Analysis

  • max time kernel
    146s
  • max time network
    143s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    01/11/2022, 04:42

General

  • Target

    dd95cbf431fa94240f079d044986f903c5d9401fd730e46007cb210867ed76d7.exe

  • Size

    1.3MB

  • MD5

    69ce6bb383fb28bfaeda85933390bdd6

  • SHA1

    abbb7260ce238f8c95de21e0a1584bebe3891f97

  • SHA256

    dd95cbf431fa94240f079d044986f903c5d9401fd730e46007cb210867ed76d7

  • SHA512

    d0cd72da6d149515d5018559cb43da70dd4036d1032cc566d8cb4cf730395553a2841883d01e4824142de51fb2cf7eda20e476661bcfea2b02a646480ec754d2

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Process spawned unexpected child process 36 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 14 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 11 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 36 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dd95cbf431fa94240f079d044986f903c5d9401fd730e46007cb210867ed76d7.exe
    "C:\Users\Admin\AppData\Local\Temp\dd95cbf431fa94240f079d044986f903c5d9401fd730e46007cb210867ed76d7.exe"
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4748
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4292
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\providercommon\1zu9dW.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:5032
        • C:\providercommon\DllCommonsvc.exe
          "C:\providercommon\DllCommonsvc.exe"
          4⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2276
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2624
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\Idle.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4436
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\fontdrvhost.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1892
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Cursors\spoolsv.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2664
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\conhost.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1016
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\winlogon.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2732
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\odt\fontdrvhost.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1964
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\Application Data\lsass.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3788
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Globalization\Time Zone\fontdrvhost.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:5080
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\Documents\My Pictures\services.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4056
          • C:\Recovery\WindowsRE\cmd.exe
            "C:\Recovery\WindowsRE\cmd.exe"
            5⤵
            • Executes dropped EXE
            • Modifies registry class
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1348
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\AJeLhFiBvb.bat"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:4016
              • C:\Windows\system32\w32tm.exe
                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                7⤵
                  PID:2272
                • C:\Recovery\WindowsRE\cmd.exe
                  "C:\Recovery\WindowsRE\cmd.exe"
                  7⤵
                  • Executes dropped EXE
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:4784
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\uMS4yFj28m.bat"
                    8⤵
                    • Suspicious use of WriteProcessMemory
                    PID:2804
                    • C:\Windows\system32\w32tm.exe
                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                      9⤵
                        PID:4720
                      • C:\Recovery\WindowsRE\cmd.exe
                        "C:\Recovery\WindowsRE\cmd.exe"
                        9⤵
                        • Executes dropped EXE
                        • Modifies registry class
                        • Suspicious use of WriteProcessMemory
                        PID:4852
                        • C:\Windows\System32\cmd.exe
                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\1Gu59oh2IN.bat"
                          10⤵
                          • Suspicious use of WriteProcessMemory
                          PID:4056
                          • C:\Windows\system32\w32tm.exe
                            w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                            11⤵
                              PID:4708
                            • C:\Recovery\WindowsRE\cmd.exe
                              "C:\Recovery\WindowsRE\cmd.exe"
                              11⤵
                              • Executes dropped EXE
                              • Modifies registry class
                              • Suspicious use of WriteProcessMemory
                              PID:2168
                              • C:\Windows\System32\cmd.exe
                                "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\qUPyb5cGVE.bat"
                                12⤵
                                • Suspicious use of WriteProcessMemory
                                PID:300
                                • C:\Windows\system32\w32tm.exe
                                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                  13⤵
                                    PID:2812
                                  • C:\Recovery\WindowsRE\cmd.exe
                                    "C:\Recovery\WindowsRE\cmd.exe"
                                    13⤵
                                    • Executes dropped EXE
                                    • Modifies registry class
                                    • Suspicious use of WriteProcessMemory
                                    PID:2640
                                    • C:\Windows\System32\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\uVa8TbDE3p.bat"
                                      14⤵
                                      • Suspicious use of WriteProcessMemory
                                      PID:3916
                                      • C:\Windows\system32\w32tm.exe
                                        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                        15⤵
                                          PID:2236
                                        • C:\Recovery\WindowsRE\cmd.exe
                                          "C:\Recovery\WindowsRE\cmd.exe"
                                          15⤵
                                          • Executes dropped EXE
                                          • Modifies registry class
                                          PID:2632
                                          • C:\Windows\System32\cmd.exe
                                            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\AJeLhFiBvb.bat"
                                            16⤵
                                              PID:1892
                                              • C:\Windows\system32\w32tm.exe
                                                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                17⤵
                                                  PID:4692
                                                • C:\Recovery\WindowsRE\cmd.exe
                                                  "C:\Recovery\WindowsRE\cmd.exe"
                                                  17⤵
                                                  • Executes dropped EXE
                                                  • Modifies registry class
                                                  PID:3736
                                                  • C:\Windows\System32\cmd.exe
                                                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\xHU7fKnwSZ.bat"
                                                    18⤵
                                                      PID:536
                                                      • C:\Windows\system32\w32tm.exe
                                                        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                        19⤵
                                                          PID:4348
                                                        • C:\Recovery\WindowsRE\cmd.exe
                                                          "C:\Recovery\WindowsRE\cmd.exe"
                                                          19⤵
                                                          • Executes dropped EXE
                                                          • Modifies registry class
                                                          PID:4772
                                                          • C:\Windows\System32\cmd.exe
                                                            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\H7kUlUtrsw.bat"
                                                            20⤵
                                                              PID:2924
                                                              • C:\Windows\system32\w32tm.exe
                                                                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                21⤵
                                                                  PID:4252
                                                                • C:\Recovery\WindowsRE\cmd.exe
                                                                  "C:\Recovery\WindowsRE\cmd.exe"
                                                                  21⤵
                                                                  • Executes dropped EXE
                                                                  • Modifies registry class
                                                                  PID:1064
                                                                  • C:\Windows\System32\cmd.exe
                                                                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\lcLsEvVTrf.bat"
                                                                    22⤵
                                                                      PID:2096
                                                                      • C:\Windows\system32\w32tm.exe
                                                                        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                        23⤵
                                                                          PID:2284
                                                                        • C:\Recovery\WindowsRE\cmd.exe
                                                                          "C:\Recovery\WindowsRE\cmd.exe"
                                                                          23⤵
                                                                          • Executes dropped EXE
                                                                          PID:4560
                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\odt\csrss.exe'
                                      5⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:1972
                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Adobe\Acrobat Reader DC\conhost.exe'
                                      5⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:2288
                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\cmd.exe'
                                      5⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:2228
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\cmd.exe'" /f
                              1⤵
                              • Process spawned unexpected child process
                              • Creates scheduled task(s)
                              PID:4756
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\cmd.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Creates scheduled task(s)
                              PID:4460
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\cmd.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Creates scheduled task(s)
                              PID:4680
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\Idle.exe'" /f
                              1⤵
                              • Process spawned unexpected child process
                              • Creates scheduled task(s)
                              PID:4828
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\Idle.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Creates scheduled task(s)
                              PID:4716
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\Idle.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Creates scheduled task(s)
                              PID:4728
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 6 /tr "'C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\fontdrvhost.exe'" /f
                              1⤵
                              • Process spawned unexpected child process
                              • Creates scheduled task(s)
                              PID:4848
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\fontdrvhost.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Creates scheduled task(s)
                              PID:4092
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 6 /tr "'C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\fontdrvhost.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Creates scheduled task(s)
                              PID:3864
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 9 /tr "'C:\Windows\Cursors\spoolsv.exe'" /f
                              1⤵
                              • Process spawned unexpected child process
                              • Creates scheduled task(s)
                              PID:3156
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Windows\Cursors\spoolsv.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Creates scheduled task(s)
                              PID:4872
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 9 /tr "'C:\Windows\Cursors\spoolsv.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Creates scheduled task(s)
                              PID:4432
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 7 /tr "'C:\providercommon\conhost.exe'" /f
                              1⤵
                              • Process spawned unexpected child process
                              • Creates scheduled task(s)
                              PID:4440
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\providercommon\conhost.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Creates scheduled task(s)
                              PID:3932
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 14 /tr "'C:\providercommon\conhost.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Creates scheduled task(s)
                              PID:3120
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 11 /tr "'C:\providercommon\winlogon.exe'" /f
                              1⤵
                              • Process spawned unexpected child process
                              • Creates scheduled task(s)
                              PID:4868
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\providercommon\winlogon.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Creates scheduled task(s)
                              PID:1768
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 11 /tr "'C:\providercommon\winlogon.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Creates scheduled task(s)
                              PID:668
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\conhost.exe'" /f
                              1⤵
                              • Process spawned unexpected child process
                              • Creates scheduled task(s)
                              PID:508
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\conhost.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Creates scheduled task(s)
                              PID:440
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\conhost.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Creates scheduled task(s)
                              PID:660
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 6 /tr "'C:\odt\fontdrvhost.exe'" /f
                              1⤵
                              • Process spawned unexpected child process
                              • Creates scheduled task(s)
                              PID:1712
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\odt\fontdrvhost.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Creates scheduled task(s)
                              PID:1424
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 11 /tr "'C:\odt\fontdrvhost.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Creates scheduled task(s)
                              PID:1400
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 5 /tr "'C:\Users\Admin\Application Data\lsass.exe'" /f
                              1⤵
                              • Process spawned unexpected child process
                              • Creates scheduled task(s)
                              PID:1740
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Users\Admin\Application Data\lsass.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Creates scheduled task(s)
                              PID:1784
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 11 /tr "'C:\Users\Admin\Application Data\lsass.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Creates scheduled task(s)
                              PID:1324
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\odt\csrss.exe'" /f
                              1⤵
                              • Process spawned unexpected child process
                              • Creates scheduled task(s)
                              PID:1160
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\odt\csrss.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Creates scheduled task(s)
                              PID:956
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\odt\csrss.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Creates scheduled task(s)
                              PID:1772
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 9 /tr "'C:\Windows\Globalization\Time Zone\fontdrvhost.exe'" /f
                              1⤵
                              • Process spawned unexpected child process
                              • Creates scheduled task(s)
                              PID:2400
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Windows\Globalization\Time Zone\fontdrvhost.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Creates scheduled task(s)
                              PID:3860
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "servicess" /sc MINUTE /mo 13 /tr "'C:\Users\Default\Documents\My Pictures\services.exe'" /f
                              1⤵
                              • Process spawned unexpected child process
                              • Creates scheduled task(s)
                              PID:192
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 7 /tr "'C:\Windows\Globalization\Time Zone\fontdrvhost.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Creates scheduled task(s)
                              PID:288
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Users\Default\Documents\My Pictures\services.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Creates scheduled task(s)
                              PID:208
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "servicess" /sc MINUTE /mo 7 /tr "'C:\Users\Default\Documents\My Pictures\services.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Creates scheduled task(s)
                              PID:2296

                            Network

                            MITRE ATT&CK Enterprise v6

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Recovery\WindowsRE\cmd.exe

                              Filesize

                              1.0MB

                              MD5

                              bd31e94b4143c4ce49c17d3af46bcad0

                              SHA1

                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                              SHA256

                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                              SHA512

                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                            • C:\Recovery\WindowsRE\cmd.exe

                              Filesize

                              1.0MB

                              MD5

                              bd31e94b4143c4ce49c17d3af46bcad0

                              SHA1

                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                              SHA256

                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                              SHA512

                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                            • C:\Recovery\WindowsRE\cmd.exe

                              Filesize

                              1.0MB

                              MD5

                              bd31e94b4143c4ce49c17d3af46bcad0

                              SHA1

                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                              SHA256

                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                              SHA512

                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                            • C:\Recovery\WindowsRE\cmd.exe

                              Filesize

                              1.0MB

                              MD5

                              bd31e94b4143c4ce49c17d3af46bcad0

                              SHA1

                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                              SHA256

                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                              SHA512

                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                            • C:\Recovery\WindowsRE\cmd.exe

                              Filesize

                              1.0MB

                              MD5

                              bd31e94b4143c4ce49c17d3af46bcad0

                              SHA1

                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                              SHA256

                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                              SHA512

                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                            • C:\Recovery\WindowsRE\cmd.exe

                              Filesize

                              1.0MB

                              MD5

                              bd31e94b4143c4ce49c17d3af46bcad0

                              SHA1

                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                              SHA256

                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                              SHA512

                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                            • C:\Recovery\WindowsRE\cmd.exe

                              Filesize

                              1.0MB

                              MD5

                              bd31e94b4143c4ce49c17d3af46bcad0

                              SHA1

                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                              SHA256

                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                              SHA512

                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                            • C:\Recovery\WindowsRE\cmd.exe

                              Filesize

                              1.0MB

                              MD5

                              bd31e94b4143c4ce49c17d3af46bcad0

                              SHA1

                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                              SHA256

                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                              SHA512

                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                            • C:\Recovery\WindowsRE\cmd.exe

                              Filesize

                              1.0MB

                              MD5

                              bd31e94b4143c4ce49c17d3af46bcad0

                              SHA1

                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                              SHA256

                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                              SHA512

                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                            • C:\Recovery\WindowsRE\cmd.exe

                              Filesize

                              1.0MB

                              MD5

                              bd31e94b4143c4ce49c17d3af46bcad0

                              SHA1

                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                              SHA256

                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                              SHA512

                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                            • C:\Recovery\WindowsRE\cmd.exe

                              Filesize

                              1.0MB

                              MD5

                              bd31e94b4143c4ce49c17d3af46bcad0

                              SHA1

                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                              SHA256

                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                              SHA512

                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\cmd.exe.log

                              Filesize

                              1KB

                              MD5

                              d63ff49d7c92016feb39812e4db10419

                              SHA1

                              2307d5e35ca9864ffefc93acf8573ea995ba189b

                              SHA256

                              375076241775962f3edc08a8c72832a00920b427a4f3332528d91d21e909fa12

                              SHA512

                              00f8c8d0336d6575b956876183199624d6f4d2056f2c0aa633a6f17c516f22ee648062d9bc419254d84c459323e9424f0da8aed9dd4e16c2926e5ba30e797d8a

                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                              Filesize

                              3KB

                              MD5

                              ad5cd538ca58cb28ede39c108acb5785

                              SHA1

                              1ae910026f3dbe90ed025e9e96ead2b5399be877

                              SHA256

                              c9e6cb04d6c893458d5a7e12eb575cf97c3172f5e312b1f63a667cbbc5f0c033

                              SHA512

                              c066c5d9b276a68fa636647bb29aea05bfa2292217bc77f5324d9c1d93117772ee8277e1f7cff91ec8d6b7c05ca078f929cecfdbb09582522a9067f54740af13

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                              Filesize

                              1KB

                              MD5

                              dece8851144522b140c729b7ea5e59cd

                              SHA1

                              c69c55e54b2370a0201531142a2373d1fddfddbe

                              SHA256

                              1326facf2e03cf2bf34399a61fce786ef0b1a2bd36b0f219669cbfc99615000b

                              SHA512

                              19727f921944b4114a8b8a1d7bea14a4bd6e5b262cc97879200841799f9443753bb25681c727584bfd785a0a0f27d0eb4e8e8239be35f73c126480460a46fca1

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                              Filesize

                              1KB

                              MD5

                              02486fe53d1d21a5e9cbbf7a862f14dd

                              SHA1

                              a0a55362da9bf2b3e1bfafd8227e194faa87e3a7

                              SHA256

                              00db0610a6ea0fcb6f44255ee94a7b91b5bebc9c508bb47763ec002d21dfb4f2

                              SHA512

                              1f151f3086ff687702dbf32dd1255ad3c852a26b054902f83418825bf55c64547f39818a183a65f73323d325e9c36acaebd74425bcc775ed33e06870e52cc4e4

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                              Filesize

                              1KB

                              MD5

                              972c467dd1b0431c769ee36f17554188

                              SHA1

                              5579af287989ffba3e0c7d2d82ad5e93bb457932

                              SHA256

                              88bd05c4f3ff994dca09fbbcc9056fc5bd73eaf37e15fec03c85a31b4f196c78

                              SHA512

                              b2e76ee3b0c4b0ee0b9e1bd6c3920985322444bb730d23266b916062fb001a9531aada4c2c0ff124cf39e7b392b2be562c8b1b68b1fc80630f051cf614b66db3

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                              Filesize

                              1KB

                              MD5

                              1ccff6094bd0d6e1e2fcd5c4ae732fa5

                              SHA1

                              5a12ad56a6822696bb03c21e7f906807768f0f92

                              SHA256

                              124d5ae0ada82d9ef4ba5e44565774ccaf899afd8d91299f8c00928fc30b0986

                              SHA512

                              914ae756ccd37247e480674b2ca5668ffcbaf0f5876d8392e9c483667123a7f31469caabde5814ac2871216e716d93a2939a487d124df4afaf34af76f05d8d56

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                              Filesize

                              1KB

                              MD5

                              d28a0b63c304efec82abc0bd8da4de10

                              SHA1

                              47116531242c07abb861d7e58d838beaccfd6017

                              SHA256

                              8215e49abe34bdd3c824d5dc6543701b2ad3d2bddc95d2479f215e7206f84a9a

                              SHA512

                              41619a6ee3b4d40c9d9726d0cdc8d171c0ea49475cda87ca68b80edc05ba40a600e4d38e9e0ae227492626b7d5a81b16057c7132876ddd4fec08f2b90ae2df89

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                              Filesize

                              1KB

                              MD5

                              077f6fd5ff0e74c1eed551c6fde2a8c2

                              SHA1

                              f7b747083282bc609981e6ac9edd0433b63ad424

                              SHA256

                              31c35240eb018ec7891ff162bc69f5150194c336c89eb8b68eb04dadb9a75846

                              SHA512

                              d2e95fcb57e778c5a13681b92aac9e972cfa99f9adfe05013d02fe5a80ec31b3320d5f211b1d874b35cce82fc222d8680a7235112fbb7c74f0f4ab4fb11fa838

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                              Filesize

                              1KB

                              MD5

                              7160d0a154b74f72f459c69a7e01cc1e

                              SHA1

                              f14341612f1f71d03c77e31974de2731315e2c13

                              SHA256

                              d7bd3895a59b2aaea9b244ced20f487bf0999e50817e227312fef765bc9d11cb

                              SHA512

                              3d9690ec9e569794b6bf70b4a99e870777dc73d0a92f6816cb88bc2e7b7a9558944faf4e81b80d941b99cfbca24260e05d18e910e8a2e731343104260dba84e7

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                              Filesize

                              1KB

                              MD5

                              7160d0a154b74f72f459c69a7e01cc1e

                              SHA1

                              f14341612f1f71d03c77e31974de2731315e2c13

                              SHA256

                              d7bd3895a59b2aaea9b244ced20f487bf0999e50817e227312fef765bc9d11cb

                              SHA512

                              3d9690ec9e569794b6bf70b4a99e870777dc73d0a92f6816cb88bc2e7b7a9558944faf4e81b80d941b99cfbca24260e05d18e910e8a2e731343104260dba84e7

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                              Filesize

                              1KB

                              MD5

                              436fb4ad13d75441848029fd2a575872

                              SHA1

                              3a6c851e3c1159348d2f9ad83795b35bf4d8bc35

                              SHA256

                              1afee2d6bfd5f7b058e143efd4c3a70bc357b73532426d9beb09c99a54779434

                              SHA512

                              0d2cc2862b4424e3ba43cf1ae199b32a642b3d8fbdcbc6f577dc00f461dbe00bf13f1e6dea640b3d94fd6412d72a513cbd9fdad104a0113a8cd507f7266e10c8

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                              Filesize

                              1KB

                              MD5

                              436fb4ad13d75441848029fd2a575872

                              SHA1

                              3a6c851e3c1159348d2f9ad83795b35bf4d8bc35

                              SHA256

                              1afee2d6bfd5f7b058e143efd4c3a70bc357b73532426d9beb09c99a54779434

                              SHA512

                              0d2cc2862b4424e3ba43cf1ae199b32a642b3d8fbdcbc6f577dc00f461dbe00bf13f1e6dea640b3d94fd6412d72a513cbd9fdad104a0113a8cd507f7266e10c8

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                              Filesize

                              1KB

                              MD5

                              83f0f1937b9a8e85f35d906b321dbe25

                              SHA1

                              4b138b0949020c0a1dcd2ba66d4f0ab14f8c89b8

                              SHA256

                              8f8294c63846680dc178107b6c7a647ca097be39928c70df1362b6314367fecb

                              SHA512

                              42ec227a99b9ce4aa1b373cbaab8639d3a44149ef6c8600843ee8e813324421dc32cd491c122512c44800fecff561e30de9709086ce931718a61a1af23966cc2

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                              Filesize

                              1KB

                              MD5

                              83f0f1937b9a8e85f35d906b321dbe25

                              SHA1

                              4b138b0949020c0a1dcd2ba66d4f0ab14f8c89b8

                              SHA256

                              8f8294c63846680dc178107b6c7a647ca097be39928c70df1362b6314367fecb

                              SHA512

                              42ec227a99b9ce4aa1b373cbaab8639d3a44149ef6c8600843ee8e813324421dc32cd491c122512c44800fecff561e30de9709086ce931718a61a1af23966cc2

                            • C:\Users\Admin\AppData\Local\Temp\1Gu59oh2IN.bat

                              Filesize

                              194B

                              MD5

                              4aa9a6e0a945b3c3cf47949a7e7b3b74

                              SHA1

                              32ab2a57915c3a751a28859aea1149e733b334d0

                              SHA256

                              17a57e54b456235fa1df7f18e52ae65d98bbd91bb2249baf50bc49d285f673ac

                              SHA512

                              ef979b6f5bb42823538b0ae9a5f20d3ef6b79324a908004a0d54a465e0d67aac303782b9dc1cb7041c396c667efad62318b8f96d9d7a7bf7c5d141da3e4b1a0c

                            • C:\Users\Admin\AppData\Local\Temp\AJeLhFiBvb.bat

                              Filesize

                              194B

                              MD5

                              bd7a211bd403a3109ae076fa4f4b0e1b

                              SHA1

                              c182d970d80422a4568a18d928b642bfd28177bb

                              SHA256

                              aaafe2806ad5703d46de46659c5874742d3aebf78588ddb8e7a5070def0ad0f0

                              SHA512

                              a313d88e7fd55819fa533588a8f7a61945ac5bd89cdf2422660437aecb378c9619a0a2013a780f3dc7f23c440ec52ac2c23e6db54d1104007b9d23dfeff6f06b

                            • C:\Users\Admin\AppData\Local\Temp\AJeLhFiBvb.bat

                              Filesize

                              194B

                              MD5

                              bd7a211bd403a3109ae076fa4f4b0e1b

                              SHA1

                              c182d970d80422a4568a18d928b642bfd28177bb

                              SHA256

                              aaafe2806ad5703d46de46659c5874742d3aebf78588ddb8e7a5070def0ad0f0

                              SHA512

                              a313d88e7fd55819fa533588a8f7a61945ac5bd89cdf2422660437aecb378c9619a0a2013a780f3dc7f23c440ec52ac2c23e6db54d1104007b9d23dfeff6f06b

                            • C:\Users\Admin\AppData\Local\Temp\H7kUlUtrsw.bat

                              Filesize

                              194B

                              MD5

                              2b59feb4a1327a016f167bdd5423d52c

                              SHA1

                              b6b9bfdddd6b392347e6847c6635e53590c2deb8

                              SHA256

                              026d5fea5e53cc64f7b6d94bfe7cc0c988dc4b7dfd0d27b5dd40a69a93ba05b8

                              SHA512

                              7f6e198d5991ac79983611cee0fc463fcd2352d7097892958294631f43ca438fdfc146d61d1b2c23c7324ae4e76140d17d6cbe79013d2f213a8e2e9602c605af

                            • C:\Users\Admin\AppData\Local\Temp\lcLsEvVTrf.bat

                              Filesize

                              194B

                              MD5

                              d996ff20e0ace731c5b3cf9a9902463a

                              SHA1

                              f1f860c8a66c0a00f9848b666342bce702c9e032

                              SHA256

                              ac34da6c017c6a9eef4627c224c4fdad605621a8781bdd791719fe0f46823e21

                              SHA512

                              31e232afcc4d58a5826dcfaf6668a8ff0865a7b3624b6c04571b8cc15cb5e606df7c4f6b29f3c851a0dc74183a0f93353bfe2db697d64c7016fbf4dfa148b53f

                            • C:\Users\Admin\AppData\Local\Temp\qUPyb5cGVE.bat

                              Filesize

                              194B

                              MD5

                              6cc5095c3e590a60faf1fafcae7255e5

                              SHA1

                              3fa3ac03898e3a64746b66220037b07c460c7196

                              SHA256

                              ae43c413f682e6183f814e354c7eac712c5915826f2ebb0a6350b731a8350750

                              SHA512

                              7dcfd44a4dfce6005fbffe697c780deb31d65848e854c73c3c10e1d948b302ca481e9c7c1d87250a47c0884126b9d0a083a3581641a77d941439223730b4d331

                            • C:\Users\Admin\AppData\Local\Temp\uMS4yFj28m.bat

                              Filesize

                              194B

                              MD5

                              a3860841be7b14a33a2d528f880a192e

                              SHA1

                              6909583a887e89654f6b6fa7593d4efada37adca

                              SHA256

                              b2d64261b1284d4a97bee34be7ab5404e475ad3bb763e7d439eb20dfcc5f391b

                              SHA512

                              8a2456fa1d353909187ba8c9f89e41cf1684f9c2dafa0b74d3a9bdb53fc992cd4310bd2fcb0a4befa9116a87c22ee40d68ebd507b18178d037edf0803e567bf1

                            • C:\Users\Admin\AppData\Local\Temp\uVa8TbDE3p.bat

                              Filesize

                              194B

                              MD5

                              6769e3f1340fc7a8bc715b6e71536084

                              SHA1

                              6cd77a361dd04d5d73d16ae79c3ffc930f50e1fa

                              SHA256

                              388875bf9e01fabd459dafa2a95447b02a1a09567e421cd32584dfe711a98970

                              SHA512

                              808947cfaf8a0c9c25334ae6723315c17838cf5c27ebdc8dd316d7f0e713e6e0c94bac1b9561bec2a016781ec68de57973f54d42f14dc914e9168616c3cf4c1e

                            • C:\Users\Admin\AppData\Local\Temp\xHU7fKnwSZ.bat

                              Filesize

                              194B

                              MD5

                              606fed2425fa11f428367dbe7524407e

                              SHA1

                              ad0d35c68b2a426fa12fe9184aa8dc9324dbe0d6

                              SHA256

                              369f28b04acaca53649f7bfafa5a43a13dea5b1f57387a97f4f4f49142b21adb

                              SHA512

                              286930c3f41a88398a9249955007c8fe067c34d25608d2adcf05032e3d17e70fe1c0c976db3f5f3d52336f65475ad0598072263addec35f8d75089493695e640

                            • C:\providercommon\1zu9dW.bat

                              Filesize

                              36B

                              MD5

                              6783c3ee07c7d151ceac57f1f9c8bed7

                              SHA1

                              17468f98f95bf504cc1f83c49e49a78526b3ea03

                              SHA256

                              8ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322

                              SHA512

                              c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8

                            • C:\providercommon\DllCommonsvc.exe

                              Filesize

                              1.0MB

                              MD5

                              bd31e94b4143c4ce49c17d3af46bcad0

                              SHA1

                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                              SHA256

                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                              SHA512

                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                            • C:\providercommon\DllCommonsvc.exe

                              Filesize

                              1.0MB

                              MD5

                              bd31e94b4143c4ce49c17d3af46bcad0

                              SHA1

                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                              SHA256

                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                              SHA512

                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                            • C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe

                              Filesize

                              197B

                              MD5

                              8088241160261560a02c84025d107592

                              SHA1

                              083121f7027557570994c9fc211df61730455bb5

                              SHA256

                              2072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1

                              SHA512

                              20d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478

                            • memory/1348-360-0x00000000014E0000-0x00000000014F2000-memory.dmp

                              Filesize

                              72KB

                            • memory/2168-769-0x0000000002BF0000-0x0000000002C02000-memory.dmp

                              Filesize

                              72KB

                            • memory/2276-288-0x0000000000ED0000-0x0000000000EDC000-memory.dmp

                              Filesize

                              48KB

                            • memory/2276-287-0x0000000000D70000-0x0000000000D82000-memory.dmp

                              Filesize

                              72KB

                            • memory/2276-286-0x0000000000700000-0x0000000000810000-memory.dmp

                              Filesize

                              1.1MB

                            • memory/2276-289-0x0000000000EC0000-0x0000000000ECC000-memory.dmp

                              Filesize

                              48KB

                            • memory/2276-290-0x0000000000EE0000-0x0000000000EEC000-memory.dmp

                              Filesize

                              48KB

                            • memory/2288-366-0x0000020627B00000-0x0000020627B76000-memory.dmp

                              Filesize

                              472KB

                            • memory/2624-342-0x0000022ACCE60000-0x0000022ACCE82000-memory.dmp

                              Filesize

                              136KB

                            • memory/2632-780-0x0000000000E80000-0x0000000000E92000-memory.dmp

                              Filesize

                              72KB

                            • memory/4292-186-0x0000000077BB0000-0x0000000077D3E000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/4292-185-0x0000000077BB0000-0x0000000077D3E000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/4560-801-0x0000000001370000-0x0000000001382000-memory.dmp

                              Filesize

                              72KB

                            • memory/4748-150-0x0000000077BB0000-0x0000000077D3E000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/4748-153-0x0000000077BB0000-0x0000000077D3E000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/4748-181-0x0000000077BB0000-0x0000000077D3E000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/4748-180-0x0000000077BB0000-0x0000000077D3E000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/4748-155-0x0000000077BB0000-0x0000000077D3E000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/4748-178-0x0000000077BB0000-0x0000000077D3E000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/4748-177-0x0000000077BB0000-0x0000000077D3E000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/4748-176-0x0000000077BB0000-0x0000000077D3E000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/4748-175-0x0000000077BB0000-0x0000000077D3E000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/4748-174-0x0000000077BB0000-0x0000000077D3E000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/4748-173-0x0000000077BB0000-0x0000000077D3E000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/4748-172-0x0000000077BB0000-0x0000000077D3E000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/4748-170-0x0000000077BB0000-0x0000000077D3E000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/4748-171-0x0000000077BB0000-0x0000000077D3E000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/4748-169-0x0000000077BB0000-0x0000000077D3E000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/4748-168-0x0000000077BB0000-0x0000000077D3E000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/4748-167-0x0000000077BB0000-0x0000000077D3E000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/4748-166-0x0000000077BB0000-0x0000000077D3E000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/4748-165-0x0000000077BB0000-0x0000000077D3E000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/4748-164-0x0000000077BB0000-0x0000000077D3E000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/4748-162-0x0000000077BB0000-0x0000000077D3E000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/4748-163-0x0000000077BB0000-0x0000000077D3E000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/4748-161-0x0000000077BB0000-0x0000000077D3E000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/4748-120-0x0000000077BB0000-0x0000000077D3E000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/4748-121-0x0000000077BB0000-0x0000000077D3E000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/4748-122-0x0000000077BB0000-0x0000000077D3E000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/4748-123-0x0000000077BB0000-0x0000000077D3E000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/4748-160-0x0000000077BB0000-0x0000000077D3E000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/4748-159-0x0000000077BB0000-0x0000000077D3E000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/4748-158-0x0000000077BB0000-0x0000000077D3E000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/4748-157-0x0000000077BB0000-0x0000000077D3E000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/4748-156-0x0000000077BB0000-0x0000000077D3E000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/4748-179-0x0000000077BB0000-0x0000000077D3E000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/4748-182-0x0000000077BB0000-0x0000000077D3E000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/4748-131-0x0000000077BB0000-0x0000000077D3E000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/4748-154-0x0000000077BB0000-0x0000000077D3E000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/4748-152-0x0000000077BB0000-0x0000000077D3E000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/4748-151-0x0000000077BB0000-0x0000000077D3E000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/4748-149-0x0000000077BB0000-0x0000000077D3E000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/4748-148-0x0000000077BB0000-0x0000000077D3E000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/4748-147-0x0000000077BB0000-0x0000000077D3E000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/4748-146-0x0000000077BB0000-0x0000000077D3E000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/4748-145-0x0000000077BB0000-0x0000000077D3E000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/4748-144-0x0000000077BB0000-0x0000000077D3E000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/4748-143-0x0000000077BB0000-0x0000000077D3E000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/4748-142-0x0000000077BB0000-0x0000000077D3E000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/4748-141-0x0000000077BB0000-0x0000000077D3E000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/4748-140-0x0000000077BB0000-0x0000000077D3E000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/4748-139-0x0000000077BB0000-0x0000000077D3E000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/4748-138-0x0000000077BB0000-0x0000000077D3E000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/4748-137-0x0000000077BB0000-0x0000000077D3E000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/4748-136-0x0000000077BB0000-0x0000000077D3E000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/4748-135-0x0000000077BB0000-0x0000000077D3E000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/4748-125-0x0000000077BB0000-0x0000000077D3E000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/4748-134-0x0000000077BB0000-0x0000000077D3E000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/4748-133-0x0000000077BB0000-0x0000000077D3E000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/4748-132-0x0000000077BB0000-0x0000000077D3E000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/4748-183-0x0000000077BB0000-0x0000000077D3E000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/4748-130-0x0000000077BB0000-0x0000000077D3E000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/4748-129-0x0000000077BB0000-0x0000000077D3E000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/4748-128-0x0000000077BB0000-0x0000000077D3E000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/4748-126-0x0000000077BB0000-0x0000000077D3E000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/4784-758-0x00000000011E0000-0x00000000011F2000-memory.dmp

                              Filesize

                              72KB