 PID 2584 wrote to memory of 2640 2584 JaffaCakes118_747c9e38eb6ded3426cefefb85cf585f7a639640851e04f9ff6f9c51331a924f.exe 30 PID 2640 wrote to memory of 2084 2640 WScript.exe 32 PID 2640 wrote to memory of 2084 2640 WScript.exe 32 PID 2640 wrote to memory of 2084 2640 WScript.exe 32 PID 2640 wrote to memory of 2084 2640 WScript.exe 32 PID 2084 wrote to memory of 2508 2084 cmd.exe 34 PID 2084 wrote to memory of 2508 2084 cmd.exe 34 PID 2084 wrote to memory of 2508 2084 cmd.exe 34 PID 2084 wrote to memory of 2508 2084 cmd.exe 34 PID 2508 wrote to memory of 2496 2508 DllCommonsvc.exe 84 PID 2508 wrote to memory of 2496 2508 DllCommonsvc.exe 84 PID 2508 wrote to memory of 2496 2508 DllCommonsvc.exe 84 PID 2508 wrote to memory of 2408 2508 DllCommonsvc.exe 85 PID 2508 wrote to memory of 2408 2508 DllCommonsvc.exe 85 PID 2508 wrote to memory of 2408 2508 DllCommonsvc.exe 85 PID 2508 wrote to memory of 1532 2508 DllCommonsvc.exe 87 PID 2508 wrote to memory of 1532 2508 DllCommonsvc.exe 87 PID 2508 wrote to memory of 1532 2508 DllCommonsvc.exe 87 PID 2508 wrote to memory of 1656 2508 DllCommonsvc.exe 89 PID 2508 wrote to memory of 1656 2508 DllCommonsvc.exe 89 PID 2508 wrote to memory of 1656 2508 DllCommonsvc.exe 89 PID 2508 wrote to memory of 1212 2508 DllCommonsvc.exe 90 PID 2508 wrote to memory of 1212 2508 DllCommonsvc.exe 90 PID 2508 wrote to memory of 1212 2508 DllCommonsvc.exe 90 PID 2508 wrote to memory of 892 2508 DllCommonsvc.exe 92 PID 2508 wrote to memory of 892 2508 DllCommonsvc.exe 92 PID 2508 wrote to memory of 892 2508 DllCommonsvc.exe 92 PID 2508 wrote to memory of 2596 2508 DllCommonsvc.exe 94 PID 2508 wrote to memory of 2596 2508 DllCommonsvc.exe 94 PID 2508 wrote to memory of 2596 2508 DllCommonsvc.exe 94 PID 2508 wrote to memory of 1472 2508 DllCommonsvc.exe 95 PID 2508 wrote to memory of 1472 2508 DllCommonsvc.exe 95 PID 2508 wrote to memory of 1472 2508 DllCommonsvc.exe 95 PID 2508 wrote to memory of 2400 2508 DllCommonsvc.exe 96 PID 2508 wrote to memory of 2400 2508 DllCommonsvc.exe 96 PID 2508 wrote to memory of 2400 2508 DllCommonsvc.exe 96 PID 2508 wrote to memory of 2020 2508 DllCommonsvc.exe 97 PID 2508 wrote to memory of 2020 2508 DllCommonsvc.exe 97 PID 2508 wrote to memory of 2020 2508 DllCommonsvc.exe 97 PID 2508 wrote to memory of 316 2508 DllCommonsvc.exe 98 PID 2508 wrote to memory of 316 2508 DllCommonsvc.exe 98 PID 2508 wrote to memory of 316 2508 DllCommonsvc.exe 98 PID 2508 wrote to memory of 1648 2508 DllCommonsvc.exe 99 PID 2508 wrote to memory of 1648 2508 DllCommonsvc.exe 99 PID 2508 wrote to memory of 1648 2508 DllCommonsvc.exe 99 PID 2508 wrote to memory of 2392 2508 DllCommonsvc.exe 100 PID 2508 wrote to memory of 2392 2508 DllCommonsvc.exe 100 PID 2508 wrote to memory of 2392 2508 DllCommonsvc.exe 100 PID 2508 wrote to memory of 2588 2508 DllCommonsvc.exe 101 PID 2508 wrote to memory of 2588 2508 DllCommonsvc.exe 101 PID 2508 wrote to memory of 2588 2508 DllCommonsvc.exe 101 PID 2508 wrote to memory of 1584 2508 DllCommonsvc.exe 102 PID 2508 wrote to memory of 1584 2508 DllCommonsvc.exe 102 PID 2508 wrote to memory of 1584 2508 DllCommonsvc.exe 102 PID 2508 wrote to memory of 2640 2508 DllCommonsvc.exe 103 PID 2508 wrote to memory of 2640 2508 DllCommonsvc.exe 103 PID 2508 wrote to memory of 2640 2508 DllCommonsvc.exe 103 PID 2508 wrote to memory of 2440 2508 DllCommonsvc.exe 104 PID 2508 wrote to memory of 2440 2508 DllCommonsvc.exe 104 PID 2508 wrote to memory of 2440 2508 DllCommonsvc.exe 104 PID 2508 wrote to memory of 3068 2508 DllCommonsvc.exe 118 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_747c9e38eb6ded3426cefefb85cf585f7a639640851e04f9ff6f9c51331a924f.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_747c9e38eb6ded3426cefefb85cf585f7a639640851e04f9ff6f9c51331a924f.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\providercommon\1zu9dW.bat" "3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2496
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Media Player\es-ES\DllCommonsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2408
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\All Users\Microsoft Help\winlogon.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1532
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Speech\conhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1656
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\PLA\System\System.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1212
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\lsass.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:892
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\WMIADAP.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2596
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Photo Viewer\de-DE\spoolsv.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1472
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\IME\IMESC5\HELP\lsass.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2400
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\spoolsv.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2020
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\480d7142-91a3-11ef-b9f6-6e5a89f5a3c7\audiodg.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:316
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\explorer.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1648
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\480d7142-91a3-11ef-b9f6-6e5a89f5a3c7\services.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2392
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Microsoft Games\Chess\fr-FR\conhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2588
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\L2Schemas\csrss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1584
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\sppsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2640
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\explorer.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2440
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\upUBl0JO6k.bat"5⤵PID:3068
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:2312
-
-
C:\Windows\PLA\System\System.exe"C:\Windows\PLA\System\System.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1424 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\uLZJId2lFR.bat"7⤵PID:2952
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:28⤵PID:2052
-
-
C:\Windows\PLA\System\System.exe"C:\Windows\PLA\System\System.exe"8⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2700 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\lmMgPtgxf2.bat"9⤵PID:2736
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:210⤵PID:552
-
-
C:\Windows\PLA\System\System.exe"C:\Windows\PLA\System\System.exe"10⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2252 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\1hmmkqxEk5.bat"11⤵PID:1020
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:212⤵PID:2804
-
-
C:\Windows\PLA\System\System.exe"C:\Windows\PLA\System\System.exe"12⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:316 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\HmDgHlPzdV.bat"13⤵PID:2200
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:214⤵PID:1860
-
-
C:\Windows\PLA\System\System.exe"C:\Windows\PLA\System\System.exe"14⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:896 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\qzxbGmHcY3.bat"15⤵PID:1920
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:216⤵PID:1712
-
-
C:\Windows\PLA\System\System.exe"C:\Windows\PLA\System\System.exe"16⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1288 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\wHaMzi6eYE.bat"17⤵PID:1360
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:218⤵PID:2220
-
-
C:\Windows\PLA\System\System.exe"C:\Windows\PLA\System\System.exe"18⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2640 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\cqXkQwtlzQ.bat"19⤵PID:3036
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:220⤵PID:3032
-
-
C:\Windows\PLA\System\System.exe"C:\Windows\PLA\System\System.exe"20⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:940 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\1hmmkqxEk5.bat"21⤵PID:328
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:222⤵PID:1648
-
-
C:\Windows\PLA\System\System.exe"C:\Windows\PLA\System\System.exe"22⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:944 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\cqXkQwtlzQ.bat"23⤵PID:2588
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:224⤵PID:2296
-
-
C:\Windows\PLA\System\System.exe"C:\Windows\PLA\System\System.exe"24⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2488 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\u02VouYs0z.bat"25⤵PID:2680
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:226⤵PID:2940
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvcD" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows Media Player\es-ES\DllCommonsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2844
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvc" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Media Player\es-ES\DllCommonsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2904
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvcD" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Media Player\es-ES\DllCommonsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2960
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 9 /tr "'C:\Users\All Users\Microsoft Help\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2796
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Users\All Users\Microsoft Help\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2680
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 7 /tr "'C:\Users\All Users\Microsoft Help\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2700
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 10 /tr "'C:\Windows\Speech\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2852
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Windows\Speech\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:552
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 13 /tr "'C:\Windows\Speech\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:572
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 13 /tr "'C:\Windows\PLA\System\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3000
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Windows\PLA\System\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1712
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 6 /tr "'C:\Windows\PLA\System\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2772
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 8 /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2980
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2992
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 5 /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:480
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WMIADAPW" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\WMIADAP.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1464
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WMIADAP" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\WMIADAP.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3052
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WMIADAPW" /sc MINUTE /mo 10 /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\WMIADAP.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2008
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Photo Viewer\de-DE\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2044
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files\Windows Photo Viewer\de-DE\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1568
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows Photo Viewer\de-DE\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1324
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 12 /tr "'C:\Windows\IME\IMESC5\HELP\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1948
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Windows\IME\IMESC5\HELP\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2644
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 6 /tr "'C:\Windows\IME\IMESC5\HELP\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2332
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 9 /tr "'C:\providercommon\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2240
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\providercommon\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2052
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 7 /tr "'C:\providercommon\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1748
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 8 /tr "'C:\Recovery\480d7142-91a3-11ef-b9f6-6e5a89f5a3c7\audiodg.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:404
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Recovery\480d7142-91a3-11ef-b9f6-6e5a89f5a3c7\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1636
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 6 /tr "'C:\Recovery\480d7142-91a3-11ef-b9f6-6e5a89f5a3c7\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2476
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 9 /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:972
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:944
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1268
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 12 /tr "'C:\Recovery\480d7142-91a3-11ef-b9f6-6e5a89f5a3c7\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:376
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Recovery\480d7142-91a3-11ef-b9f6-6e5a89f5a3c7\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:236
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 14 /tr "'C:\Recovery\480d7142-91a3-11ef-b9f6-6e5a89f5a3c7\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1476
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 13 /tr "'C:\Program Files\Microsoft Games\Chess\fr-FR\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1892
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Program Files\Microsoft Games\Chess\fr-FR\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1232
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 11 /tr "'C:\Program Files\Microsoft Games\Chess\fr-FR\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1224
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\Windows\L2Schemas\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2116
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\L2Schemas\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2580
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\Windows\L2Schemas\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1316
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 8 /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2492
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2860
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 14 /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1480
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 5 /tr "'C:\providercommon\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1876
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\providercommon\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:896
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 9 /tr "'C:\providercommon\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbe04a6f6174923d30b1c80048ea270b
SHA197e7ab9a65f44a2bf45e9d3f8b08bbd00b9a6efa
SHA2566228418d3f6223123c0243228b5e2486e21bab6e4bd9f259248fe436d7e00001
SHA5129d75afebee34ae8fed92f7657d534c3ae6010e35c3e6ec32eaf21bf52d3fe765687b960fe6b51bf0132218899fb890f6ca158468e57eb3799dbcc06c7befe666
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d95bb1a7e00fffe589e88a35d33bbef5
SHA1a8f9b24e87a6d5930b995eb88c5b402223e52b67
SHA256ca3060dfc5f65fc9f37ea42e61ce857270d432bd2e51c1fc646d50f2ab86de09
SHA512eb8c9003fd0c1067fc424c9f5afa4bfcc1ebaf633838d4f43716e97518656b59316e87c411b2d9a756a183c8dda437ed2ecf5e00d7e3aa1a944934a2213b13e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a5729b8a96a179fe1dcb61dbb258ef3
SHA14bf406847b0b8e1be409435eebcfc870ac2c412c
SHA2563780db267e7d0605910bb3f4cb4aa420dcfd875f5d07666fdd138f2ac88043c5
SHA51252785aa4d1f3f5220ec9e9ea7266f7be8de0e61f77b9270c95ff3697f15294f08582dc3a6d851a63dea8fde2c09231e0f1c41a148d74e46da5bfba311c0c0a99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d42b0db0b8fa14a02263ef298e47f65
SHA143bb5cbae55cf784aee359f1a46a8a129b35bad2
SHA2563019ae95ce52e6ef81d28c16f32c95ecd1ff8f55a34f6c6c29f292c28250ed7d
SHA5122320fd18fa7d900e5dd23cf3c179e78d7ac57b364bbcab6fb41ed9c77d2a35109f27c60ab2a5f3405478f965d5777b30ccd42a3d6041bd055f2139061e357649
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca7fef142b92ea4a5a455d3bcdf50719
SHA1d48187d80a9da56d0abdef63dd46d7b1e1871e80
SHA2562c28c9b4b612cc9dbfb8462a829563461815ee02b4bb8ee1047949b7018b4de2
SHA512310244a9ae2dbfa0d1fbc7a76dc7bbbee2ad7d586dc782baebf7638689f9f40eda52dd231083ab564ad0f13aa33492bc4ecabac9d0b36aeea1e4ad8105522850
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555ec5a926cd5f82cfbe5cc61f8086357
SHA11de5dbafe8aacff2ebd67a5fc7b794e6b972b64d
SHA256bf144ed0ddc414a1c5217a221957a42e047058d96442da29ad9eede217b1f677
SHA5125d2c149e703cc816875b4ad4f3a0f9ce693b77cb1902f62bf3f49595047b8bc41a78fd9aecdf170664613129703915ab73313331cd180c8e3acf1038956617b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563b0ea0c4594bfa542a85a6328ca1cf7
SHA10629127c59fbf0b0ca8308aecb05d7f26492e846
SHA25618b56ddb4d393cff4741f72e2b43df8d041467c963d252e7970fd0795ad415cb
SHA512f03112514ad0aec377ac8355821deed7ccaed2619a0257ddb32845b3ded452b3749131bde8f35b8f299b2eebd22effbefbb78e424639e0caa56cec980c2fe15e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5393fc137d653d365f85b976a665e9595
SHA18cc1c6cd683a3f32b26b4cd10a467b4846aa7ab7
SHA256789c4305ac7e91fc06aa3c7634e6d7db2af98b48ab484291d2182cc37c8c80d0
SHA5129173a8ece846bc416898ca22cb85f1c43710a3ae9fb48d9deffc848cfb276e0e0b6dbcf5489cd172f2b72fdc4b9a48617fb18f42ce02caec0071f3b59a5bba6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d47e48c68fd5795b30eab117f7981607
SHA1ca85662c4f9a574302febaf255c246e5b44a2e1e
SHA25635fd5104809d19f3a363e2fa9fdb894263c45cea2102b7cc529eeceb58cbda2d
SHA51230b62c4903494cf36c76d7b56f10fc4d3979c5911af3d9241c5017e634e041bcd4fa7d33902c6740721f71d6f949414763ba02df3cb3cc7773379c926a302b45
-
Filesize
197B
MD5b34242b8f961da8cb502645fd85b1fc9
SHA1ca5f86ee2b6282f3385ee89d9b1b87dd9bff4248
SHA256a9bc8e3bc3d2add3e90a9c6189c41fc14fc68af3928dc0c340e74906d9c631bb
SHA512015621b8e0d3252fa80930a0001aaa5f21f5a8c9eed10b84d8a27a65c3a17df49a67716e7c45aabd8bff4253053b9a0473226366e72b951c5e5af37657d71a0f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
197B
MD5b3db16349e7903eac3d37a9a25338a4d
SHA122e100a8a1295e677d15c8f68225345e9e3894c4
SHA25629e0999475ad637a12c1ce3a5a3dc49709455b207b3dcaa1e455f99896b69ab3
SHA5128d390deab0ac29f151a7b7cd02f7a9db38f9771b32a5e4c019cc1a2a443c4fdd915f232b3f0d1f25ecefa78b380bd118e024296db99764dfc17d66fc1a6b746c
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
197B
MD58e2554def5488af68bf9c5648eecbcbf
SHA1c659b9a1dcb16b39d94f21d0e9694a95328910c4
SHA25681d80660f4be0a05fc6b64ffac5e6d43d78b5b15f342ea11dc2419af2e8a2d13
SHA512cb96c447f176528e256914ae3ea821ac58ec1a021be53f5bc733bd89da9f695a0f514a52ee969cac06f7453b270c7fcf110e75e06add2b6a45a7d7f1243e9f34
-
Filesize
197B
MD5d56b2f94b402343f708050c616cc4320
SHA182fe41d9fd232d57bac3d454c4c96e3c57f90d64
SHA256185537e7ffb8002e141c07dd0b64fc122e691be2572a72c42039505f3d14e872
SHA512745ece83b2a4c584fa6f521d598d86f18cdbb1e946f5ff0cf1566e12b011bba23bb3ae5c035cc525697848fcfdfa9bd8d722221bf58eb070892ee07ab277a204
-
Filesize
197B
MD5647aa03ec8d61af3233e7f3f4247e48f
SHA1b42a41a58246169de07deec224da0f891adb4e7c
SHA256275d9afbe7747da0abb4912e8407bb69bd764b56232551780a1b66d707094506
SHA5128d7ba1df44e17478055bdf161febf01e4d8df8708c87d411109666c793b6aa2817f73890bd45851e75d92dab2789124b6e1a8cbb9d4eeb11ed7cb07af33e5e1a
-
Filesize
197B
MD5fb85a2592b03fc1f6efc51aabf8e07e8
SHA14103a3bfe4e3cc5df5ee399070f94c530ef2da5a
SHA256a18c163e87cae2280e4ea238d8cd4123892ed18d0716ecf7408c0e67527a39fe
SHA5129772d4244cd98b99019ca44b8a821632b66e8ed9868c9cc6d37e16a343bc81ffda180180e0ea6e485c8070c9ee525b57e59633827a7a7b6c52cd14713e2827bc
-
Filesize
197B
MD5fb83df4e6c390c38bc04083078a1da41
SHA19f846bb782ac64cb3800debcdd86e58d17e3a64d
SHA2567d033b68d3e6bac097e8acf019986688fdb54d4e79a9a04db911e7d2fb56d718
SHA51250e33390b51b79f9aebcbe044f72205e9d0632d13aaf3b48fe7bedf0ed7a27a0453e9892fb1547e2cef26a5aabbc52c7491c44fe7c1f6eaf29d3510ddfbac637
-
Filesize
197B
MD55dcdf69541a76dd1b34ad04fbdd97fcb
SHA1e3baf9d118ceb37e81dcc761045ceeb415057ea9
SHA25643d8a8c5db15d10074f49d0b01d9c73c17dd663bed8b617a31c54d960b704272
SHA5127bd5818d3f773da7f93b79471b63f0e17d84a00a7820f82b021e2cd12dddc93336b8471462448e7549a9012ea6797c64e74047d2660e40e5b5ab8ee673936d6b
-
Filesize
197B
MD58d64baf94416c95847f18ab317a0db3b
SHA1fe631189fbb82d3cd7e1b6b25e4d9ac1624f1125
SHA25640a74c8f020d0bfd4352213af16f55bdf5d48d883d7c38e8f25c93c0a620d9a5
SHA512dfb47e33cd889a47c1ef35eef2c85ff7936d8c2e0e9d51884c27c0dd300d56f15c0f8bec3c659daabca8a94fd1508e4fe39ec2c947bc561b531509e82299538d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5ed9ba810e422df604757b14be0d3017f
SHA1a2a9319679189fcd5d746f1a8f17ae5e77684e9f
SHA2562d35d91ac9e54c745555a1e046138c705db5ca89ae6b2c08c79bb2d84c693b5e
SHA512f3abbe6434d9426471606a52aeae7bc7d4e5059acbbafe2d6ee14b01da0ea5964e47ced27b96e282cf780b146c985f80dc60cc167da43acfbbbdd201c1b61bd5
-
Filesize
36B
MD56783c3ee07c7d151ceac57f1f9c8bed7
SHA117468f98f95bf504cc1f83c49e49a78526b3ea03
SHA2568ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322
SHA512c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
197B
MD58088241160261560a02c84025d107592
SHA1083121f7027557570994c9fc211df61730455bb5
SHA2562072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1
SHA51220d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478