Malware Analysis Report

2025-08-05 17:33

Sample ID 221101-ml3gesbhbk
Target d74f50a5a85cd6a92c1efb2c08735c929292eaefedf9884ce7e289cfab8d7afa
SHA256 d74f50a5a85cd6a92c1efb2c08735c929292eaefedf9884ce7e289cfab8d7afa
Tags
rat dcrat infostealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V6

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

d74f50a5a85cd6a92c1efb2c08735c929292eaefedf9884ce7e289cfab8d7afa

Threat Level: Known bad

The file d74f50a5a85cd6a92c1efb2c08735c929292eaefedf9884ce7e289cfab8d7afa was found to be: Known bad.

Malicious Activity Summary

rat dcrat infostealer

DCRat payload

Process spawned unexpected child process

DcRat

Dcrat family

DCRat payload

Executes dropped EXE

Checks computer location settings

Legitimate hosting services abused for malware hosting/C2

Drops file in Windows directory

Drops file in Program Files directory

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

Suspicious behavior: EnumeratesProcesses

Modifies registry class

Suspicious use of AdjustPrivilegeToken

Creates scheduled task(s)

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2022-11-01 10:34

Signatures

DCRat payload

rat
Description Indicator Process Target
N/A N/A N/A N/A

Dcrat family

dcrat

Analysis: behavioral1

Detonation Overview

Submitted

2022-11-01 10:34

Reported

2022-11-01 10:36

Platform

win10v2004-20220812-en

Max time kernel

144s

Max time network

147s

Command Line

"C:\Users\Admin\AppData\Local\Temp\d74f50a5a85cd6a92c1efb2c08735c929292eaefedf9884ce7e289cfab8d7afa.exe"

Signatures

DcRat

rat infostealer dcrat

Process spawned unexpected child process

Description Indicator Process Target
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe

DCRat payload

rat
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation C:\providercommon\DllCommonsvc.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\d74f50a5a85cd6a92c1efb2c08735c929292eaefedf9884ce7e289cfab8d7afa.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation C:\Windows\SysWOW64\WScript.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe N/A

Legitimate hosting services abused for malware hosting/C2

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files (x86)\Windows Mail\fontdrvhost.exe C:\providercommon\DllCommonsvc.exe N/A
File opened for modification C:\Program Files (x86)\Windows Mail\fontdrvhost.exe C:\providercommon\DllCommonsvc.exe N/A
File created C:\Program Files (x86)\Windows Mail\5b884080fd4f94 C:\providercommon\DllCommonsvc.exe N/A
File created C:\Program Files\WindowsApps\Microsoft.ZuneMusic_2019.19071.19011.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\lsass.exe C:\providercommon\DllCommonsvc.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Downloaded Program Files\886983d96e3d3e C:\providercommon\DllCommonsvc.exe N/A
File created C:\Windows\Vss\Writers\sihost.exe C:\providercommon\DllCommonsvc.exe N/A
File created C:\Windows\Vss\Writers\66fc9ff0ee96c2 C:\providercommon\DllCommonsvc.exe N/A
File created C:\Windows\Logs\waasmedic\dllhost.exe C:\providercommon\DllCommonsvc.exe N/A
File created C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe C:\providercommon\DllCommonsvc.exe N/A
File created C:\Windows\assembly\NativeImages_v2.0.50727_32\e6c9b481da804f C:\providercommon\DllCommonsvc.exe N/A
File created C:\Windows\Downloaded Program Files\csrss.exe C:\providercommon\DllCommonsvc.exe N/A

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings C:\Users\Admin\AppData\Local\Temp\d74f50a5a85cd6a92c1efb2c08735c929292eaefedf9884ce7e289cfab8d7afa.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\providercommon\DllCommonsvc.exe N/A
N/A N/A C:\providercommon\DllCommonsvc.exe N/A
N/A N/A C:\providercommon\DllCommonsvc.exe N/A
N/A N/A C:\providercommon\DllCommonsvc.exe N/A
N/A N/A C:\providercommon\DllCommonsvc.exe N/A
N/A N/A C:\providercommon\DllCommonsvc.exe N/A
N/A N/A C:\providercommon\DllCommonsvc.exe N/A
N/A N/A C:\providercommon\DllCommonsvc.exe N/A
N/A N/A C:\providercommon\DllCommonsvc.exe N/A
N/A N/A C:\providercommon\DllCommonsvc.exe N/A
N/A N/A C:\providercommon\DllCommonsvc.exe N/A
N/A N/A C:\providercommon\DllCommonsvc.exe N/A
N/A N/A C:\providercommon\DllCommonsvc.exe N/A
N/A N/A C:\providercommon\DllCommonsvc.exe N/A
N/A N/A C:\providercommon\DllCommonsvc.exe N/A
N/A N/A C:\providercommon\DllCommonsvc.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe N/A
N/A N/A C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe N/A
N/A N/A C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe N/A
N/A N/A C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe N/A
N/A N/A C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe N/A
N/A N/A C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe N/A
N/A N/A C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe N/A
N/A N/A C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe N/A
N/A N/A C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe N/A
N/A N/A C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe N/A
N/A N/A C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\providercommon\DllCommonsvc.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4648 wrote to memory of 3468 N/A C:\Users\Admin\AppData\Local\Temp\d74f50a5a85cd6a92c1efb2c08735c929292eaefedf9884ce7e289cfab8d7afa.exe C:\Windows\SysWOW64\WScript.exe
PID 4648 wrote to memory of 3468 N/A C:\Users\Admin\AppData\Local\Temp\d74f50a5a85cd6a92c1efb2c08735c929292eaefedf9884ce7e289cfab8d7afa.exe C:\Windows\SysWOW64\WScript.exe
PID 4648 wrote to memory of 3468 N/A C:\Users\Admin\AppData\Local\Temp\d74f50a5a85cd6a92c1efb2c08735c929292eaefedf9884ce7e289cfab8d7afa.exe C:\Windows\SysWOW64\WScript.exe
PID 3468 wrote to memory of 3116 N/A C:\Windows\SysWOW64\WScript.exe C:\Windows\SysWOW64\cmd.exe
PID 3468 wrote to memory of 3116 N/A C:\Windows\SysWOW64\WScript.exe C:\Windows\SysWOW64\cmd.exe
PID 3468 wrote to memory of 3116 N/A C:\Windows\SysWOW64\WScript.exe C:\Windows\SysWOW64\cmd.exe
PID 3116 wrote to memory of 2992 N/A C:\Windows\SysWOW64\cmd.exe C:\providercommon\DllCommonsvc.exe
PID 3116 wrote to memory of 2992 N/A C:\Windows\SysWOW64\cmd.exe C:\providercommon\DllCommonsvc.exe
PID 2992 wrote to memory of 3976 N/A C:\providercommon\DllCommonsvc.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2992 wrote to memory of 3976 N/A C:\providercommon\DllCommonsvc.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2992 wrote to memory of 2116 N/A C:\providercommon\DllCommonsvc.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2992 wrote to memory of 2116 N/A C:\providercommon\DllCommonsvc.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2992 wrote to memory of 1636 N/A C:\providercommon\DllCommonsvc.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2992 wrote to memory of 1636 N/A C:\providercommon\DllCommonsvc.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2992 wrote to memory of 2444 N/A C:\providercommon\DllCommonsvc.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2992 wrote to memory of 2444 N/A C:\providercommon\DllCommonsvc.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2992 wrote to memory of 3700 N/A C:\providercommon\DllCommonsvc.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2992 wrote to memory of 3700 N/A C:\providercommon\DllCommonsvc.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2992 wrote to memory of 2948 N/A C:\providercommon\DllCommonsvc.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2992 wrote to memory of 2948 N/A C:\providercommon\DllCommonsvc.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2992 wrote to memory of 2236 N/A C:\providercommon\DllCommonsvc.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2992 wrote to memory of 2236 N/A C:\providercommon\DllCommonsvc.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2992 wrote to memory of 2592 N/A C:\providercommon\DllCommonsvc.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2992 wrote to memory of 2592 N/A C:\providercommon\DllCommonsvc.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2992 wrote to memory of 3016 N/A C:\providercommon\DllCommonsvc.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2992 wrote to memory of 3016 N/A C:\providercommon\DllCommonsvc.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2992 wrote to memory of 5012 N/A C:\providercommon\DllCommonsvc.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2992 wrote to memory of 5012 N/A C:\providercommon\DllCommonsvc.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2992 wrote to memory of 2596 N/A C:\providercommon\DllCommonsvc.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2992 wrote to memory of 2596 N/A C:\providercommon\DllCommonsvc.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2992 wrote to memory of 3404 N/A C:\providercommon\DllCommonsvc.exe C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe
PID 2992 wrote to memory of 3404 N/A C:\providercommon\DllCommonsvc.exe C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe
PID 3404 wrote to memory of 3756 N/A C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe C:\Windows\System32\cmd.exe
PID 3404 wrote to memory of 3756 N/A C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe C:\Windows\System32\cmd.exe
PID 3756 wrote to memory of 3760 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\w32tm.exe
PID 3756 wrote to memory of 3760 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\w32tm.exe
PID 3756 wrote to memory of 1708 N/A C:\Windows\System32\cmd.exe C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe
PID 3756 wrote to memory of 1708 N/A C:\Windows\System32\cmd.exe C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe
PID 1708 wrote to memory of 2208 N/A C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe C:\Windows\System32\cmd.exe
PID 1708 wrote to memory of 2208 N/A C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe C:\Windows\System32\cmd.exe
PID 2208 wrote to memory of 2576 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\w32tm.exe
PID 2208 wrote to memory of 2576 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\w32tm.exe
PID 2208 wrote to memory of 4060 N/A C:\Windows\System32\cmd.exe C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe
PID 2208 wrote to memory of 4060 N/A C:\Windows\System32\cmd.exe C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe
PID 4060 wrote to memory of 792 N/A C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe C:\Windows\System32\cmd.exe
PID 4060 wrote to memory of 792 N/A C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe C:\Windows\System32\cmd.exe
PID 792 wrote to memory of 4344 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\w32tm.exe
PID 792 wrote to memory of 4344 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\w32tm.exe
PID 792 wrote to memory of 4868 N/A C:\Windows\System32\cmd.exe C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe
PID 792 wrote to memory of 4868 N/A C:\Windows\System32\cmd.exe C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe
PID 4868 wrote to memory of 3704 N/A C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe C:\Windows\System32\cmd.exe
PID 4868 wrote to memory of 3704 N/A C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe C:\Windows\System32\cmd.exe
PID 3704 wrote to memory of 440 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\w32tm.exe
PID 3704 wrote to memory of 440 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\w32tm.exe
PID 3704 wrote to memory of 2816 N/A C:\Windows\System32\cmd.exe C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe
PID 3704 wrote to memory of 2816 N/A C:\Windows\System32\cmd.exe C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe
PID 2816 wrote to memory of 2588 N/A C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe C:\Windows\System32\cmd.exe
PID 2816 wrote to memory of 2588 N/A C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe C:\Windows\System32\cmd.exe
PID 2588 wrote to memory of 4212 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\w32tm.exe
PID 2588 wrote to memory of 4212 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\w32tm.exe
PID 2588 wrote to memory of 5076 N/A C:\Windows\System32\cmd.exe C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe
PID 2588 wrote to memory of 5076 N/A C:\Windows\System32\cmd.exe C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe
PID 5076 wrote to memory of 3076 N/A C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe C:\Windows\System32\cmd.exe
PID 5076 wrote to memory of 3076 N/A C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe C:\Windows\System32\cmd.exe

Processes

C:\Users\Admin\AppData\Local\Temp\d74f50a5a85cd6a92c1efb2c08735c929292eaefedf9884ce7e289cfab8d7afa.exe

"C:\Users\Admin\AppData\Local\Temp\d74f50a5a85cd6a92c1efb2c08735c929292eaefedf9884ce7e289cfab8d7afa.exe"

C:\Windows\SysWOW64\WScript.exe

"C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c ""C:\providercommon\1zu9dW.bat" "

C:\providercommon\DllCommonsvc.exe

"C:\providercommon\DllCommonsvc.exe"

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows Mail\fontdrvhost.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Windows Mail\fontdrvhost.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Mail\fontdrvhost.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 11 /tr "'C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\Downloaded Program Files\csrss.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\Windows\Downloaded Program Files\csrss.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 5 /tr "'C:\odt\dllhost.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 6 /tr "'C:\odt\dllhost.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\odt\dllhost.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 13 /tr "'C:\odt\Idle.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\odt\Idle.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 10 /tr "'C:\odt\Idle.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 13 /tr "'C:\odt\fontdrvhost.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Windows\Vss\Writers\sihost.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "sihosts" /sc MINUTE /mo 8 /tr "'C:\Windows\Vss\Writers\sihost.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Users\Admin\Recent\OfficeClickToRun.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 14 /tr "'C:\Users\Admin\Recent\OfficeClickToRun.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 11 /tr "'C:\Users\Admin\Recent\OfficeClickToRun.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\providercommon\RuntimeBroker.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 6 /tr "'C:\providercommon\StartMenuExperienceHost.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 5 /tr "'C:\providercommon\StartMenuExperienceHost.exe'" /rl HIGHEST /f

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Vss\Writers\sihost.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\Recent\OfficeClickToRun.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\RuntimeBroker.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\StartMenuExperienceHost.exe'

C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe

"C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe"

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:\odt\fontdrvhost.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:\odt\Idle.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:\odt\dllhost.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Downloaded Program Files\csrss.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Mail\fontdrvhost.exe'

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\providercommon\StartMenuExperienceHost.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\providercommon\RuntimeBroker.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 7 /tr "'C:\providercommon\RuntimeBroker.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "sihosts" /sc MINUTE /mo 13 /tr "'C:\Windows\Vss\Writers\sihost.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\odt\fontdrvhost.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 5 /tr "'C:\odt\fontdrvhost.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\Windows\Downloaded Program Files\csrss.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 7 /tr "'C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe'" /rl HIGHEST /f

C:\Windows\System32\cmd.exe

"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\SaOkt9ru2m.bat"

C:\Windows\system32\w32tm.exe

w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2

C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe

"C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe"

C:\Windows\system32\w32tm.exe

w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2

C:\Windows\System32\cmd.exe

"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\pCY6B1XXru.bat"

C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe

"C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe"

C:\Windows\system32\w32tm.exe

w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2

C:\Windows\System32\cmd.exe

"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Wm5t4PlH1R.bat"

C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe

"C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe"

C:\Windows\system32\w32tm.exe

w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2

C:\Windows\System32\cmd.exe

"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\qO35UmqwIy.bat"

C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe

"C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe"

C:\Windows\system32\w32tm.exe

w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2

C:\Windows\System32\cmd.exe

"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\D9KWG0zl28.bat"

C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe

"C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe"

C:\Windows\System32\cmd.exe

"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\I0OceA6Xfh.bat"

C:\Windows\system32\w32tm.exe

w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2

C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe

"C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe"

C:\Windows\system32\w32tm.exe

w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2

C:\Windows\System32\cmd.exe

"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\3EiKDvRnKw.bat"

C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe

"C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe"

C:\Windows\System32\cmd.exe

"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\MsSi1KDKJG.bat"

C:\Windows\system32\w32tm.exe

w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2

C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe

"C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe"

C:\Windows\System32\cmd.exe

"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\XdxpZ3I66P.bat"

C:\Windows\system32\w32tm.exe

w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2

C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe

"C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe"

C:\Windows\System32\cmd.exe

"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\45aGjaybPu.bat"

C:\Windows\system32\w32tm.exe

w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2

C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe

"C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe"

C:\Windows\System32\cmd.exe

"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\8xeM6k5O3T.bat"

C:\Windows\system32\w32tm.exe

w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 raw.githubusercontent.com udp
US 185.199.108.133:443 raw.githubusercontent.com tcp
NL 95.101.78.106:80 tcp
NL 95.101.78.106:80 tcp
US 185.199.108.133:443 raw.githubusercontent.com tcp
US 185.199.108.133:443 raw.githubusercontent.com tcp
DE 51.116.253.168:443 tcp
US 185.199.108.133:443 raw.githubusercontent.com tcp
US 93.184.221.240:80 tcp
US 93.184.221.240:80 tcp
US 185.199.108.133:443 raw.githubusercontent.com tcp
US 93.184.220.29:80 tcp
US 185.199.108.133:443 raw.githubusercontent.com tcp
US 185.199.108.133:443 raw.githubusercontent.com tcp
US 185.199.108.133:443 raw.githubusercontent.com tcp
US 185.199.108.133:443 raw.githubusercontent.com tcp
US 185.199.108.133:443 raw.githubusercontent.com tcp
US 185.199.108.133:443 raw.githubusercontent.com tcp

Files

memory/3468-132-0x0000000000000000-mapping.dmp

C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe

MD5 8088241160261560a02c84025d107592
SHA1 083121f7027557570994c9fc211df61730455bb5
SHA256 2072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1
SHA512 20d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478

C:\providercommon\1zu9dW.bat

MD5 6783c3ee07c7d151ceac57f1f9c8bed7
SHA1 17468f98f95bf504cc1f83c49e49a78526b3ea03
SHA256 8ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322
SHA512 c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8

memory/3116-135-0x0000000000000000-mapping.dmp

C:\providercommon\DllCommonsvc.exe

MD5 bd31e94b4143c4ce49c17d3af46bcad0
SHA1 f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256 b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512 f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

C:\providercommon\DllCommonsvc.exe

MD5 bd31e94b4143c4ce49c17d3af46bcad0
SHA1 f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256 b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512 f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

memory/2992-139-0x0000000000B20000-0x0000000000C30000-memory.dmp

memory/2992-136-0x0000000000000000-mapping.dmp

memory/2992-140-0x00007FFE53580000-0x00007FFE54041000-memory.dmp

memory/1636-143-0x0000000000000000-mapping.dmp

memory/1636-151-0x000001D347590000-0x000001D3475B2000-memory.dmp

memory/2596-152-0x0000000000000000-mapping.dmp

memory/5012-150-0x0000000000000000-mapping.dmp

memory/2116-153-0x00007FFE53580000-0x00007FFE54041000-memory.dmp

memory/3404-154-0x0000000000000000-mapping.dmp

C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe

MD5 bd31e94b4143c4ce49c17d3af46bcad0
SHA1 f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256 b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512 f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe

MD5 bd31e94b4143c4ce49c17d3af46bcad0
SHA1 f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256 b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512 f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

memory/1636-156-0x00007FFE53580000-0x00007FFE54041000-memory.dmp

memory/2992-159-0x00007FFE53580000-0x00007FFE54041000-memory.dmp

memory/3700-158-0x00007FFE53580000-0x00007FFE54041000-memory.dmp

memory/2444-160-0x00007FFE53580000-0x00007FFE54041000-memory.dmp

memory/3016-149-0x0000000000000000-mapping.dmp

memory/2592-148-0x0000000000000000-mapping.dmp

memory/2948-161-0x00007FFE53580000-0x00007FFE54041000-memory.dmp

memory/2236-147-0x0000000000000000-mapping.dmp

memory/2948-146-0x0000000000000000-mapping.dmp

memory/2236-162-0x00007FFE53580000-0x00007FFE54041000-memory.dmp

memory/3976-163-0x00007FFE53580000-0x00007FFE54041000-memory.dmp

memory/3700-145-0x0000000000000000-mapping.dmp

memory/2444-144-0x0000000000000000-mapping.dmp

memory/2592-164-0x00007FFE53580000-0x00007FFE54041000-memory.dmp

memory/3016-165-0x00007FFE53580000-0x00007FFE54041000-memory.dmp

memory/2116-142-0x0000000000000000-mapping.dmp

memory/3976-141-0x0000000000000000-mapping.dmp

memory/5012-166-0x00007FFE53580000-0x00007FFE54041000-memory.dmp

memory/3404-167-0x00007FFE53580000-0x00007FFE54041000-memory.dmp

memory/2596-168-0x00007FFE53580000-0x00007FFE54041000-memory.dmp

memory/1636-172-0x00007FFE53580000-0x00007FFE54041000-memory.dmp

memory/3700-174-0x00007FFE53580000-0x00007FFE54041000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 e243a38635ff9a06c87c2a61a2200656
SHA1 ecd95ed5bf1a9fbe96a8448fc2814a0210fa2afc
SHA256 af5782703f3f2d5a29fb313dae6680a64134db26064d4a321a3f23b75f6ca00f
SHA512 4418957a1b10eee44cf270c81816ae707352411c4f5ac14b6b61ab537c91480e24e0a0a2c276a6291081b4984c123cf673a45dcedb0ceeef682054ba0fc19cb4

memory/3756-178-0x0000000000000000-mapping.dmp

memory/2116-176-0x00007FFE53580000-0x00007FFE54041000-memory.dmp

memory/2444-180-0x00007FFE53580000-0x00007FFE54041000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 3a6bad9528f8e23fb5c77fbd81fa28e8
SHA1 f127317c3bc6407f536c0f0600dcbcf1aabfba36
SHA256 986366767de5873f1b170a63f2a33ce05132d1afd90c8f5017afbca8ef1beb05
SHA512 846002154a0ece6f3e9feda6f115d3161dc21b3789525dd62ae1d9188495171293efdbe7be4710666dd8a15e66b557315b5a02918a741ed1d5f3ff0c515b98e2

memory/3976-184-0x00007FFE53580000-0x00007FFE54041000-memory.dmp

memory/3404-187-0x00007FFE53580000-0x00007FFE54041000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 3a6bad9528f8e23fb5c77fbd81fa28e8
SHA1 f127317c3bc6407f536c0f0600dcbcf1aabfba36
SHA256 986366767de5873f1b170a63f2a33ce05132d1afd90c8f5017afbca8ef1beb05
SHA512 846002154a0ece6f3e9feda6f115d3161dc21b3789525dd62ae1d9188495171293efdbe7be4710666dd8a15e66b557315b5a02918a741ed1d5f3ff0c515b98e2

memory/3760-194-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Local\Temp\SaOkt9ru2m.bat

MD5 f07712e6c0bb1409eb6c99f90ac79739
SHA1 2079e889660534a1a905481bed527172433fa11f
SHA256 1a7494e2f2f522b244430edce0dfe5faf36cc7b51adfdde671fda4c28012020e
SHA512 4a5a8226cd8982490daf1d65fe2d0c10dc0a10aabb7415c7fbdb3671abd345961aa0cff6f5b5e9c1c24f2a9708784d47dc607f842780dc53df9df3d795aa3c8c

memory/5012-192-0x00007FFE53580000-0x00007FFE54041000-memory.dmp

memory/3016-191-0x00007FFE53580000-0x00007FFE54041000-memory.dmp

memory/2596-190-0x00007FFE53580000-0x00007FFE54041000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 3a6bad9528f8e23fb5c77fbd81fa28e8
SHA1 f127317c3bc6407f536c0f0600dcbcf1aabfba36
SHA256 986366767de5873f1b170a63f2a33ce05132d1afd90c8f5017afbca8ef1beb05
SHA512 846002154a0ece6f3e9feda6f115d3161dc21b3789525dd62ae1d9188495171293efdbe7be4710666dd8a15e66b557315b5a02918a741ed1d5f3ff0c515b98e2

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 3a6bad9528f8e23fb5c77fbd81fa28e8
SHA1 f127317c3bc6407f536c0f0600dcbcf1aabfba36
SHA256 986366767de5873f1b170a63f2a33ce05132d1afd90c8f5017afbca8ef1beb05
SHA512 846002154a0ece6f3e9feda6f115d3161dc21b3789525dd62ae1d9188495171293efdbe7be4710666dd8a15e66b557315b5a02918a741ed1d5f3ff0c515b98e2

memory/2236-185-0x00007FFE53580000-0x00007FFE54041000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 3a6bad9528f8e23fb5c77fbd81fa28e8
SHA1 f127317c3bc6407f536c0f0600dcbcf1aabfba36
SHA256 986366767de5873f1b170a63f2a33ce05132d1afd90c8f5017afbca8ef1beb05
SHA512 846002154a0ece6f3e9feda6f115d3161dc21b3789525dd62ae1d9188495171293efdbe7be4710666dd8a15e66b557315b5a02918a741ed1d5f3ff0c515b98e2

memory/2592-181-0x00007FFE53580000-0x00007FFE54041000-memory.dmp

memory/2948-179-0x00007FFE53580000-0x00007FFE54041000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 e243a38635ff9a06c87c2a61a2200656
SHA1 ecd95ed5bf1a9fbe96a8448fc2814a0210fa2afc
SHA256 af5782703f3f2d5a29fb313dae6680a64134db26064d4a321a3f23b75f6ca00f
SHA512 4418957a1b10eee44cf270c81816ae707352411c4f5ac14b6b61ab537c91480e24e0a0a2c276a6291081b4984c123cf673a45dcedb0ceeef682054ba0fc19cb4

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 5f0ddc7f3691c81ee14d17b419ba220d
SHA1 f0ef5fde8bab9d17c0b47137e014c91be888ee53
SHA256 a31805264b8b13ce4145f272cb2830728c186c46e314b48514d636866217add5
SHA512 2ce7c2a0833f581297c13dd88ccfcd36bf129d2b5d7718c52b1d67c97cbd8fc93abc085a040229a0fd712e880c690de7f6b996b0b47c46a091fabb7931be58d3

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 5f0ddc7f3691c81ee14d17b419ba220d
SHA1 f0ef5fde8bab9d17c0b47137e014c91be888ee53
SHA256 a31805264b8b13ce4145f272cb2830728c186c46e314b48514d636866217add5
SHA512 2ce7c2a0833f581297c13dd88ccfcd36bf129d2b5d7718c52b1d67c97cbd8fc93abc085a040229a0fd712e880c690de7f6b996b0b47c46a091fabb7931be58d3

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

MD5 d85ba6ff808d9e5444a4b369f5bc2730
SHA1 31aa9d96590fff6981b315e0b391b575e4c0804a
SHA256 84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA512 8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 3a6bad9528f8e23fb5c77fbd81fa28e8
SHA1 f127317c3bc6407f536c0f0600dcbcf1aabfba36
SHA256 986366767de5873f1b170a63f2a33ce05132d1afd90c8f5017afbca8ef1beb05
SHA512 846002154a0ece6f3e9feda6f115d3161dc21b3789525dd62ae1d9188495171293efdbe7be4710666dd8a15e66b557315b5a02918a741ed1d5f3ff0c515b98e2

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\OfficeClickToRun.exe.log

MD5 baf55b95da4a601229647f25dad12878
SHA1 abc16954ebfd213733c4493fc1910164d825cac8
SHA256 ee954c5d8156fd8890e582c716e5758ed9b33721258f10e758bdc31ccbcb1924
SHA512 24f502fedb1a305d0d7b08857ffc1db9b2359ff34e06d5748ecc84e35c985f29a20d9f0a533bea32d234ab37097ec0481620c63b14ac89b280e75e14d19fd545

C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe

MD5 bd31e94b4143c4ce49c17d3af46bcad0
SHA1 f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256 b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512 f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

memory/1708-195-0x0000000000000000-mapping.dmp

memory/1708-198-0x00007FFE534D0000-0x00007FFE53F91000-memory.dmp

memory/2208-199-0x0000000000000000-mapping.dmp

memory/2576-201-0x0000000000000000-mapping.dmp

memory/1708-202-0x00007FFE534D0000-0x00007FFE53F91000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\pCY6B1XXru.bat

MD5 98082cc7bacbdd78a246b80920b90a3b
SHA1 61f8e060a64a1486305a50594c20c5eb7e9c7e66
SHA256 53f3bf758598e98602721124cad3e5737668818b51094f1355b4c45247e4baf0
SHA512 f864f713710498e8c579c64309fe07fd04341c10306e87f499e46b1d83999c719dd21043f534606597a2d81a75259a6634032b49eadb2142c9d166e5ae8f02aa

C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe

MD5 bd31e94b4143c4ce49c17d3af46bcad0
SHA1 f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256 b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512 f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

memory/4060-203-0x0000000000000000-mapping.dmp

memory/4060-205-0x00007FFE534D0000-0x00007FFE53F91000-memory.dmp

memory/792-206-0x0000000000000000-mapping.dmp

memory/4344-208-0x0000000000000000-mapping.dmp

memory/4060-209-0x00007FFE534D0000-0x00007FFE53F91000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\Wm5t4PlH1R.bat

MD5 533066af28bc602019c0218431a9801a
SHA1 ff827c292efcc9a66c132bade54114c0c351b5bf
SHA256 0c8663e4cff958c95aee28378156782393ce657595124a8d7b370e19e556e01d
SHA512 a1c935c0e1fd2c41e10ea69b91263eddb19d397e0bc94941124fc7f9bb3b32ab5eabc00bfbc089e419c25840ad713121be121ea20f1de2c0adbb36ff1b44947d

C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe

MD5 bd31e94b4143c4ce49c17d3af46bcad0
SHA1 f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256 b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512 f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

memory/4868-210-0x0000000000000000-mapping.dmp

memory/4868-212-0x00007FFE534D0000-0x00007FFE53F91000-memory.dmp

memory/3704-213-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Local\Temp\qO35UmqwIy.bat

MD5 660f297ae672a67d959a060eec06bf17
SHA1 73ebed7c8a6da64feb901c3db0b0c7cc7491c11f
SHA256 784f99e1091d0b4e926d32cc9b4c98eb99117708197bb171e992d5bb1c90f654
SHA512 d699fd352b78539db3abddd26279fb838f9aed9eecca787152ed196ce10def0c6153dac3eeda837244458ddd21907dbd9064e90363a1abc46a8d6021840faf45

memory/4868-216-0x00007FFE534D0000-0x00007FFE53F91000-memory.dmp

memory/440-215-0x0000000000000000-mapping.dmp

C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe

MD5 bd31e94b4143c4ce49c17d3af46bcad0
SHA1 f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256 b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512 f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

memory/2816-217-0x0000000000000000-mapping.dmp

memory/2816-219-0x00007FFE534D0000-0x00007FFE53F91000-memory.dmp

memory/2588-220-0x0000000000000000-mapping.dmp

memory/4212-222-0x0000000000000000-mapping.dmp

memory/2816-223-0x00007FFE534D0000-0x00007FFE53F91000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\D9KWG0zl28.bat

MD5 ba90edd584bdebe33489a4ed7bb35bcb
SHA1 a1e0936e97909f8fb145b2ca8df2d70a91db425a
SHA256 781cddf96ccd3b269cf19603d9e4dfbff8346d0e015e3e8f0405f2ef2d3f32c1
SHA512 593478ed5f04868162e8ea83d64feec347de402c8fa1847345e0baf30989397263a285daf68d5f2ee5743cccec7a447a36891e4c6c5d8332a8812dd4fd659d5f

C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe

MD5 bd31e94b4143c4ce49c17d3af46bcad0
SHA1 f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256 b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512 f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

memory/5076-224-0x0000000000000000-mapping.dmp

memory/5076-226-0x00007FFE53580000-0x00007FFE54041000-memory.dmp

memory/3076-227-0x0000000000000000-mapping.dmp

memory/2152-229-0x0000000000000000-mapping.dmp

memory/5076-230-0x00007FFE53580000-0x00007FFE54041000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\I0OceA6Xfh.bat

MD5 d211d77d2dd4409aa4c41eff7dfcb4b2
SHA1 0477a703907ea7eb0ddcb7d8851c8ac7b4e7917c
SHA256 fa878410333b06b7d4b61a47c1d59107c75e5d00ff94e2e70b313fee62da94e1
SHA512 a943a2ac9f8ca09b3686dc8184db8e8afae3af78f9bb5d09c65d37b9f7b4685fd56305b6076ba3ea57cae6314787e2bc2cfaf36a3e2c8b4525174d6084bcaaf1

C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe

MD5 bd31e94b4143c4ce49c17d3af46bcad0
SHA1 f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256 b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512 f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

memory/2192-231-0x0000000000000000-mapping.dmp

memory/2192-233-0x00007FFE53580000-0x00007FFE54041000-memory.dmp

memory/1992-234-0x0000000000000000-mapping.dmp

memory/2232-236-0x0000000000000000-mapping.dmp

memory/2192-237-0x00007FFE53580000-0x00007FFE54041000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\3EiKDvRnKw.bat

MD5 cff4c99a808016d8cadcfb52818b779f
SHA1 4048c4a11ad43172b32fda070d26ddad0992ae2b
SHA256 7653873e99148479121679502eb76eaf16b15a7256ff5000367220a89e320ffb
SHA512 926a3c8a1ed8e28485de11adb8b2b1a56fe022bf1269fc246e7887934f9b14a9c4c0bce5e9414bdf5ea34f100aad6a3a6274394e26e4d41df2dd4e0e50c48c93

memory/1380-238-0x0000000000000000-mapping.dmp

C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe

MD5 bd31e94b4143c4ce49c17d3af46bcad0
SHA1 f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256 b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512 f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

memory/1380-240-0x00007FFE53580000-0x00007FFE54041000-memory.dmp

memory/4484-241-0x0000000000000000-mapping.dmp

memory/1380-244-0x00007FFE53580000-0x00007FFE54041000-memory.dmp

memory/4984-243-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Local\Temp\MsSi1KDKJG.bat

MD5 57fc89d9fcd5252f229a7349a60929d0
SHA1 87c44691472ba44a5f5dcda406da100aec8339c8
SHA256 bf8739cefc6258af10cae14bae56978b7095b8c906e216d05e60dd73fff59497
SHA512 172ae8ac0454ed32b4ab2560ecf628d65aab354ab8c1541865a4091b3b23df1cbd5878069354e4b3c3a4d52e1d7b0dd143ef39ed68e9a0bc99595a21928ab137

C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe

MD5 bd31e94b4143c4ce49c17d3af46bcad0
SHA1 f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256 b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512 f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

memory/4228-245-0x0000000000000000-mapping.dmp

memory/4228-247-0x00007FFE53580000-0x00007FFE54041000-memory.dmp

memory/1284-248-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Local\Temp\XdxpZ3I66P.bat

MD5 d403403094d5c979bbd54b21bf941794
SHA1 d17ee54c34b39a527dcdda7d12393844d02a6ab7
SHA256 2c40df8bcaedc3a2c548003fd1991ce0eb41261d3197606a498b84dde83d3ca6
SHA512 2247d6e5c91b76566a681ba207290e510e2e5e63eeb38e33f8eaf4946f2b802881c066dd5d87ae40007177794fa37ca01f5391d11ca1895e26bf271a0c07a1a2

memory/2312-250-0x0000000000000000-mapping.dmp

memory/4228-251-0x00007FFE53580000-0x00007FFE54041000-memory.dmp

memory/1868-252-0x0000000000000000-mapping.dmp

C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe

MD5 bd31e94b4143c4ce49c17d3af46bcad0
SHA1 f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256 b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512 f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

memory/1868-254-0x00007FFE53580000-0x00007FFE54041000-memory.dmp

memory/4340-255-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Local\Temp\45aGjaybPu.bat

MD5 28eecc32bd63c9f6b5351597e2e1b80f
SHA1 0cfb0fcc7a86151532e09ac0775d58a36a20154f
SHA256 c50edb7a53c431774a548fc2e68e51f1bc02f2c6573ff2d349c21758325e415c
SHA512 4180a989379eeb1999bea10aff768d2a54b5ba1063d372338ba0764c16d938181d80c4e845e52d9b1120195942c9cf1e62ee5c683225c4aa6e45cc2880d4b812

memory/4896-257-0x0000000000000000-mapping.dmp

memory/1868-258-0x00007FFE53580000-0x00007FFE54041000-memory.dmp

memory/3656-259-0x0000000000000000-mapping.dmp

C:\Windows\assembly\NativeImages_v2.0.50727_32\OfficeClickToRun.exe

MD5 bd31e94b4143c4ce49c17d3af46bcad0
SHA1 f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256 b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512 f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

memory/3656-261-0x00007FFE53580000-0x00007FFE54041000-memory.dmp

memory/372-262-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Local\Temp\8xeM6k5O3T.bat

MD5 cd859198a81722ea373ac04686756e7e
SHA1 710e688a0ee5dc6f3c42171d42d56151e7944f31
SHA256 4a4804675cf11bdf434b47db28b55846064c6d7e96668f7cb849f58bea64f857
SHA512 6d942825a114d7542d14a21bef96772693172deec9e299efccc45d5ffba3a0be2a3be9d44b5f64af8ee825fdb013071dc4032beca57a9c4ecfe1cfb93952eeec

memory/2904-264-0x0000000000000000-mapping.dmp

memory/3656-265-0x00007FFE53580000-0x00007FFE54041000-memory.dmp