Analysis

  • max time kernel
    49s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/03/2025, 06:14

General

  • Target

    9a292ed0f527c2d277d74caf545de066170c26a23fb147dd88cf6a84f580a37a.exe

  • Size

    1.6MB

  • MD5

    1537a2448a3278776c0ad106d583bf42

  • SHA1

    3374a83147189b932096d99e2f34c5c185611242

  • SHA256

    9a292ed0f527c2d277d74caf545de066170c26a23fb147dd88cf6a84f580a37a

  • SHA512

    51dab8150cfc0f8c830a3d583e53e6a89a9f05c95daf84dee27cabcd43e03ee2953391d25b366a4a902e6cae6e8b1d05a4eae832d4d51f9e47869ca984e9d10a

  • SSDEEP

    24576:6sm8JijftfWIqZpyh/X6bSmV2GKz1oncoiF9GFwUvpHk3tSfEybcswrJ4gOEGEk:6D8Jijt+xpS/ekYmLGdhEAf7bCcjE

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 45 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 4 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 16 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Drops file in Program Files directory 26 IoCs
  • Drops file in Windows directory 20 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 5 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 45 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 21 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9a292ed0f527c2d277d74caf545de066170c26a23fb147dd88cf6a84f580a37a.exe
    "C:\Users\Admin\AppData\Local\Temp\9a292ed0f527c2d277d74caf545de066170c26a23fb147dd88cf6a84f580a37a.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3796
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\9a292ed0f527c2d277d74caf545de066170c26a23fb147dd88cf6a84f580a37a.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3092
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\0154351536fc379faee1\wininit.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4184
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\MSBuild\RuntimeBroker.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:536
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Google\Chrome\csrss.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4144
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\0154351536fc379faee1\dllhost.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3188
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Globalization\Sorting\taskhostw.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2552
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Downloaded Program Files\9a292ed0f527c2d277d74caf545de066170c26a23fb147dd88cf6a84f580a37a.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4796
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\3ac54ddf2ad44faa6035cf\taskhostw.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2364
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\lsass.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:408
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\VideoLAN\VLC\skins\fontdrvhost.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3124
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\PLA\Reports\fr-FR\backgroundTaskHost.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4568
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\0154351536fc379faee1\TextInputHost.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:652
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Tasks\sysmon.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:676
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\smss.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1676
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\0154351536fc379faee1\fontdrvhost.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2772
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Mozilla Firefox\uninstall\sysmon.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2548
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\9LsWxqGeQz.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3048
      • C:\Windows\system32\w32tm.exe
        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
        3⤵
          PID:5576
        • C:\Program Files\VideoLAN\VLC\skins\fontdrvhost.exe
          "C:\Program Files\VideoLAN\VLC\skins\fontdrvhost.exe"
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Modifies registry class
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3820
          • C:\Windows\System32\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ad864412-1d0b-40e6-b7a8-3dcba908c246.vbs"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:5160
            • C:\Program Files\VideoLAN\VLC\skins\fontdrvhost.exe
              "C:\Program Files\VideoLAN\VLC\skins\fontdrvhost.exe"
              5⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Modifies registry class
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:5368
              • C:\Windows\System32\WScript.exe
                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ec2d0873-c796-4c2a-a251-43ebbe3b0ff3.vbs"
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:5400
                • C:\Program Files\VideoLAN\VLC\skins\fontdrvhost.exe
                  "C:\Program Files\VideoLAN\VLC\skins\fontdrvhost.exe"
                  7⤵
                  • Blocklisted process makes network request
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Modifies registry class
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:3092
                  • C:\Windows\System32\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\b1912e1f-8b6b-40ce-8f05-f851fe9530f2.vbs"
                    8⤵
                    • Suspicious use of WriteProcessMemory
                    PID:5744
                    • C:\Program Files\VideoLAN\VLC\skins\fontdrvhost.exe
                      "C:\Program Files\VideoLAN\VLC\skins\fontdrvhost.exe"
                      9⤵
                      • Checks computer location settings
                      • Executes dropped EXE
                      • Modifies registry class
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:5672
                      • C:\Windows\System32\WScript.exe
                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\0f425322-e580-4881-9740-b2fa959d8b37.vbs"
                        10⤵
                          PID:2536
                          • C:\Program Files\VideoLAN\VLC\skins\fontdrvhost.exe
                            "C:\Program Files\VideoLAN\VLC\skins\fontdrvhost.exe"
                            11⤵
                              PID:776
                              • C:\Windows\System32\WScript.exe
                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ea5dd2c6-2f60-4101-a4c6-cfbee4effa34.vbs"
                                12⤵
                                  PID:6108
                                  • C:\Program Files\VideoLAN\VLC\skins\fontdrvhost.exe
                                    "C:\Program Files\VideoLAN\VLC\skins\fontdrvhost.exe"
                                    13⤵
                                      PID:5220
                                      • C:\Windows\System32\WScript.exe
                                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\143d88f3-d615-45db-8915-d15e65c2229b.vbs"
                                        14⤵
                                          PID:5328
                                          • C:\Program Files\VideoLAN\VLC\skins\fontdrvhost.exe
                                            "C:\Program Files\VideoLAN\VLC\skins\fontdrvhost.exe"
                                            15⤵
                                              PID:5392
                                              • C:\Windows\System32\WScript.exe
                                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\b2c4297f-2f16-4267-abb0-a5a7ca02f7c1.vbs"
                                                16⤵
                                                  PID:5444
                                                  • C:\Program Files\VideoLAN\VLC\skins\fontdrvhost.exe
                                                    "C:\Program Files\VideoLAN\VLC\skins\fontdrvhost.exe"
                                                    17⤵
                                                      PID:3760
                                                      • C:\Windows\System32\WScript.exe
                                                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\e5ee2f3e-07d2-41ff-acfd-7ada995b38a8.vbs"
                                                        18⤵
                                                          PID:5048
                                                          • C:\Program Files\VideoLAN\VLC\skins\fontdrvhost.exe
                                                            "C:\Program Files\VideoLAN\VLC\skins\fontdrvhost.exe"
                                                            19⤵
                                                              PID:5864
                                                              • C:\Windows\System32\WScript.exe
                                                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\a2cc13ca-020c-432d-be79-d6c1110c215d.vbs"
                                                                20⤵
                                                                  PID:4276
                                                                  • C:\Program Files\VideoLAN\VLC\skins\fontdrvhost.exe
                                                                    "C:\Program Files\VideoLAN\VLC\skins\fontdrvhost.exe"
                                                                    21⤵
                                                                      PID:5784
                                                                      • C:\Windows\System32\WScript.exe
                                                                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\9c21cb71-0225-402e-a6b4-78c049389884.vbs"
                                                                        22⤵
                                                                          PID:3092
                                                                          • C:\Program Files\VideoLAN\VLC\skins\fontdrvhost.exe
                                                                            "C:\Program Files\VideoLAN\VLC\skins\fontdrvhost.exe"
                                                                            23⤵
                                                                              PID:2208
                                                                              • C:\Windows\System32\WScript.exe
                                                                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\0750f6b5-5fc5-4f6b-b7bc-376ed543d541.vbs"
                                                                                24⤵
                                                                                  PID:2744
                                                                                  • C:\Program Files\VideoLAN\VLC\skins\fontdrvhost.exe
                                                                                    "C:\Program Files\VideoLAN\VLC\skins\fontdrvhost.exe"
                                                                                    25⤵
                                                                                      PID:2384
                                                                                      • C:\Windows\System32\WScript.exe
                                                                                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\a8d0dbba-97e5-434b-b91a-c63ff14cd654.vbs"
                                                                                        26⤵
                                                                                          PID:1520
                                                                                          • C:\Program Files\VideoLAN\VLC\skins\fontdrvhost.exe
                                                                                            "C:\Program Files\VideoLAN\VLC\skins\fontdrvhost.exe"
                                                                                            27⤵
                                                                                              PID:2400
                                                                                              • C:\Windows\System32\WScript.exe
                                                                                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\daa34029-69b9-4988-9909-64de54e69cdf.vbs"
                                                                                                28⤵
                                                                                                  PID:3596
                                                                                                • C:\Windows\System32\WScript.exe
                                                                                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\9fc269ec-a9d6-4ee4-9b3c-e526897eb671.vbs"
                                                                                                  28⤵
                                                                                                    PID:432
                                                                                              • C:\Windows\System32\WScript.exe
                                                                                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\da19d123-8a01-49c4-b4cf-372eccee2585.vbs"
                                                                                                26⤵
                                                                                                  PID:3076
                                                                                            • C:\Windows\System32\WScript.exe
                                                                                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\8932ff6c-3f62-4300-8a55-72cea4e2fbda.vbs"
                                                                                              24⤵
                                                                                                PID:2088
                                                                                          • C:\Windows\System32\WScript.exe
                                                                                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\433decd5-24de-4f88-96db-dd7ebc1e6b20.vbs"
                                                                                            22⤵
                                                                                              PID:2424
                                                                                        • C:\Windows\System32\WScript.exe
                                                                                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\e8c78d7e-3db0-4934-87a6-25373f483d5d.vbs"
                                                                                          20⤵
                                                                                            PID:1572
                                                                                      • C:\Windows\System32\WScript.exe
                                                                                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\07c83612-8151-463d-92d7-c1f5ffcd2edd.vbs"
                                                                                        18⤵
                                                                                          PID:2780
                                                                                    • C:\Windows\System32\WScript.exe
                                                                                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\f1c8ec38-0465-4250-9c3f-4ed352c9ea94.vbs"
                                                                                      16⤵
                                                                                        PID:3988
                                                                                  • C:\Windows\System32\WScript.exe
                                                                                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\a3f7db39-d31d-4fd6-8357-af22d368d036.vbs"
                                                                                    14⤵
                                                                                      PID:5288
                                                                                • C:\Windows\System32\WScript.exe
                                                                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\9a05d6f8-035c-45f4-995c-233800f1d025.vbs"
                                                                                  12⤵
                                                                                    PID:3004
                                                                              • C:\Windows\System32\WScript.exe
                                                                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\c3d06bd6-d8a2-486a-a79c-acf7c6eed99d.vbs"
                                                                                10⤵
                                                                                  PID:3388
                                                                            • C:\Windows\System32\WScript.exe
                                                                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\82d7454b-9b63-4359-8b25-aceaf183a8d4.vbs"
                                                                              8⤵
                                                                                PID:1060
                                                                          • C:\Windows\System32\WScript.exe
                                                                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\7a24a6a3-0ff9-4047-9892-1e71b52da37c.vbs"
                                                                            6⤵
                                                                              PID:3220
                                                                        • C:\Windows\System32\WScript.exe
                                                                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\d47d0623-ffa7-4a2b-82c4-063dbfdf6706.vbs"
                                                                          4⤵
                                                                            PID:5260
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 11 /tr "'C:\0154351536fc379faee1\wininit.exe'" /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:5044
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\0154351536fc379faee1\wininit.exe'" /rl HIGHEST /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:2736
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 13 /tr "'C:\0154351536fc379faee1\wininit.exe'" /rl HIGHEST /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:3348
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 6 /tr "'C:\Program Files\MSBuild\RuntimeBroker.exe'" /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:4308
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files\MSBuild\RuntimeBroker.exe'" /rl HIGHEST /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:2592
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\Program Files\MSBuild\RuntimeBroker.exe'" /rl HIGHEST /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:1812
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Program Files\Google\Chrome\csrss.exe'" /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:3948
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Google\Chrome\csrss.exe'" /rl HIGHEST /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:1956
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Program Files\Google\Chrome\csrss.exe'" /rl HIGHEST /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:2248
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 8 /tr "'C:\0154351536fc379faee1\dllhost.exe'" /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:3228
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\0154351536fc379faee1\dllhost.exe'" /rl HIGHEST /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:3316
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 14 /tr "'C:\0154351536fc379faee1\dllhost.exe'" /rl HIGHEST /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:4628
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 13 /tr "'C:\Windows\Globalization\Sorting\taskhostw.exe'" /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:4768
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Windows\Globalization\Sorting\taskhostw.exe'" /rl HIGHEST /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:2468
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 6 /tr "'C:\Windows\Globalization\Sorting\taskhostw.exe'" /rl HIGHEST /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:2748
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "9a292ed0f527c2d277d74caf545de066170c26a23fb147dd88cf6a84f580a37a9" /sc MINUTE /mo 11 /tr "'C:\Windows\Downloaded Program Files\9a292ed0f527c2d277d74caf545de066170c26a23fb147dd88cf6a84f580a37a.exe'" /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:2288
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "9a292ed0f527c2d277d74caf545de066170c26a23fb147dd88cf6a84f580a37a" /sc ONLOGON /tr "'C:\Windows\Downloaded Program Files\9a292ed0f527c2d277d74caf545de066170c26a23fb147dd88cf6a84f580a37a.exe'" /rl HIGHEST /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:232
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "9a292ed0f527c2d277d74caf545de066170c26a23fb147dd88cf6a84f580a37a9" /sc MINUTE /mo 12 /tr "'C:\Windows\Downloaded Program Files\9a292ed0f527c2d277d74caf545de066170c26a23fb147dd88cf6a84f580a37a.exe'" /rl HIGHEST /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:3416
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 10 /tr "'C:\3ac54ddf2ad44faa6035cf\taskhostw.exe'" /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:1728
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\3ac54ddf2ad44faa6035cf\taskhostw.exe'" /rl HIGHEST /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:2840
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 10 /tr "'C:\3ac54ddf2ad44faa6035cf\taskhostw.exe'" /rl HIGHEST /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:1804
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\lsass.exe'" /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:1192
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\lsass.exe'" /rl HIGHEST /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:1892
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\lsass.exe'" /rl HIGHEST /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:3092
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 7 /tr "'C:\Program Files\VideoLAN\VLC\skins\fontdrvhost.exe'" /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:3808
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Program Files\VideoLAN\VLC\skins\fontdrvhost.exe'" /rl HIGHEST /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:4796
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 11 /tr "'C:\Program Files\VideoLAN\VLC\skins\fontdrvhost.exe'" /rl HIGHEST /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:408
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 7 /tr "'C:\Windows\PLA\Reports\fr-FR\backgroundTaskHost.exe'" /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:652
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Windows\PLA\Reports\fr-FR\backgroundTaskHost.exe'" /rl HIGHEST /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:2548
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 12 /tr "'C:\Windows\PLA\Reports\fr-FR\backgroundTaskHost.exe'" /rl HIGHEST /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:4988
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 14 /tr "'C:\0154351536fc379faee1\TextInputHost.exe'" /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:1676
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\0154351536fc379faee1\TextInputHost.exe'" /rl HIGHEST /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:2348
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 6 /tr "'C:\0154351536fc379faee1\TextInputHost.exe'" /rl HIGHEST /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:848
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "sysmons" /sc MINUTE /mo 6 /tr "'C:\Windows\Tasks\sysmon.exe'" /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:1332
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Windows\Tasks\sysmon.exe'" /rl HIGHEST /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:216
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "sysmons" /sc MINUTE /mo 12 /tr "'C:\Windows\Tasks\sysmon.exe'" /rl HIGHEST /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:1188
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "smsss" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\smss.exe'" /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:924
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\smss.exe'" /rl HIGHEST /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:1584
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "smsss" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\smss.exe'" /rl HIGHEST /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:2280
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 9 /tr "'C:\0154351536fc379faee1\fontdrvhost.exe'" /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:4032
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\0154351536fc379faee1\fontdrvhost.exe'" /rl HIGHEST /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:1756
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 6 /tr "'C:\0154351536fc379faee1\fontdrvhost.exe'" /rl HIGHEST /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:3352
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "sysmons" /sc MINUTE /mo 5 /tr "'C:\Program Files\Mozilla Firefox\uninstall\sysmon.exe'" /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:3712
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Program Files\Mozilla Firefox\uninstall\sysmon.exe'" /rl HIGHEST /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:3252
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks.exe /create /tn "sysmons" /sc MINUTE /mo 8 /tr "'C:\Program Files\Mozilla Firefox\uninstall\sysmon.exe'" /rl HIGHEST /f
                                                                      1⤵
                                                                      • Process spawned unexpected child process
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:1936

                                                                    Network

                                                                    MITRE ATT&CK Enterprise v15

                                                                    Replay Monitor

                                                                    Loading Replay Monitor...

                                                                    Downloads

                                                                    • C:\0154351536fc379faee1\RCXD7BF.tmp

                                                                      Filesize

                                                                      1.6MB

                                                                      MD5

                                                                      7f8694303ee286c1cfaa46d0cd4472ca

                                                                      SHA1

                                                                      a9f2f2f154140c5a201fd8770791fd6ab388abe4

                                                                      SHA256

                                                                      7f7d0b8649539adb7141369ba1e30edf9ec7d8ac0b9c44c092624df4d7315644

                                                                      SHA512

                                                                      2263f7412e6615e9dd6faca053b04706411a97d66898541ba166ea11a0dcfbf62c4af19b2539f8c4f1e4c5a75ecc5245c24f8f8fbf7813cb16bd72fbdc922247

                                                                    • C:\3ac54ddf2ad44faa6035cf\taskhostw.exe

                                                                      Filesize

                                                                      1.6MB

                                                                      MD5

                                                                      112a3c51199bae5f6bb72705a5ffcf08

                                                                      SHA1

                                                                      c8db321b15f062d21744906e3c2101f99f655c8b

                                                                      SHA256

                                                                      3171e367425ba974a84976b3fdcf7bd3637bf76329f3c7dfca9fac8eb056b822

                                                                      SHA512

                                                                      79c95044b67219bb6b5f311a8a1e93a2b0da5ff5e57f7c086c7081ee7de26d4c150606a166f9b0b79351d01d6402e611cb306f1ebc7595e5780de898883e5654

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\fontdrvhost.exe.log

                                                                      Filesize

                                                                      1KB

                                                                      MD5

                                                                      3690a1c3b695227a38625dcf27bd6dac

                                                                      SHA1

                                                                      c2ed91e98b120681182904fa2c7cd504e5c4b2f5

                                                                      SHA256

                                                                      2ca8df156dba033c5b3ae4009e3be14dcdc6b9be53588055efd0864a1ab8ff73

                                                                      SHA512

                                                                      15ebfe05c0317f844e957ac02842a60b01f00ddca981e888e547056d0e30c97829bc4a2a46ce43034b3346f7cf5406c7c41c2a830f0abc47c8d2fd2ef00cb2c1

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                      Filesize

                                                                      2KB

                                                                      MD5

                                                                      d85ba6ff808d9e5444a4b369f5bc2730

                                                                      SHA1

                                                                      31aa9d96590fff6981b315e0b391b575e4c0804a

                                                                      SHA256

                                                                      84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                                                      SHA512

                                                                      8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                      Filesize

                                                                      944B

                                                                      MD5

                                                                      9191187d695b2965f2ceb651f0b37ee8

                                                                      SHA1

                                                                      b50a4038fb94c8aa7cff8d6941a4329b5b2ae8c7

                                                                      SHA256

                                                                      654a46452391ae3310ff9c6a4c820774e950276014fea044c41f007f6c335833

                                                                      SHA512

                                                                      90094f44f83470c88c4fcecb239f70e8e791b3b3da628c00676e3c4791766808b4e31c12beef2a7bc7d6a12d05bd8150888461ed1ef7e9eebc8697f6955d63bc

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                      Filesize

                                                                      944B

                                                                      MD5

                                                                      6b097b3e3e3911971243ad921c41967f

                                                                      SHA1

                                                                      006f7002f8aadf9c6ef2753b7d89d35899924a2e

                                                                      SHA256

                                                                      e7ca42d3072d5fb73ed8abdce1332805bbb5ab4c4c1359c1ebfbebd7317dc390

                                                                      SHA512

                                                                      069faeccf5c6ab83594d43b6ae553c2c8ded4ce672d9dd99fbc21e90f9829427d0f32536d874529dc3a2d246c0efe3aab50940a796b97632d66d3a169d91e0bc

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                      Filesize

                                                                      944B

                                                                      MD5

                                                                      82da496008a09abc336bf9adbe6453dd

                                                                      SHA1

                                                                      a57df6c2432c6bf7ab549a4333e636f9d9dfebd2

                                                                      SHA256

                                                                      69def38d01c34269e4e7be79130fc62befb01815c783fef6d4dc116672306810

                                                                      SHA512

                                                                      86d1efaf512d5ffc0af6a4508e63ffaa646971192762461957c0a544e77f9f24bbd0576927a6a996a87f147bcd6562bdc27a57caac6aad64354f485a7a7a7197

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                      Filesize

                                                                      944B

                                                                      MD5

                                                                      a16aff60eb3c3e35753a259b050c8a27

                                                                      SHA1

                                                                      85196d5dfb23d0c8b32b186325e2d58315a11287

                                                                      SHA256

                                                                      a057f85fa5358fac25f1337c1fbabeffb1ca1908b352208038293ec575dfc206

                                                                      SHA512

                                                                      13e6514cddaafba8f4fe3b08f6d6e118823ad454aac4efcb71a82438de50f97cd9570f44d594db27e4c534912a12ed066ea098b95505a6994f854f8349f2f5b0

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                      Filesize

                                                                      944B

                                                                      MD5

                                                                      0c87ff349c47ae6e678ea72feb4bb181

                                                                      SHA1

                                                                      0668dc890d29354fbb86cfaeae5363d9f2c1fdc8

                                                                      SHA256

                                                                      68decb0f61e56ef1ad4a9c69e0c496ac30ead7bdb15ae2830a01a21cb4c243fc

                                                                      SHA512

                                                                      32a9a76ddc1de0612c74ce170e86e716fde003306c202c68573ce4dcbb58e2ff59b7bdff77e4c259c869f4443e2c6aa023d1fcae6857ea36e4bf8a3110b58fbe

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                      Filesize

                                                                      944B

                                                                      MD5

                                                                      0c3cddab7d289f65843ac7ee436ff50d

                                                                      SHA1

                                                                      19046a0dc416df364c3be08b72166becf7ed9ca9

                                                                      SHA256

                                                                      c94ea9a9d0877a48ade47f77733be15871512f7aded45a211eb636bdcf7e45a1

                                                                      SHA512

                                                                      45c710a959f67ed05c25709c24887a4d5e5909e94f2012bd1cad64b32729fafea6f6628b2552f36c9d98bf8a1ddf50bb84d92d6e1cb15f20b2a74739ff19c9ff

                                                                    • C:\Users\Admin\AppData\Local\Temp\0750f6b5-5fc5-4f6b-b7bc-376ed543d541.vbs

                                                                      Filesize

                                                                      727B

                                                                      MD5

                                                                      278e5e8a50b22ec2808ded53012598a4

                                                                      SHA1

                                                                      2987b86215b02d75fdbbcc5215d667474ddcd630

                                                                      SHA256

                                                                      4d5681609bcfd56784eb7de61bca38cae974272d58d54fdc093092c8b43b2250

                                                                      SHA512

                                                                      c434314f14f92c883f51cb5480dc2acce35c140ab306dc2a595075d1dc96eadd52556eff28d098b1f15b9b6cedb7200b847aefe838e5cbc732f3122582ee8641

                                                                    • C:\Users\Admin\AppData\Local\Temp\0f425322-e580-4881-9740-b2fa959d8b37.vbs

                                                                      Filesize

                                                                      727B

                                                                      MD5

                                                                      aa3c941d9ca545bc0c2e38f57ec88efe

                                                                      SHA1

                                                                      21b46a98df0be2e1319469a7786f3c2fb8c7da69

                                                                      SHA256

                                                                      3e7fd9dc9a3bbf3066a5890dd797d7b55171cee15681116fe6fbbc43c8edbd48

                                                                      SHA512

                                                                      9e03abc060ae3f362152672129653b3145b197dab621e76476bc2a56f68dc7bb827c3163fd8e05c18881ec1f9748d78aead6b73f429900439cf5a73d05620995

                                                                    • C:\Users\Admin\AppData\Local\Temp\143d88f3-d615-45db-8915-d15e65c2229b.vbs

                                                                      Filesize

                                                                      727B

                                                                      MD5

                                                                      a64f42a3c3be95bd7dac7221001c7ba3

                                                                      SHA1

                                                                      edeaaf6b2e559394d41f1972f57437c560e3c7f6

                                                                      SHA256

                                                                      5f1ce76ff4a924cb4789a05d247fa7cb8ee14eae5e3b97fb588ce69110550e1a

                                                                      SHA512

                                                                      8e45af1a844e063e83369bdf13685e0e09116cbefe9367bd42c32899012ea9ed34560bf27188a1706503cd413ca5abcc4320de1e6741e6aa8aa95d6f8963f340

                                                                    • C:\Users\Admin\AppData\Local\Temp\9LsWxqGeQz.bat

                                                                      Filesize

                                                                      216B

                                                                      MD5

                                                                      18ec006330fc148a4c3b4cc6c1ce2787

                                                                      SHA1

                                                                      7129404ff9e9a7141e59b7de37650a4cfd22449a

                                                                      SHA256

                                                                      2ac20eeacf9a01de2a505be3d20c0641303c25713574be340023d04b45a09ae5

                                                                      SHA512

                                                                      da7903cde7dba5eb5cdbd4587c615bec69c13dd2fee9ec217b3727a56122a3964659e3be1d170ce2db68b6ce9754f4bddfe48bd636b9f16c58a7fb921250e30e

                                                                    • C:\Users\Admin\AppData\Local\Temp\9c21cb71-0225-402e-a6b4-78c049389884.vbs

                                                                      Filesize

                                                                      727B

                                                                      MD5

                                                                      dfcda554f3205c624b47289d82065e0f

                                                                      SHA1

                                                                      7f33b4efbf5368ca7e5346c99a35ec1a2a9fd8f6

                                                                      SHA256

                                                                      a3b692d84848ff90a9d35abceaf59ce0d80f9ac78ffe78803bc3d4c59a316a37

                                                                      SHA512

                                                                      4f30c70d71bb14591074428d727e8ffccb35589d8d69ef23f9b9c4dc0b22efb3a272ce984a5a34c410fb7c5ef7438aa26772d7b8d484d608ae84d517ab74ea36

                                                                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_nfy1iwhr.exa.ps1

                                                                      Filesize

                                                                      60B

                                                                      MD5

                                                                      d17fe0a3f47be24a6453e9ef58c94641

                                                                      SHA1

                                                                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                      SHA256

                                                                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                      SHA512

                                                                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                    • C:\Users\Admin\AppData\Local\Temp\a2cc13ca-020c-432d-be79-d6c1110c215d.vbs

                                                                      Filesize

                                                                      727B

                                                                      MD5

                                                                      9ca260e6c6e5fb58354b027f4721d242

                                                                      SHA1

                                                                      fca4e7432bbed25a453eb5445e3f7ced7f5a95ee

                                                                      SHA256

                                                                      9fd6321e25ad6371794dbe2447ee8b1d035e39b1ecf9e005821591c14a3ed036

                                                                      SHA512

                                                                      01c4ad69848462183b12f0e62cb0071c7931f911c6bef1a876585389a0244acee3ae5eea7dc2bb8f9246c762537c108a06de9e2e93ba634e703f772e97cc3b52

                                                                    • C:\Users\Admin\AppData\Local\Temp\a8d0dbba-97e5-434b-b91a-c63ff14cd654.vbs

                                                                      Filesize

                                                                      727B

                                                                      MD5

                                                                      140120676bfe6b9e24c060669ff6a2ab

                                                                      SHA1

                                                                      b53e3f37f10d3a83d3a44a33fff5aecaeddb2890

                                                                      SHA256

                                                                      19592ed719a931caf727417acd47343e52caa505b9bb29730f3b0abd6a8deff6

                                                                      SHA512

                                                                      7020d59c754136aa4ee9bc2340f455a5702d13103428bbd1c74cc518bf6776c0fa56e6121d3ff7382a6867988105cf50f970affee3523fc0893a7a2e5a24bec4

                                                                    • C:\Users\Admin\AppData\Local\Temp\ad864412-1d0b-40e6-b7a8-3dcba908c246.vbs

                                                                      Filesize

                                                                      727B

                                                                      MD5

                                                                      5024abf9b3ce834c1ebcc39f53f27a94

                                                                      SHA1

                                                                      34f54134543d932232f675c97bcf7dcdd86ba019

                                                                      SHA256

                                                                      c0d46bffa9e2e6d842754372c108406199b0045143f84b844b50565e8d6b5734

                                                                      SHA512

                                                                      9fe1da16ac9c35f61ae15565a8f1e0742512e8ea4309f0b933413c7c65c35a7d4577549a9a1acfd72d9fe0f63a9efa9d98b6f49db68387c66e0719edfcf6edc1

                                                                    • C:\Users\Admin\AppData\Local\Temp\b1912e1f-8b6b-40ce-8f05-f851fe9530f2.vbs

                                                                      Filesize

                                                                      727B

                                                                      MD5

                                                                      120af05685c878681f55b8674216bf32

                                                                      SHA1

                                                                      01c843783e1f498eb5af4da5bad2c9570947a698

                                                                      SHA256

                                                                      939cb72e04da4321fb09948659cf3afeae9841179e0a424cb721a6c3891e5f44

                                                                      SHA512

                                                                      7681e4a8c7810212da8f6de28fb6134fa5e454ed30d164abb7e63245ead8cdb23cdda607ccca3b4efbff61710b043ba8e2b37ffaf98662b2f3a03f82b9693c61

                                                                    • C:\Users\Admin\AppData\Local\Temp\b2c4297f-2f16-4267-abb0-a5a7ca02f7c1.vbs

                                                                      Filesize

                                                                      727B

                                                                      MD5

                                                                      89eb0d04206b6b9cee2ccf40e5aaadab

                                                                      SHA1

                                                                      3ea80283a024636acadef6ebb643d5384f961cce

                                                                      SHA256

                                                                      5d742c0cb2c26cffb8b81350ef4c165e624e1bce73eba0521592188128f80dad

                                                                      SHA512

                                                                      6e1969e9a13c07317438e5feb859603fa40271b723b9f94380f076fca6f47ebbaf9b349a82f933218a5e130055951e78381ddeb4c2eb6d0f1ab822f1e0271f7f

                                                                    • C:\Users\Admin\AppData\Local\Temp\d47d0623-ffa7-4a2b-82c4-063dbfdf6706.vbs

                                                                      Filesize

                                                                      503B

                                                                      MD5

                                                                      f4df08bb118332f57e4b12666debd596

                                                                      SHA1

                                                                      e6efb311401d7b67e237c4622fa06d5b904e362a

                                                                      SHA256

                                                                      0753d6a1e8e53ac446c13522aa5ba2c1e72c48ffd33600de242245486aed9e34

                                                                      SHA512

                                                                      e3dfc08e194458d909022f69134965da56a4e0a385876db9cac22349890c300ed8c10f6fc7872d9e9f9bf12b66feb26b9b2e64ea1f980fa5ac47a0fadc74aaed

                                                                    • C:\Users\Admin\AppData\Local\Temp\e5ee2f3e-07d2-41ff-acfd-7ada995b38a8.vbs

                                                                      Filesize

                                                                      727B

                                                                      MD5

                                                                      7ae3f732e10d2ab453196f08e5eb2bff

                                                                      SHA1

                                                                      af92cc6eb69d8d26c5283d22a7e37e1d5b563cdd

                                                                      SHA256

                                                                      f23e7d759db127f5b8ae0caafaab5db0700b41ea70ef180e1848ceb76be2ab13

                                                                      SHA512

                                                                      e6dcd6ddc781e955050ae75a3400af08165276badbcac8ce1aa77320f7a236e7c6eab71880f135c44ae5f81b1e4e280e572ee903d1b8630696fe7ce21540c9ba

                                                                    • C:\Users\Admin\AppData\Local\Temp\ea5dd2c6-2f60-4101-a4c6-cfbee4effa34.vbs

                                                                      Filesize

                                                                      726B

                                                                      MD5

                                                                      f21be0a1864712db39b2de0e77941d7c

                                                                      SHA1

                                                                      b288673b775a25edbad301ebaf87976927681709

                                                                      SHA256

                                                                      e678182aa718bbf49174691364deaef7c414c6543e7059377b3959d05c0cd1f6

                                                                      SHA512

                                                                      1264076ca3a781b0008846af4805aa47e54ac005f12458866c138bc1fcb5233b6c59d44719529fe857ff4469b2eed91e634a22f03d0be4318f51338d1520f7fb

                                                                    • C:\Users\Admin\AppData\Local\Temp\ec2d0873-c796-4c2a-a251-43ebbe3b0ff3.vbs

                                                                      Filesize

                                                                      727B

                                                                      MD5

                                                                      e5cd827a58d50c7a7e67d2cb2de923d5

                                                                      SHA1

                                                                      a78236d6d5f223d3bf9875423f25191d04ef7c0e

                                                                      SHA256

                                                                      27cbfb5f77116a604b13b46928f2ee3df01b480859a7d4e7469343ed1f715684

                                                                      SHA512

                                                                      8c57993f19321403fb31cfa58df2c8992f5db14cb34e9b54624588412d1198227a895fdfc778a89738e509ad679a6178f0becd34ad11f294a1ea7449a4041ea9

                                                                    • C:\Windows\Globalization\Sorting\taskhostw.exe

                                                                      Filesize

                                                                      1.6MB

                                                                      MD5

                                                                      1537a2448a3278776c0ad106d583bf42

                                                                      SHA1

                                                                      3374a83147189b932096d99e2f34c5c185611242

                                                                      SHA256

                                                                      9a292ed0f527c2d277d74caf545de066170c26a23fb147dd88cf6a84f580a37a

                                                                      SHA512

                                                                      51dab8150cfc0f8c830a3d583e53e6a89a9f05c95daf84dee27cabcd43e03ee2953391d25b366a4a902e6cae6e8b1d05a4eae832d4d51f9e47869ca984e9d10a

                                                                    • memory/3188-243-0x0000022FE7290000-0x0000022FE72B2000-memory.dmp

                                                                      Filesize

                                                                      136KB

                                                                    • memory/3796-0-0x00007FFAA5E13000-0x00007FFAA5E15000-memory.dmp

                                                                      Filesize

                                                                      8KB

                                                                    • memory/3796-13-0x000000001BCE0000-0x000000001BCEE000-memory.dmp

                                                                      Filesize

                                                                      56KB

                                                                    • memory/3796-10-0x000000001B3A0000-0x000000001B3AC000-memory.dmp

                                                                      Filesize

                                                                      48KB

                                                                    • memory/3796-9-0x0000000002A60000-0x0000000002A68000-memory.dmp

                                                                      Filesize

                                                                      32KB

                                                                    • memory/3796-6-0x0000000002A30000-0x0000000002A46000-memory.dmp

                                                                      Filesize

                                                                      88KB

                                                                    • memory/3796-8-0x0000000002A50000-0x0000000002A60000-memory.dmp

                                                                      Filesize

                                                                      64KB

                                                                    • memory/3796-7-0x0000000001070000-0x0000000001078000-memory.dmp

                                                                      Filesize

                                                                      32KB

                                                                    • memory/3796-17-0x000000001BD20000-0x000000001BD2C000-memory.dmp

                                                                      Filesize

                                                                      48KB

                                                                    • memory/3796-15-0x000000001BD00000-0x000000001BD08000-memory.dmp

                                                                      Filesize

                                                                      32KB

                                                                    • memory/3796-3-0x0000000001050000-0x000000000106C000-memory.dmp

                                                                      Filesize

                                                                      112KB

                                                                    • memory/3796-262-0x00007FFAA5E10000-0x00007FFAA68D1000-memory.dmp

                                                                      Filesize

                                                                      10.8MB

                                                                    • memory/3796-11-0x000000001BCC0000-0x000000001BCCC000-memory.dmp

                                                                      Filesize

                                                                      48KB

                                                                    • memory/3796-5-0x0000000000FE0000-0x0000000000FF0000-memory.dmp

                                                                      Filesize

                                                                      64KB

                                                                    • memory/3796-215-0x00007FFAA5E10000-0x00007FFAA68D1000-memory.dmp

                                                                      Filesize

                                                                      10.8MB

                                                                    • memory/3796-4-0x000000001BB30000-0x000000001BB80000-memory.dmp

                                                                      Filesize

                                                                      320KB

                                                                    • memory/3796-14-0x000000001BCF0000-0x000000001BCF8000-memory.dmp

                                                                      Filesize

                                                                      32KB

                                                                    • memory/3796-192-0x00007FFAA5E13000-0x00007FFAA5E15000-memory.dmp

                                                                      Filesize

                                                                      8KB

                                                                    • memory/3796-16-0x000000001BD10000-0x000000001BD1A000-memory.dmp

                                                                      Filesize

                                                                      40KB

                                                                    • memory/3796-2-0x00007FFAA5E10000-0x00007FFAA68D1000-memory.dmp

                                                                      Filesize

                                                                      10.8MB

                                                                    • memory/3796-1-0x0000000000680000-0x0000000000822000-memory.dmp

                                                                      Filesize

                                                                      1.6MB

                                                                    • memory/3796-12-0x000000001BCD0000-0x000000001BCDA000-memory.dmp

                                                                      Filesize

                                                                      40KB