Analysis

  • max time kernel
    148s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/03/2025, 06:18

General

  • Target

    fe282eaa9036b889aafc6db602127b45.exe

  • Size

    885KB

  • MD5

    fe282eaa9036b889aafc6db602127b45

  • SHA1

    65e037b4c6a892801ac475c201219167f89d1f48

  • SHA256

    1a55e2bcf26895655a7da6acda6ecbdbef033d60bf805aaf4ef88c0cf6348cb6

  • SHA512

    c3a913f2ba698ec5d387cb394b7b6fb600271dcb7d2db8c8162d2f6c90c9dd123d4f9dcbd482d6ee8e76c83cacb566faf4f7bd92fea981e2c49fee8817854d39

  • SSDEEP

    12288:8lNE5VnZuh+ZIlXJBH5SP2I/lwvDT77/wOKsV42i3GULVaHeopyyx:8lNCv6XJ5BClaXfD9vUha+u

Score
10/10

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 45 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 4 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Checks computer location settings 2 TTPs 16 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 14 IoCs
  • Drops file in Program Files directory 22 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 16 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 45 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\fe282eaa9036b889aafc6db602127b45.exe
    "C:\Users\Admin\AppData\Local\Temp\fe282eaa9036b889aafc6db602127b45.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4064
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\cEOmkgkzHS.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2228
      • C:\Windows\system32\w32tm.exe
        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
        3⤵
          PID:2240
        • C:\Users\Admin\AppData\Local\Temp\fe282eaa9036b889aafc6db602127b45.exe
          "C:\Users\Admin\AppData\Local\Temp\fe282eaa9036b889aafc6db602127b45.exe"
          3⤵
          • Checks computer location settings
          • Drops file in Program Files directory
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2012
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\9wg4WVtVjF.bat"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:3944
            • C:\Windows\system32\w32tm.exe
              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
              5⤵
                PID:5356
              • C:\Users\Default User\fe282eaa9036b889aafc6db602127b45.exe
                "C:\Users\Default User\fe282eaa9036b889aafc6db602127b45.exe"
                5⤵
                • Checks computer location settings
                • Executes dropped EXE
                • Modifies registry class
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2196
                • C:\Windows\System32\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\6a803551-6c4f-4b4b-bf9d-565e3fd5df9a.vbs"
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:3172
                  • C:\Users\Default User\fe282eaa9036b889aafc6db602127b45.exe
                    "C:\Users\Default User\fe282eaa9036b889aafc6db602127b45.exe"
                    7⤵
                    • Checks computer location settings
                    • Executes dropped EXE
                    • Modifies registry class
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:4780
                    • C:\Windows\System32\WScript.exe
                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\d85244ff-084e-4181-a072-898d8d4a5991.vbs"
                      8⤵
                      • Suspicious use of WriteProcessMemory
                      PID:3924
                      • C:\Users\Default User\fe282eaa9036b889aafc6db602127b45.exe
                        "C:\Users\Default User\fe282eaa9036b889aafc6db602127b45.exe"
                        9⤵
                        • Checks computer location settings
                        • Executes dropped EXE
                        • Modifies registry class
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:3120
                        • C:\Windows\System32\WScript.exe
                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\839381a6-8d71-4f68-8fb4-e44273b32bca.vbs"
                          10⤵
                          • Suspicious use of WriteProcessMemory
                          PID:828
                          • C:\Users\Default User\fe282eaa9036b889aafc6db602127b45.exe
                            "C:\Users\Default User\fe282eaa9036b889aafc6db602127b45.exe"
                            11⤵
                            • Checks computer location settings
                            • Executes dropped EXE
                            • Modifies registry class
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of WriteProcessMemory
                            PID:1144
                            • C:\Windows\System32\WScript.exe
                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\b962422a-4bab-49fb-9923-0841b427d59c.vbs"
                              12⤵
                              • Suspicious use of WriteProcessMemory
                              PID:3504
                              • C:\Users\Default User\fe282eaa9036b889aafc6db602127b45.exe
                                "C:\Users\Default User\fe282eaa9036b889aafc6db602127b45.exe"
                                13⤵
                                • Checks computer location settings
                                • Executes dropped EXE
                                • Modifies registry class
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                • Suspicious use of WriteProcessMemory
                                PID:1784
                                • C:\Windows\System32\WScript.exe
                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\265c6995-8f13-492f-89fa-a42359d753ec.vbs"
                                  14⤵
                                  • Suspicious use of WriteProcessMemory
                                  PID:5368
                                  • C:\Users\Default User\fe282eaa9036b889aafc6db602127b45.exe
                                    "C:\Users\Default User\fe282eaa9036b889aafc6db602127b45.exe"
                                    15⤵
                                    • Checks computer location settings
                                    • Executes dropped EXE
                                    • Modifies registry class
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    • Suspicious use of WriteProcessMemory
                                    PID:5768
                                    • C:\Windows\System32\WScript.exe
                                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\01e4ab55-5fb9-4439-b0ed-f1366263bb02.vbs"
                                      16⤵
                                      • Suspicious use of WriteProcessMemory
                                      PID:5328
                                      • C:\Users\Default User\fe282eaa9036b889aafc6db602127b45.exe
                                        "C:\Users\Default User\fe282eaa9036b889aafc6db602127b45.exe"
                                        17⤵
                                        • Checks computer location settings
                                        • Executes dropped EXE
                                        • Modifies registry class
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        • Suspicious use of WriteProcessMemory
                                        PID:1904
                                        • C:\Windows\System32\WScript.exe
                                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\80a8c8db-8c45-4211-a16e-e41d5eeaa274.vbs"
                                          18⤵
                                          • Suspicious use of WriteProcessMemory
                                          PID:2792
                                          • C:\Users\Default User\fe282eaa9036b889aafc6db602127b45.exe
                                            "C:\Users\Default User\fe282eaa9036b889aafc6db602127b45.exe"
                                            19⤵
                                            • Checks computer location settings
                                            • Executes dropped EXE
                                            • Modifies registry class
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of AdjustPrivilegeToken
                                            • Suspicious use of WriteProcessMemory
                                            PID:2668
                                            • C:\Windows\System32\WScript.exe
                                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\e89eb7e4-daad-43f1-956a-1186f09a60f9.vbs"
                                              20⤵
                                              • Suspicious use of WriteProcessMemory
                                              PID:5704
                                              • C:\Users\Default User\fe282eaa9036b889aafc6db602127b45.exe
                                                "C:\Users\Default User\fe282eaa9036b889aafc6db602127b45.exe"
                                                21⤵
                                                • Checks computer location settings
                                                • Executes dropped EXE
                                                • Modifies registry class
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                • Suspicious use of WriteProcessMemory
                                                PID:4896
                                                • C:\Windows\System32\WScript.exe
                                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\b816e1f4-050e-4139-b87b-ef906e28bbb8.vbs"
                                                  22⤵
                                                    PID:4816
                                                    • C:\Users\Default User\fe282eaa9036b889aafc6db602127b45.exe
                                                      "C:\Users\Default User\fe282eaa9036b889aafc6db602127b45.exe"
                                                      23⤵
                                                      • Checks computer location settings
                                                      • Executes dropped EXE
                                                      • Modifies registry class
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:5412
                                                      • C:\Windows\System32\WScript.exe
                                                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\d9658db6-6627-4b3b-adbb-f390750e7535.vbs"
                                                        24⤵
                                                          PID:1212
                                                          • C:\Users\Default User\fe282eaa9036b889aafc6db602127b45.exe
                                                            "C:\Users\Default User\fe282eaa9036b889aafc6db602127b45.exe"
                                                            25⤵
                                                            • Checks computer location settings
                                                            • Executes dropped EXE
                                                            • Modifies registry class
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:2444
                                                            • C:\Windows\System32\WScript.exe
                                                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ad32546d-dab2-48c7-a837-bb0fbbe17131.vbs"
                                                              26⤵
                                                                PID:872
                                                                • C:\Users\Default User\fe282eaa9036b889aafc6db602127b45.exe
                                                                  "C:\Users\Default User\fe282eaa9036b889aafc6db602127b45.exe"
                                                                  27⤵
                                                                  • Checks computer location settings
                                                                  • Executes dropped EXE
                                                                  • Modifies registry class
                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:5196
                                                                  • C:\Windows\System32\WScript.exe
                                                                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ee1b92fd-3c8f-44b7-a64e-5446ab6ae1a0.vbs"
                                                                    28⤵
                                                                      PID:800
                                                                      • C:\Users\Default User\fe282eaa9036b889aafc6db602127b45.exe
                                                                        "C:\Users\Default User\fe282eaa9036b889aafc6db602127b45.exe"
                                                                        29⤵
                                                                        • Checks computer location settings
                                                                        • Executes dropped EXE
                                                                        • Modifies registry class
                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        PID:3636
                                                                        • C:\Windows\System32\WScript.exe
                                                                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\f10e7dda-0708-4af0-afb7-7be597168fb7.vbs"
                                                                          30⤵
                                                                            PID:1784
                                                                            • C:\Users\Default User\fe282eaa9036b889aafc6db602127b45.exe
                                                                              "C:\Users\Default User\fe282eaa9036b889aafc6db602127b45.exe"
                                                                              31⤵
                                                                              • Checks computer location settings
                                                                              • Executes dropped EXE
                                                                              • Modifies registry class
                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:2280
                                                                              • C:\Windows\System32\WScript.exe
                                                                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\a48a0ec4-2ce3-4a11-9c39-f3c592ec3c5b.vbs"
                                                                                32⤵
                                                                                  PID:5020
                                                                                • C:\Windows\System32\WScript.exe
                                                                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\810c91a2-b588-4e6d-bb37-1ccb2f593f85.vbs"
                                                                                  32⤵
                                                                                    PID:4464
                                                                              • C:\Windows\System32\WScript.exe
                                                                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fad62948-f3b0-4e80-8dcc-08c608d94520.vbs"
                                                                                30⤵
                                                                                  PID:3724
                                                                            • C:\Windows\System32\WScript.exe
                                                                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\9be65356-39aa-4978-a76a-87dc0c087b73.vbs"
                                                                              28⤵
                                                                                PID:5940
                                                                          • C:\Windows\System32\WScript.exe
                                                                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\6b18aa6c-a32c-4827-b749-63e9e35fbead.vbs"
                                                                            26⤵
                                                                              PID:2892
                                                                        • C:\Windows\System32\WScript.exe
                                                                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\81d1cc90-d692-4d48-8818-a1a7808d31fb.vbs"
                                                                          24⤵
                                                                            PID:5632
                                                                      • C:\Windows\System32\WScript.exe
                                                                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\9e091e5d-b814-4561-9d6f-dd44fb97a2ca.vbs"
                                                                        22⤵
                                                                          PID:2904
                                                                    • C:\Windows\System32\WScript.exe
                                                                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\885dab41-060a-4fab-a714-f02307ef3040.vbs"
                                                                      20⤵
                                                                        PID:4784
                                                                  • C:\Windows\System32\WScript.exe
                                                                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\c4b85486-db6c-4fd7-bafe-432379529a33.vbs"
                                                                    18⤵
                                                                      PID:5972
                                                                • C:\Windows\System32\WScript.exe
                                                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\b05d7dfe-5b7f-4777-94b4-a44135be17b0.vbs"
                                                                  16⤵
                                                                    PID:640
                                                              • C:\Windows\System32\WScript.exe
                                                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\5d460739-91c4-4157-a05c-1c296dc01eca.vbs"
                                                                14⤵
                                                                  PID:2004
                                                            • C:\Windows\System32\WScript.exe
                                                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\f917c821-6273-4870-ad94-be1c7cc72cb1.vbs"
                                                              12⤵
                                                                PID:1616
                                                          • C:\Windows\System32\WScript.exe
                                                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\f6dc242f-80c5-472b-af3f-12776def6506.vbs"
                                                            10⤵
                                                              PID:4424
                                                        • C:\Windows\System32\WScript.exe
                                                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\49c2daa0-2fa2-467e-b807-c9f62816574e.vbs"
                                                          8⤵
                                                            PID:2704
                                                      • C:\Windows\System32\WScript.exe
                                                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\75ca4e6d-3fa3-4950-83e8-c669772fd134.vbs"
                                                        6⤵
                                                          PID:5984
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "smsss" /sc MINUTE /mo 13 /tr "'C:\Program Files\edge_BITS_4732_595216890\smss.exe'" /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:5792
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files\edge_BITS_4732_595216890\smss.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:436
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "smsss" /sc MINUTE /mo 11 /tr "'C:\Program Files\edge_BITS_4732_595216890\smss.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:4248
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 14 /tr "'C:\d25f591a00514bc9ba8441\fontdrvhost.exe'" /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:5740
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\d25f591a00514bc9ba8441\fontdrvhost.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:4196
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 7 /tr "'C:\d25f591a00514bc9ba8441\fontdrvhost.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:1756
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 9 /tr "'C:\Users\Admin\Pictures\Camera Roll\System.exe'" /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:1680
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Users\Admin\Pictures\Camera Roll\System.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:5772
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 11 /tr "'C:\Users\Admin\Pictures\Camera Roll\System.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:3228
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "sysmons" /sc MINUTE /mo 13 /tr "'C:\d25f591a00514bc9ba8441\sysmon.exe'" /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:4388
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\d25f591a00514bc9ba8441\sysmon.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:5560
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "sysmons" /sc MINUTE /mo 5 /tr "'C:\d25f591a00514bc9ba8441\sysmon.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:5292
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "sysmons" /sc MINUTE /mo 13 /tr "'C:\7e20f84d5244aba7145631d4073af8\sysmon.exe'" /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:2716
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\7e20f84d5244aba7145631d4073af8\sysmon.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:4272
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "sysmons" /sc MINUTE /mo 11 /tr "'C:\7e20f84d5244aba7145631d4073af8\sysmon.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:4512
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "sysmons" /sc MINUTE /mo 10 /tr "'C:\Program Files\Microsoft Office\Office16\sysmon.exe'" /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:4496
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Program Files\Microsoft Office\Office16\sysmon.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:852
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "sysmons" /sc MINUTE /mo 8 /tr "'C:\Program Files\Microsoft Office\Office16\sysmon.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:2388
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 7 /tr "'C:\d25f591a00514bc9ba8441\sppsvc.exe'" /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:3500
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\d25f591a00514bc9ba8441\sppsvc.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:2092
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 8 /tr "'C:\d25f591a00514bc9ba8441\sppsvc.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:3472
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows NT\Accessories\en-US\winlogon.exe'" /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:2408
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows NT\Accessories\en-US\winlogon.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:2880
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows NT\Accessories\en-US\winlogon.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:4232
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "explorere" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Internet Explorer\explorer.exe'" /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:4740
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files (x86)\Internet Explorer\explorer.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:4848
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "explorere" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Internet Explorer\explorer.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:4952
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 8 /tr "'C:\d25f591a00514bc9ba8441\Idle.exe'" /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:4768
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\d25f591a00514bc9ba8441\Idle.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:4480
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 9 /tr "'C:\d25f591a00514bc9ba8441\Idle.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:4960
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "sysmons" /sc MINUTE /mo 13 /tr "'C:\Windows\Speech_OneCore\sysmon.exe'" /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:4532
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Windows\Speech_OneCore\sysmon.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:4584
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "sysmons" /sc MINUTE /mo 8 /tr "'C:\Windows\Speech_OneCore\sysmon.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:4656
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 5 /tr "'C:\Program Files\edge_BITS_4596_316599628\SearchApp.exe'" /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:2288
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Program Files\edge_BITS_4596_316599628\SearchApp.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:1164
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 5 /tr "'C:\Program Files\edge_BITS_4596_316599628\SearchApp.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:5300
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "fe282eaa9036b889aafc6db602127b45f" /sc MINUTE /mo 14 /tr "'C:\Users\Default User\fe282eaa9036b889aafc6db602127b45.exe'" /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:5696
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "fe282eaa9036b889aafc6db602127b45" /sc ONLOGON /tr "'C:\Users\Default User\fe282eaa9036b889aafc6db602127b45.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:3940
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "fe282eaa9036b889aafc6db602127b45f" /sc MINUTE /mo 12 /tr "'C:\Users\Default User\fe282eaa9036b889aafc6db602127b45.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:5800
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 11 /tr "'C:\7e20f84d5244aba7145631d4073af8\RuntimeBroker.exe'" /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:2572
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\7e20f84d5244aba7145631d4073af8\RuntimeBroker.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:1020
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 6 /tr "'C:\7e20f84d5244aba7145631d4073af8\RuntimeBroker.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:1868
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 13 /tr "'C:\Users\Default\Documents\My Videos\sppsvc.exe'" /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:3344
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Users\Default\Documents\My Videos\sppsvc.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:464
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 6 /tr "'C:\Users\Default\Documents\My Videos\sppsvc.exe'" /rl HIGHEST /f
                                                1⤵
                                                • Process spawned unexpected child process
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:3912

                                              Network

                                              MITRE ATT&CK Enterprise v15

                                              Replay Monitor

                                              Loading Replay Monitor...

                                              Downloads

                                              • C:\7e20f84d5244aba7145631d4073af8\sysmon.exe

                                                Filesize

                                                885KB

                                                MD5

                                                fe282eaa9036b889aafc6db602127b45

                                                SHA1

                                                65e037b4c6a892801ac475c201219167f89d1f48

                                                SHA256

                                                1a55e2bcf26895655a7da6acda6ecbdbef033d60bf805aaf4ef88c0cf6348cb6

                                                SHA512

                                                c3a913f2ba698ec5d387cb394b7b6fb600271dcb7d2db8c8162d2f6c90c9dd123d4f9dcbd482d6ee8e76c83cacb566faf4f7bd92fea981e2c49fee8817854d39

                                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\fe282eaa9036b889aafc6db602127b45.exe.log

                                                Filesize

                                                1KB

                                                MD5

                                                7800fca2323a4130444c572374a030f4

                                                SHA1

                                                40c9b8e0e5e7d72a5293f4010f2ccf21e637b4aa

                                                SHA256

                                                29f5645ac14353ac460858f52c856548f3aeb144b09eef672a6b4849bafe742e

                                                SHA512

                                                c8a7ad930b8c07007c7a67d8c32a2a4a401dcc34ab966e0e80901655fcbe1f5c95b72a195e6381b1de56c2c987eeab093d8e89891bec9e9684785c5d824b3554

                                              • C:\Users\Admin\AppData\Local\Temp\01e4ab55-5fb9-4439-b0ed-f1366263bb02.vbs

                                                Filesize

                                                734B

                                                MD5

                                                3d948127ec4033938ab488d6e47e98fa

                                                SHA1

                                                3213f2478ed174677fdf53e99f1c9cd0a4dd1bfe

                                                SHA256

                                                19a11ba77a4a6420131833c76a18d330cb6e0202b391de8d37e49174e47ebe46

                                                SHA512

                                                c80946f0f903122a6e789f536588a39312a9a56791f201140f138295daa4ce30be16680088ab24d946949e36ce12e64a9499f8f4fc041a5d580748e3ce815b94

                                              • C:\Users\Admin\AppData\Local\Temp\265c6995-8f13-492f-89fa-a42359d753ec.vbs

                                                Filesize

                                                734B

                                                MD5

                                                e5e60a466d5f5b2c9c7df9cef15f56f5

                                                SHA1

                                                1a9005074b7080d1edcdd6808ea8de889c6e61ae

                                                SHA256

                                                19eba62704cf220cd03e94b66702998e3a64501bee12490df394ec5b303cba3c

                                                SHA512

                                                13d7d85d04f27953fcb6e6a2609ea10795f1fe6091f3fbb965c1329c717a970f5a171cedfcd0b957aa0cf5502b25583d1ab05adafe054fe137fb6caf0af87f90

                                              • C:\Users\Admin\AppData\Local\Temp\6a803551-6c4f-4b4b-bf9d-565e3fd5df9a.vbs

                                                Filesize

                                                734B

                                                MD5

                                                c4ecf4317a33d44774b437d1a7b3cd15

                                                SHA1

                                                e56031b3003ed163e03423cc469ead8418fc8236

                                                SHA256

                                                01309bfc7d729d37d4725d463ed53b49eb0adb6f9dd4a032ab8bf58ccde7b010

                                                SHA512

                                                cc122036c73876687e5ed7dceedb2a91eb3589b28ad03efb0b7ab6e5c4f73a3aafa6ee60bc8121381203ccb241d1abd82c0358b9e6a16bbddcc35f31a6b93d93

                                              • C:\Users\Admin\AppData\Local\Temp\75ca4e6d-3fa3-4950-83e8-c669772fd134.vbs

                                                Filesize

                                                510B

                                                MD5

                                                a6cc2dad7418061c8f79507af8872c3a

                                                SHA1

                                                5080d713ee6db7f1f67c08e751e5ddba61e6c1ce

                                                SHA256

                                                4b0c8cc4c5fc53d3daa86d41fd2fa777585b2161d857a4480de6bb5abe63541c

                                                SHA512

                                                41c769cbcab261cf7c02fb314ebc0d3ee834b06000f6382cadaa21550dc009b2924d66334eede6759a2ebf7080a9b933bb0cdd0097b81022bc2cc857f966e403

                                              • C:\Users\Admin\AppData\Local\Temp\80a8c8db-8c45-4211-a16e-e41d5eeaa274.vbs

                                                Filesize

                                                734B

                                                MD5

                                                3b6f05da39ecedb90a5242e1f03784c0

                                                SHA1

                                                7710b318949417cd5f0163435ac352050ba25e01

                                                SHA256

                                                9c456b0f4a9c2c33e233c837f1c18dab5caa76d5109a2fbd991924be2983bb60

                                                SHA512

                                                ba70e59fb2b15384cd11c25bb33538e196b98e8b558966fffab62ff4283003f23f911a9f227767fdf1b6958711b4a32865c6d81f6bdad889c66817ff0ac6092e

                                              • C:\Users\Admin\AppData\Local\Temp\839381a6-8d71-4f68-8fb4-e44273b32bca.vbs

                                                Filesize

                                                734B

                                                MD5

                                                01cfa1bc2b5c14a3fbafa1e10a681fa5

                                                SHA1

                                                fce2458e5e747d13cdaf0abe0712e459c029bbc1

                                                SHA256

                                                5719e68ec9d9c2e760f7d1fc68b3834aed52ad1cfca0d4ffb22aa523517b633c

                                                SHA512

                                                d066b34920b01c32e70c2b56deee8e9016b85ed24ca51ed04e1c1eb7f8faae64d8879ac20d0c3bcd7c11377389b12c59aaae2bbd6544dfacc5faca5c87e8c5e7

                                              • C:\Users\Admin\AppData\Local\Temp\9wg4WVtVjF.bat

                                                Filesize

                                                223B

                                                MD5

                                                492d220820784d78630ce0a1c09bbe7b

                                                SHA1

                                                a56b355309667e97c8364897c74b0e964584e8ab

                                                SHA256

                                                1e180ec1017a1afa96879f34f07b8b4f5bdb4240013c2ccfd7bf54dc2a8b6d30

                                                SHA512

                                                a360fbaf9d6677c1a4c963fb542c0709baae29c20ba9d644915f10a4f2fc975ff070efddc054ebd6a8128c823a5b4460cab9ef732801d1086db146e0c5d360ac

                                              • C:\Users\Admin\AppData\Local\Temp\RCX880C.tmp

                                                Filesize

                                                885KB

                                                MD5

                                                2afb4d8760bcac3986b9dc2bde6b6bd2

                                                SHA1

                                                f0528aec1acb0a4f7b787ca415bfded0c991c93f

                                                SHA256

                                                432cc3d3f8f777c93b4d018244f3b0541f0e3f394ebf9813285dbe1cc2f80bdd

                                                SHA512

                                                0e71ebb078af8bf157ed1c9dd6d71eb0ccd9b201e060b9ba30a69dd83c19db339abc0275f6284ae5ec1c0998345386c286681b47daa11617477644c0d9c5d0b0

                                              • C:\Users\Admin\AppData\Local\Temp\a48a0ec4-2ce3-4a11-9c39-f3c592ec3c5b.vbs

                                                Filesize

                                                734B

                                                MD5

                                                7dffead8aae30400ab0898bf7a6794a5

                                                SHA1

                                                b448ec4cc800e6c5ad82dfd779bb88e0a2be5e13

                                                SHA256

                                                5b85349e296ea37c19f507d5367d7064082c2a06cfae9b4e4fa9512c777185e8

                                                SHA512

                                                40a586ba7a8cd415b1f5c067e2efafba2f86ec5a0d069b2b7532a45ab2b50ac88748d14d1eb5cec38af744270ce647a27703fcd1cd20d5e89ae8ac40420e6720

                                              • C:\Users\Admin\AppData\Local\Temp\ad32546d-dab2-48c7-a837-bb0fbbe17131.vbs

                                                Filesize

                                                734B

                                                MD5

                                                4f0b5aef511feffec2e64383d4332ade

                                                SHA1

                                                c3603837a28e1d1b2ac516104fc989ab64744a25

                                                SHA256

                                                d07b0b569354424984e20eebc4359fb51871b5a50e988cc46722d29de7f6c662

                                                SHA512

                                                3f4d5efd9a4bc2ae644231c471d0d9e93674d8243637b14436c7c599a3660b5a2ea69b32fe1263d8283368937b83be1bf24a88649e1c8ff038704bc7460b153d

                                              • C:\Users\Admin\AppData\Local\Temp\b816e1f4-050e-4139-b87b-ef906e28bbb8.vbs

                                                Filesize

                                                734B

                                                MD5

                                                80f58683eab65106cc550297e5bf3906

                                                SHA1

                                                7a8ac7f8524d85f1de4560bb8603730359a1da97

                                                SHA256

                                                f579c5e1e32a87807cf10d208e925642aa6c1d717bbd33f539291f5c4581c4fd

                                                SHA512

                                                db86227a81af3a245c20ca3e3fcb5b8c961aba19b8a10e5385f25e24f0d644506ed2e7109ca6e6cfcad5432007dadf49637a19a9835998faadc126ddb7b5566f

                                              • C:\Users\Admin\AppData\Local\Temp\b962422a-4bab-49fb-9923-0841b427d59c.vbs

                                                Filesize

                                                734B

                                                MD5

                                                7f7eee2a877be6c5b2393983c05dc332

                                                SHA1

                                                885956c89f565940333d0554b93c0a78028f1151

                                                SHA256

                                                559b5600028ffdacb974fefb10f5ec9533c4835d26d50541c403615c9c079188

                                                SHA512

                                                0126965fa20346784ffccd4b43235caa1c63271191ac542bca960737c272175f5360cbe473f6b61cb6e5afeb7426efe5ed7b377091fbfa250830cb0190e4b3b3

                                              • C:\Users\Admin\AppData\Local\Temp\cEOmkgkzHS.bat

                                                Filesize

                                                235B

                                                MD5

                                                0d25848d871089401bd6da0500644ae2

                                                SHA1

                                                8f872e7b38bfec6e9f13274580a145665a7dc958

                                                SHA256

                                                9fbf22c796f171e2fb047fcde4c01057d8792b6bc0a5095eaea6d47d367b836b

                                                SHA512

                                                37334bc590614e654eb87deccff78836f6476e848fd0d388419dc9ff7051a255585616e83a2d1553e31a08c6ac77d181666e06e1221279bf8feeefed8ba71c74

                                              • C:\Users\Admin\AppData\Local\Temp\d85244ff-084e-4181-a072-898d8d4a5991.vbs

                                                Filesize

                                                734B

                                                MD5

                                                bb19212978315749f321be24d61bdfe5

                                                SHA1

                                                b013c32e44b3723048475cda5fdcc74db7aa9758

                                                SHA256

                                                c7c520768447124572fd75d53b80f2b230ca9c73e9438e74133b1969ed1d715f

                                                SHA512

                                                e8278e3a3ca2cb26822bbc68427b7639cbd781e6806914b07cd73d536f720dc1f0dfdde1243a9e2a115334c31d9907fdabca996d02f1dcb7b039c8fe0d85c9f5

                                              • C:\Users\Admin\AppData\Local\Temp\d9658db6-6627-4b3b-adbb-f390750e7535.vbs

                                                Filesize

                                                734B

                                                MD5

                                                73476328a6fceddfae575830d4115932

                                                SHA1

                                                f314cfa6b0a9402e3a37a2689a4ab776278b20c7

                                                SHA256

                                                07c73d64981a127ac8d9e9eb3f0111dd6141c9c687bb19e17d97782a90c4192d

                                                SHA512

                                                ce5f4cff79737a5ececfe8f03ccee73df552a569b626ba500a5603db53b061e30cf6665ed1891731ec73d13e918927a2673d154cceabe5bf737fe47266ae14b5

                                              • C:\Users\Admin\AppData\Local\Temp\e89eb7e4-daad-43f1-956a-1186f09a60f9.vbs

                                                Filesize

                                                734B

                                                MD5

                                                6543e2a6a696239c61ca71d19f2e1945

                                                SHA1

                                                61fb1d054e6b0df45e8ec9332845a219d3e94582

                                                SHA256

                                                4dc646abfdd6176154f8b3674dbe1fd6e24de9c4c74331c15320646d5fd40855

                                                SHA512

                                                5f59cdadad483bc505c05d68a4af51647e098a1ba6b1c9202b65f67bf5178c3b41f1329ae4469f12af362320508464abd91fa1e6c773908aa88a7c17b3ce5f2e

                                              • C:\Users\Admin\AppData\Local\Temp\ee1b92fd-3c8f-44b7-a64e-5446ab6ae1a0.vbs

                                                Filesize

                                                734B

                                                MD5

                                                f97bd03220049bc5db80c110c6dc807e

                                                SHA1

                                                bc8fc53f154c76a1d2427b268446f08b8c9d6ff9

                                                SHA256

                                                59bb6cfeb47771a850243e1a59dee23bbdd0a383c45dc8d219ddbd5c2b01eb1e

                                                SHA512

                                                96bac41478f67523909053be06fb1a0231bd573e2684a672b7abc74b7f06506c11a2d57c7ba939f6d9263229d5cdd231ab6aab61a496c48f7dd84d91ec139a0a

                                              • C:\Users\Admin\AppData\Local\Temp\f10e7dda-0708-4af0-afb7-7be597168fb7.vbs

                                                Filesize

                                                734B

                                                MD5

                                                78df118640aa47f2ee29b4441bd60721

                                                SHA1

                                                7fec394d60eb85605f0409b0986e5630c1f9b536

                                                SHA256

                                                71dde77fa16906a4a5b4e1f3f4ec9d5cf2719aff4d42de8473051bb10b6ec0b9

                                                SHA512

                                                492a7690eb852e9ea884da7a416228b5dd33e16f544c27dc281876ee1fcda945e3d0577c4aa66c033e5db36b7f31db99d4dda3cc248df061183160309562429c

                                              • C:\Users\Default\Videos\sppsvc.exe

                                                Filesize

                                                885KB

                                                MD5

                                                72752c102d829a6db14d122fe8252246

                                                SHA1

                                                92331776f620a5b6e3b5d3576dd8ceb658ae7d26

                                                SHA256

                                                84a9fbae62e2c95c17dd569d93f06ca5bd4e84233e9bce3f50723605a034c7b1

                                                SHA512

                                                8a8f05085431e8499785f3f23fd7b95d776d0cc49b28e298b5a2e4ffa92645c68bf3e98b9ebb3e2d0275e6d164810267c3ffffbae047577288eb0d21bac1e188

                                              • memory/1144-275-0x000000001BEE0000-0x000000001BFE2000-memory.dmp

                                                Filesize

                                                1.0MB

                                              • memory/1784-287-0x000000001C180000-0x000000001C282000-memory.dmp

                                                Filesize

                                                1.0MB

                                              • memory/4064-4-0x000000001B9C0000-0x000000001BA10000-memory.dmp

                                                Filesize

                                                320KB

                                              • memory/4064-3-0x0000000000F30000-0x0000000000F4C000-memory.dmp

                                                Filesize

                                                112KB

                                              • memory/4064-2-0x00007FFBC8120000-0x00007FFBC8BE1000-memory.dmp

                                                Filesize

                                                10.8MB

                                              • memory/4064-0-0x00007FFBC8123000-0x00007FFBC8125000-memory.dmp

                                                Filesize

                                                8KB

                                              • memory/4064-1-0x0000000000690000-0x0000000000774000-memory.dmp

                                                Filesize

                                                912KB

                                              • memory/4064-10-0x0000000002A10000-0x0000000002A1C000-memory.dmp

                                                Filesize

                                                48KB

                                              • memory/4064-7-0x00000000010F0000-0x00000000010FA000-memory.dmp

                                                Filesize

                                                40KB

                                              • memory/4064-6-0x0000000000F70000-0x0000000000F86000-memory.dmp

                                                Filesize

                                                88KB

                                              • memory/4064-8-0x0000000001100000-0x000000000110E000-memory.dmp

                                                Filesize

                                                56KB

                                              • memory/4064-165-0x00007FFBC8120000-0x00007FFBC8BE1000-memory.dmp

                                                Filesize

                                                10.8MB

                                              • memory/4064-9-0x0000000002A00000-0x0000000002A08000-memory.dmp

                                                Filesize

                                                32KB

                                              • memory/4064-5-0x0000000000F60000-0x0000000000F70000-memory.dmp

                                                Filesize

                                                64KB

                                              • memory/4780-252-0x000000001C2A0000-0x000000001C3A2000-memory.dmp

                                                Filesize

                                                1.0MB

                                              • memory/5768-299-0x000000001BF60000-0x000000001C062000-memory.dmp

                                                Filesize

                                                1.0MB