Analysis
-
max time kernel
147s -
max time network
145s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
02-02-2023 11:46
Behavioral task
behavioral1
Sample
85e6a921f859702996dd221dab906b2441d6ecb263d402b113ef786efa7d2c79.exe
Resource
win10-20220812-en
General
-
Target
85e6a921f859702996dd221dab906b2441d6ecb263d402b113ef786efa7d2c79.exe
-
Size
1.3MB
-
MD5
c32e3208096e936d47197c7d06dbef66
-
SHA1
241bd81863c03a43114bdcf5bc45ea4ff888b0be
-
SHA256
85e6a921f859702996dd221dab906b2441d6ecb263d402b113ef786efa7d2c79
-
SHA512
7494f14ed79c556914897c280522fd5dfa97ade8c8c7aeb048ddbb63a78261006224f01bddab6bb42f7745525d9ae936a13be5c168f354df78a617eeda00b541
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 24 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3996 3288 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3960 3288 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2284 3288 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3068 3288 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2836 3288 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4924 3288 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4904 3288 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4808 3288 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4756 3288 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 696 3288 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4384 3288 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4504 3288 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4516 3288 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4520 3288 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4564 3288 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4560 3288 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4340 3288 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4380 3288 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4408 3288 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4372 3288 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4344 3288 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1876 3288 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 732 3288 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 428 3288 schtasks.exe -
Processes:
resource yara_rule C:\providercommon\DllCommonsvc.exe dcrat C:\providercommon\DllCommonsvc.exe dcrat behavioral1/memory/2092-281-0x0000000000750000-0x0000000000860000-memory.dmp dcrat C:\ProgramData\Oracle\Java\installcache_x64\Idle.exe dcrat C:\Users\All Users\Oracle\Java\installcache_x64\Idle.exe dcrat C:\ProgramData\Oracle\Java\installcache_x64\Idle.exe dcrat C:\ProgramData\Oracle\Java\installcache_x64\Idle.exe dcrat C:\ProgramData\Oracle\Java\installcache_x64\Idle.exe dcrat C:\ProgramData\Oracle\Java\installcache_x64\Idle.exe dcrat C:\ProgramData\Oracle\Java\installcache_x64\Idle.exe dcrat C:\ProgramData\Oracle\Java\installcache_x64\Idle.exe dcrat C:\ProgramData\Oracle\Java\installcache_x64\Idle.exe dcrat C:\ProgramData\Oracle\Java\installcache_x64\Idle.exe dcrat C:\ProgramData\Oracle\Java\installcache_x64\Idle.exe dcrat -
Executes dropped EXE 11 IoCs
Processes:
DllCommonsvc.exeIdle.exeIdle.exeIdle.exeIdle.exeIdle.exeIdle.exeIdle.exeIdle.exeIdle.exeIdle.exepid process 2092 DllCommonsvc.exe 5096 Idle.exe 4448 Idle.exe 4672 Idle.exe 1016 Idle.exe 3368 Idle.exe 4636 Idle.exe 3328 Idle.exe 2320 Idle.exe 4916 Idle.exe 4680 Idle.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in Program Files directory 4 IoCs
Processes:
DllCommonsvc.exedescription ioc process File created C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\RuntimeBroker.exe DllCommonsvc.exe File created C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\9e8d7a4ca61bd9 DllCommonsvc.exe File created C:\Program Files\Java\jre1.8.0_66\bin\SearchUI.exe DllCommonsvc.exe File created C:\Program Files\Java\jre1.8.0_66\bin\dab4d89cac03ec DllCommonsvc.exe -
Drops file in Windows directory 6 IoCs
Processes:
DllCommonsvc.exedescription ioc process File created C:\Windows\diagnostics\index\dwm.exe DllCommonsvc.exe File created C:\Windows\AppPatch\cmd.exe DllCommonsvc.exe File created C:\Windows\AppPatch\ebf1f9fa8afd6d DllCommonsvc.exe File created C:\Windows\InputMethod\SHARED\winlogon.exe DllCommonsvc.exe File created C:\Windows\InputMethod\SHARED\cc11b995f2a76d DllCommonsvc.exe File created C:\Windows\rescache\winlogon.exe DllCommonsvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 24 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 3068 schtasks.exe 2836 schtasks.exe 4904 schtasks.exe 1876 schtasks.exe 428 schtasks.exe 732 schtasks.exe 3960 schtasks.exe 4924 schtasks.exe 4384 schtasks.exe 4520 schtasks.exe 4560 schtasks.exe 4340 schtasks.exe 4408 schtasks.exe 3996 schtasks.exe 2284 schtasks.exe 4808 schtasks.exe 4756 schtasks.exe 4344 schtasks.exe 696 schtasks.exe 4504 schtasks.exe 4516 schtasks.exe 4564 schtasks.exe 4380 schtasks.exe 4372 schtasks.exe -
Modifies registry class 11 IoCs
Processes:
Idle.exeIdle.exeIdle.exe85e6a921f859702996dd221dab906b2441d6ecb263d402b113ef786efa7d2c79.exeIdle.exeIdle.exeIdle.exeIdle.exeDllCommonsvc.exeIdle.exeIdle.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings Idle.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings Idle.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings Idle.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings 85e6a921f859702996dd221dab906b2441d6ecb263d402b113ef786efa7d2c79.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings Idle.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings Idle.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings Idle.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings Idle.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings DllCommonsvc.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings Idle.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings Idle.exe -
Suspicious behavior: EnumeratesProcesses 51 IoCs
Processes:
DllCommonsvc.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exeIdle.exeIdle.exeIdle.exeIdle.exeIdle.exeIdle.exeIdle.exeIdle.exeIdle.exeIdle.exepid process 2092 DllCommonsvc.exe 2092 DllCommonsvc.exe 2092 DllCommonsvc.exe 2092 DllCommonsvc.exe 2092 DllCommonsvc.exe 1088 powershell.exe 1088 powershell.exe 4540 powershell.exe 4540 powershell.exe 4540 powershell.exe 1088 powershell.exe 1472 powershell.exe 1472 powershell.exe 1860 powershell.exe 1860 powershell.exe 1860 powershell.exe 1472 powershell.exe 188 powershell.exe 188 powershell.exe 860 powershell.exe 860 powershell.exe 3300 powershell.exe 3300 powershell.exe 2316 powershell.exe 2316 powershell.exe 368 powershell.exe 368 powershell.exe 3300 powershell.exe 368 powershell.exe 188 powershell.exe 860 powershell.exe 2316 powershell.exe 1088 powershell.exe 4540 powershell.exe 188 powershell.exe 3300 powershell.exe 368 powershell.exe 860 powershell.exe 1472 powershell.exe 1860 powershell.exe 2316 powershell.exe 5096 Idle.exe 4448 Idle.exe 4672 Idle.exe 1016 Idle.exe 3368 Idle.exe 4636 Idle.exe 3328 Idle.exe 2320 Idle.exe 4916 Idle.exe 4680 Idle.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
DllCommonsvc.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 2092 DllCommonsvc.exe Token: SeDebugPrivilege 1088 powershell.exe Token: SeDebugPrivilege 4540 powershell.exe Token: SeDebugPrivilege 1860 powershell.exe Token: SeDebugPrivilege 1472 powershell.exe Token: SeDebugPrivilege 860 powershell.exe Token: SeDebugPrivilege 3300 powershell.exe Token: SeDebugPrivilege 188 powershell.exe Token: SeDebugPrivilege 368 powershell.exe Token: SeDebugPrivilege 2316 powershell.exe Token: SeIncreaseQuotaPrivilege 3300 powershell.exe Token: SeSecurityPrivilege 3300 powershell.exe Token: SeTakeOwnershipPrivilege 3300 powershell.exe Token: SeLoadDriverPrivilege 3300 powershell.exe Token: SeSystemProfilePrivilege 3300 powershell.exe Token: SeSystemtimePrivilege 3300 powershell.exe Token: SeProfSingleProcessPrivilege 3300 powershell.exe Token: SeIncBasePriorityPrivilege 3300 powershell.exe Token: SeCreatePagefilePrivilege 3300 powershell.exe Token: SeBackupPrivilege 3300 powershell.exe Token: SeRestorePrivilege 3300 powershell.exe Token: SeShutdownPrivilege 3300 powershell.exe Token: SeDebugPrivilege 3300 powershell.exe Token: SeSystemEnvironmentPrivilege 3300 powershell.exe Token: SeRemoteShutdownPrivilege 3300 powershell.exe Token: SeUndockPrivilege 3300 powershell.exe Token: SeManageVolumePrivilege 3300 powershell.exe Token: 33 3300 powershell.exe Token: 34 3300 powershell.exe Token: 35 3300 powershell.exe Token: 36 3300 powershell.exe Token: SeIncreaseQuotaPrivilege 1088 powershell.exe Token: SeSecurityPrivilege 1088 powershell.exe Token: SeTakeOwnershipPrivilege 1088 powershell.exe Token: SeLoadDriverPrivilege 1088 powershell.exe Token: SeSystemProfilePrivilege 1088 powershell.exe Token: SeSystemtimePrivilege 1088 powershell.exe Token: SeProfSingleProcessPrivilege 1088 powershell.exe Token: SeIncBasePriorityPrivilege 1088 powershell.exe Token: SeCreatePagefilePrivilege 1088 powershell.exe Token: SeBackupPrivilege 1088 powershell.exe Token: SeRestorePrivilege 1088 powershell.exe Token: SeShutdownPrivilege 1088 powershell.exe Token: SeDebugPrivilege 1088 powershell.exe Token: SeSystemEnvironmentPrivilege 1088 powershell.exe Token: SeRemoteShutdownPrivilege 1088 powershell.exe Token: SeUndockPrivilege 1088 powershell.exe Token: SeManageVolumePrivilege 1088 powershell.exe Token: 33 1088 powershell.exe Token: 34 1088 powershell.exe Token: 35 1088 powershell.exe Token: 36 1088 powershell.exe Token: SeIncreaseQuotaPrivilege 188 powershell.exe Token: SeSecurityPrivilege 188 powershell.exe Token: SeTakeOwnershipPrivilege 188 powershell.exe Token: SeLoadDriverPrivilege 188 powershell.exe Token: SeSystemProfilePrivilege 188 powershell.exe Token: SeSystemtimePrivilege 188 powershell.exe Token: SeProfSingleProcessPrivilege 188 powershell.exe Token: SeIncBasePriorityPrivilege 188 powershell.exe Token: SeCreatePagefilePrivilege 188 powershell.exe Token: SeBackupPrivilege 188 powershell.exe Token: SeRestorePrivilege 188 powershell.exe Token: SeShutdownPrivilege 188 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
85e6a921f859702996dd221dab906b2441d6ecb263d402b113ef786efa7d2c79.exeWScript.execmd.exeDllCommonsvc.execmd.exeIdle.execmd.exeIdle.execmd.exeIdle.execmd.exeIdle.execmd.exeIdle.execmd.exeIdle.exedescription pid process target process PID 2424 wrote to memory of 4688 2424 85e6a921f859702996dd221dab906b2441d6ecb263d402b113ef786efa7d2c79.exe WScript.exe PID 2424 wrote to memory of 4688 2424 85e6a921f859702996dd221dab906b2441d6ecb263d402b113ef786efa7d2c79.exe WScript.exe PID 2424 wrote to memory of 4688 2424 85e6a921f859702996dd221dab906b2441d6ecb263d402b113ef786efa7d2c79.exe WScript.exe PID 4688 wrote to memory of 5096 4688 WScript.exe cmd.exe PID 4688 wrote to memory of 5096 4688 WScript.exe cmd.exe PID 4688 wrote to memory of 5096 4688 WScript.exe cmd.exe PID 5096 wrote to memory of 2092 5096 cmd.exe DllCommonsvc.exe PID 5096 wrote to memory of 2092 5096 cmd.exe DllCommonsvc.exe PID 2092 wrote to memory of 4540 2092 DllCommonsvc.exe powershell.exe PID 2092 wrote to memory of 4540 2092 DllCommonsvc.exe powershell.exe PID 2092 wrote to memory of 1860 2092 DllCommonsvc.exe powershell.exe PID 2092 wrote to memory of 1860 2092 DllCommonsvc.exe powershell.exe PID 2092 wrote to memory of 1088 2092 DllCommonsvc.exe powershell.exe PID 2092 wrote to memory of 1088 2092 DllCommonsvc.exe powershell.exe PID 2092 wrote to memory of 1472 2092 DllCommonsvc.exe powershell.exe PID 2092 wrote to memory of 1472 2092 DllCommonsvc.exe powershell.exe PID 2092 wrote to memory of 368 2092 DllCommonsvc.exe powershell.exe PID 2092 wrote to memory of 368 2092 DllCommonsvc.exe powershell.exe PID 2092 wrote to memory of 860 2092 DllCommonsvc.exe powershell.exe PID 2092 wrote to memory of 860 2092 DllCommonsvc.exe powershell.exe PID 2092 wrote to memory of 3300 2092 DllCommonsvc.exe powershell.exe PID 2092 wrote to memory of 3300 2092 DllCommonsvc.exe powershell.exe PID 2092 wrote to memory of 188 2092 DllCommonsvc.exe powershell.exe PID 2092 wrote to memory of 188 2092 DllCommonsvc.exe powershell.exe PID 2092 wrote to memory of 2316 2092 DllCommonsvc.exe powershell.exe PID 2092 wrote to memory of 2316 2092 DllCommonsvc.exe powershell.exe PID 2092 wrote to memory of 4088 2092 DllCommonsvc.exe cmd.exe PID 2092 wrote to memory of 4088 2092 DllCommonsvc.exe cmd.exe PID 4088 wrote to memory of 4748 4088 cmd.exe w32tm.exe PID 4088 wrote to memory of 4748 4088 cmd.exe w32tm.exe PID 4088 wrote to memory of 5096 4088 cmd.exe Idle.exe PID 4088 wrote to memory of 5096 4088 cmd.exe Idle.exe PID 5096 wrote to memory of 3188 5096 Idle.exe cmd.exe PID 5096 wrote to memory of 3188 5096 Idle.exe cmd.exe PID 3188 wrote to memory of 4564 3188 cmd.exe w32tm.exe PID 3188 wrote to memory of 4564 3188 cmd.exe w32tm.exe PID 3188 wrote to memory of 4448 3188 cmd.exe Idle.exe PID 3188 wrote to memory of 4448 3188 cmd.exe Idle.exe PID 4448 wrote to memory of 4388 4448 Idle.exe cmd.exe PID 4448 wrote to memory of 4388 4448 Idle.exe cmd.exe PID 4388 wrote to memory of 4676 4388 cmd.exe w32tm.exe PID 4388 wrote to memory of 4676 4388 cmd.exe w32tm.exe PID 4388 wrote to memory of 4672 4388 cmd.exe Idle.exe PID 4388 wrote to memory of 4672 4388 cmd.exe Idle.exe PID 4672 wrote to memory of 4692 4672 Idle.exe cmd.exe PID 4672 wrote to memory of 4692 4672 Idle.exe cmd.exe PID 4692 wrote to memory of 4988 4692 cmd.exe w32tm.exe PID 4692 wrote to memory of 4988 4692 cmd.exe w32tm.exe PID 4692 wrote to memory of 1016 4692 cmd.exe Idle.exe PID 4692 wrote to memory of 1016 4692 cmd.exe Idle.exe PID 1016 wrote to memory of 4924 1016 Idle.exe cmd.exe PID 1016 wrote to memory of 4924 1016 Idle.exe cmd.exe PID 4924 wrote to memory of 5044 4924 cmd.exe w32tm.exe PID 4924 wrote to memory of 5044 4924 cmd.exe w32tm.exe PID 4924 wrote to memory of 3368 4924 cmd.exe Idle.exe PID 4924 wrote to memory of 3368 4924 cmd.exe Idle.exe PID 3368 wrote to memory of 200 3368 Idle.exe cmd.exe PID 3368 wrote to memory of 200 3368 Idle.exe cmd.exe PID 200 wrote to memory of 1456 200 cmd.exe w32tm.exe PID 200 wrote to memory of 1456 200 cmd.exe w32tm.exe PID 200 wrote to memory of 4636 200 cmd.exe Idle.exe PID 200 wrote to memory of 4636 200 cmd.exe Idle.exe PID 4636 wrote to memory of 340 4636 Idle.exe cmd.exe PID 4636 wrote to memory of 340 4636 Idle.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\85e6a921f859702996dd221dab906b2441d6ecb263d402b113ef786efa7d2c79.exe"C:\Users\Admin\AppData\Local\Temp\85e6a921f859702996dd221dab906b2441d6ecb263d402b113ef786efa7d2c79.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\providercommon\1zu9dW.bat" "3⤵
- Suspicious use of WriteProcessMemory
-
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\RuntimeBroker.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\AppPatch\cmd.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Java\jre1.8.0_66\bin\SearchUI.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\smss.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\sihost.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\All Users\Oracle\Java\installcache_x64\Idle.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\InputMethod\SHARED\winlogon.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\fontdrvhost.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\rlsc8UuZJg.bat"5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵
-
C:\Users\All Users\Oracle\Java\installcache_x64\Idle.exe"C:\Users\All Users\Oracle\Java\installcache_x64\Idle.exe"6⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\XkJigN4PJf.bat"7⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:28⤵
-
C:\Users\All Users\Oracle\Java\installcache_x64\Idle.exe"C:\Users\All Users\Oracle\Java\installcache_x64\Idle.exe"8⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\iPSx7mMsuZ.bat"9⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:210⤵
-
C:\Users\All Users\Oracle\Java\installcache_x64\Idle.exe"C:\Users\All Users\Oracle\Java\installcache_x64\Idle.exe"10⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\hevtjRcN1r.bat"11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:212⤵
-
C:\Users\All Users\Oracle\Java\installcache_x64\Idle.exe"C:\Users\All Users\Oracle\Java\installcache_x64\Idle.exe"12⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\dgWvFyiHB2.bat"13⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:214⤵
-
C:\Users\All Users\Oracle\Java\installcache_x64\Idle.exe"C:\Users\All Users\Oracle\Java\installcache_x64\Idle.exe"14⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\D9KWG0zl28.bat"15⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:216⤵
-
C:\Users\All Users\Oracle\Java\installcache_x64\Idle.exe"C:\Users\All Users\Oracle\Java\installcache_x64\Idle.exe"16⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\F4MZx53eLu.bat"17⤵
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:218⤵
-
C:\Users\All Users\Oracle\Java\installcache_x64\Idle.exe"C:\Users\All Users\Oracle\Java\installcache_x64\Idle.exe"18⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\DFgOOKl5EO.bat"19⤵
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:220⤵
-
C:\Users\All Users\Oracle\Java\installcache_x64\Idle.exe"C:\Users\All Users\Oracle\Java\installcache_x64\Idle.exe"20⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\oS12nhm3yC.bat"21⤵
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:222⤵
-
C:\Users\All Users\Oracle\Java\installcache_x64\Idle.exe"C:\Users\All Users\Oracle\Java\installcache_x64\Idle.exe"22⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\PliZKNaLvF.bat"23⤵
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:224⤵
-
C:\Users\All Users\Oracle\Java\installcache_x64\Idle.exe"C:\Users\All Users\Oracle\Java\installcache_x64\Idle.exe"24⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 9 /tr "'C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 13 /tr "'C:\Windows\AppPatch\cmd.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Windows\AppPatch\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 9 /tr "'C:\Windows\AppPatch\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 7 /tr "'C:\Windows\InputMethod\SHARED\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Windows\InputMethod\SHARED\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 5 /tr "'C:\Windows\InputMethod\SHARED\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchUIS" /sc MINUTE /mo 14 /tr "'C:\Program Files\Java\jre1.8.0_66\bin\SearchUI.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchUI" /sc ONLOGON /tr "'C:\Program Files\Java\jre1.8.0_66\bin\SearchUI.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchUIS" /sc MINUTE /mo 11 /tr "'C:\Program Files\Java\jre1.8.0_66\bin\SearchUI.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 8 /tr "'C:\providercommon\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\providercommon\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 10 /tr "'C:\providercommon\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\sihost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 6 /tr "'C:\Users\All Users\Oracle\Java\installcache_x64\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Users\All Users\Oracle\Java\installcache_x64\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 12 /tr "'C:\Users\All Users\Oracle\Java\installcache_x64\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Oracle\Java\installcache_x64\Idle.exeFilesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
C:\ProgramData\Oracle\Java\installcache_x64\Idle.exeFilesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
C:\ProgramData\Oracle\Java\installcache_x64\Idle.exeFilesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
C:\ProgramData\Oracle\Java\installcache_x64\Idle.exeFilesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
C:\ProgramData\Oracle\Java\installcache_x64\Idle.exeFilesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
C:\ProgramData\Oracle\Java\installcache_x64\Idle.exeFilesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
C:\ProgramData\Oracle\Java\installcache_x64\Idle.exeFilesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
C:\ProgramData\Oracle\Java\installcache_x64\Idle.exeFilesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
C:\ProgramData\Oracle\Java\installcache_x64\Idle.exeFilesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
C:\ProgramData\Oracle\Java\installcache_x64\Idle.exeFilesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Idle.exe.logFilesize
1KB
MD5d63ff49d7c92016feb39812e4db10419
SHA12307d5e35ca9864ffefc93acf8573ea995ba189b
SHA256375076241775962f3edc08a8c72832a00920b427a4f3332528d91d21e909fa12
SHA51200f8c8d0336d6575b956876183199624d6f4d2056f2c0aa633a6f17c516f22ee648062d9bc419254d84c459323e9424f0da8aed9dd4e16c2926e5ba30e797d8a
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
3KB
MD5ad5cd538ca58cb28ede39c108acb5785
SHA11ae910026f3dbe90ed025e9e96ead2b5399be877
SHA256c9e6cb04d6c893458d5a7e12eb575cf97c3172f5e312b1f63a667cbbc5f0c033
SHA512c066c5d9b276a68fa636647bb29aea05bfa2292217bc77f5324d9c1d93117772ee8277e1f7cff91ec8d6b7c05ca078f929cecfdbb09582522a9067f54740af13
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5bc3c91897fcd9ecb4d65c2fd9804a503
SHA11a61d0057459e48c4a6aefef84aca819351bece1
SHA256c298ac841a638baa105c39c8e918f30db0c5870ecedc5eb3ce1c527de995b2c6
SHA512546e722076fa773f6556aeeb4c5a2eda576788a2bc27897ca687e86e065fa6279f3edb95fb1a41cbf9a0bddc8caf4b75211ce30f58390c3bee3463fa8602a22c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5c4c162f87d3599d2134e08df556a39f8
SHA1c2d3e8ac6c297624d6fbfdcfe4eef14e428bc16a
SHA256a8a75ad12d75fd1523c1c7cb79724fa9835269fc853c839874beb9a60aed94b4
SHA5126fa874fb15faf3db03b4db60354f9f900043b4c9eaa8aa7adb5ce42e7e547288daa097ef926fd2286c05eb2a3429619a8b1695f74cca0dc836aae12deda00473
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5b51a5c3dc594c6a73b6804718e7ad3ff
SHA168bc7aaca1ca8f81d7525de3dd6da3315da2fddb
SHA25605fbdce639344d3a5d411b253d1b6c1bb8262941b872024b1b201db3a7301c82
SHA512240be4b4df87af3241400164addb3cfd640cd514cb2af59e0f411f713c33bf38377d61235fed98eaaf607e034d539703bd81a0d1adc3b63c46aa5f06d6552d1f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD581b543cd63778569f373b30204ee9f35
SHA1f2d5df5a11238b9e7ecc646bdac57caf5254b3a3
SHA256a8efdd68b74e868c212b46e82d82e7cc71b2d1d3bd19f3d970d73adc5e09db5e
SHA5126b2c436f858429cc082a8cf4a23af6896cded5132af6b4fe2ac37691e3c697d77dec221d1ab4fa2438634079a8527301ebb090e1bdeabba59646eff271544023
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD581b543cd63778569f373b30204ee9f35
SHA1f2d5df5a11238b9e7ecc646bdac57caf5254b3a3
SHA256a8efdd68b74e868c212b46e82d82e7cc71b2d1d3bd19f3d970d73adc5e09db5e
SHA5126b2c436f858429cc082a8cf4a23af6896cded5132af6b4fe2ac37691e3c697d77dec221d1ab4fa2438634079a8527301ebb090e1bdeabba59646eff271544023
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5dbbaf0e0dc208cb75483fed8df19979e
SHA1695a0b38f05dbf8176b3372a3601285bdb771163
SHA2562a598e00a59e8b4a054446547882224b18c8bc2af74d67d92d881b195c2dab82
SHA512afa4704d715f7cc2f506c718f77713fc01a910dd542f21547ec31e7259feac108e2137dd19adcd247bf5d2976ed592b6b535632ccdb62ae66d46391e1bb14745
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5dbbaf0e0dc208cb75483fed8df19979e
SHA1695a0b38f05dbf8176b3372a3601285bdb771163
SHA2562a598e00a59e8b4a054446547882224b18c8bc2af74d67d92d881b195c2dab82
SHA512afa4704d715f7cc2f506c718f77713fc01a910dd542f21547ec31e7259feac108e2137dd19adcd247bf5d2976ed592b6b535632ccdb62ae66d46391e1bb14745
-
C:\Users\Admin\AppData\Local\Temp\D9KWG0zl28.batFilesize
221B
MD5dcfeb3b70c35bcf383ad5270a28c47e7
SHA1f46c40a4050796717c6bac248390acd27a148765
SHA256bcf6896990858475e9c839c462226b6ed345d1bf9805287da72add2b2855f665
SHA512dc143c774aedca289b4b49e42ca7201622741a7b1eaf41836cd4755be68a2b0ac8186bd5f731c66156fa370852594c07a78397ace623a564cb7666aa7236e58c
-
C:\Users\Admin\AppData\Local\Temp\DFgOOKl5EO.batFilesize
221B
MD5e8dc789a4e4e23f10c0ff92857e9d3c1
SHA1b2899d343ad9289e935094be017cbc38578b7ec4
SHA2568cde087597fea4f912cff722112b4eb699e51f07e085c4b297df12d0c33802a9
SHA51247fc33fe1977db2282d7ecc1598a54fbc2e44549c6f464961ac8d6aeec3c7fbb71a599a17d39f39eca6ec0dd032b57550059453ff257a85a7be76bcca0199254
-
C:\Users\Admin\AppData\Local\Temp\F4MZx53eLu.batFilesize
221B
MD5c3f0fcd11517b671c2b5b035b7cce2c4
SHA185fc8d9dd475489508c4fcbf625c383f567709d0
SHA256b68c14720c98915e34b33116c865a0d65c37197e238edecf1de2d90f5ebadef8
SHA512bffb68ee11e58679146e3be8ba3bd1c259d6ec626bd0326691960678e7e5e1a07eefde96841ab22db27e7c2b8c721ed87fd8269e9db4821e0e3f0a6fc10962e2
-
C:\Users\Admin\AppData\Local\Temp\PliZKNaLvF.batFilesize
221B
MD546a46660ad0bff68cd8b15f4c276294f
SHA1756cf196a14da21de551836459fc87bee90830c8
SHA256458aebeefa7a47ed58d477cfcf697b4b93eddd37d7ff0ea03e53d1ce54bd566f
SHA5129cc4756d925f068b06498ca7991a5e4e3bbad49a30e2ccfc97c5dfef9b4dac9b52d6f4d653030badaabff17457fdf2556c4fa4ab1a13cc3b0d5a88663e797846
-
C:\Users\Admin\AppData\Local\Temp\XkJigN4PJf.batFilesize
221B
MD57827e88995379a38333a31a30379e96e
SHA1f959bef0f2eb1787d4a4bfcb4ddd288988d1767f
SHA2568a589becd36fc6711cd676a79f7792dd7d874412e621304fdd2c679af9377e5a
SHA512fbaeefbf901a96f9b2059b77690242b4871c8e1d490d813b7905c8d57421cff80dbc4b109896c133dac87900fbdcac31a1a83b15d6051f997adcf0094fd138bc
-
C:\Users\Admin\AppData\Local\Temp\dgWvFyiHB2.batFilesize
221B
MD5f3b10cef69a1eb13da53f3cf88dd3128
SHA109086c4ec5b5e583823cb68db787863b5f8b7db4
SHA2566ebe51d31e221ef4479b6618263cd13a5af82eeea5ebbca00f07c55f08569b55
SHA51262627dbb1698a41f78ab30e9bc723d7316328f44e7a98616fd552a4706d76d9fe61e3c44b47d6229f4f950954735dcfb07273ae4db464a1c01ab880291f74721
-
C:\Users\Admin\AppData\Local\Temp\hevtjRcN1r.batFilesize
221B
MD5e1112e5d68e5d196fd64effa54873e1c
SHA1c1461a5dd5065b3bdaccb89a6b85af49d8db3fbf
SHA2560f409e90895aae5c98b7f7f5604a0f5d6e6c97dc5b2092c4daa8c51d3e715a52
SHA512d4c7a250a7a75362cc1238f849d0ff6f54d3f4aa16892170451695ca503d22a52035d8b0c33a2126a0ee2382b0798e76899a1cf780ea883083f8db309863aaff
-
C:\Users\Admin\AppData\Local\Temp\iPSx7mMsuZ.batFilesize
221B
MD56092ed2b34cee8a862d3347104605c7c
SHA16c83349c73620f91ed115b5909272af85ca54d08
SHA25638a683397ddd364344cdb2cab6699e2d66f0b19b2e16bd627a8faf2e6c07c1a0
SHA5127d5ea81e1765a1e8d033a5fb214ce1e76b8cdbc2ce275ced7353113877811e25e90ff21192522720c76497c342a0417c88f75b9456cd09aee592387791bc7a65
-
C:\Users\Admin\AppData\Local\Temp\oS12nhm3yC.batFilesize
221B
MD507567c3b1bde7d93659c9e6c0f48dc93
SHA1a016e070b31a780ee12c156391e9bcc63518f4c2
SHA256d0ec8d331191dcafa7b34852310203f792aea870a10cb543616a93025a82f8a9
SHA5124e2dd787d4a06e7a136688188788b0166cb61b82a103428ae64537941dc9b65f6c28eebe970fe57e5a036be9c554ff0380f3d69e2e38cbe9886430f6501246ec
-
C:\Users\Admin\AppData\Local\Temp\rlsc8UuZJg.batFilesize
221B
MD5e8b0bbc0f2f0fde8fbdd40fedbf63fce
SHA10b0f707c9c230b4278fac25792d7a3d103256b7c
SHA2569c0329e6da330ca6b14176c3effd553041c60312380baca23e3a78c606eda5f7
SHA512f984fc0a3265cf68ca5afcad9c17ff9697a8ea45d2982f9b3f6063d333d198472616f04f9c47e3470a7a74b00798a283621c49e5fe27463cb73b8f07645ac8bb
-
C:\Users\All Users\Oracle\Java\installcache_x64\Idle.exeFilesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
C:\providercommon\1zu9dW.batFilesize
36B
MD56783c3ee07c7d151ceac57f1f9c8bed7
SHA117468f98f95bf504cc1f83c49e49a78526b3ea03
SHA2568ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322
SHA512c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8
-
C:\providercommon\DllCommonsvc.exeFilesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
C:\providercommon\DllCommonsvc.exeFilesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbeFilesize
197B
MD58088241160261560a02c84025d107592
SHA1083121f7027557570994c9fc211df61730455bb5
SHA2562072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1
SHA51220d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478
-
memory/188-295-0x0000000000000000-mapping.dmp
-
memory/200-632-0x0000000000000000-mapping.dmp
-
memory/340-637-0x0000000000000000-mapping.dmp
-
memory/368-290-0x0000000000000000-mapping.dmp
-
memory/860-291-0x0000000000000000-mapping.dmp
-
memory/1016-624-0x0000000000000000-mapping.dmp
-
memory/1088-288-0x0000000000000000-mapping.dmp
-
memory/1088-331-0x0000026BBD470000-0x0000026BBD492000-memory.dmpFilesize
136KB
-
memory/1088-351-0x0000026BD57C0000-0x0000026BD5836000-memory.dmpFilesize
472KB
-
memory/1324-645-0x0000000000000000-mapping.dmp
-
memory/1456-634-0x0000000000000000-mapping.dmp
-
memory/1472-289-0x0000000000000000-mapping.dmp
-
memory/1860-287-0x0000000000000000-mapping.dmp
-
memory/2092-284-0x000000001BD60000-0x000000001BD6C000-memory.dmpFilesize
48KB
-
memory/2092-283-0x00000000029D0000-0x00000000029DC000-memory.dmpFilesize
48KB
-
memory/2092-282-0x0000000000D70000-0x0000000000D82000-memory.dmpFilesize
72KB
-
memory/2092-281-0x0000000000750000-0x0000000000860000-memory.dmpFilesize
1.1MB
-
memory/2092-285-0x00000000029E0000-0x00000000029EC000-memory.dmpFilesize
48KB
-
memory/2092-278-0x0000000000000000-mapping.dmp
-
memory/2316-296-0x0000000000000000-mapping.dmp
-
memory/2320-646-0x0000000000000000-mapping.dmp
-
memory/2424-155-0x0000000077DF0000-0x0000000077F7E000-memory.dmpFilesize
1.6MB
-
memory/2424-130-0x0000000077DF0000-0x0000000077F7E000-memory.dmpFilesize
1.6MB
-
memory/2424-174-0x0000000077DF0000-0x0000000077F7E000-memory.dmpFilesize
1.6MB
-
memory/2424-175-0x0000000077DF0000-0x0000000077F7E000-memory.dmpFilesize
1.6MB
-
memory/2424-176-0x0000000077DF0000-0x0000000077F7E000-memory.dmpFilesize
1.6MB
-
memory/2424-177-0x0000000077DF0000-0x0000000077F7E000-memory.dmpFilesize
1.6MB
-
memory/2424-178-0x0000000077DF0000-0x0000000077F7E000-memory.dmpFilesize
1.6MB
-
memory/2424-116-0x0000000077DF0000-0x0000000077F7E000-memory.dmpFilesize
1.6MB
-
memory/2424-117-0x0000000077DF0000-0x0000000077F7E000-memory.dmpFilesize
1.6MB
-
memory/2424-118-0x0000000077DF0000-0x0000000077F7E000-memory.dmpFilesize
1.6MB
-
memory/2424-172-0x0000000077DF0000-0x0000000077F7E000-memory.dmpFilesize
1.6MB
-
memory/2424-171-0x0000000077DF0000-0x0000000077F7E000-memory.dmpFilesize
1.6MB
-
memory/2424-120-0x0000000077DF0000-0x0000000077F7E000-memory.dmpFilesize
1.6MB
-
memory/2424-170-0x0000000077DF0000-0x0000000077F7E000-memory.dmpFilesize
1.6MB
-
memory/2424-169-0x0000000077DF0000-0x0000000077F7E000-memory.dmpFilesize
1.6MB
-
memory/2424-167-0x0000000077DF0000-0x0000000077F7E000-memory.dmpFilesize
1.6MB
-
memory/2424-168-0x0000000077DF0000-0x0000000077F7E000-memory.dmpFilesize
1.6MB
-
memory/2424-166-0x0000000077DF0000-0x0000000077F7E000-memory.dmpFilesize
1.6MB
-
memory/2424-165-0x0000000077DF0000-0x0000000077F7E000-memory.dmpFilesize
1.6MB
-
memory/2424-164-0x0000000077DF0000-0x0000000077F7E000-memory.dmpFilesize
1.6MB
-
memory/2424-163-0x0000000077DF0000-0x0000000077F7E000-memory.dmpFilesize
1.6MB
-
memory/2424-162-0x0000000077DF0000-0x0000000077F7E000-memory.dmpFilesize
1.6MB
-
memory/2424-161-0x0000000077DF0000-0x0000000077F7E000-memory.dmpFilesize
1.6MB
-
memory/2424-160-0x0000000077DF0000-0x0000000077F7E000-memory.dmpFilesize
1.6MB
-
memory/2424-159-0x0000000077DF0000-0x0000000077F7E000-memory.dmpFilesize
1.6MB
-
memory/2424-121-0x0000000077DF0000-0x0000000077F7E000-memory.dmpFilesize
1.6MB
-
memory/2424-158-0x0000000077DF0000-0x0000000077F7E000-memory.dmpFilesize
1.6MB
-
memory/2424-157-0x0000000077DF0000-0x0000000077F7E000-memory.dmpFilesize
1.6MB
-
memory/2424-156-0x0000000077DF0000-0x0000000077F7E000-memory.dmpFilesize
1.6MB
-
memory/2424-123-0x0000000077DF0000-0x0000000077F7E000-memory.dmpFilesize
1.6MB
-
memory/2424-115-0x0000000077DF0000-0x0000000077F7E000-memory.dmpFilesize
1.6MB
-
memory/2424-124-0x0000000077DF0000-0x0000000077F7E000-memory.dmpFilesize
1.6MB
-
memory/2424-154-0x0000000077DF0000-0x0000000077F7E000-memory.dmpFilesize
1.6MB
-
memory/2424-153-0x0000000077DF0000-0x0000000077F7E000-memory.dmpFilesize
1.6MB
-
memory/2424-125-0x0000000077DF0000-0x0000000077F7E000-memory.dmpFilesize
1.6MB
-
memory/2424-152-0x0000000077DF0000-0x0000000077F7E000-memory.dmpFilesize
1.6MB
-
memory/2424-151-0x0000000077DF0000-0x0000000077F7E000-memory.dmpFilesize
1.6MB
-
memory/2424-150-0x0000000077DF0000-0x0000000077F7E000-memory.dmpFilesize
1.6MB
-
memory/2424-149-0x0000000077DF0000-0x0000000077F7E000-memory.dmpFilesize
1.6MB
-
memory/2424-148-0x0000000077DF0000-0x0000000077F7E000-memory.dmpFilesize
1.6MB
-
memory/2424-147-0x0000000077DF0000-0x0000000077F7E000-memory.dmpFilesize
1.6MB
-
memory/2424-146-0x0000000077DF0000-0x0000000077F7E000-memory.dmpFilesize
1.6MB
-
memory/2424-145-0x0000000077DF0000-0x0000000077F7E000-memory.dmpFilesize
1.6MB
-
memory/2424-144-0x0000000077DF0000-0x0000000077F7E000-memory.dmpFilesize
1.6MB
-
memory/2424-126-0x0000000077DF0000-0x0000000077F7E000-memory.dmpFilesize
1.6MB
-
memory/2424-143-0x0000000077DF0000-0x0000000077F7E000-memory.dmpFilesize
1.6MB
-
memory/2424-127-0x0000000077DF0000-0x0000000077F7E000-memory.dmpFilesize
1.6MB
-
memory/2424-129-0x0000000077DF0000-0x0000000077F7E000-memory.dmpFilesize
1.6MB
-
memory/2424-142-0x0000000077DF0000-0x0000000077F7E000-memory.dmpFilesize
1.6MB
-
memory/2424-173-0x0000000077DF0000-0x0000000077F7E000-memory.dmpFilesize
1.6MB
-
memory/2424-131-0x0000000077DF0000-0x0000000077F7E000-memory.dmpFilesize
1.6MB
-
memory/2424-141-0x0000000077DF0000-0x0000000077F7E000-memory.dmpFilesize
1.6MB
-
memory/2424-140-0x0000000077DF0000-0x0000000077F7E000-memory.dmpFilesize
1.6MB
-
memory/2424-132-0x0000000077DF0000-0x0000000077F7E000-memory.dmpFilesize
1.6MB
-
memory/2424-139-0x0000000077DF0000-0x0000000077F7E000-memory.dmpFilesize
1.6MB
-
memory/2424-133-0x0000000077DF0000-0x0000000077F7E000-memory.dmpFilesize
1.6MB
-
memory/2424-128-0x0000000077DF0000-0x0000000077F7E000-memory.dmpFilesize
1.6MB
-
memory/2424-134-0x0000000077DF0000-0x0000000077F7E000-memory.dmpFilesize
1.6MB
-
memory/2424-135-0x0000000077DF0000-0x0000000077F7E000-memory.dmpFilesize
1.6MB
-
memory/2424-136-0x0000000077DF0000-0x0000000077F7E000-memory.dmpFilesize
1.6MB
-
memory/2424-138-0x0000000077DF0000-0x0000000077F7E000-memory.dmpFilesize
1.6MB
-
memory/2424-137-0x0000000077DF0000-0x0000000077F7E000-memory.dmpFilesize
1.6MB
-
memory/3188-609-0x0000000000000000-mapping.dmp
-
memory/3300-292-0x0000000000000000-mapping.dmp
-
memory/3328-640-0x0000000000000000-mapping.dmp
-
memory/3328-642-0x00000000027E0000-0x00000000027F2000-memory.dmpFilesize
72KB
-
memory/3368-631-0x0000000000970000-0x0000000000982000-memory.dmpFilesize
72KB
-
memory/3368-629-0x0000000000000000-mapping.dmp
-
memory/3488-648-0x0000000000000000-mapping.dmp
-
memory/3836-654-0x0000000000000000-mapping.dmp
-
memory/4088-343-0x0000000000000000-mapping.dmp
-
memory/4368-656-0x0000000000000000-mapping.dmp
-
memory/4388-615-0x0000000000000000-mapping.dmp
-
memory/4448-612-0x0000000000000000-mapping.dmp
-
memory/4540-286-0x0000000000000000-mapping.dmp
-
memory/4564-611-0x0000000000000000-mapping.dmp
-
memory/4632-639-0x0000000000000000-mapping.dmp
-
memory/4636-635-0x0000000000000000-mapping.dmp
-
memory/4672-618-0x0000000000000000-mapping.dmp
-
memory/4672-620-0x0000000000900000-0x0000000000912000-memory.dmpFilesize
72KB
-
memory/4676-617-0x0000000000000000-mapping.dmp
-
memory/4680-657-0x0000000000000000-mapping.dmp
-
memory/4688-179-0x0000000000000000-mapping.dmp
-
memory/4688-180-0x0000000077DF0000-0x0000000077F7E000-memory.dmpFilesize
1.6MB
-
memory/4688-181-0x0000000077DF0000-0x0000000077F7E000-memory.dmpFilesize
1.6MB
-
memory/4692-621-0x0000000000000000-mapping.dmp
-
memory/4724-643-0x0000000000000000-mapping.dmp
-
memory/4748-496-0x0000000000000000-mapping.dmp
-
memory/4916-651-0x0000000000000000-mapping.dmp
-
memory/4916-653-0x0000000000E80000-0x0000000000E92000-memory.dmpFilesize
72KB
-
memory/4924-626-0x0000000000000000-mapping.dmp
-
memory/4988-623-0x0000000000000000-mapping.dmp
-
memory/5044-628-0x0000000000000000-mapping.dmp
-
memory/5056-650-0x0000000000000000-mapping.dmp
-
memory/5096-255-0x0000000000000000-mapping.dmp
-
memory/5096-608-0x0000000002A70000-0x0000000002A82000-memory.dmpFilesize
72KB
-
memory/5096-605-0x0000000000000000-mapping.dmp