Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    01/11/2022, 16:40

General

  • Target

    91308f2f31d57a38ce13e7e2272fa4dfb82ee96fe6c2cb6dacb455828f85f7df.exe

  • Size

    1.3MB

  • MD5

    58aed10f970dc6f7f6d8a59feee6aa17

  • SHA1

    6e957e48eeb1dcf45b2d1a83c6dccf3f2fe93994

  • SHA256

    91308f2f31d57a38ce13e7e2272fa4dfb82ee96fe6c2cb6dacb455828f85f7df

  • SHA512

    8c5cda14ab9854f57d003f89455a0e76f1f2c2afe321e8cdbfa7405820bbda6c9d70f2b03a998aa12a55a3f6107ec803370a142401a6345abddc12b9ff16d2f7

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Process spawned unexpected child process 33 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 16 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 13 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 33 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 14 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\91308f2f31d57a38ce13e7e2272fa4dfb82ee96fe6c2cb6dacb455828f85f7df.exe
    "C:\Users\Admin\AppData\Local\Temp\91308f2f31d57a38ce13e7e2272fa4dfb82ee96fe6c2cb6dacb455828f85f7df.exe"
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1896
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4356
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\providercommon\1zu9dW.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3348
        • C:\providercommon\DllCommonsvc.exe
          "C:\providercommon\DllCommonsvc.exe"
          4⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2480
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3408
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\System.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2348
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\odt\smss.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2224
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\Idle.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2704
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\All Users\Oracle\Java\javapath\taskhostw.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1784
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\NetHood\dwm.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:928
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\Application Data\spoolsv.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1644
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\WindowsPowerShell\spoolsv.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4236
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\fontdrvhost.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2508
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default User\RuntimeBroker.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4112
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default User\dllhost.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4672
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\Templates\smss.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:336
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\wajPrgVpq4.bat"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:4796
            • C:\Windows\system32\w32tm.exe
              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
              6⤵
                PID:3452
              • C:\Program Files\WindowsPowerShell\spoolsv.exe
                "C:\Program Files\WindowsPowerShell\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • Modifies registry class
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:3492
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Nc51i3GWIc.bat"
                  7⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2084
                  • C:\Windows\system32\w32tm.exe
                    w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                    8⤵
                      PID:1888
                    • C:\Program Files\WindowsPowerShell\spoolsv.exe
                      "C:\Program Files\WindowsPowerShell\spoolsv.exe"
                      8⤵
                      • Executes dropped EXE
                      • Modifies registry class
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of WriteProcessMemory
                      PID:3724
                      • C:\Windows\System32\cmd.exe
                        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\3npectBbsF.bat"
                        9⤵
                        • Suspicious use of WriteProcessMemory
                        PID:1800
                        • C:\Windows\system32\w32tm.exe
                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                          10⤵
                            PID:3308
                          • C:\Program Files\WindowsPowerShell\spoolsv.exe
                            "C:\Program Files\WindowsPowerShell\spoolsv.exe"
                            10⤵
                            • Executes dropped EXE
                            • Modifies registry class
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of WriteProcessMemory
                            PID:5028
                            • C:\Windows\System32\cmd.exe
                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\HZWv28qLDz.bat"
                              11⤵
                              • Suspicious use of WriteProcessMemory
                              PID:2172
                              • C:\Windows\system32\w32tm.exe
                                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                12⤵
                                  PID:4900
                                • C:\Program Files\WindowsPowerShell\spoolsv.exe
                                  "C:\Program Files\WindowsPowerShell\spoolsv.exe"
                                  12⤵
                                  • Executes dropped EXE
                                  • Modifies registry class
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of WriteProcessMemory
                                  PID:4812
                                  • C:\Windows\System32\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\3npectBbsF.bat"
                                    13⤵
                                    • Suspicious use of WriteProcessMemory
                                    PID:5068
                                    • C:\Windows\system32\w32tm.exe
                                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                      14⤵
                                        PID:3112
                                      • C:\Program Files\WindowsPowerShell\spoolsv.exe
                                        "C:\Program Files\WindowsPowerShell\spoolsv.exe"
                                        14⤵
                                        • Executes dropped EXE
                                        • Modifies registry class
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of WriteProcessMemory
                                        PID:768
                                        • C:\Windows\System32\cmd.exe
                                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\h6hK16ZrMt.bat"
                                          15⤵
                                            PID:4080
                                            • C:\Windows\system32\w32tm.exe
                                              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                              16⤵
                                                PID:200
                                              • C:\Program Files\WindowsPowerShell\spoolsv.exe
                                                "C:\Program Files\WindowsPowerShell\spoolsv.exe"
                                                16⤵
                                                • Executes dropped EXE
                                                • Modifies registry class
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:3152
                                                • C:\Windows\System32\cmd.exe
                                                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\l7tVtcAquU.bat"
                                                  17⤵
                                                    PID:1192
                                                    • C:\Windows\system32\w32tm.exe
                                                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                      18⤵
                                                        PID:96
                                                      • C:\Program Files\WindowsPowerShell\spoolsv.exe
                                                        "C:\Program Files\WindowsPowerShell\spoolsv.exe"
                                                        18⤵
                                                        • Executes dropped EXE
                                                        • Modifies registry class
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        PID:1340
                                                        • C:\Windows\System32\cmd.exe
                                                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\xkGYwzkQoc.bat"
                                                          19⤵
                                                            PID:3676
                                                            • C:\Windows\system32\w32tm.exe
                                                              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                              20⤵
                                                                PID:4820
                                                              • C:\Program Files\WindowsPowerShell\spoolsv.exe
                                                                "C:\Program Files\WindowsPowerShell\spoolsv.exe"
                                                                20⤵
                                                                • Executes dropped EXE
                                                                • Modifies registry class
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                PID:3860
                                                                • C:\Windows\System32\cmd.exe
                                                                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\p5ITN63wlJ.bat"
                                                                  21⤵
                                                                    PID:396
                                                                    • C:\Windows\system32\w32tm.exe
                                                                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                      22⤵
                                                                        PID:2504
                                                                      • C:\Program Files\WindowsPowerShell\spoolsv.exe
                                                                        "C:\Program Files\WindowsPowerShell\spoolsv.exe"
                                                                        22⤵
                                                                        • Executes dropped EXE
                                                                        • Modifies registry class
                                                                        PID:2488
                                                                        • C:\Windows\System32\cmd.exe
                                                                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\d8IMWcflW5.bat"
                                                                          23⤵
                                                                            PID:1840
                                                                            • C:\Windows\system32\w32tm.exe
                                                                              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                              24⤵
                                                                                PID:1660
                                                                              • C:\Program Files\WindowsPowerShell\spoolsv.exe
                                                                                "C:\Program Files\WindowsPowerShell\spoolsv.exe"
                                                                                24⤵
                                                                                • Executes dropped EXE
                                                                                • Modifies registry class
                                                                                PID:4404
                                                                                • C:\Windows\System32\cmd.exe
                                                                                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\eKnLpNzAx9.bat"
                                                                                  25⤵
                                                                                    PID:2900
                                                                                    • C:\Windows\system32\w32tm.exe
                                                                                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                      26⤵
                                                                                        PID:4076
                                                                                      • C:\Program Files\WindowsPowerShell\spoolsv.exe
                                                                                        "C:\Program Files\WindowsPowerShell\spoolsv.exe"
                                                                                        26⤵
                                                                                        • Executes dropped EXE
                                                                                        • Modifies registry class
                                                                                        PID:1156
                                                                                        • C:\Windows\System32\cmd.exe
                                                                                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\yoQf8QHV2Q.bat"
                                                                                          27⤵
                                                                                            PID:1896
                                                                                            • C:\Windows\system32\w32tm.exe
                                                                                              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                              28⤵
                                                                                                PID:4664
                                                                                              • C:\Program Files\WindowsPowerShell\spoolsv.exe
                                                                                                "C:\Program Files\WindowsPowerShell\spoolsv.exe"
                                                                                                28⤵
                                                                                                • Executes dropped EXE
                                                                                                • Modifies registry class
                                                                                                PID:3868
                                                                                                • C:\Windows\System32\cmd.exe
                                                                                                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\WLCDTNV5Zk.bat"
                                                                                                  29⤵
                                                                                                    PID:1964
                                                                                                    • C:\Windows\system32\w32tm.exe
                                                                                                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                                      30⤵
                                                                                                        PID:4044
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "smsss" /sc MINUTE /mo 14 /tr "'C:\Users\Admin\Templates\smss.exe'" /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Creates scheduled task(s)
                                              PID:4884
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Users\Admin\Templates\smss.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Creates scheduled task(s)
                                              PID:4868
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "smsss" /sc MINUTE /mo 5 /tr "'C:\Users\Admin\Templates\smss.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Creates scheduled task(s)
                                              PID:3188
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\System.exe'" /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Creates scheduled task(s)
                                              PID:3920
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\System.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Creates scheduled task(s)
                                              PID:3132
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\System.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Creates scheduled task(s)
                                              PID:2112
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "smsss" /sc MINUTE /mo 12 /tr "'C:\odt\smss.exe'" /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Creates scheduled task(s)
                                              PID:2896
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\odt\smss.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Creates scheduled task(s)
                                              PID:3680
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "smsss" /sc MINUTE /mo 14 /tr "'C:\odt\smss.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Creates scheduled task(s)
                                              PID:3152
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\Idle.exe'" /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Creates scheduled task(s)
                                              PID:3164
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\Idle.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Creates scheduled task(s)
                                              PID:2724
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\Idle.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Creates scheduled task(s)
                                              PID:1064
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 8 /tr "'C:\Users\All Users\Oracle\Java\javapath\taskhostw.exe'" /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Creates scheduled task(s)
                                              PID:456
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Users\All Users\Oracle\Java\javapath\taskhostw.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Creates scheduled task(s)
                                              PID:4204
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 7 /tr "'C:\Users\All Users\Oracle\Java\javapath\taskhostw.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Creates scheduled task(s)
                                              PID:4184
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 5 /tr "'C:\Users\Default\NetHood\dwm.exe'" /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Creates scheduled task(s)
                                              PID:1652
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Users\Default\NetHood\dwm.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Creates scheduled task(s)
                                              PID:1188
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 10 /tr "'C:\Users\Default\NetHood\dwm.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Creates scheduled task(s)
                                              PID:1208
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 13 /tr "'C:\Users\Default\Application Data\spoolsv.exe'" /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Creates scheduled task(s)
                                              PID:1688
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Users\Default\Application Data\spoolsv.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Creates scheduled task(s)
                                              PID:1632
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 7 /tr "'C:\Users\Default\Application Data\spoolsv.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Creates scheduled task(s)
                                              PID:1200
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 5 /tr "'C:\Program Files\WindowsPowerShell\spoolsv.exe'" /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Creates scheduled task(s)
                                              PID:4228
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files\WindowsPowerShell\spoolsv.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Creates scheduled task(s)
                                              PID:1868
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 9 /tr "'C:\Program Files\WindowsPowerShell\spoolsv.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Creates scheduled task(s)
                                              PID:2084
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 10 /tr "'C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\fontdrvhost.exe'" /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Creates scheduled task(s)
                                              PID:2144
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\fontdrvhost.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Creates scheduled task(s)
                                              PID:676
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 8 /tr "'C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\fontdrvhost.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Creates scheduled task(s)
                                              PID:248
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 9 /tr "'C:\Users\Default User\RuntimeBroker.exe'" /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Creates scheduled task(s)
                                              PID:3472
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Users\Default User\RuntimeBroker.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Creates scheduled task(s)
                                              PID:228
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 10 /tr "'C:\Users\Default User\RuntimeBroker.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Creates scheduled task(s)
                                              PID:212
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 11 /tr "'C:\Users\Default User\dllhost.exe'" /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Creates scheduled task(s)
                                              PID:200
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Users\Default User\dllhost.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Creates scheduled task(s)
                                              PID:3452
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 7 /tr "'C:\Users\Default User\dllhost.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Creates scheduled task(s)
                                              PID:3444

                                            Network

                                            MITRE ATT&CK Enterprise v6

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\Program Files\WindowsPowerShell\spoolsv.exe

                                              Filesize

                                              1.0MB

                                              MD5

                                              bd31e94b4143c4ce49c17d3af46bcad0

                                              SHA1

                                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                              SHA256

                                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                              SHA512

                                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                            • C:\Program Files\WindowsPowerShell\spoolsv.exe

                                              Filesize

                                              1.0MB

                                              MD5

                                              bd31e94b4143c4ce49c17d3af46bcad0

                                              SHA1

                                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                              SHA256

                                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                              SHA512

                                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                            • C:\Program Files\WindowsPowerShell\spoolsv.exe

                                              Filesize

                                              1.0MB

                                              MD5

                                              bd31e94b4143c4ce49c17d3af46bcad0

                                              SHA1

                                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                              SHA256

                                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                              SHA512

                                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                            • C:\Program Files\WindowsPowerShell\spoolsv.exe

                                              Filesize

                                              1.0MB

                                              MD5

                                              bd31e94b4143c4ce49c17d3af46bcad0

                                              SHA1

                                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                              SHA256

                                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                              SHA512

                                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                            • C:\Program Files\WindowsPowerShell\spoolsv.exe

                                              Filesize

                                              1.0MB

                                              MD5

                                              bd31e94b4143c4ce49c17d3af46bcad0

                                              SHA1

                                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                              SHA256

                                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                              SHA512

                                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                            • C:\Program Files\WindowsPowerShell\spoolsv.exe

                                              Filesize

                                              1.0MB

                                              MD5

                                              bd31e94b4143c4ce49c17d3af46bcad0

                                              SHA1

                                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                              SHA256

                                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                              SHA512

                                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                            • C:\Program Files\WindowsPowerShell\spoolsv.exe

                                              Filesize

                                              1.0MB

                                              MD5

                                              bd31e94b4143c4ce49c17d3af46bcad0

                                              SHA1

                                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                              SHA256

                                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                              SHA512

                                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                            • C:\Program Files\WindowsPowerShell\spoolsv.exe

                                              Filesize

                                              1.0MB

                                              MD5

                                              bd31e94b4143c4ce49c17d3af46bcad0

                                              SHA1

                                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                              SHA256

                                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                              SHA512

                                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                            • C:\Program Files\WindowsPowerShell\spoolsv.exe

                                              Filesize

                                              1.0MB

                                              MD5

                                              bd31e94b4143c4ce49c17d3af46bcad0

                                              SHA1

                                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                              SHA256

                                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                              SHA512

                                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                            • C:\Program Files\WindowsPowerShell\spoolsv.exe

                                              Filesize

                                              1.0MB

                                              MD5

                                              bd31e94b4143c4ce49c17d3af46bcad0

                                              SHA1

                                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                              SHA256

                                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                              SHA512

                                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                            • C:\Program Files\WindowsPowerShell\spoolsv.exe

                                              Filesize

                                              1.0MB

                                              MD5

                                              bd31e94b4143c4ce49c17d3af46bcad0

                                              SHA1

                                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                              SHA256

                                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                              SHA512

                                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                            • C:\Program Files\WindowsPowerShell\spoolsv.exe

                                              Filesize

                                              1.0MB

                                              MD5

                                              bd31e94b4143c4ce49c17d3af46bcad0

                                              SHA1

                                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                              SHA256

                                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                              SHA512

                                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                            • C:\Program Files\WindowsPowerShell\spoolsv.exe

                                              Filesize

                                              1.0MB

                                              MD5

                                              bd31e94b4143c4ce49c17d3af46bcad0

                                              SHA1

                                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                              SHA256

                                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                              SHA512

                                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                              Filesize

                                              3KB

                                              MD5

                                              ad5cd538ca58cb28ede39c108acb5785

                                              SHA1

                                              1ae910026f3dbe90ed025e9e96ead2b5399be877

                                              SHA256

                                              c9e6cb04d6c893458d5a7e12eb575cf97c3172f5e312b1f63a667cbbc5f0c033

                                              SHA512

                                              c066c5d9b276a68fa636647bb29aea05bfa2292217bc77f5324d9c1d93117772ee8277e1f7cff91ec8d6b7c05ca078f929cecfdbb09582522a9067f54740af13

                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\spoolsv.exe.log

                                              Filesize

                                              1KB

                                              MD5

                                              d63ff49d7c92016feb39812e4db10419

                                              SHA1

                                              2307d5e35ca9864ffefc93acf8573ea995ba189b

                                              SHA256

                                              375076241775962f3edc08a8c72832a00920b427a4f3332528d91d21e909fa12

                                              SHA512

                                              00f8c8d0336d6575b956876183199624d6f4d2056f2c0aa633a6f17c516f22ee648062d9bc419254d84c459323e9424f0da8aed9dd4e16c2926e5ba30e797d8a

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                              Filesize

                                              1KB

                                              MD5

                                              9fb8e485a202d28a1a374ba6af39b2fb

                                              SHA1

                                              15e1794a859fc5ff0ec022026a4ecc062df8f252

                                              SHA256

                                              61cfb6a71b2a98e8a4fad7af0d89955e206634f3eeb0bbf5005db1ce07c8805f

                                              SHA512

                                              daccd31f3bd8d09f668b29f05d253820048f3a4c48e4ba5c7dde7e6eab6072e2f4ff4ce88519d23b9ee682fbacdd893a13e21f6ee4f897838bdc1f9570eb6afd

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                              Filesize

                                              1KB

                                              MD5

                                              e9b364a5e6cb8ea170474ed3b7997dc2

                                              SHA1

                                              a327cddbe2ed0da79659ff292b15e8b53e30c011

                                              SHA256

                                              1bd87de5ae0346deed53ae08a031cc6961cd87c715015aef1c82d7a7dd2617db

                                              SHA512

                                              09b529573d5dd8d9e5b747458e6e601257b0594243ec0056a495960eec506bb1974f31e6f9e9fd85a62f002031e926adfecb23611cda4e8107880e324b208ada

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                              Filesize

                                              1KB

                                              MD5

                                              c6ae222992f919b13cd4b5033c222e67

                                              SHA1

                                              3a8b99428198cf6d211365cdc5be3039c8280764

                                              SHA256

                                              92e91ada4ba47720351150131ea2790e9de66a4a849a2d40fc6ae7191de5e260

                                              SHA512

                                              4c00921caa047745d0f509b5f78e7240722a986e3b47ca76b24557bfbf10be67c4361686119c2911b5f31a050c9b827914fe1c47b8c4553a8e8191aab0b5851a

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                              Filesize

                                              1KB

                                              MD5

                                              308c7e715912b7d27be4a5f3e6351131

                                              SHA1

                                              04c1c72e2fce0308fea2ba3c2a57cc1fcad92c43

                                              SHA256

                                              bbaf52b7572845d6838747cceefc525a2a60077ed92722f8681a6883703da876

                                              SHA512

                                              27afa1b8b608524a732de06a765b371c6ef8787fbbd54ab9cd44d1fd7423abf4ad71711df54a8a4dee1a8ed827e8cdaaab942551b3b172b9452c2e761dcd5d84

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                              Filesize

                                              1KB

                                              MD5

                                              1adc3a5b5a05556ec64e167841887fb0

                                              SHA1

                                              20780e0dfde261dd78482ed4a52e0bb22facdd2d

                                              SHA256

                                              c1134abda4788e94c9527849103383549df332b2640eaedb82e42a501b5baae7

                                              SHA512

                                              51be4b77d1bc5dd2a7912cc6e903864dd404c73f621f93efc915825578de049144ffd6c4f4f8cd5b34b4231b69d9beea0cafdfc5a1902c83f2828520e3801640

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                              Filesize

                                              1KB

                                              MD5

                                              1adc3a5b5a05556ec64e167841887fb0

                                              SHA1

                                              20780e0dfde261dd78482ed4a52e0bb22facdd2d

                                              SHA256

                                              c1134abda4788e94c9527849103383549df332b2640eaedb82e42a501b5baae7

                                              SHA512

                                              51be4b77d1bc5dd2a7912cc6e903864dd404c73f621f93efc915825578de049144ffd6c4f4f8cd5b34b4231b69d9beea0cafdfc5a1902c83f2828520e3801640

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                              Filesize

                                              1KB

                                              MD5

                                              1adc3a5b5a05556ec64e167841887fb0

                                              SHA1

                                              20780e0dfde261dd78482ed4a52e0bb22facdd2d

                                              SHA256

                                              c1134abda4788e94c9527849103383549df332b2640eaedb82e42a501b5baae7

                                              SHA512

                                              51be4b77d1bc5dd2a7912cc6e903864dd404c73f621f93efc915825578de049144ffd6c4f4f8cd5b34b4231b69d9beea0cafdfc5a1902c83f2828520e3801640

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                              Filesize

                                              1KB

                                              MD5

                                              32ced60f152a420352be8c9b94fbd410

                                              SHA1

                                              53494f0160df72885ca17134847cb5188f533e93

                                              SHA256

                                              ca4bfc0aceded7ac92db1781fab06570557fdb171c19ca6b7ca2a4cb55289c60

                                              SHA512

                                              3f2a8f44da7e1d197263e61fe7d7516d698c5fc71824186c7ec9d3d821f73bf7eddc8d41dea21ebb13f86d580cc633b5f01d5070fcea6e84a1522a2e63fdfd8c

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                              Filesize

                                              1KB

                                              MD5

                                              3f5d072fc27730bde6e9249a4781175d

                                              SHA1

                                              239af86ea3d3c77f5cbf9db7f1059807792560ec

                                              SHA256

                                              65ee63099d3fef8216b522bf13b5c096c4ff032d0eef838179cf25e0d8abc700

                                              SHA512

                                              083c7bd01401e42197badbe4abc6fc7be522cde204c08ef9caca4e8fbb01a330239ff3ea682898ec345e4a9759a62758ba1ddfd3672c71eb6c2b1a99c98387b2

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                              Filesize

                                              1KB

                                              MD5

                                              5558ac852338e32b90fd9af755fc3aa3

                                              SHA1

                                              4a3ee2143d6fee640308715140e84ae5a00066d4

                                              SHA256

                                              9869700c4aae42f27b79db322526b7542ac767b46460934286d2a76734367c99

                                              SHA512

                                              11c06b233e2e6c7277bedc8a912f4ac253606071b167f133cda48f50ee6fc677eb03dbef2dfbe3e42d1f5bf876146eea05de5447f089ffe1bc1eed51aed3779e

                                            • C:\Users\Admin\AppData\Local\Temp\3npectBbsF.bat

                                              Filesize

                                              211B

                                              MD5

                                              8e2851f16b83d868197ec4ef3dda6673

                                              SHA1

                                              bd3f2240b1add099a4010f509d76796c0d7398ff

                                              SHA256

                                              5700e969e466ef27c76d5519b0ffc47f18ebbc1b5b034df480b17b44a0c9005b

                                              SHA512

                                              76c03270fdfaeb9bbdfe86371279f02498554a19fe81ac4e0c26c6df3695f6dac19515a155ce84be42bc1e24a99cdfb2b7c16984d0932c1b5d9ae92e3be0cb8c

                                            • C:\Users\Admin\AppData\Local\Temp\3npectBbsF.bat

                                              Filesize

                                              211B

                                              MD5

                                              8e2851f16b83d868197ec4ef3dda6673

                                              SHA1

                                              bd3f2240b1add099a4010f509d76796c0d7398ff

                                              SHA256

                                              5700e969e466ef27c76d5519b0ffc47f18ebbc1b5b034df480b17b44a0c9005b

                                              SHA512

                                              76c03270fdfaeb9bbdfe86371279f02498554a19fe81ac4e0c26c6df3695f6dac19515a155ce84be42bc1e24a99cdfb2b7c16984d0932c1b5d9ae92e3be0cb8c

                                            • C:\Users\Admin\AppData\Local\Temp\HZWv28qLDz.bat

                                              Filesize

                                              211B

                                              MD5

                                              81e199d2628d35c4689751c198715929

                                              SHA1

                                              b1f4c78cb926e94eaad1be399984fece369bbe1d

                                              SHA256

                                              b1fb588e2a91824f5f69c19136f3dac8e5a997e80bd7ff8bd704b9e248e88c3b

                                              SHA512

                                              7073641f176f9dbbb958e57aa5980221df258dfc1a544ca4d534be46b0eefe33a438c4678626bc29a25cc1f7ec1c82f2cdd48160409faf34e4653bbb300c2196

                                            • C:\Users\Admin\AppData\Local\Temp\Nc51i3GWIc.bat

                                              Filesize

                                              211B

                                              MD5

                                              0378a39def66cb5388b004452f437f1b

                                              SHA1

                                              40224a41cc478352bf5d647c1b9783fd2fc9f1b5

                                              SHA256

                                              939892d0732fc84d64051a7ab82502e43f610767cad9940bc24c92fab8658311

                                              SHA512

                                              594a203b61d706d6dfe04272bc4b7e2f85006078929fe20231346bd0904061c5a3ece8a61460ff9dc9e057b4161bae5ecceb825f2816ae0bacfd524312059388

                                            • C:\Users\Admin\AppData\Local\Temp\WLCDTNV5Zk.bat

                                              Filesize

                                              211B

                                              MD5

                                              e0522c68b81e0865e16580f560e14732

                                              SHA1

                                              1f791726e66686bb360432428be3d57c0206db9a

                                              SHA256

                                              3756d305480aa2947479b4d2256f48f0b130715b21e282c7dae38ceca5158383

                                              SHA512

                                              e09b4f8b677447af631c2cd888f6f390b3aaff0450e2eeaa0f10ee202f5b73c5f99edbe1080e42667c3bdc33082eb6220e7180c4ef09a1b537519ab20cbcc70e

                                            • C:\Users\Admin\AppData\Local\Temp\d8IMWcflW5.bat

                                              Filesize

                                              211B

                                              MD5

                                              52d779377b44d705d36b396d640d509a

                                              SHA1

                                              7d658475b095690d88b23f0a5d05e34b753edd2d

                                              SHA256

                                              a4b3d7fb6613312f6b1bbb5c679791e7d7f7d3af16ff29bdbd4109a8f47ffce0

                                              SHA512

                                              32da092dc3948cfe7a71ea68ae28fe5399fa60b001511f23e7f8b632c7e5b60e8d01ec208dc57d98325600ebc4665a4f4ea0c25050620b72f381e921a4cb7e18

                                            • C:\Users\Admin\AppData\Local\Temp\eKnLpNzAx9.bat

                                              Filesize

                                              211B

                                              MD5

                                              4691bf2441794c418a7d885fe2fb773d

                                              SHA1

                                              e4aa82875c6101328056af375d12b21d076b642d

                                              SHA256

                                              010ff71710f7abb9bd2e4617df263564fd3b70d38b603e5a727a5eaee1817d70

                                              SHA512

                                              697f62d43ee4a892276b05a6a8268a56ef66d693ac1f4ccb30df13f6387c0b62b3601441745b8e8c289d1ca1a079fa491b3eb0ecaae470356e28bf63819e6b2e

                                            • C:\Users\Admin\AppData\Local\Temp\h6hK16ZrMt.bat

                                              Filesize

                                              211B

                                              MD5

                                              0f578888a8727d4771d8cff7d6b1a4b1

                                              SHA1

                                              959fa53eb97e915f3afcfe8eba5ffb7012b031b4

                                              SHA256

                                              007b04f2f5b9c2ad058dd154558ddcb3a0ad259a16d0e9a616d779d8b1f1a3f6

                                              SHA512

                                              0a55cee5664c70a4557ffe81e0dc6ee6eb399068454ecbfeb2a506ab16fdfae3845b9db5889747e4ffb98a7c0dde181268d02a4faf6787471af9e09f32fb44b1

                                            • C:\Users\Admin\AppData\Local\Temp\l7tVtcAquU.bat

                                              Filesize

                                              211B

                                              MD5

                                              1960da9850b5cdaabe3969fb6761b66d

                                              SHA1

                                              e1b0a3bccf30b8a95295924c89a022e645cbb895

                                              SHA256

                                              ee55b384216ace3fad9e1f37364e96fd32fd9b3880a40ab3c2468353ffd9a732

                                              SHA512

                                              e08921a366f35d30b5274a775cacb4e97c4e8f58bb5fd1bedfe56e963f14a3acdf27fe5373cc639e21e247944b89ebe8dd36af8df3f172b0490be7d4ce767a89

                                            • C:\Users\Admin\AppData\Local\Temp\p5ITN63wlJ.bat

                                              Filesize

                                              211B

                                              MD5

                                              eda8d2bae7794d91816830dfbc9a5cca

                                              SHA1

                                              4f149accf849d11fbc77186020ba6affd6557cf6

                                              SHA256

                                              9a380348863ec654cd5a81f80d2db0958feacf9eedf387ffadaef37ae5173a92

                                              SHA512

                                              0d1b279c0d7810093122e206bf6b03a132868d9ad8d28c1c6d19bf286d7c38c9cf0078bd4a1f2f70c5bf10b50dc748535cf312b0ad607475362051f0517ac359

                                            • C:\Users\Admin\AppData\Local\Temp\wajPrgVpq4.bat

                                              Filesize

                                              211B

                                              MD5

                                              7e0a21a36e30b4caa7fb69b05ecc557d

                                              SHA1

                                              844386e632f516c3998275efe304f3349f4f063f

                                              SHA256

                                              2f6276fc6e923f145968aca107c22b1cdf6f7cc6d6240c4920ac79c5084bbafa

                                              SHA512

                                              64662834445402e508fa439b28955f359f293f901fa0ed498ddc68db2a69998f61d5c18465f6f626b299f60a8910efd756fc22d86195f430f073a18a965c27f3

                                            • C:\Users\Admin\AppData\Local\Temp\xkGYwzkQoc.bat

                                              Filesize

                                              211B

                                              MD5

                                              2871af154118c525561c6d9748cee2b5

                                              SHA1

                                              a6df49c5869c83b9a7efc961eedd5b2a21478238

                                              SHA256

                                              5f7a3776490da27af394e540f41b08a4f1b9ccab13e6f3791f737754a7ce2c22

                                              SHA512

                                              c7b244fa771b7ac2067ae325f97303e887ac93634ee812afebc8f6732a652de6a9cd01f6b03b491184e8cdd019092f97dd9c5aaa16cf27bd68e4c6f8c0a3b4d7

                                            • C:\Users\Admin\AppData\Local\Temp\yoQf8QHV2Q.bat

                                              Filesize

                                              211B

                                              MD5

                                              fbd2fd81f1263be483130505077fdce6

                                              SHA1

                                              aa210a499cffd1d42b12b1b06acc3ed2728be16c

                                              SHA256

                                              5e35a82adea7f73a131bcec6737d78ba6d5b28cfe72a83f0dad3ae302629b80b

                                              SHA512

                                              b3cd6cdfa98866ca43944a79582461796de37ee2b2bc53220c4fdda7c75b74ab901b64ad5471a14b8e891de009987fd302af1a3f6a5851be7845742660ad406d

                                            • C:\providercommon\1zu9dW.bat

                                              Filesize

                                              36B

                                              MD5

                                              6783c3ee07c7d151ceac57f1f9c8bed7

                                              SHA1

                                              17468f98f95bf504cc1f83c49e49a78526b3ea03

                                              SHA256

                                              8ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322

                                              SHA512

                                              c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8

                                            • C:\providercommon\DllCommonsvc.exe

                                              Filesize

                                              1.0MB

                                              MD5

                                              bd31e94b4143c4ce49c17d3af46bcad0

                                              SHA1

                                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                              SHA256

                                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                              SHA512

                                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                            • C:\providercommon\DllCommonsvc.exe

                                              Filesize

                                              1.0MB

                                              MD5

                                              bd31e94b4143c4ce49c17d3af46bcad0

                                              SHA1

                                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                              SHA256

                                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                              SHA512

                                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                            • C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe

                                              Filesize

                                              197B

                                              MD5

                                              8088241160261560a02c84025d107592

                                              SHA1

                                              083121f7027557570994c9fc211df61730455bb5

                                              SHA256

                                              2072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1

                                              SHA512

                                              20d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478

                                            • memory/1156-822-0x0000000001200000-0x0000000001212000-memory.dmp

                                              Filesize

                                              72KB

                                            • memory/1896-165-0x0000000077250000-0x00000000773DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/1896-172-0x0000000077250000-0x00000000773DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/1896-182-0x0000000077250000-0x00000000773DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/1896-183-0x0000000077250000-0x00000000773DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/1896-121-0x0000000077250000-0x00000000773DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/1896-149-0x0000000077250000-0x00000000773DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/1896-122-0x0000000077250000-0x00000000773DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/1896-180-0x0000000077250000-0x00000000773DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/1896-179-0x0000000077250000-0x00000000773DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/1896-123-0x0000000077250000-0x00000000773DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/1896-178-0x0000000077250000-0x00000000773DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/1896-177-0x0000000077250000-0x00000000773DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/1896-126-0x0000000077250000-0x00000000773DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/1896-125-0x0000000077250000-0x00000000773DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/1896-128-0x0000000077250000-0x00000000773DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/1896-129-0x0000000077250000-0x00000000773DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/1896-130-0x0000000077250000-0x00000000773DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/1896-131-0x0000000077250000-0x00000000773DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/1896-132-0x0000000077250000-0x00000000773DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/1896-133-0x0000000077250000-0x00000000773DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/1896-134-0x0000000077250000-0x00000000773DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/1896-135-0x0000000077250000-0x00000000773DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/1896-176-0x0000000077250000-0x00000000773DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/1896-175-0x0000000077250000-0x00000000773DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/1896-174-0x0000000077250000-0x00000000773DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/1896-136-0x0000000077250000-0x00000000773DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/1896-148-0x0000000077250000-0x00000000773DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/1896-181-0x0000000077250000-0x00000000773DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/1896-173-0x0000000077250000-0x00000000773DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/1896-137-0x0000000077250000-0x00000000773DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/1896-138-0x0000000077250000-0x00000000773DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/1896-139-0x0000000077250000-0x00000000773DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/1896-150-0x0000000077250000-0x00000000773DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/1896-140-0x0000000077250000-0x00000000773DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/1896-141-0x0000000077250000-0x00000000773DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/1896-170-0x0000000077250000-0x00000000773DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/1896-171-0x0000000077250000-0x00000000773DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/1896-142-0x0000000077250000-0x00000000773DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/1896-169-0x0000000077250000-0x00000000773DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/1896-168-0x0000000077250000-0x00000000773DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/1896-151-0x0000000077250000-0x00000000773DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/1896-167-0x0000000077250000-0x00000000773DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/1896-166-0x0000000077250000-0x00000000773DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/1896-120-0x0000000077250000-0x00000000773DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/1896-164-0x0000000077250000-0x00000000773DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/1896-163-0x0000000077250000-0x00000000773DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/1896-162-0x0000000077250000-0x00000000773DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/1896-161-0x0000000077250000-0x00000000773DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/1896-160-0x0000000077250000-0x00000000773DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/1896-159-0x0000000077250000-0x00000000773DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/1896-158-0x0000000077250000-0x00000000773DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/1896-157-0x0000000077250000-0x00000000773DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/1896-156-0x0000000077250000-0x00000000773DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/1896-143-0x0000000077250000-0x00000000773DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/1896-155-0x0000000077250000-0x00000000773DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/1896-144-0x0000000077250000-0x00000000773DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/1896-154-0x0000000077250000-0x00000000773DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/1896-153-0x0000000077250000-0x00000000773DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/1896-145-0x0000000077250000-0x00000000773DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/1896-146-0x0000000077250000-0x00000000773DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/1896-152-0x0000000077250000-0x00000000773DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/1896-147-0x0000000077250000-0x00000000773DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2348-373-0x000002346F650000-0x000002346F6C6000-memory.dmp

                                              Filesize

                                              472KB

                                            • memory/2480-287-0x0000000001670000-0x0000000001682000-memory.dmp

                                              Filesize

                                              72KB

                                            • memory/2480-286-0x0000000000E20000-0x0000000000F30000-memory.dmp

                                              Filesize

                                              1.1MB

                                            • memory/2480-288-0x00000000016D0000-0x00000000016DC000-memory.dmp

                                              Filesize

                                              48KB

                                            • memory/2480-289-0x00000000016E0000-0x00000000016EC000-memory.dmp

                                              Filesize

                                              48KB

                                            • memory/2480-290-0x0000000001700000-0x000000000170C000-memory.dmp

                                              Filesize

                                              48KB

                                            • memory/2488-810-0x0000000000D30000-0x0000000000D42000-memory.dmp

                                              Filesize

                                              72KB

                                            • memory/3152-793-0x0000000001100000-0x0000000001112000-memory.dmp

                                              Filesize

                                              72KB

                                            • memory/3408-363-0x000002564F430000-0x000002564F452000-memory.dmp

                                              Filesize

                                              136KB

                                            • memory/3492-696-0x0000000002B20000-0x0000000002B32000-memory.dmp

                                              Filesize

                                              72KB

                                            • memory/3724-771-0x0000000000C60000-0x0000000000C72000-memory.dmp

                                              Filesize

                                              72KB

                                            • memory/3860-804-0x0000000002FF0000-0x0000000003002000-memory.dmp

                                              Filesize

                                              72KB

                                            • memory/4356-185-0x0000000077250000-0x00000000773DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4356-186-0x0000000077250000-0x00000000773DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4404-816-0x0000000000E90000-0x0000000000EA2000-memory.dmp

                                              Filesize

                                              72KB

                                            • memory/5028-777-0x00000000029D0000-0x00000000029E2000-memory.dmp

                                              Filesize

                                              72KB