Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/11/2022, 11:48

General

  • Target

    b905c95976075fc80aff89c53c30cd8b1e3f2127b2f0abf035f266835ca61d67.exe

  • Size

    1.3MB

  • MD5

    8008d370d88b1dae6d5b920560daee35

  • SHA1

    50ad16bab233eaacae99828ecb5ba8ed154e7246

  • SHA256

    b905c95976075fc80aff89c53c30cd8b1e3f2127b2f0abf035f266835ca61d67

  • SHA512

    afd22f7a34f5574dc108bbe6878798c8695fdec902c75622620a3f544d6fd5b19af98da233deaa6e4af4c5d22da877b58a35821310b79ebe7d54c682f0e85896

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Process spawned unexpected child process 12 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 14 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 11 IoCs
  • Checks computer location settings 2 TTPs 13 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Drops file in Program Files directory 5 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 12 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b905c95976075fc80aff89c53c30cd8b1e3f2127b2f0abf035f266835ca61d67.exe
    "C:\Users\Admin\AppData\Local\Temp\b905c95976075fc80aff89c53c30cd8b1e3f2127b2f0abf035f266835ca61d67.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3036
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"
      2⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:4992
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\providercommon\1zu9dW.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2092
        • C:\providercommon\DllCommonsvc.exe
          "C:\providercommon\DllCommonsvc.exe"
          4⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:320
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4252
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Mail\DllCommonsvc.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2348
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Google\Update\Download\spoolsv.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3348
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\ModemLogs\csrss.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3380
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Public\Pictures\dwm.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4848
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Yt7RvnjQdj.bat"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:3172
            • C:\Windows\system32\w32tm.exe
              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
              6⤵
                PID:4568
              • C:\Program Files (x86)\Windows Mail\DllCommonsvc.exe
                "C:\Program Files (x86)\Windows Mail\DllCommonsvc.exe"
                6⤵
                • Executes dropped EXE
                • Checks computer location settings
                • Modifies registry class
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:408
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\oVhzrLBDaJ.bat"
                  7⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1436
                  • C:\Windows\system32\w32tm.exe
                    w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                    8⤵
                      PID:4008
                    • C:\Program Files (x86)\Windows Mail\DllCommonsvc.exe
                      "C:\Program Files (x86)\Windows Mail\DllCommonsvc.exe"
                      8⤵
                      • Executes dropped EXE
                      • Checks computer location settings
                      • Modifies registry class
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:3188
                      • C:\Windows\System32\cmd.exe
                        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\RkPY472Oq9.bat"
                        9⤵
                        • Suspicious use of WriteProcessMemory
                        PID:2068
                        • C:\Windows\system32\w32tm.exe
                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                          10⤵
                            PID:2160
                          • C:\Program Files (x86)\Windows Mail\DllCommonsvc.exe
                            "C:\Program Files (x86)\Windows Mail\DllCommonsvc.exe"
                            10⤵
                            • Executes dropped EXE
                            • Checks computer location settings
                            • Modifies registry class
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of WriteProcessMemory
                            PID:100
                            • C:\Windows\System32\cmd.exe
                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\0LMDaVm4bI.bat"
                              11⤵
                              • Suspicious use of WriteProcessMemory
                              PID:4964
                              • C:\Windows\system32\w32tm.exe
                                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                12⤵
                                  PID:4224
                                • C:\Program Files (x86)\Windows Mail\DllCommonsvc.exe
                                  "C:\Program Files (x86)\Windows Mail\DllCommonsvc.exe"
                                  12⤵
                                  • Executes dropped EXE
                                  • Checks computer location settings
                                  • Modifies registry class
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of WriteProcessMemory
                                  PID:4704
                                  • C:\Windows\System32\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\M1TWCJOn7d.bat"
                                    13⤵
                                    • Suspicious use of WriteProcessMemory
                                    PID:2980
                                    • C:\Windows\system32\w32tm.exe
                                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                      14⤵
                                        PID:2092
                                      • C:\Program Files (x86)\Windows Mail\DllCommonsvc.exe
                                        "C:\Program Files (x86)\Windows Mail\DllCommonsvc.exe"
                                        14⤵
                                        • Executes dropped EXE
                                        • Checks computer location settings
                                        • Modifies registry class
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        • Suspicious use of WriteProcessMemory
                                        PID:3292
                                        • C:\Windows\System32\cmd.exe
                                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\mQXsfud8LV.bat"
                                          15⤵
                                          • Suspicious use of WriteProcessMemory
                                          PID:3816
                                          • C:\Windows\system32\w32tm.exe
                                            w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                            16⤵
                                              PID:5108
                                            • C:\Program Files (x86)\Windows Mail\DllCommonsvc.exe
                                              "C:\Program Files (x86)\Windows Mail\DllCommonsvc.exe"
                                              16⤵
                                              • Executes dropped EXE
                                              • Checks computer location settings
                                              • Modifies registry class
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of AdjustPrivilegeToken
                                              • Suspicious use of WriteProcessMemory
                                              PID:1924
                                              • C:\Windows\System32\cmd.exe
                                                "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\M1TWCJOn7d.bat"
                                                17⤵
                                                • Suspicious use of WriteProcessMemory
                                                PID:4088
                                                • C:\Windows\system32\w32tm.exe
                                                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                  18⤵
                                                    PID:2356
                                                  • C:\Program Files (x86)\Windows Mail\DllCommonsvc.exe
                                                    "C:\Program Files (x86)\Windows Mail\DllCommonsvc.exe"
                                                    18⤵
                                                    • Executes dropped EXE
                                                    • Checks computer location settings
                                                    • Modifies registry class
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    • Suspicious use of WriteProcessMemory
                                                    PID:3948
                                                    • C:\Windows\System32\cmd.exe
                                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Ww6iFNwlpp.bat"
                                                      19⤵
                                                      • Suspicious use of WriteProcessMemory
                                                      PID:1884
                                                      • C:\Windows\system32\w32tm.exe
                                                        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                        20⤵
                                                          PID:3732
                                                        • C:\Program Files (x86)\Windows Mail\DllCommonsvc.exe
                                                          "C:\Program Files (x86)\Windows Mail\DllCommonsvc.exe"
                                                          20⤵
                                                          • Executes dropped EXE
                                                          • Checks computer location settings
                                                          • Modifies registry class
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:4872
                                                          • C:\Windows\System32\cmd.exe
                                                            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\fdSjcfTSOA.bat"
                                                            21⤵
                                                              PID:2116
                                                              • C:\Windows\system32\w32tm.exe
                                                                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                22⤵
                                                                  PID:2136
                                                                • C:\Program Files (x86)\Windows Mail\DllCommonsvc.exe
                                                                  "C:\Program Files (x86)\Windows Mail\DllCommonsvc.exe"
                                                                  22⤵
                                                                  • Executes dropped EXE
                                                                  • Checks computer location settings
                                                                  • Modifies registry class
                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:2416
                                                                  • C:\Windows\System32\cmd.exe
                                                                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\SvvYNrLnHE.bat"
                                                                    23⤵
                                                                      PID:3500
                                                                      • C:\Windows\system32\w32tm.exe
                                                                        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                        24⤵
                                                                          PID:1616
                                                                        • C:\Program Files (x86)\Windows Mail\DllCommonsvc.exe
                                                                          "C:\Program Files (x86)\Windows Mail\DllCommonsvc.exe"
                                                                          24⤵
                                                                          • Executes dropped EXE
                                                                          • Checks computer location settings
                                                                          • Modifies registry class
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:4752
                                                                          • C:\Windows\System32\cmd.exe
                                                                            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\iYTmIkWLiw.bat"
                                                                            25⤵
                                                                              PID:4068
                                                                              • C:\Windows\system32\w32tm.exe
                                                                                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                26⤵
                                                                                  PID:216
                              • C:\Windows\system32\schtasks.exe
                                schtasks.exe /create /tn "DllCommonsvcD" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Mail\DllCommonsvc.exe'" /f
                                1⤵
                                • Process spawned unexpected child process
                                • Creates scheduled task(s)
                                PID:4820
                              • C:\Windows\system32\schtasks.exe
                                schtasks.exe /create /tn "DllCommonsvc" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Mail\DllCommonsvc.exe'" /rl HIGHEST /f
                                1⤵
                                • Process spawned unexpected child process
                                • Creates scheduled task(s)
                                PID:4788
                              • C:\Windows\system32\schtasks.exe
                                schtasks.exe /create /tn "DllCommonsvcD" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Mail\DllCommonsvc.exe'" /rl HIGHEST /f
                                1⤵
                                • Process spawned unexpected child process
                                • Creates scheduled task(s)
                                PID:3748
                              • C:\Windows\system32\schtasks.exe
                                schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Google\Update\Download\spoolsv.exe'" /f
                                1⤵
                                • Process spawned unexpected child process
                                • Creates scheduled task(s)
                                PID:1544
                              • C:\Windows\system32\schtasks.exe
                                schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files (x86)\Google\Update\Download\spoolsv.exe'" /rl HIGHEST /f
                                1⤵
                                • Process spawned unexpected child process
                                • Creates scheduled task(s)
                                PID:2040
                              • C:\Windows\system32\schtasks.exe
                                schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Google\Update\Download\spoolsv.exe'" /rl HIGHEST /f
                                1⤵
                                • Process spawned unexpected child process
                                • Creates scheduled task(s)
                                PID:4876
                              • C:\Windows\system32\schtasks.exe
                                schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\Windows\ModemLogs\csrss.exe'" /f
                                1⤵
                                • Process spawned unexpected child process
                                • Creates scheduled task(s)
                                PID:5080
                              • C:\Windows\system32\schtasks.exe
                                schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\ModemLogs\csrss.exe'" /rl HIGHEST /f
                                1⤵
                                • Process spawned unexpected child process
                                • Creates scheduled task(s)
                                PID:3236
                              • C:\Windows\system32\schtasks.exe
                                schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\Windows\ModemLogs\csrss.exe'" /rl HIGHEST /f
                                1⤵
                                • Process spawned unexpected child process
                                • Creates scheduled task(s)
                                PID:4224
                              • C:\Windows\system32\schtasks.exe
                                schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 6 /tr "'C:\Users\Public\Pictures\dwm.exe'" /f
                                1⤵
                                • Process spawned unexpected child process
                                • Creates scheduled task(s)
                                PID:3996
                              • C:\Windows\system32\schtasks.exe
                                schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Users\Public\Pictures\dwm.exe'" /rl HIGHEST /f
                                1⤵
                                • Process spawned unexpected child process
                                • Creates scheduled task(s)
                                PID:4812
                              • C:\Windows\system32\schtasks.exe
                                schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 7 /tr "'C:\Users\Public\Pictures\dwm.exe'" /rl HIGHEST /f
                                1⤵
                                • Process spawned unexpected child process
                                • Creates scheduled task(s)
                                PID:2376

                              Network

                              MITRE ATT&CK Enterprise v6

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Program Files (x86)\Windows Mail\DllCommonsvc.exe

                                Filesize

                                1.0MB

                                MD5

                                bd31e94b4143c4ce49c17d3af46bcad0

                                SHA1

                                f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                SHA256

                                b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                SHA512

                                f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                              • C:\Program Files (x86)\Windows Mail\DllCommonsvc.exe

                                Filesize

                                1.0MB

                                MD5

                                bd31e94b4143c4ce49c17d3af46bcad0

                                SHA1

                                f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                SHA256

                                b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                SHA512

                                f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                              • C:\Program Files (x86)\Windows Mail\DllCommonsvc.exe

                                Filesize

                                1.0MB

                                MD5

                                bd31e94b4143c4ce49c17d3af46bcad0

                                SHA1

                                f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                SHA256

                                b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                SHA512

                                f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                              • C:\Program Files (x86)\Windows Mail\DllCommonsvc.exe

                                Filesize

                                1.0MB

                                MD5

                                bd31e94b4143c4ce49c17d3af46bcad0

                                SHA1

                                f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                SHA256

                                b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                SHA512

                                f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                              • C:\Program Files (x86)\Windows Mail\DllCommonsvc.exe

                                Filesize

                                1.0MB

                                MD5

                                bd31e94b4143c4ce49c17d3af46bcad0

                                SHA1

                                f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                SHA256

                                b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                SHA512

                                f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                              • C:\Program Files (x86)\Windows Mail\DllCommonsvc.exe

                                Filesize

                                1.0MB

                                MD5

                                bd31e94b4143c4ce49c17d3af46bcad0

                                SHA1

                                f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                SHA256

                                b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                SHA512

                                f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                              • C:\Program Files (x86)\Windows Mail\DllCommonsvc.exe

                                Filesize

                                1.0MB

                                MD5

                                bd31e94b4143c4ce49c17d3af46bcad0

                                SHA1

                                f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                SHA256

                                b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                SHA512

                                f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                              • C:\Program Files (x86)\Windows Mail\DllCommonsvc.exe

                                Filesize

                                1.0MB

                                MD5

                                bd31e94b4143c4ce49c17d3af46bcad0

                                SHA1

                                f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                SHA256

                                b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                SHA512

                                f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                              • C:\Program Files (x86)\Windows Mail\DllCommonsvc.exe

                                Filesize

                                1.0MB

                                MD5

                                bd31e94b4143c4ce49c17d3af46bcad0

                                SHA1

                                f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                SHA256

                                b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                SHA512

                                f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                              • C:\Program Files (x86)\Windows Mail\DllCommonsvc.exe

                                Filesize

                                1.0MB

                                MD5

                                bd31e94b4143c4ce49c17d3af46bcad0

                                SHA1

                                f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                SHA256

                                b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                SHA512

                                f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                              • C:\Program Files (x86)\Windows Mail\DllCommonsvc.exe

                                Filesize

                                1.0MB

                                MD5

                                bd31e94b4143c4ce49c17d3af46bcad0

                                SHA1

                                f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                SHA256

                                b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                SHA512

                                f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\DllCommonsvc.exe.log

                                Filesize

                                1KB

                                MD5

                                7f3c0ae41f0d9ae10a8985a2c327b8fb

                                SHA1

                                d58622bf6b5071beacf3b35bb505bde2000983e3

                                SHA256

                                519fceae4d0dd4d09edd1b81bcdfa8aeab4b59eee77a4cd4b6295ce8e591a900

                                SHA512

                                8a8fd17eef071f86e672cba0d8fc2cfed6118aff816100b9d7c06eb96443c04c04bc5692259c8d7ecb1563e877921939c61726605af4f969e3f586f0913ed125

                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                Filesize

                                2KB

                                MD5

                                d85ba6ff808d9e5444a4b369f5bc2730

                                SHA1

                                31aa9d96590fff6981b315e0b391b575e4c0804a

                                SHA256

                                84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                SHA512

                                8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                Filesize

                                944B

                                MD5

                                e243a38635ff9a06c87c2a61a2200656

                                SHA1

                                ecd95ed5bf1a9fbe96a8448fc2814a0210fa2afc

                                SHA256

                                af5782703f3f2d5a29fb313dae6680a64134db26064d4a321a3f23b75f6ca00f

                                SHA512

                                4418957a1b10eee44cf270c81816ae707352411c4f5ac14b6b61ab537c91480e24e0a0a2c276a6291081b4984c123cf673a45dcedb0ceeef682054ba0fc19cb4

                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                Filesize

                                944B

                                MD5

                                e243a38635ff9a06c87c2a61a2200656

                                SHA1

                                ecd95ed5bf1a9fbe96a8448fc2814a0210fa2afc

                                SHA256

                                af5782703f3f2d5a29fb313dae6680a64134db26064d4a321a3f23b75f6ca00f

                                SHA512

                                4418957a1b10eee44cf270c81816ae707352411c4f5ac14b6b61ab537c91480e24e0a0a2c276a6291081b4984c123cf673a45dcedb0ceeef682054ba0fc19cb4

                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                Filesize

                                944B

                                MD5

                                59d97011e091004eaffb9816aa0b9abd

                                SHA1

                                1602a56b01dd4b7c577ca27d3117e4bcc1aa657b

                                SHA256

                                18f381e0db020a763b8c515c346ef58679ab9c403267eacfef5359e272f7e71d

                                SHA512

                                d9ca49c1a17580981e2c1a50d73c0eecaa7a62f8514741512172e395af2a3d80aeb0f71c58bc7f52c18246d57ba67af09b6bff4776877d6cc6f0245c30e092d6

                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                Filesize

                                944B

                                MD5

                                3a6bad9528f8e23fb5c77fbd81fa28e8

                                SHA1

                                f127317c3bc6407f536c0f0600dcbcf1aabfba36

                                SHA256

                                986366767de5873f1b170a63f2a33ce05132d1afd90c8f5017afbca8ef1beb05

                                SHA512

                                846002154a0ece6f3e9feda6f115d3161dc21b3789525dd62ae1d9188495171293efdbe7be4710666dd8a15e66b557315b5a02918a741ed1d5f3ff0c515b98e2

                              • C:\Users\Admin\AppData\Local\Temp\0LMDaVm4bI.bat

                                Filesize

                                217B

                                MD5

                                7c7b6aeeb0d89ee4727cbb343b2e3b76

                                SHA1

                                9e92f5ca631f7dbe058a51291f09d24beb3aa082

                                SHA256

                                660f76fe59f69db84bcace72e938ca9da6c9cadd73547a1de1564f5e7c189c8e

                                SHA512

                                b99428b5429d16e56f00c9668ffd303e52eaae8ce9bf3493532ff79f30ebbe54c636476f560a1a502a2e95f60fc73503b82ee6ff06f8c81cee68926cf43dadb2

                              • C:\Users\Admin\AppData\Local\Temp\M1TWCJOn7d.bat

                                Filesize

                                217B

                                MD5

                                dd600962aed5746ef482701aba7561be

                                SHA1

                                8c30ec7f9cebcfc82f10721dfb248a99f93e0388

                                SHA256

                                d4c7b17a0740328ffe57c760f9d9bbea9f1130d9dfb293aa01eeecbc2b2ed668

                                SHA512

                                721aea95aeac0458d7bddaf5ba1e3bca838df8e71fafceaa5acb4b581ea88a241c8203ecdfc51990e4725e3d7f6bd06e8ae0cf2020636ac8413fd82ef2555540

                              • C:\Users\Admin\AppData\Local\Temp\M1TWCJOn7d.bat

                                Filesize

                                217B

                                MD5

                                dd600962aed5746ef482701aba7561be

                                SHA1

                                8c30ec7f9cebcfc82f10721dfb248a99f93e0388

                                SHA256

                                d4c7b17a0740328ffe57c760f9d9bbea9f1130d9dfb293aa01eeecbc2b2ed668

                                SHA512

                                721aea95aeac0458d7bddaf5ba1e3bca838df8e71fafceaa5acb4b581ea88a241c8203ecdfc51990e4725e3d7f6bd06e8ae0cf2020636ac8413fd82ef2555540

                              • C:\Users\Admin\AppData\Local\Temp\RkPY472Oq9.bat

                                Filesize

                                217B

                                MD5

                                454112e6f4ac1883e63a42e3121c5fa8

                                SHA1

                                8071cee89c73c06e6274f6d67e470178aa123585

                                SHA256

                                36b4299775fe937dca895ca9cd9ba39f33974823933a44efeb7abc8156182bc1

                                SHA512

                                1933892c2326107c952be6d6e7af91a3564fbeb1102f2075426a35b81d64e7026cd9749f43748d931db1cd310ac112ea45b7d6b8e799fd458fa19213117891c8

                              • C:\Users\Admin\AppData\Local\Temp\SvvYNrLnHE.bat

                                Filesize

                                217B

                                MD5

                                68b5f8600ed0dc984fac01679b87a8aa

                                SHA1

                                562669d8dd1c5f46ba8300da9030c21899b4df6f

                                SHA256

                                dad6908e498d4c60f9e180faad0ce06f7a6dd445e052b028dd22d7a707998499

                                SHA512

                                25a689fa4357551b9e313e55646f07f642ad1b2590d4ddf64feab1e8dc7ffa176d78b312def3545c6b513f33abd2d2f9aa7b6abcd378ba8cbc45307a8edff631

                              • C:\Users\Admin\AppData\Local\Temp\Ww6iFNwlpp.bat

                                Filesize

                                217B

                                MD5

                                09eab5be846e6246fcc469c67480fbd6

                                SHA1

                                4246c86454c7bc6c75cdab4e30ce0bd1ea4fb410

                                SHA256

                                34eee62ffd3c0ec534fa0ad2133b9f4d4c9a92643e04712c1662550b632d4a8a

                                SHA512

                                c23820f86e072f58dc598d09ea5c6ab2f674f60f8a891d037aa58945e478f93b5a7aecccaf6947e4063158d299061298da73b09ff6bd0b3e88f0321d1def612b

                              • C:\Users\Admin\AppData\Local\Temp\Yt7RvnjQdj.bat

                                Filesize

                                217B

                                MD5

                                b57cddf47bfa7daa6a6dd0d81d184128

                                SHA1

                                7e256232c1d15162860c82aeb86eccfabcbe14a6

                                SHA256

                                493a045eb0dcc4c7b4ccd5d5375bf322ae4d9d0292923a6973e49b9c53ada287

                                SHA512

                                a6b152deeb8f0eea978e361009a9f4ea0983087097124071ddee513613cf9605dd89f79bfb59823a51264d7f36734c8ec9d9db6bf4e66fe40c261a922636b7f9

                              • C:\Users\Admin\AppData\Local\Temp\fdSjcfTSOA.bat

                                Filesize

                                217B

                                MD5

                                c1f3d0c393f0559b7394a831a7af2463

                                SHA1

                                91d4526430da5068ebff76aed53d4decef0fc80e

                                SHA256

                                5abf361d50956f5a8706e08456ecac24b8fb9cacc37e5c395c4a76a26015d911

                                SHA512

                                d0c4feb0592957a9e3707878247111bf2b614c9b1909702f40b7c554d89faadd1ff39e19f8e51c27619d2ff1f490eeff76e66bac058d052be1b005ef35afce5f

                              • C:\Users\Admin\AppData\Local\Temp\iYTmIkWLiw.bat

                                Filesize

                                217B

                                MD5

                                6f8783205bbcf7d12cb14f16ef9e496b

                                SHA1

                                77c91a7b454883eab64d194e41f9bd79da6bf4e3

                                SHA256

                                0643c99c936fbf9a3720e2067cf284c58d02ef47ce3156833975ffbcbb1b3a59

                                SHA512

                                cc2e7dc08e380c3caf5aa72f56813d07144364e79f5af0b56b28d1b70ba467b35a5410094fe27f12b281b0fc5d669b712807f47966e7050e4a7a876cb1c80b84

                              • C:\Users\Admin\AppData\Local\Temp\mQXsfud8LV.bat

                                Filesize

                                217B

                                MD5

                                a6f688ea7bd3d8dc056a8d8a16af10bf

                                SHA1

                                4280a502e9f088215f1f27ca6722d12968527a01

                                SHA256

                                533137cb449e12170e68ffd4b2c8e14941571b82d9903f043dc843e049cc2a06

                                SHA512

                                fe6f8b2b57e33ad45bc160602f2576a8e24c130c804e558cb1450fc93c8160a600c87c9a62089b8b7f1ff98f2a6a53d482e06ad41f97427bb588bd047435351d

                              • C:\Users\Admin\AppData\Local\Temp\oVhzrLBDaJ.bat

                                Filesize

                                217B

                                MD5

                                f75eb1ab21210dcd8bab26cc871b6248

                                SHA1

                                47f307d88942b991574556b35065650b912d006e

                                SHA256

                                4010ae0940a3398eecb8d95644934c4cf1e895ca3402d048b65aa38e1e77b881

                                SHA512

                                7e61fe1814bd9b1c8dad0eb30b92d0442c2ed798acb72ac2c1d811b98c431c70ef436ea867dc483587acbd4e9ba3ed343d862209165c08f37ef4176cb9fa49f8

                              • C:\providercommon\1zu9dW.bat

                                Filesize

                                36B

                                MD5

                                6783c3ee07c7d151ceac57f1f9c8bed7

                                SHA1

                                17468f98f95bf504cc1f83c49e49a78526b3ea03

                                SHA256

                                8ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322

                                SHA512

                                c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8

                              • C:\providercommon\DllCommonsvc.exe

                                Filesize

                                1.0MB

                                MD5

                                bd31e94b4143c4ce49c17d3af46bcad0

                                SHA1

                                f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                SHA256

                                b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                SHA512

                                f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                              • C:\providercommon\DllCommonsvc.exe

                                Filesize

                                1.0MB

                                MD5

                                bd31e94b4143c4ce49c17d3af46bcad0

                                SHA1

                                f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                SHA256

                                b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                SHA512

                                f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                              • C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe

                                Filesize

                                197B

                                MD5

                                8088241160261560a02c84025d107592

                                SHA1

                                083121f7027557570994c9fc211df61730455bb5

                                SHA256

                                2072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1

                                SHA512

                                20d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478

                              • memory/100-184-0x00007FFDDFE90000-0x00007FFDE0951000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/100-188-0x00007FFDDFE90000-0x00007FFDE0951000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/320-149-0x00007FFDDFE90000-0x00007FFDE0951000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/320-140-0x00007FFDDFE90000-0x00007FFDE0951000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/320-139-0x0000000000980000-0x0000000000A90000-memory.dmp

                                Filesize

                                1.1MB

                              • memory/408-170-0x00007FFDDFDD0000-0x00007FFDE0891000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/408-174-0x00007FFDDFDD0000-0x00007FFDE0891000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/1924-209-0x00007FFDDFE90000-0x00007FFDE0951000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/1924-205-0x00007FFDDFE90000-0x00007FFDE0951000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/2348-148-0x00000212BA840000-0x00000212BA862000-memory.dmp

                                Filesize

                                136KB

                              • memory/2348-151-0x00007FFDDFE90000-0x00007FFDE0951000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/2348-162-0x00007FFDDFE90000-0x00007FFDE0951000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/2416-226-0x00007FFDDFE90000-0x00007FFDE0951000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/2416-230-0x00007FFDDFE90000-0x00007FFDE0951000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/3188-181-0x00007FFDDFE90000-0x00007FFDE0951000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/3188-177-0x00007FFDDFE90000-0x00007FFDE0951000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/3292-198-0x00007FFDDFE90000-0x00007FFDE0951000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/3292-202-0x00007FFDDFE90000-0x00007FFDE0951000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/3348-146-0x00007FFDDFE90000-0x00007FFDE0951000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/3348-160-0x00007FFDDFE90000-0x00007FFDE0951000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/3380-152-0x00007FFDDFE90000-0x00007FFDE0951000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/3380-163-0x00007FFDDFE90000-0x00007FFDE0951000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/3948-212-0x00007FFDDFE90000-0x00007FFDE0951000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/3948-216-0x00007FFDDFE90000-0x00007FFDE0951000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/4252-155-0x00007FFDDFE90000-0x00007FFDE0951000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/4252-165-0x00007FFDDFE90000-0x00007FFDE0951000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/4704-195-0x00007FFDDFE90000-0x00007FFDE0951000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/4704-191-0x00007FFDDFE90000-0x00007FFDE0951000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/4752-233-0x00007FFDDFE90000-0x00007FFDE0951000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/4752-237-0x00007FFDDFE90000-0x00007FFDE0951000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/4848-158-0x00007FFDDFE90000-0x00007FFDE0951000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/4848-154-0x00007FFDDFE90000-0x00007FFDE0951000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/4872-223-0x00007FFDDFE90000-0x00007FFDE0951000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/4872-219-0x00007FFDDFE90000-0x00007FFDE0951000-memory.dmp

                                Filesize

                                10.8MB