Malware Analysis Report

2025-08-10 23:15

Sample ID 221031-116paaedgj
Target c5d3e0c2baa11d96bf56f700b3916cfd6f0c53acf3707ccb0c5736a0bf10f820
SHA256 c5d3e0c2baa11d96bf56f700b3916cfd6f0c53acf3707ccb0c5736a0bf10f820
Tags
rat dcrat infostealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V6

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

c5d3e0c2baa11d96bf56f700b3916cfd6f0c53acf3707ccb0c5736a0bf10f820

Threat Level: Known bad

The file c5d3e0c2baa11d96bf56f700b3916cfd6f0c53acf3707ccb0c5736a0bf10f820 was found to be: Known bad.

Malicious Activity Summary

rat dcrat infostealer

DcRat

Process spawned unexpected child process

Dcrat family

DCRat payload

DCRat payload

Executes dropped EXE

Checks computer location settings

Legitimate hosting services abused for malware hosting/C2

Drops file in Program Files directory

Drops file in Windows directory

Enumerates physical storage devices

Modifies registry class

Suspicious behavior: EnumeratesProcesses

Suspicious use of WriteProcessMemory

Suspicious use of AdjustPrivilegeToken

Creates scheduled task(s)

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2022-10-31 22:08

Signatures

DCRat payload

rat
Description Indicator Process Target
N/A N/A N/A N/A

Dcrat family

dcrat

Analysis: behavioral1

Detonation Overview

Submitted

2022-10-31 22:08

Reported

2022-10-31 22:10

Platform

win10v2004-20220812-en

Max time kernel

146s

Max time network

141s

Command Line

"C:\Users\Admin\AppData\Local\Temp\c5d3e0c2baa11d96bf56f700b3916cfd6f0c53acf3707ccb0c5736a0bf10f820.exe"

Signatures

DcRat

rat infostealer dcrat

Process spawned unexpected child process

Description Indicator Process Target
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe

DCRat payload

rat
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation C:\Windows\Vss\Writers\System\explorer.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation C:\Windows\Vss\Writers\System\explorer.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation C:\Windows\Vss\Writers\System\explorer.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation C:\Windows\Vss\Writers\System\explorer.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation C:\Windows\Vss\Writers\System\explorer.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation C:\Windows\Vss\Writers\System\explorer.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation C:\providercommon\DllCommonsvc.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation C:\Windows\SysWOW64\WScript.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation C:\Windows\Vss\Writers\System\explorer.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation C:\Windows\Vss\Writers\System\explorer.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\c5d3e0c2baa11d96bf56f700b3916cfd6f0c53acf3707ccb0c5736a0bf10f820.exe N/A

Legitimate hosting services abused for malware hosting/C2

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files (x86)\Windows Portable Devices\ebf1f9fa8afd6d C:\providercommon\DllCommonsvc.exe N/A
File created C:\Program Files\ModifiableWindowsApps\WmiPrvSE.exe C:\providercommon\DllCommonsvc.exe N/A
File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\ja\RuntimeBroker.exe C:\providercommon\DllCommonsvc.exe N/A
File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\ja\RuntimeBroker.exe C:\providercommon\DllCommonsvc.exe N/A
File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\ja\9e8d7a4ca61bd9 C:\providercommon\DllCommonsvc.exe N/A
File created C:\Program Files (x86)\Windows Portable Devices\cmd.exe C:\providercommon\DllCommonsvc.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Vss\Writers\System\explorer.exe C:\providercommon\DllCommonsvc.exe N/A
File created C:\Windows\Vss\Writers\System\7a0fd90576e088 C:\providercommon\DllCommonsvc.exe N/A

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings C:\Windows\Vss\Writers\System\explorer.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings C:\Windows\Vss\Writers\System\explorer.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings C:\Windows\Vss\Writers\System\explorer.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings C:\Windows\Vss\Writers\System\explorer.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings C:\Windows\Vss\Writers\System\explorer.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings C:\Windows\Vss\Writers\System\explorer.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings C:\Users\Admin\AppData\Local\Temp\c5d3e0c2baa11d96bf56f700b3916cfd6f0c53acf3707ccb0c5736a0bf10f820.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings C:\providercommon\DllCommonsvc.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings C:\Windows\Vss\Writers\System\explorer.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings C:\Windows\Vss\Writers\System\explorer.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\providercommon\DllCommonsvc.exe N/A
N/A N/A C:\providercommon\DllCommonsvc.exe N/A
N/A N/A C:\providercommon\DllCommonsvc.exe N/A
N/A N/A C:\providercommon\DllCommonsvc.exe N/A
N/A N/A C:\providercommon\DllCommonsvc.exe N/A
N/A N/A C:\providercommon\DllCommonsvc.exe N/A
N/A N/A C:\providercommon\DllCommonsvc.exe N/A
N/A N/A C:\providercommon\DllCommonsvc.exe N/A
N/A N/A C:\providercommon\DllCommonsvc.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\Vss\Writers\System\explorer.exe N/A
N/A N/A C:\Windows\Vss\Writers\System\explorer.exe N/A
N/A N/A C:\Windows\Vss\Writers\System\explorer.exe N/A
N/A N/A C:\Windows\Vss\Writers\System\explorer.exe N/A
N/A N/A C:\Windows\Vss\Writers\System\explorer.exe N/A
N/A N/A C:\Windows\Vss\Writers\System\explorer.exe N/A
N/A N/A C:\Windows\Vss\Writers\System\explorer.exe N/A
N/A N/A C:\Windows\Vss\Writers\System\explorer.exe N/A
N/A N/A C:\Windows\Vss\Writers\System\explorer.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\providercommon\DllCommonsvc.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\Vss\Writers\System\explorer.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\Vss\Writers\System\explorer.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\Vss\Writers\System\explorer.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\Vss\Writers\System\explorer.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\Vss\Writers\System\explorer.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\Vss\Writers\System\explorer.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\Vss\Writers\System\explorer.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\Vss\Writers\System\explorer.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\Vss\Writers\System\explorer.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4400 wrote to memory of 724 N/A C:\Users\Admin\AppData\Local\Temp\c5d3e0c2baa11d96bf56f700b3916cfd6f0c53acf3707ccb0c5736a0bf10f820.exe C:\Windows\SysWOW64\WScript.exe
PID 4400 wrote to memory of 724 N/A C:\Users\Admin\AppData\Local\Temp\c5d3e0c2baa11d96bf56f700b3916cfd6f0c53acf3707ccb0c5736a0bf10f820.exe C:\Windows\SysWOW64\WScript.exe
PID 4400 wrote to memory of 724 N/A C:\Users\Admin\AppData\Local\Temp\c5d3e0c2baa11d96bf56f700b3916cfd6f0c53acf3707ccb0c5736a0bf10f820.exe C:\Windows\SysWOW64\WScript.exe
PID 724 wrote to memory of 4136 N/A C:\Windows\SysWOW64\WScript.exe C:\Windows\SysWOW64\cmd.exe
PID 724 wrote to memory of 4136 N/A C:\Windows\SysWOW64\WScript.exe C:\Windows\SysWOW64\cmd.exe
PID 724 wrote to memory of 4136 N/A C:\Windows\SysWOW64\WScript.exe C:\Windows\SysWOW64\cmd.exe
PID 4136 wrote to memory of 5036 N/A C:\Windows\SysWOW64\cmd.exe C:\providercommon\DllCommonsvc.exe
PID 4136 wrote to memory of 5036 N/A C:\Windows\SysWOW64\cmd.exe C:\providercommon\DllCommonsvc.exe
PID 5036 wrote to memory of 4168 N/A C:\providercommon\DllCommonsvc.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 5036 wrote to memory of 4168 N/A C:\providercommon\DllCommonsvc.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 5036 wrote to memory of 3604 N/A C:\providercommon\DllCommonsvc.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 5036 wrote to memory of 3604 N/A C:\providercommon\DllCommonsvc.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 5036 wrote to memory of 4304 N/A C:\providercommon\DllCommonsvc.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 5036 wrote to memory of 4304 N/A C:\providercommon\DllCommonsvc.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 5036 wrote to memory of 4948 N/A C:\providercommon\DllCommonsvc.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 5036 wrote to memory of 4948 N/A C:\providercommon\DllCommonsvc.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 5036 wrote to memory of 1456 N/A C:\providercommon\DllCommonsvc.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 5036 wrote to memory of 1456 N/A C:\providercommon\DllCommonsvc.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 5036 wrote to memory of 3532 N/A C:\providercommon\DllCommonsvc.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 5036 wrote to memory of 3532 N/A C:\providercommon\DllCommonsvc.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 5036 wrote to memory of 4408 N/A C:\providercommon\DllCommonsvc.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 5036 wrote to memory of 4408 N/A C:\providercommon\DllCommonsvc.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 5036 wrote to memory of 1612 N/A C:\providercommon\DllCommonsvc.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 5036 wrote to memory of 1612 N/A C:\providercommon\DllCommonsvc.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 5036 wrote to memory of 1108 N/A C:\providercommon\DllCommonsvc.exe C:\Windows\System32\cmd.exe
PID 5036 wrote to memory of 1108 N/A C:\providercommon\DllCommonsvc.exe C:\Windows\System32\cmd.exe
PID 1108 wrote to memory of 3796 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\w32tm.exe
PID 1108 wrote to memory of 3796 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\w32tm.exe
PID 1108 wrote to memory of 4880 N/A C:\Windows\System32\cmd.exe C:\Windows\Vss\Writers\System\explorer.exe
PID 1108 wrote to memory of 4880 N/A C:\Windows\System32\cmd.exe C:\Windows\Vss\Writers\System\explorer.exe
PID 4880 wrote to memory of 2348 N/A C:\Windows\Vss\Writers\System\explorer.exe C:\Windows\System32\cmd.exe
PID 4880 wrote to memory of 2348 N/A C:\Windows\Vss\Writers\System\explorer.exe C:\Windows\System32\cmd.exe
PID 2348 wrote to memory of 4476 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\w32tm.exe
PID 2348 wrote to memory of 4476 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\w32tm.exe
PID 2348 wrote to memory of 3788 N/A C:\Windows\System32\cmd.exe C:\Windows\Vss\Writers\System\explorer.exe
PID 2348 wrote to memory of 3788 N/A C:\Windows\System32\cmd.exe C:\Windows\Vss\Writers\System\explorer.exe
PID 3788 wrote to memory of 3568 N/A C:\Windows\Vss\Writers\System\explorer.exe C:\Windows\System32\cmd.exe
PID 3788 wrote to memory of 3568 N/A C:\Windows\Vss\Writers\System\explorer.exe C:\Windows\System32\cmd.exe
PID 3568 wrote to memory of 3248 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\w32tm.exe
PID 3568 wrote to memory of 3248 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\w32tm.exe
PID 3568 wrote to memory of 1956 N/A C:\Windows\System32\cmd.exe C:\Windows\Vss\Writers\System\explorer.exe
PID 3568 wrote to memory of 1956 N/A C:\Windows\System32\cmd.exe C:\Windows\Vss\Writers\System\explorer.exe
PID 1956 wrote to memory of 5088 N/A C:\Windows\Vss\Writers\System\explorer.exe C:\Windows\System32\cmd.exe
PID 1956 wrote to memory of 5088 N/A C:\Windows\Vss\Writers\System\explorer.exe C:\Windows\System32\cmd.exe
PID 5088 wrote to memory of 3976 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\w32tm.exe
PID 5088 wrote to memory of 3976 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\w32tm.exe
PID 5088 wrote to memory of 2292 N/A C:\Windows\System32\cmd.exe C:\Windows\Vss\Writers\System\explorer.exe
PID 5088 wrote to memory of 2292 N/A C:\Windows\System32\cmd.exe C:\Windows\Vss\Writers\System\explorer.exe
PID 2292 wrote to memory of 2324 N/A C:\Windows\Vss\Writers\System\explorer.exe C:\Windows\System32\cmd.exe
PID 2292 wrote to memory of 2324 N/A C:\Windows\Vss\Writers\System\explorer.exe C:\Windows\System32\cmd.exe
PID 2324 wrote to memory of 756 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\w32tm.exe
PID 2324 wrote to memory of 756 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\w32tm.exe
PID 2324 wrote to memory of 4412 N/A C:\Windows\System32\cmd.exe C:\Windows\Vss\Writers\System\explorer.exe
PID 2324 wrote to memory of 4412 N/A C:\Windows\System32\cmd.exe C:\Windows\Vss\Writers\System\explorer.exe
PID 4412 wrote to memory of 532 N/A C:\Windows\Vss\Writers\System\explorer.exe C:\Windows\System32\cmd.exe
PID 4412 wrote to memory of 532 N/A C:\Windows\Vss\Writers\System\explorer.exe C:\Windows\System32\cmd.exe
PID 532 wrote to memory of 3548 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\w32tm.exe
PID 532 wrote to memory of 3548 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\w32tm.exe
PID 532 wrote to memory of 3428 N/A C:\Windows\System32\cmd.exe C:\Windows\Vss\Writers\System\explorer.exe
PID 532 wrote to memory of 3428 N/A C:\Windows\System32\cmd.exe C:\Windows\Vss\Writers\System\explorer.exe
PID 3428 wrote to memory of 4312 N/A C:\Windows\Vss\Writers\System\explorer.exe C:\Windows\System32\cmd.exe
PID 3428 wrote to memory of 4312 N/A C:\Windows\Vss\Writers\System\explorer.exe C:\Windows\System32\cmd.exe
PID 4312 wrote to memory of 2620 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\w32tm.exe
PID 4312 wrote to memory of 2620 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\w32tm.exe

Processes

C:\Users\Admin\AppData\Local\Temp\c5d3e0c2baa11d96bf56f700b3916cfd6f0c53acf3707ccb0c5736a0bf10f820.exe

"C:\Users\Admin\AppData\Local\Temp\c5d3e0c2baa11d96bf56f700b3916cfd6f0c53acf3707ccb0c5736a0bf10f820.exe"

C:\Windows\SysWOW64\WScript.exe

"C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c ""C:\providercommon\1zu9dW.bat" "

C:\providercommon\DllCommonsvc.exe

"C:\providercommon\DllCommonsvc.exe"

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\ja\RuntimeBroker.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\ja\RuntimeBroker.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\ja\RuntimeBroker.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "smsss" /sc MINUTE /mo 9 /tr "'C:\providercommon\smss.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\providercommon\smss.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "smsss" /sc MINUTE /mo 7 /tr "'C:\providercommon\smss.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Windows Portable Devices\cmd.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Portable Devices\cmd.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Portable Devices\cmd.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "explorere" /sc MINUTE /mo 9 /tr "'C:\Windows\Vss\Writers\System\explorer.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Windows\Vss\Writers\System\explorer.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "explorere" /sc MINUTE /mo 11 /tr "'C:\Windows\Vss\Writers\System\explorer.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 11 /tr "'C:\Users\Default\My Documents\Registry.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Users\Default\My Documents\Registry.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 13 /tr "'C:\Users\Default\My Documents\Registry.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 9 /tr "'C:\Users\Admin\Cookies\OfficeClickToRun.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Users\Admin\Cookies\OfficeClickToRun.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 11 /tr "'C:\Users\Admin\Cookies\OfficeClickToRun.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 7 /tr "'C:\Users\Admin\Contacts\OfficeClickToRun.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Users\Admin\Contacts\OfficeClickToRun.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 7 /tr "'C:\Users\Admin\Contacts\OfficeClickToRun.exe'" /rl HIGHEST /f

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\ja\RuntimeBroker.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Portable Devices\cmd.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\smss.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\My Documents\Registry.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\Cookies\OfficeClickToRun.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Vss\Writers\System\explorer.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\Contacts\OfficeClickToRun.exe'

C:\Windows\System32\cmd.exe

"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\FEhBhep8bI.bat"

C:\Windows\system32\w32tm.exe

w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2

C:\Windows\Vss\Writers\System\explorer.exe

"C:\Windows\Vss\Writers\System\explorer.exe"

C:\Windows\System32\cmd.exe

"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\qzxbGmHcY3.bat"

C:\Windows\system32\w32tm.exe

w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2

C:\Windows\Vss\Writers\System\explorer.exe

"C:\Windows\Vss\Writers\System\explorer.exe"

C:\Windows\System32\cmd.exe

"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\jBrSCX6wbi.bat"

C:\Windows\system32\w32tm.exe

w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2

C:\Windows\Vss\Writers\System\explorer.exe

"C:\Windows\Vss\Writers\System\explorer.exe"

C:\Windows\System32\cmd.exe

"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\CPbxFudqw6.bat"

C:\Windows\system32\w32tm.exe

w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2

C:\Windows\Vss\Writers\System\explorer.exe

"C:\Windows\Vss\Writers\System\explorer.exe"

C:\Windows\System32\cmd.exe

"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\vhtd8auDHa.bat"

C:\Windows\system32\w32tm.exe

w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2

C:\Windows\Vss\Writers\System\explorer.exe

"C:\Windows\Vss\Writers\System\explorer.exe"

C:\Windows\System32\cmd.exe

"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\LZh5ueQJla.bat"

C:\Windows\system32\w32tm.exe

w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2

C:\Windows\Vss\Writers\System\explorer.exe

"C:\Windows\Vss\Writers\System\explorer.exe"

C:\Windows\System32\cmd.exe

"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\VAhDAdBh8f.bat"

C:\Windows\system32\w32tm.exe

w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2

C:\Windows\Vss\Writers\System\explorer.exe

"C:\Windows\Vss\Writers\System\explorer.exe"

C:\Windows\System32\cmd.exe

"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\xdvgpfy6bM.bat"

C:\Windows\system32\w32tm.exe

w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2

C:\Windows\Vss\Writers\System\explorer.exe

"C:\Windows\Vss\Writers\System\explorer.exe"

C:\Windows\System32\cmd.exe

"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\MTMDnLe0ZL.bat"

C:\Windows\system32\w32tm.exe

w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2

C:\Windows\Vss\Writers\System\explorer.exe

"C:\Windows\Vss\Writers\System\explorer.exe"

Network

Country Destination Domain Proto
US 93.184.220.29:80 tcp
US 93.184.221.240:80 tcp
US 93.184.221.240:80 tcp
US 93.184.221.240:80 tcp
NL 104.80.225.205:443 tcp
US 8.8.8.8:53 raw.githubusercontent.com udp
US 185.199.108.133:443 raw.githubusercontent.com tcp
US 185.199.108.133:443 raw.githubusercontent.com tcp
FR 40.79.150.121:443 tcp
US 209.197.3.8:80 tcp
US 209.197.3.8:80 tcp
US 209.197.3.8:80 tcp
US 185.199.108.133:443 raw.githubusercontent.com tcp
US 185.199.108.133:443 raw.githubusercontent.com tcp
US 185.199.108.133:443 raw.githubusercontent.com tcp
US 185.199.108.133:443 raw.githubusercontent.com tcp
US 185.199.108.133:443 raw.githubusercontent.com tcp
US 185.199.108.133:443 raw.githubusercontent.com tcp

Files

memory/724-132-0x0000000000000000-mapping.dmp

C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe

MD5 8088241160261560a02c84025d107592
SHA1 083121f7027557570994c9fc211df61730455bb5
SHA256 2072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1
SHA512 20d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478

C:\providercommon\1zu9dW.bat

MD5 6783c3ee07c7d151ceac57f1f9c8bed7
SHA1 17468f98f95bf504cc1f83c49e49a78526b3ea03
SHA256 8ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322
SHA512 c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8

memory/4136-135-0x0000000000000000-mapping.dmp

memory/5036-136-0x0000000000000000-mapping.dmp

C:\providercommon\DllCommonsvc.exe

MD5 bd31e94b4143c4ce49c17d3af46bcad0
SHA1 f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256 b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512 f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

C:\providercommon\DllCommonsvc.exe

MD5 bd31e94b4143c4ce49c17d3af46bcad0
SHA1 f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256 b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512 f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

memory/5036-139-0x00000000006E0000-0x00000000007F0000-memory.dmp

memory/5036-140-0x00007FFECED60000-0x00007FFECF821000-memory.dmp

memory/4168-141-0x0000000000000000-mapping.dmp

memory/3604-142-0x0000000000000000-mapping.dmp

memory/4304-143-0x0000000000000000-mapping.dmp

memory/3532-146-0x0000000000000000-mapping.dmp

memory/1456-145-0x0000000000000000-mapping.dmp

memory/4948-144-0x0000000000000000-mapping.dmp

memory/4408-147-0x0000000000000000-mapping.dmp

memory/1612-148-0x0000000000000000-mapping.dmp

memory/4168-149-0x00007FFECED60000-0x00007FFECF821000-memory.dmp

memory/4948-150-0x000001AC664D0000-0x000001AC664F2000-memory.dmp

memory/1108-152-0x0000000000000000-mapping.dmp

memory/4304-151-0x00007FFECED60000-0x00007FFECF821000-memory.dmp

memory/3604-153-0x00007FFECED60000-0x00007FFECF821000-memory.dmp

memory/4948-155-0x00007FFECED60000-0x00007FFECF821000-memory.dmp

memory/5036-154-0x00007FFECED60000-0x00007FFECF821000-memory.dmp

memory/1456-156-0x00007FFECED60000-0x00007FFECF821000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\FEhBhep8bI.bat

MD5 4cc7a452bad0b2a86bf4befeb16a8250
SHA1 9b91ef2eae5494106f9c4393d4947c45328d1394
SHA256 9360e360a6a8d34690b8b64e8596a5860c44df6ee4c3c854cff057baaba0bfb3
SHA512 95b6939bacbc47aba4b13e893b9d4b2e57ca9f838da27e5667c3ccf470ba5bc62b6705d8e7c7ed5859f5fc1ad9d3377583bbf67d896e9c2f405d5e7383b08cfd

memory/3532-158-0x00007FFECED60000-0x00007FFECF821000-memory.dmp

memory/1612-159-0x00007FFECED60000-0x00007FFECF821000-memory.dmp

memory/3796-160-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

MD5 d85ba6ff808d9e5444a4b369f5bc2730
SHA1 31aa9d96590fff6981b315e0b391b575e4c0804a
SHA256 84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA512 8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 5f0ddc7f3691c81ee14d17b419ba220d
SHA1 f0ef5fde8bab9d17c0b47137e014c91be888ee53
SHA256 a31805264b8b13ce4145f272cb2830728c186c46e314b48514d636866217add5
SHA512 2ce7c2a0833f581297c13dd88ccfcd36bf129d2b5d7718c52b1d67c97cbd8fc93abc085a040229a0fd712e880c690de7f6b996b0b47c46a091fabb7931be58d3

memory/1612-170-0x00007FFECED60000-0x00007FFECF821000-memory.dmp

memory/4168-172-0x00007FFECED60000-0x00007FFECF821000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 59d97011e091004eaffb9816aa0b9abd
SHA1 1602a56b01dd4b7c577ca27d3117e4bcc1aa657b
SHA256 18f381e0db020a763b8c515c346ef58679ab9c403267eacfef5359e272f7e71d
SHA512 d9ca49c1a17580981e2c1a50d73c0eecaa7a62f8514741512172e395af2a3d80aeb0f71c58bc7f52c18246d57ba67af09b6bff4776877d6cc6f0245c30e092d6

memory/1456-176-0x00007FFECED60000-0x00007FFECF821000-memory.dmp

memory/3532-174-0x00007FFECED60000-0x00007FFECF821000-memory.dmp

memory/4948-173-0x00007FFECED60000-0x00007FFECF821000-memory.dmp

memory/3604-171-0x00007FFECED60000-0x00007FFECF821000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 5f0ddc7f3691c81ee14d17b419ba220d
SHA1 f0ef5fde8bab9d17c0b47137e014c91be888ee53
SHA256 a31805264b8b13ce4145f272cb2830728c186c46e314b48514d636866217add5
SHA512 2ce7c2a0833f581297c13dd88ccfcd36bf129d2b5d7718c52b1d67c97cbd8fc93abc085a040229a0fd712e880c690de7f6b996b0b47c46a091fabb7931be58d3

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 e8ce785f8ccc6d202d56fefc59764945
SHA1 ca032c62ddc5e0f26d84eff9895eb87f14e15960
SHA256 d85c19fc6b9d25e2168a2cc50ff38bd226fbf4f02aa7ac038a5f319522d2ffa4
SHA512 66460aec4afee582556270f8ee6048d130a090f1c12a2632ed71a99a4073e9931e9e1cc286e32debffb95a90bd955f0f0d6ec891b1c5cd2f0aae41eb6d25832f

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 e8ce785f8ccc6d202d56fefc59764945
SHA1 ca032c62ddc5e0f26d84eff9895eb87f14e15960
SHA256 d85c19fc6b9d25e2168a2cc50ff38bd226fbf4f02aa7ac038a5f319522d2ffa4
SHA512 66460aec4afee582556270f8ee6048d130a090f1c12a2632ed71a99a4073e9931e9e1cc286e32debffb95a90bd955f0f0d6ec891b1c5cd2f0aae41eb6d25832f

memory/4304-165-0x00007FFECED60000-0x00007FFECF821000-memory.dmp

memory/4408-164-0x00007FFECED60000-0x00007FFECF821000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 5f0ddc7f3691c81ee14d17b419ba220d
SHA1 f0ef5fde8bab9d17c0b47137e014c91be888ee53
SHA256 a31805264b8b13ce4145f272cb2830728c186c46e314b48514d636866217add5
SHA512 2ce7c2a0833f581297c13dd88ccfcd36bf129d2b5d7718c52b1d67c97cbd8fc93abc085a040229a0fd712e880c690de7f6b996b0b47c46a091fabb7931be58d3

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 d28a889fd956d5cb3accfbaf1143eb6f
SHA1 157ba54b365341f8ff06707d996b3635da8446f7
SHA256 21e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45
SHA512 0b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c

C:\Windows\Vss\Writers\System\explorer.exe

MD5 bd31e94b4143c4ce49c17d3af46bcad0
SHA1 f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256 b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512 f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

memory/4880-177-0x0000000000000000-mapping.dmp

C:\Windows\Vss\Writers\System\explorer.exe

MD5 bd31e94b4143c4ce49c17d3af46bcad0
SHA1 f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256 b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512 f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

memory/4880-180-0x00007FFECED60000-0x00007FFECF821000-memory.dmp

memory/2348-181-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Local\Temp\qzxbGmHcY3.bat

MD5 a307a0d84c9e2e1aa1bb8d8110f9cd5e
SHA1 3dc677b1f0c99fe70e6c59f2a460d634fd51791c
SHA256 f39e024f82aeb1db578ebd1c9ad93532c47c1e796f80c7e7313d28434b0c940d
SHA512 16a20415b1835b847b99d6f5414e5c41bfabc13d60cffe66f1b9b7f4f83ad7e2b4be4377c242356503069590749eaf178b767a9f46ec86338bfbaaa3f1c1b4c1

memory/4476-183-0x0000000000000000-mapping.dmp

memory/4880-184-0x00007FFECED60000-0x00007FFECF821000-memory.dmp

memory/3788-185-0x0000000000000000-mapping.dmp

C:\Windows\Vss\Writers\System\explorer.exe

MD5 bd31e94b4143c4ce49c17d3af46bcad0
SHA1 f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256 b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512 f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\explorer.exe.log

MD5 baf55b95da4a601229647f25dad12878
SHA1 abc16954ebfd213733c4493fc1910164d825cac8
SHA256 ee954c5d8156fd8890e582c716e5758ed9b33721258f10e758bdc31ccbcb1924
SHA512 24f502fedb1a305d0d7b08857ffc1db9b2359ff34e06d5748ecc84e35c985f29a20d9f0a533bea32d234ab37097ec0481620c63b14ac89b280e75e14d19fd545

memory/3788-188-0x00007FFECEB70000-0x00007FFECF631000-memory.dmp

memory/3568-189-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Local\Temp\jBrSCX6wbi.bat

MD5 09325acba1833275a875a939c5b25d1e
SHA1 c7fb9abcae978ec7df680d113e7295be766743fb
SHA256 f6e8bd4a84ff29830343e2c21b69aa18cfcd038a57ebf83970b5250612b9544d
SHA512 9bb2bbf6520de9e90a3810905c0b59265e693d2a5f4ded8f551e8a2430de860bde603db0fca685229c5671e5e5c6707ff04b144818be6c0c97f25462dfe4da5d

memory/3248-191-0x0000000000000000-mapping.dmp

memory/3788-192-0x00007FFECEB70000-0x00007FFECF631000-memory.dmp

memory/1956-193-0x0000000000000000-mapping.dmp

C:\Windows\Vss\Writers\System\explorer.exe

MD5 bd31e94b4143c4ce49c17d3af46bcad0
SHA1 f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256 b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512 f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

memory/1956-195-0x00007FFECEB70000-0x00007FFECF631000-memory.dmp

memory/5088-196-0x0000000000000000-mapping.dmp

memory/3976-198-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Local\Temp\CPbxFudqw6.bat

MD5 a46c9bb8da4c4ee33f83574c8783e9d2
SHA1 0aebfc0debbc5f0dc358988505f40df1ff9a64a2
SHA256 2bdff7f526bdc0ac1d4b4dfd6f21b4ee182e89ea59310022d416fec81e74c481
SHA512 92c6295675ebc14f6d1734ce074ca945c379b8fbbd14220dc4a68a050f844b963360b29f37ba16a494ea7af23e51b88a9fbec37d29a70983364a0026f8306c97

memory/1956-199-0x00007FFECEB70000-0x00007FFECF631000-memory.dmp

memory/2292-200-0x0000000000000000-mapping.dmp

C:\Windows\Vss\Writers\System\explorer.exe

MD5 bd31e94b4143c4ce49c17d3af46bcad0
SHA1 f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256 b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512 f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

memory/2292-202-0x00007FFECEB70000-0x00007FFECF631000-memory.dmp

memory/2324-203-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Local\Temp\vhtd8auDHa.bat

MD5 303eddbf8e081ca246f43c91c50e2251
SHA1 7beea955ca392439834b2e8ece87558f483530fe
SHA256 e0e3e4ab13d5a6980a8f0ca13cb7f6aef0a7e4226bacb2082fd4ad9e3939781b
SHA512 9b279d935f700d4b7d1b1544e1df11770a3390e6bd743c05bb93056478127ceb2b597763be83ad0ae553283942ca9bf8e55271356a308e216b973540d594f7c8

memory/756-205-0x0000000000000000-mapping.dmp

memory/2292-206-0x00007FFECEB70000-0x00007FFECF631000-memory.dmp

memory/4412-207-0x0000000000000000-mapping.dmp

C:\Windows\Vss\Writers\System\explorer.exe

MD5 bd31e94b4143c4ce49c17d3af46bcad0
SHA1 f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256 b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512 f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

memory/4412-209-0x00007FFECEB70000-0x00007FFECF631000-memory.dmp

memory/532-210-0x0000000000000000-mapping.dmp

memory/3548-212-0x0000000000000000-mapping.dmp

memory/4412-213-0x00007FFECEB70000-0x00007FFECF631000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\LZh5ueQJla.bat

MD5 9c41c6198d2e7b99f711d860d09b9ee6
SHA1 04db4294d3cc8d340d07990a87a03160d2c98040
SHA256 a08c5b2085c56f96452c6e8b06896749239312a8fef80af6df0ed6c3fbda24fe
SHA512 c1c9a3ccc5101783ff8bade023edcb43baf2ac4b9420318b349e3368a32517cc2fe2f1003f5c1a544c796de43f5e797cce2b5d48e45a0d4cbfba3a8e1b7b870d

memory/3428-214-0x0000000000000000-mapping.dmp

C:\Windows\Vss\Writers\System\explorer.exe

MD5 bd31e94b4143c4ce49c17d3af46bcad0
SHA1 f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256 b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512 f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

memory/3428-216-0x00007FFECEB70000-0x00007FFECF631000-memory.dmp

memory/3428-217-0x00007FFECEB70000-0x00007FFECF631000-memory.dmp

memory/4312-218-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Local\Temp\VAhDAdBh8f.bat

MD5 d1e4005af73a3a220a64ad7a886c48a6
SHA1 da8ad19d59fa2af7c60da974da890cbb2b36e5f3
SHA256 7dcb0c7afc1ecacea25c8f6ee3d9200f36d2fcab22e30f99f3dfe0f2126b4b1e
SHA512 d7a2d4660e01cb897ba3fe2d7fadd5b0ef690f7fad036924cff3112c9b765997d64724cd7fdf2a134f652929cd95da9c5d3ec1e01299b4fe7ce8c827cad1f38d

memory/2620-220-0x0000000000000000-mapping.dmp

memory/3428-221-0x00007FFECEB70000-0x00007FFECF631000-memory.dmp

memory/2764-222-0x0000000000000000-mapping.dmp

C:\Windows\Vss\Writers\System\explorer.exe

MD5 bd31e94b4143c4ce49c17d3af46bcad0
SHA1 f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256 b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512 f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

memory/2764-224-0x00007FFECEB70000-0x00007FFECF631000-memory.dmp

memory/2768-225-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Local\Temp\xdvgpfy6bM.bat

MD5 e494aedad0225f1b90c06a0e30022123
SHA1 17009248032dc8795e48ab675a48da09463752ec
SHA256 ce079f5b2f67de7339b32e6fb8cff0f553e803aa92d3dba098ddee1a77e60b52
SHA512 377fb4c6af8a050f1210cec1e54b540410c2f9292db2d98a221f399170a3c9631ef94293ae93fb880b36acf2c4042a84fc66b004cbee3a7ff275fd9dee5bfba8

memory/2764-228-0x00007FFECEB70000-0x00007FFECF631000-memory.dmp

memory/1684-227-0x0000000000000000-mapping.dmp

memory/4492-229-0x0000000000000000-mapping.dmp

C:\Windows\Vss\Writers\System\explorer.exe

MD5 bd31e94b4143c4ce49c17d3af46bcad0
SHA1 f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256 b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512 f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

memory/4492-231-0x00007FFECEB70000-0x00007FFECF631000-memory.dmp

memory/2248-232-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Local\Temp\MTMDnLe0ZL.bat

MD5 b5e65fa7f0237d2ea8e3f804b25c5901
SHA1 3f21a84506fd4c7162a98d1d2e2e32c7ab21e97e
SHA256 fa6be72237306faf40afbedf3b51fb593ee8f94fa9ca55b58bb491c6610e6fcc
SHA512 314e83f96e66597c9766951de26d7f2602e1360eb478b87cb5fa225bee83ab852987d582361f00ca6313af5002b861440d8dfd00e7ae1b92885d251e4775cf1e

memory/2808-234-0x0000000000000000-mapping.dmp

memory/4492-235-0x00007FFECEB70000-0x00007FFECF631000-memory.dmp

memory/2244-236-0x0000000000000000-mapping.dmp

C:\Windows\Vss\Writers\System\explorer.exe

MD5 bd31e94b4143c4ce49c17d3af46bcad0
SHA1 f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256 b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512 f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

memory/2244-238-0x00007FFECEB70000-0x00007FFECF631000-memory.dmp