Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    141s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    02/11/2022, 15:38

General

  • Target

    b0e9d98bed7f4f8aac340222599bbb526a55e38ddd3f5ed4b7947c9be5fd4037.exe

  • Size

    1.3MB

  • MD5

    56d52e51566e7807801c5bdfae7f064b

  • SHA1

    3d897f8b78f03d472e4a04a4e56c9f37492c812d

  • SHA256

    b0e9d98bed7f4f8aac340222599bbb526a55e38ddd3f5ed4b7947c9be5fd4037

  • SHA512

    a9ac32eb0b303a59fe6814869238e55d01f178a9094b356f7765801a6b0cdab13ee8db5aefbbe1990ac62a008c8d6a362328f0e9e337720d4eb463cf22991746

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Process spawned unexpected child process 30 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 18 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 15 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Drops file in Program Files directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 30 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 14 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b0e9d98bed7f4f8aac340222599bbb526a55e38ddd3f5ed4b7947c9be5fd4037.exe
    "C:\Users\Admin\AppData\Local\Temp\b0e9d98bed7f4f8aac340222599bbb526a55e38ddd3f5ed4b7947c9be5fd4037.exe"
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2672
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4588
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\providercommon\1zu9dW.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2160
        • C:\providercommon\DllCommonsvc.exe
          "C:\providercommon\DllCommonsvc.exe"
          4⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4852
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:520
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Mail\en-US\dllhost.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:600
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default User\sihost.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:688
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\dwm.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1432
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Public\Desktop\taskhostw.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1820
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\RuntimeBroker.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1904
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\services.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:508
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\odt\dllhost.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2292
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\All Users\Microsoft\Windows Defender Advanced Threat Protection\fontdrvhost.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1788
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\sppsvc.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:196
          • C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\DllCommonsvc.exe
            "C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\DllCommonsvc.exe"
            5⤵
            • Executes dropped EXE
            • Modifies registry class
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2812
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\1JZ2DT5CuV.bat"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:4780
              • C:\Windows\system32\w32tm.exe
                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                7⤵
                  PID:4136
                • C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\DllCommonsvc.exe
                  "C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\DllCommonsvc.exe"
                  7⤵
                  • Executes dropped EXE
                  • Modifies registry class
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:1912
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Xnyek1SZun.bat"
                    8⤵
                    • Suspicious use of WriteProcessMemory
                    PID:4820
                    • C:\Windows\system32\w32tm.exe
                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                      9⤵
                        PID:4120
                      • C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\DllCommonsvc.exe
                        "C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\DllCommonsvc.exe"
                        9⤵
                        • Executes dropped EXE
                        • Modifies registry class
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of WriteProcessMemory
                        PID:2344
                        • C:\Windows\System32\cmd.exe
                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\7FnFm4j3ls.bat"
                          10⤵
                          • Suspicious use of WriteProcessMemory
                          PID:4692
                          • C:\Windows\system32\w32tm.exe
                            w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                            11⤵
                              PID:3364
                            • C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\DllCommonsvc.exe
                              "C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\DllCommonsvc.exe"
                              11⤵
                              • Executes dropped EXE
                              • Modifies registry class
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of WriteProcessMemory
                              PID:4716
                              • C:\Windows\System32\cmd.exe
                                "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\3Fb5uY85DH.bat"
                                12⤵
                                • Suspicious use of WriteProcessMemory
                                PID:5084
                                • C:\Windows\system32\w32tm.exe
                                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                  13⤵
                                    PID:3812
                                  • C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\DllCommonsvc.exe
                                    "C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\DllCommonsvc.exe"
                                    13⤵
                                    • Executes dropped EXE
                                    • Modifies registry class
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of WriteProcessMemory
                                    PID:4996
                                    • C:\Windows\System32\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Ww6iFNwlpp.bat"
                                      14⤵
                                      • Suspicious use of WriteProcessMemory
                                      PID:4208
                                      • C:\Windows\system32\w32tm.exe
                                        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                        15⤵
                                          PID:600
                                        • C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\DllCommonsvc.exe
                                          "C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\DllCommonsvc.exe"
                                          15⤵
                                          • Executes dropped EXE
                                          • Modifies registry class
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of WriteProcessMemory
                                          PID:1944
                                          • C:\Windows\System32\cmd.exe
                                            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\0Sh6ipYOoX.bat"
                                            16⤵
                                              PID:4164
                                              • C:\Windows\system32\w32tm.exe
                                                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                17⤵
                                                  PID:4448
                                                • C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\DllCommonsvc.exe
                                                  "C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\DllCommonsvc.exe"
                                                  17⤵
                                                  • Executes dropped EXE
                                                  • Modifies registry class
                                                  PID:4072
                                                  • C:\Windows\System32\cmd.exe
                                                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\6VGBOjzZtA.bat"
                                                    18⤵
                                                      PID:4116
                                                      • C:\Windows\system32\w32tm.exe
                                                        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                        19⤵
                                                          PID:2164
                                                        • C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\DllCommonsvc.exe
                                                          "C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\DllCommonsvc.exe"
                                                          19⤵
                                                          • Executes dropped EXE
                                                          • Modifies registry class
                                                          PID:1680
                                                          • C:\Windows\System32\cmd.exe
                                                            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\PoOVO2yVWN.bat"
                                                            20⤵
                                                              PID:3936
                                                              • C:\Windows\system32\w32tm.exe
                                                                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                21⤵
                                                                  PID:4556
                                                                • C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\DllCommonsvc.exe
                                                                  "C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\DllCommonsvc.exe"
                                                                  21⤵
                                                                  • Executes dropped EXE
                                                                  • Modifies registry class
                                                                  PID:4544
                                                                  • C:\Windows\System32\cmd.exe
                                                                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\wLA3izB53h.bat"
                                                                    22⤵
                                                                      PID:1872
                                                                      • C:\Windows\system32\w32tm.exe
                                                                        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                        23⤵
                                                                          PID:752
                                                                        • C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\DllCommonsvc.exe
                                                                          "C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\DllCommonsvc.exe"
                                                                          23⤵
                                                                          • Executes dropped EXE
                                                                          • Modifies registry class
                                                                          PID:508
                                                                          • C:\Windows\System32\cmd.exe
                                                                            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\D9EGxcg3vT.bat"
                                                                            24⤵
                                                                              PID:4888
                                                                              • C:\Windows\system32\w32tm.exe
                                                                                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                25⤵
                                                                                  PID:4240
                                                                                • C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\DllCommonsvc.exe
                                                                                  "C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\DllCommonsvc.exe"
                                                                                  25⤵
                                                                                  • Executes dropped EXE
                                                                                  • Modifies registry class
                                                                                  PID:3308
                                                                                  • C:\Windows\System32\cmd.exe
                                                                                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\MsMShxucCb.bat"
                                                                                    26⤵
                                                                                      PID:4980
                                                                                      • C:\Windows\system32\w32tm.exe
                                                                                        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                        27⤵
                                                                                          PID:4480
                                                                                        • C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\DllCommonsvc.exe
                                                                                          "C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\DllCommonsvc.exe"
                                                                                          27⤵
                                                                                          • Executes dropped EXE
                                                                                          • Modifies registry class
                                                                                          PID:2564
                                                                                          • C:\Windows\System32\cmd.exe
                                                                                            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\sT6xLp4JQ8.bat"
                                                                                            28⤵
                                                                                              PID:2516
                                                                                              • C:\Windows\system32\w32tm.exe
                                                                                                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                                29⤵
                                                                                                  PID:3620
                                                                                                • C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\DllCommonsvc.exe
                                                                                                  "C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\DllCommonsvc.exe"
                                                                                                  29⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Modifies registry class
                                                                                                  PID:928
                                                                                                  • C:\Windows\System32\cmd.exe
                                                                                                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\I1IMKnnpZ2.bat"
                                                                                                    30⤵
                                                                                                      PID:1664
                                                                                                      • C:\Windows\system32\w32tm.exe
                                                                                                        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                                        31⤵
                                                                                                          PID:4508
                                                                                                        • C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\DllCommonsvc.exe
                                                                                                          "C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\DllCommonsvc.exe"
                                                                                                          31⤵
                                                                                                          • Executes dropped EXE
                                                                                                          PID:1292
                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\DllCommonsvc.exe'
                                                      5⤵
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:3424
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 7 /tr "'C:\Program Files\Windows Mail\en-US\dllhost.exe'" /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Creates scheduled task(s)
                                              PID:5020
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files\Windows Mail\en-US\dllhost.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Creates scheduled task(s)
                                              PID:4280
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Mail\en-US\dllhost.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Creates scheduled task(s)
                                              PID:3160
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "sihosts" /sc MINUTE /mo 13 /tr "'C:\Users\Default User\sihost.exe'" /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Creates scheduled task(s)
                                              PID:4716
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Users\Default User\sihost.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Creates scheduled task(s)
                                              PID:4744
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "sihosts" /sc MINUTE /mo 5 /tr "'C:\Users\Default User\sihost.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Creates scheduled task(s)
                                              PID:4508
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\dwm.exe'" /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Creates scheduled task(s)
                                              PID:4476
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\dwm.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Creates scheduled task(s)
                                              PID:3768
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\dwm.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Creates scheduled task(s)
                                              PID:4512
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 13 /tr "'C:\Users\Public\Desktop\taskhostw.exe'" /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Creates scheduled task(s)
                                              PID:5040
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Users\Public\Desktop\taskhostw.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Creates scheduled task(s)
                                              PID:4676
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 7 /tr "'C:\Users\Public\Desktop\taskhostw.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Creates scheduled task(s)
                                              PID:4988
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 11 /tr "'C:\providercommon\RuntimeBroker.exe'" /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Creates scheduled task(s)
                                              PID:4968
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\providercommon\RuntimeBroker.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Creates scheduled task(s)
                                              PID:5064
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\providercommon\RuntimeBroker.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Creates scheduled task(s)
                                              PID:4868
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "servicess" /sc MINUTE /mo 9 /tr "'C:\providercommon\services.exe'" /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Creates scheduled task(s)
                                              PID:4912
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\providercommon\services.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Creates scheduled task(s)
                                              PID:4916
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "servicess" /sc MINUTE /mo 7 /tr "'C:\providercommon\services.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Creates scheduled task(s)
                                              PID:4960
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "DllCommonsvcD" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\DllCommonsvc.exe'" /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Creates scheduled task(s)
                                              PID:5048
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "DllCommonsvc" /sc ONLOGON /tr "'C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\DllCommonsvc.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Creates scheduled task(s)
                                              PID:5104
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "DllCommonsvcD" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\DllCommonsvc.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Creates scheduled task(s)
                                              PID:5100
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 8 /tr "'C:\providercommon\sppsvc.exe'" /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Creates scheduled task(s)
                                              PID:4304
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\providercommon\sppsvc.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Creates scheduled task(s)
                                              PID:3116
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 14 /tr "'C:\providercommon\sppsvc.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Creates scheduled task(s)
                                              PID:4936
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 13 /tr "'C:\odt\dllhost.exe'" /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Creates scheduled task(s)
                                              PID:3156
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\odt\dllhost.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Creates scheduled task(s)
                                              PID:3096
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 8 /tr "'C:\odt\dllhost.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Creates scheduled task(s)
                                              PID:3328
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 7 /tr "'C:\Users\All Users\Microsoft\Windows Defender Advanced Threat Protection\fontdrvhost.exe'" /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Creates scheduled task(s)
                                              PID:3508
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Users\All Users\Microsoft\Windows Defender Advanced Threat Protection\fontdrvhost.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Creates scheduled task(s)
                                              PID:4708
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 11 /tr "'C:\Users\All Users\Microsoft\Windows Defender Advanced Threat Protection\fontdrvhost.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Creates scheduled task(s)
                                              PID:784

                                            Network

                                            MITRE ATT&CK Enterprise v6

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\DllCommonsvc.exe

                                              Filesize

                                              1.0MB

                                              MD5

                                              bd31e94b4143c4ce49c17d3af46bcad0

                                              SHA1

                                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                              SHA256

                                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                              SHA512

                                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                            • C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\DllCommonsvc.exe

                                              Filesize

                                              1.0MB

                                              MD5

                                              bd31e94b4143c4ce49c17d3af46bcad0

                                              SHA1

                                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                              SHA256

                                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                              SHA512

                                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                            • C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\DllCommonsvc.exe

                                              Filesize

                                              1.0MB

                                              MD5

                                              bd31e94b4143c4ce49c17d3af46bcad0

                                              SHA1

                                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                              SHA256

                                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                              SHA512

                                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                            • C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\DllCommonsvc.exe

                                              Filesize

                                              1.0MB

                                              MD5

                                              bd31e94b4143c4ce49c17d3af46bcad0

                                              SHA1

                                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                              SHA256

                                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                              SHA512

                                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                            • C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\DllCommonsvc.exe

                                              Filesize

                                              1.0MB

                                              MD5

                                              bd31e94b4143c4ce49c17d3af46bcad0

                                              SHA1

                                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                              SHA256

                                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                              SHA512

                                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                            • C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\DllCommonsvc.exe

                                              Filesize

                                              1.0MB

                                              MD5

                                              bd31e94b4143c4ce49c17d3af46bcad0

                                              SHA1

                                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                              SHA256

                                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                              SHA512

                                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                            • C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\DllCommonsvc.exe

                                              Filesize

                                              1.0MB

                                              MD5

                                              bd31e94b4143c4ce49c17d3af46bcad0

                                              SHA1

                                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                              SHA256

                                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                              SHA512

                                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                            • C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\DllCommonsvc.exe

                                              Filesize

                                              1.0MB

                                              MD5

                                              bd31e94b4143c4ce49c17d3af46bcad0

                                              SHA1

                                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                              SHA256

                                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                              SHA512

                                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                            • C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\DllCommonsvc.exe

                                              Filesize

                                              1.0MB

                                              MD5

                                              bd31e94b4143c4ce49c17d3af46bcad0

                                              SHA1

                                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                              SHA256

                                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                              SHA512

                                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                            • C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\DllCommonsvc.exe

                                              Filesize

                                              1.0MB

                                              MD5

                                              bd31e94b4143c4ce49c17d3af46bcad0

                                              SHA1

                                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                              SHA256

                                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                              SHA512

                                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                            • C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\DllCommonsvc.exe

                                              Filesize

                                              1.0MB

                                              MD5

                                              bd31e94b4143c4ce49c17d3af46bcad0

                                              SHA1

                                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                              SHA256

                                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                              SHA512

                                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                            • C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\DllCommonsvc.exe

                                              Filesize

                                              1.0MB

                                              MD5

                                              bd31e94b4143c4ce49c17d3af46bcad0

                                              SHA1

                                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                              SHA256

                                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                              SHA512

                                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                            • C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\DllCommonsvc.exe

                                              Filesize

                                              1.0MB

                                              MD5

                                              bd31e94b4143c4ce49c17d3af46bcad0

                                              SHA1

                                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                              SHA256

                                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                              SHA512

                                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                            • C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\DllCommonsvc.exe

                                              Filesize

                                              1.0MB

                                              MD5

                                              bd31e94b4143c4ce49c17d3af46bcad0

                                              SHA1

                                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                              SHA256

                                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                              SHA512

                                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                            • C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\DllCommonsvc.exe

                                              Filesize

                                              1.0MB

                                              MD5

                                              bd31e94b4143c4ce49c17d3af46bcad0

                                              SHA1

                                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                              SHA256

                                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                              SHA512

                                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\DllCommonsvc.exe.log

                                              Filesize

                                              1KB

                                              MD5

                                              b4268d8ae66fdd920476b97a1776bf85

                                              SHA1

                                              f920de54f7467f0970eccc053d3c6c8dd181d49a

                                              SHA256

                                              61d17affcc8d91ecb1858e710c455186f9d0ccfc4d8ae17a1145d87bc7317879

                                              SHA512

                                              03b6b90641837f9efb6065698602220d6c5ad263d51d7b7714747c2a3c3c618bd3d94add206b034d6fa2b8e43cbd1ac4a1741cfa1c2b1c1fc8589ae0b0c89516

                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                              Filesize

                                              3KB

                                              MD5

                                              ad5cd538ca58cb28ede39c108acb5785

                                              SHA1

                                              1ae910026f3dbe90ed025e9e96ead2b5399be877

                                              SHA256

                                              c9e6cb04d6c893458d5a7e12eb575cf97c3172f5e312b1f63a667cbbc5f0c033

                                              SHA512

                                              c066c5d9b276a68fa636647bb29aea05bfa2292217bc77f5324d9c1d93117772ee8277e1f7cff91ec8d6b7c05ca078f929cecfdbb09582522a9067f54740af13

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                              Filesize

                                              1KB

                                              MD5

                                              ddc4b761ab37538f567dad4fae73d0da

                                              SHA1

                                              29502c980623baceb9778203d7fa1cfd5dde6b9b

                                              SHA256

                                              cc3fdf4e38f129ff82444e0a530dd32a88dfbe135cb6c4397db12a0dca9c59d6

                                              SHA512

                                              717832d1474d9cf0d3172834d6d86b52c82bb2e5eb9d68ab680df6a2b8ede7c40d5c68cdae77cf88dc04ce402ecd92ea6a2bce518dae4d980b7b423825470538

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                              Filesize

                                              1KB

                                              MD5

                                              cd450dff6b2e29d70ce437398c989fa1

                                              SHA1

                                              073a5bbeb6e36e8adc436a91d4cc25fb36e891f7

                                              SHA256

                                              dc07f623cf88b1dcfb40852878d12778aecda356734d03232ac74adf8071a3db

                                              SHA512

                                              a57f881ef5b5432e5c059346966786f877f8ee16fcbc261e570dc6e9ed5c29d0c749bd134596cb714a1f97e824c3c4d05664f3a5dcbcdd87ca27ead13e510425

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                              Filesize

                                              1KB

                                              MD5

                                              12fdb29386a611fc1a96a3f180eadb2a

                                              SHA1

                                              b45679c443fd525f861a43cbcb1f26afb91de19e

                                              SHA256

                                              69faabad8f196a89338508a3c83570575e66b7ab5aaa8b9f00160b6b1a6ae7ac

                                              SHA512

                                              891b1775b5fd10c8a2425bfb6d1d8897316b4a105bb3d3643b872afc8970e936a9f82e011c3f2202bc099214df50d1aaace6fe241e052f168daf95b5d72c830e

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                              Filesize

                                              1KB

                                              MD5

                                              45c7630d5106bb40c8343df46e687ba9

                                              SHA1

                                              d77f95e1cf96ad57459c48ad9d8b07a89187f379

                                              SHA256

                                              45e4a08754efaa48b904f9dbed37a4362d2e5f46c97b497adccbb757b304471b

                                              SHA512

                                              fa89133513576908db89156bf0918a77b175ac379874d91e79537eb99d99616724ab0fbe3e31ca7a3615b2482ea28f197714bbf40ab52f14f0013454fe095a4d

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                              Filesize

                                              1KB

                                              MD5

                                              1a2e152a297063366af7a7c8e00a5774

                                              SHA1

                                              47c6a8a164c6cd5fffcd0a50940e092e8f39c4a2

                                              SHA256

                                              f87521bc0ac465f82de11b391e2407a058d1956b69c630eda8f87945def437e7

                                              SHA512

                                              07a88e3b8ddc5a667674a2db167cd31e3e72f124e80a16c95ad8010d8ebfb628bbd6dabadc7576e4f33d44b797d749fbe99d7a1dcf2a4444336610363edcbc2a

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                              Filesize

                                              1KB

                                              MD5

                                              1a2e152a297063366af7a7c8e00a5774

                                              SHA1

                                              47c6a8a164c6cd5fffcd0a50940e092e8f39c4a2

                                              SHA256

                                              f87521bc0ac465f82de11b391e2407a058d1956b69c630eda8f87945def437e7

                                              SHA512

                                              07a88e3b8ddc5a667674a2db167cd31e3e72f124e80a16c95ad8010d8ebfb628bbd6dabadc7576e4f33d44b797d749fbe99d7a1dcf2a4444336610363edcbc2a

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                              Filesize

                                              1KB

                                              MD5

                                              1a2e152a297063366af7a7c8e00a5774

                                              SHA1

                                              47c6a8a164c6cd5fffcd0a50940e092e8f39c4a2

                                              SHA256

                                              f87521bc0ac465f82de11b391e2407a058d1956b69c630eda8f87945def437e7

                                              SHA512

                                              07a88e3b8ddc5a667674a2db167cd31e3e72f124e80a16c95ad8010d8ebfb628bbd6dabadc7576e4f33d44b797d749fbe99d7a1dcf2a4444336610363edcbc2a

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                              Filesize

                                              1KB

                                              MD5

                                              9dc92dcb9daf1a7ad5ed6a4d552a1ac5

                                              SHA1

                                              2b9e6c2ac924a1dd76fae1e0d95dfbf71d0f24d5

                                              SHA256

                                              050d8f2d0a1d164c9a1a100923c5e14c33ce211da52b33dc18b344a4fa4f71bf

                                              SHA512

                                              11c70275e0801cc9ef3df8ed66e26c827a2670597b57c9ceda669272217812fe402da9d9602da2d64a3563c2f1c73629b7d6f21d561db0be0ac5886bad1eeba1

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                              Filesize

                                              1KB

                                              MD5

                                              9dc92dcb9daf1a7ad5ed6a4d552a1ac5

                                              SHA1

                                              2b9e6c2ac924a1dd76fae1e0d95dfbf71d0f24d5

                                              SHA256

                                              050d8f2d0a1d164c9a1a100923c5e14c33ce211da52b33dc18b344a4fa4f71bf

                                              SHA512

                                              11c70275e0801cc9ef3df8ed66e26c827a2670597b57c9ceda669272217812fe402da9d9602da2d64a3563c2f1c73629b7d6f21d561db0be0ac5886bad1eeba1

                                            • C:\Users\Admin\AppData\Local\Temp\0Sh6ipYOoX.bat

                                              Filesize

                                              238B

                                              MD5

                                              749e5411481b630260eb1a8ac46b8a18

                                              SHA1

                                              25801b5670ed94c3682fa93c04613737520bd0eb

                                              SHA256

                                              8d7f6144d3865ea4d2355a7e5ed7a6965c666d63f417ec8a9c0b6c94d6428590

                                              SHA512

                                              dd57b7813fa228fb4d483778fc58b10812d2fb3917ebb12e92bdd3a5be38af317a4c8b832141540d71576fc7d8ee4840d2952a92a9a0361cb270a5bbfe7130f0

                                            • C:\Users\Admin\AppData\Local\Temp\1JZ2DT5CuV.bat

                                              Filesize

                                              238B

                                              MD5

                                              1a496d8aa1c3499413765ecf6bb6aa33

                                              SHA1

                                              20306e100745233a6bd91627e3dad50cfc40d66f

                                              SHA256

                                              2c84fc64b8508852bbdddc1f038065cdfe0589de7ec5628d2acf99e6e370aa93

                                              SHA512

                                              120749ae62b907bf486f827c7623074f482b6db2638db4fe51490b139e2eeceda1e518027f788b720a54036e953eba8040d4fb420e13197c9817f21221548a4f

                                            • C:\Users\Admin\AppData\Local\Temp\3Fb5uY85DH.bat

                                              Filesize

                                              238B

                                              MD5

                                              88606e8bd875bd20a5ebd0856968bf17

                                              SHA1

                                              c6247306ed63fffecb6b8e94ea5a66072e0f8866

                                              SHA256

                                              3964ad0d30a3048c9232022cf2f8c20c5d822e3686b48a10dfe1430dd0c57670

                                              SHA512

                                              78df3d65f965f665a5a200a52c482114d1124dba38a44c6cc47dbd0991505641798c41f7c8bf3343d988bb1b99d07812b4806358f826d5a1a5c37f17a511b993

                                            • C:\Users\Admin\AppData\Local\Temp\6VGBOjzZtA.bat

                                              Filesize

                                              238B

                                              MD5

                                              a0fcb3be7417cbeddb0d224c46084900

                                              SHA1

                                              16f89e7c1e71338019fc31b889cf501f1565b430

                                              SHA256

                                              c0e1cf7dc23701a2a8123e9f064a756ed1406230f546afab9d0e8bfdabf96dc2

                                              SHA512

                                              e3dafec8ccfdb5c1b3f0cdd0b2fd162a56430f2e753fa4ca4c7918b336ebf9372b28e5e3084150beee2655812a8378b2bd5fe522705e3036180699b33bd062d5

                                            • C:\Users\Admin\AppData\Local\Temp\7FnFm4j3ls.bat

                                              Filesize

                                              238B

                                              MD5

                                              8f37300bbe416b4e744f80966b3b03e8

                                              SHA1

                                              ae97526c6df8dbcff122a1431e24dd87919e16c5

                                              SHA256

                                              04526c58f9e5a036b9ea57e4bf1adbdb4269cc89ead24c365d9394e9200c419d

                                              SHA512

                                              c1588a36efb010caddd74312488c3e023d42471a63e8765a017eb718cdfc5d1c7314b1c3358496c1d1d4ae670f010b44da722590698adf9b8beee724d19b0966

                                            • C:\Users\Admin\AppData\Local\Temp\D9EGxcg3vT.bat

                                              Filesize

                                              238B

                                              MD5

                                              a2a5d2422c62937416a4295d9098bece

                                              SHA1

                                              ea652add3f31d38af7fa3b59dc71f47a02dc0556

                                              SHA256

                                              a780d8269c3dab6750fb3e11c398d49015a825bd19f5d63284e416dab8d9aa0e

                                              SHA512

                                              ff58a8a10fd04ea6eb302a238c39c677046526173a96b0b294573c4eb2b9b4c3190bdb93e26b21bc94908050d770506afb03fd43c210f85f40fb8218e9008de4

                                            • C:\Users\Admin\AppData\Local\Temp\I1IMKnnpZ2.bat

                                              Filesize

                                              238B

                                              MD5

                                              b40f2d4587ffb8b3df9e2d7d36de1304

                                              SHA1

                                              f39dc6139e95c9c14cd0415940518bac742ae4d0

                                              SHA256

                                              dfb34b0da8ec988c3dd5d64d89e44c9b7fea850d2976e178b451b4d9b382de68

                                              SHA512

                                              3a6209a6fde8c1ca48d1986762f038b2b5366bdfd846504f0adbad2aebce7ca1c54d8cb4f1cefddeb1eec86b4ade48010f6d91f0d26fd5ffb05c6c5be5fb92e2

                                            • C:\Users\Admin\AppData\Local\Temp\MsMShxucCb.bat

                                              Filesize

                                              238B

                                              MD5

                                              18d44aefc8850bd4b82e9f4d8e00be1f

                                              SHA1

                                              0c61839f0e99906f97b2debc76c72deb4c399a3d

                                              SHA256

                                              10a203acc244c7588025e85d4a622e1b2041f2a6816a3c0febdb14cf9262d8f6

                                              SHA512

                                              9cbfcbd9d68cc005297814baf5e0527c631d9058b0ae938e6e566c9796fbb3fc44e8108a8445ebf67ddade9118d42e3c773cdb720af9ebd3ef7361c808eb2cfd

                                            • C:\Users\Admin\AppData\Local\Temp\PoOVO2yVWN.bat

                                              Filesize

                                              238B

                                              MD5

                                              1f5d2bad011e80daa8cd5050f29dd61b

                                              SHA1

                                              b33efda4851f669219924537bc54841f0acaf1c0

                                              SHA256

                                              eac3939b683b8c0339a0728295055e8339356c4e8b9922c42fa0fa2276afe1d5

                                              SHA512

                                              2f020e89b3ac703bc85264321cd11194b5365b3f82f745289b5552b6f5489965d7dc6ca1bc81f3f6ed73ec98163ba18d490852f5afddad01f47e58e14b3e2a24

                                            • C:\Users\Admin\AppData\Local\Temp\Ww6iFNwlpp.bat

                                              Filesize

                                              238B

                                              MD5

                                              90b517281d5827197123b8c7670dd795

                                              SHA1

                                              dcdb0ece54cf4fdf3c87c74ff220782f34de2825

                                              SHA256

                                              4f0b9d13b3597fda125680e0e3f839a804d8e4a271745eded22e80b5844077be

                                              SHA512

                                              6741fa1a3ce0fcee765fee312fafff78f7676b461b8fd807149f9af58df0e9e6d45a0ccbce70e23835dfd20cb172d9d30b1f0c0ee076b42bce99f8ca4826a30b

                                            • C:\Users\Admin\AppData\Local\Temp\Xnyek1SZun.bat

                                              Filesize

                                              238B

                                              MD5

                                              fb89e392e5a7fcb671fe03d635779bab

                                              SHA1

                                              6b46614b0504be2f0d9400283c12459c2ac36578

                                              SHA256

                                              bfb1858c59081d355c11e2897c174505588d539f782c4806f04a18c338c1dac5

                                              SHA512

                                              f3192a19eced6ba84279748d0b8ca9ec31e5ca9411146f65e135c0b8622927d5c7eaf8d4d0265db374270fbd5c4962386542985136f6624630978a8b3395a942

                                            • C:\Users\Admin\AppData\Local\Temp\sT6xLp4JQ8.bat

                                              Filesize

                                              238B

                                              MD5

                                              2479bf56320adf7eaea9095863a918b9

                                              SHA1

                                              d009c01392eaf0b3ab483a698b73b09b44c9eaff

                                              SHA256

                                              56b2da8d02bbe4a04328e3ade60d9e3845542fd31d96a06f38f328a9e9b7068e

                                              SHA512

                                              6bad0fbf1b4c3affa35618f2569118886f596b9085ca7dbdba33395053d87c11a8a26ab988b51fe29f44d670a1d747abad4a867016da3c4cbeabe4ec436d7cb4

                                            • C:\Users\Admin\AppData\Local\Temp\wLA3izB53h.bat

                                              Filesize

                                              238B

                                              MD5

                                              2a4ca49696380d3cbf8bf639d47d5060

                                              SHA1

                                              b6c39353de5fafe272a785733170e55debd3bed1

                                              SHA256

                                              6755c5b14d6626a3b45116487695840ea5b5046560da4a8d534aed79b3aba14c

                                              SHA512

                                              3bc042f4cc64f4e5781325978939bb3a4c10c96799fe1227257fc96b1782ca7b2c0aacfb3257b89fa4b5efd514a58672eb9e6a3a76eabae2fd8ff15bc8e7b464

                                            • C:\providercommon\1zu9dW.bat

                                              Filesize

                                              36B

                                              MD5

                                              6783c3ee07c7d151ceac57f1f9c8bed7

                                              SHA1

                                              17468f98f95bf504cc1f83c49e49a78526b3ea03

                                              SHA256

                                              8ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322

                                              SHA512

                                              c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8

                                            • C:\providercommon\DllCommonsvc.exe

                                              Filesize

                                              1.0MB

                                              MD5

                                              bd31e94b4143c4ce49c17d3af46bcad0

                                              SHA1

                                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                              SHA256

                                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                              SHA512

                                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                            • C:\providercommon\DllCommonsvc.exe

                                              Filesize

                                              1.0MB

                                              MD5

                                              bd31e94b4143c4ce49c17d3af46bcad0

                                              SHA1

                                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                              SHA256

                                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                              SHA512

                                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                            • C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe

                                              Filesize

                                              197B

                                              MD5

                                              8088241160261560a02c84025d107592

                                              SHA1

                                              083121f7027557570994c9fc211df61730455bb5

                                              SHA256

                                              2072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1

                                              SHA512

                                              20d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478

                                            • memory/508-756-0x0000000001340000-0x0000000001352000-memory.dmp

                                              Filesize

                                              72KB

                                            • memory/520-360-0x000001BE3E610000-0x000001BE3E632000-memory.dmp

                                              Filesize

                                              136KB

                                            • memory/600-367-0x000001EC6B160000-0x000001EC6B1D6000-memory.dmp

                                              Filesize

                                              472KB

                                            • memory/1292-778-0x0000000001380000-0x0000000001392000-memory.dmp

                                              Filesize

                                              72KB

                                            • memory/1944-734-0x00000000015A0000-0x00000000015B2000-memory.dmp

                                              Filesize

                                              72KB

                                            • memory/2564-767-0x0000000000B40000-0x0000000000B52000-memory.dmp

                                              Filesize

                                              72KB

                                            • memory/2672-165-0x0000000077560000-0x00000000776EE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2672-140-0x0000000077560000-0x00000000776EE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2672-121-0x0000000077560000-0x00000000776EE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2672-122-0x0000000077560000-0x00000000776EE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2672-123-0x0000000077560000-0x00000000776EE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2672-126-0x0000000077560000-0x00000000776EE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2672-125-0x0000000077560000-0x00000000776EE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2672-128-0x0000000077560000-0x00000000776EE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2672-129-0x0000000077560000-0x00000000776EE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2672-130-0x0000000077560000-0x00000000776EE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2672-183-0x0000000077560000-0x00000000776EE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2672-182-0x0000000077560000-0x00000000776EE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2672-131-0x0000000077560000-0x00000000776EE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2672-132-0x0000000077560000-0x00000000776EE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2672-181-0x0000000077560000-0x00000000776EE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2672-180-0x0000000077560000-0x00000000776EE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2672-179-0x0000000077560000-0x00000000776EE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2672-133-0x0000000077560000-0x00000000776EE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2672-178-0x0000000077560000-0x00000000776EE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2672-134-0x0000000077560000-0x00000000776EE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2672-177-0x0000000077560000-0x00000000776EE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2672-176-0x0000000077560000-0x00000000776EE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2672-135-0x0000000077560000-0x00000000776EE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2672-175-0x0000000077560000-0x00000000776EE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2672-174-0x0000000077560000-0x00000000776EE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2672-173-0x0000000077560000-0x00000000776EE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2672-170-0x0000000077560000-0x00000000776EE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2672-172-0x0000000077560000-0x00000000776EE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2672-171-0x0000000077560000-0x00000000776EE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2672-169-0x0000000077560000-0x00000000776EE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2672-168-0x0000000077560000-0x00000000776EE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2672-167-0x0000000077560000-0x00000000776EE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2672-166-0x0000000077560000-0x00000000776EE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2672-120-0x0000000077560000-0x00000000776EE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2672-164-0x0000000077560000-0x00000000776EE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2672-136-0x0000000077560000-0x00000000776EE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2672-163-0x0000000077560000-0x00000000776EE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2672-137-0x0000000077560000-0x00000000776EE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2672-161-0x0000000077560000-0x00000000776EE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2672-162-0x0000000077560000-0x00000000776EE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2672-138-0x0000000077560000-0x00000000776EE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2672-160-0x0000000077560000-0x00000000776EE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2672-139-0x0000000077560000-0x00000000776EE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2672-141-0x0000000077560000-0x00000000776EE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2672-159-0x0000000077560000-0x00000000776EE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2672-142-0x0000000077560000-0x00000000776EE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2672-158-0x0000000077560000-0x00000000776EE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2672-143-0x0000000077560000-0x00000000776EE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2672-157-0x0000000077560000-0x00000000776EE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2672-144-0x0000000077560000-0x00000000776EE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2672-145-0x0000000077560000-0x00000000776EE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2672-146-0x0000000077560000-0x00000000776EE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2672-156-0x0000000077560000-0x00000000776EE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2672-155-0x0000000077560000-0x00000000776EE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2672-154-0x0000000077560000-0x00000000776EE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2672-153-0x0000000077560000-0x00000000776EE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2672-152-0x0000000077560000-0x00000000776EE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2672-147-0x0000000077560000-0x00000000776EE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2672-151-0x0000000077560000-0x00000000776EE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2672-148-0x0000000077560000-0x00000000776EE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2672-149-0x0000000077560000-0x00000000776EE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2672-150-0x0000000077560000-0x00000000776EE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2812-362-0x0000000000C00000-0x0000000000C12000-memory.dmp

                                              Filesize

                                              72KB

                                            • memory/4072-740-0x0000000001450000-0x0000000001462000-memory.dmp

                                              Filesize

                                              72KB

                                            • memory/4588-186-0x0000000077560000-0x00000000776EE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4588-185-0x0000000077560000-0x00000000776EE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4852-290-0x00000000025E0000-0x00000000025EC000-memory.dmp

                                              Filesize

                                              48KB

                                            • memory/4852-286-0x0000000000390000-0x00000000004A0000-memory.dmp

                                              Filesize

                                              1.1MB

                                            • memory/4852-287-0x00000000025A0000-0x00000000025B2000-memory.dmp

                                              Filesize

                                              72KB

                                            • memory/4852-288-0x00000000025D0000-0x00000000025DC000-memory.dmp

                                              Filesize

                                              48KB

                                            • memory/4852-289-0x00000000025C0000-0x00000000025CC000-memory.dmp

                                              Filesize

                                              48KB

                                            • memory/4996-728-0x0000000001190000-0x00000000011A2000-memory.dmp

                                              Filesize

                                              72KB