Analysis

  • max time kernel
    147s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-02-2023 00:59

General

  • Target

    3412a52e0cc2e4a1e876eb8bcc416e79a0a2e5992b0972b4eece8292a4595885.exe

  • Size

    1.3MB

  • MD5

    7ff4c9c3018952037aa84b523c0023cc

  • SHA1

    d124aeb43630601e9fd65f4b5f7421d4721c0018

  • SHA256

    3412a52e0cc2e4a1e876eb8bcc416e79a0a2e5992b0972b4eece8292a4595885

  • SHA512

    c777c2d25960eb905d459d0487b1045edfe83058ca9b544e9823f965546eab84f174018e50e377cc473a42e1bc134689db628ccbef2452d894fa0b455018c47f

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Process spawned unexpected child process 48 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 13 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Checks computer location settings 2 TTPs 12 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Drops file in Program Files directory 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 48 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 26 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3412a52e0cc2e4a1e876eb8bcc416e79a0a2e5992b0972b4eece8292a4595885.exe
    "C:\Users\Admin\AppData\Local\Temp\3412a52e0cc2e4a1e876eb8bcc416e79a0a2e5992b0972b4eece8292a4595885.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4676
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"
      2⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:4160
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\providercommon\1zu9dW.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2260
        • C:\providercommon\DllCommonsvc.exe
          "C:\providercommon\DllCommonsvc.exe"
          4⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2756
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2348
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\fontdrvhost.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4840
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\winlogon.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1672
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\odt\winlogon.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3128
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\odt\wininit.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3012
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\backgroundTaskHost.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4680
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Sidebar\RuntimeBroker.exe'
            5⤵
              PID:4796
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "powershell" -Command Add-MpPreference -ExclusionPath 'C:\odt\lsass.exe'
              5⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1976
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\services.exe'
              5⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:5064
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Mail\Idle.exe'
              5⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1008
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\All Users\Package Cache\{CF2BEA3C-26EA-32F8-AA9B-331F7E34BA97}v11.0.61030\packages\vcRuntimeMinimum_amd64\DllCommonsvc.exe'
              5⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4852
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "powershell" -Command Add-MpPreference -ExclusionPath 'C:\odt\dllhost.exe'
              5⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4676
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\All Users\WindowsHolographicDevices\SpatialStore\SearchApp.exe'
              5⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:2984
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\VideoLAN\VLC\hrtfs\sihost.exe'
              5⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4164
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Media Player\es-ES\System.exe'
              5⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:4072
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Portable Devices\csrss.exe'
              5⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:4592
            • C:\Recovery\WindowsRE\services.exe
              "C:\Recovery\WindowsRE\services.exe"
              5⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Modifies registry class
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:224
              • C:\Windows\System32\cmd.exe
                "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\SNhzeWIHcH.bat"
                6⤵
                • Checks computer location settings
                • Suspicious use of WriteProcessMemory
                PID:2756
                • C:\Windows\system32\w32tm.exe
                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                  7⤵
                    PID:4280
                  • C:\Recovery\WindowsRE\services.exe
                    "C:\Recovery\WindowsRE\services.exe"
                    7⤵
                    • Checks computer location settings
                    • Executes dropped EXE
                    • Modifies registry class
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:4376
                    • C:\Windows\System32\cmd.exe
                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\t6OOvELCCF.bat"
                      8⤵
                      • Suspicious use of WriteProcessMemory
                      PID:3120
                      • C:\Windows\system32\w32tm.exe
                        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                        9⤵
                          PID:3640
                        • C:\Recovery\WindowsRE\services.exe
                          "C:\Recovery\WindowsRE\services.exe"
                          9⤵
                          • Checks computer location settings
                          • Executes dropped EXE
                          • Modifies registry class
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:1596
                          • C:\Windows\System32\cmd.exe
                            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Ljju5cbnZy.bat"
                            10⤵
                            • Suspicious use of WriteProcessMemory
                            PID:5436
                            • C:\Windows\system32\w32tm.exe
                              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                              11⤵
                                PID:4288
                              • C:\Recovery\WindowsRE\services.exe
                                "C:\Recovery\WindowsRE\services.exe"
                                11⤵
                                • Checks computer location settings
                                • Executes dropped EXE
                                • Modifies registry class
                                • Suspicious use of AdjustPrivilegeToken
                                • Suspicious use of WriteProcessMemory
                                PID:1188
                                • C:\Windows\System32\cmd.exe
                                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\0uTXzTWsAa.bat"
                                  12⤵
                                    PID:5892
                                    • C:\Windows\system32\w32tm.exe
                                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                      13⤵
                                        PID:1672
                                      • C:\Recovery\WindowsRE\services.exe
                                        "C:\Recovery\WindowsRE\services.exe"
                                        13⤵
                                        • Checks computer location settings
                                        • Executes dropped EXE
                                        • Modifies registry class
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1900
                                        • C:\Windows\System32\cmd.exe
                                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\eNTIt1NKYH.bat"
                                          14⤵
                                            PID:1272
                                            • C:\Windows\system32\w32tm.exe
                                              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                              15⤵
                                                PID:5592
                                              • C:\Recovery\WindowsRE\services.exe
                                                "C:\Recovery\WindowsRE\services.exe"
                                                15⤵
                                                • Checks computer location settings
                                                • Executes dropped EXE
                                                • Modifies registry class
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:1540
                                                • C:\Windows\System32\cmd.exe
                                                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\XFk51gP3Gp.bat"
                                                  16⤵
                                                    PID:2468
                                                    • C:\Windows\system32\w32tm.exe
                                                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                      17⤵
                                                        PID:5160
                                                      • C:\Recovery\WindowsRE\services.exe
                                                        "C:\Recovery\WindowsRE\services.exe"
                                                        17⤵
                                                        • Checks computer location settings
                                                        • Executes dropped EXE
                                                        • Modifies registry class
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:1816
                                                        • C:\Windows\System32\cmd.exe
                                                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\2qVagYZlTM.bat"
                                                          18⤵
                                                            PID:5164
                                                            • C:\Windows\system32\w32tm.exe
                                                              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                              19⤵
                                                                PID:3804
                                                              • C:\Recovery\WindowsRE\services.exe
                                                                "C:\Recovery\WindowsRE\services.exe"
                                                                19⤵
                                                                • Checks computer location settings
                                                                • Executes dropped EXE
                                                                • Modifies registry class
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:2572
                                                                • C:\Windows\System32\cmd.exe
                                                                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\XFk51gP3Gp.bat"
                                                                  20⤵
                                                                    PID:4120
                                                                    • C:\Windows\system32\w32tm.exe
                                                                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                      21⤵
                                                                        PID:2064
                                                                      • C:\Recovery\WindowsRE\services.exe
                                                                        "C:\Recovery\WindowsRE\services.exe"
                                                                        21⤵
                                                                        • Checks computer location settings
                                                                        • Executes dropped EXE
                                                                        • Modifies registry class
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        PID:5652
                                                                        • C:\Windows\System32\cmd.exe
                                                                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\o4pIGJu18c.bat"
                                                                          22⤵
                                                                            PID:5828
                                                                            • C:\Windows\system32\w32tm.exe
                                                                              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                              23⤵
                                                                                PID:5212
                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\dwm.exe'
                                            5⤵
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:1824
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 12 /tr "'C:\odt\winlogon.exe'" /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Creates scheduled task(s)
                                    PID:2152
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\odt\winlogon.exe'" /rl HIGHEST /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Creates scheduled task(s)
                                    PID:524
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 13 /tr "'C:\odt\winlogon.exe'" /rl HIGHEST /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Creates scheduled task(s)
                                    PID:616
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 14 /tr "'C:\providercommon\fontdrvhost.exe'" /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Creates scheduled task(s)
                                    PID:540
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\providercommon\fontdrvhost.exe'" /rl HIGHEST /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Creates scheduled task(s)
                                    PID:864
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 7 /tr "'C:\providercommon\fontdrvhost.exe'" /rl HIGHEST /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Creates scheduled task(s)
                                    PID:2720
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\winlogon.exe'" /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Creates scheduled task(s)
                                    PID:3036
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\winlogon.exe'" /rl HIGHEST /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Creates scheduled task(s)
                                    PID:4800
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\winlogon.exe'" /rl HIGHEST /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Creates scheduled task(s)
                                    PID:3396
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "DllCommonsvcD" /sc MINUTE /mo 6 /tr "'C:\Users\All Users\Package Cache\{CF2BEA3C-26EA-32F8-AA9B-331F7E34BA97}v11.0.61030\packages\vcRuntimeMinimum_amd64\DllCommonsvc.exe'" /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Creates scheduled task(s)
                                    PID:3284
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "DllCommonsvc" /sc ONLOGON /tr "'C:\Users\All Users\Package Cache\{CF2BEA3C-26EA-32F8-AA9B-331F7E34BA97}v11.0.61030\packages\vcRuntimeMinimum_amd64\DllCommonsvc.exe'" /rl HIGHEST /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Creates scheduled task(s)
                                    PID:4960
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "DllCommonsvcD" /sc MINUTE /mo 9 /tr "'C:\Users\All Users\Package Cache\{CF2BEA3C-26EA-32F8-AA9B-331F7E34BA97}v11.0.61030\packages\vcRuntimeMinimum_amd64\DllCommonsvc.exe'" /rl HIGHEST /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Creates scheduled task(s)
                                    PID:4992
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 5 /tr "'C:\odt\wininit.exe'" /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Creates scheduled task(s)
                                    PID:4036
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\odt\wininit.exe'" /rl HIGHEST /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Creates scheduled task(s)
                                    PID:224
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 13 /tr "'C:\odt\wininit.exe'" /rl HIGHEST /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Creates scheduled task(s)
                                    PID:316
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Mail\Idle.exe'" /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Creates scheduled task(s)
                                    PID:3508
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Mail\Idle.exe'" /rl HIGHEST /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Creates scheduled task(s)
                                    PID:1196
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows Mail\Idle.exe'" /rl HIGHEST /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Creates scheduled task(s)
                                    PID:1828
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "servicess" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\services.exe'" /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Creates scheduled task(s)
                                    PID:4736
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\services.exe'" /rl HIGHEST /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Creates scheduled task(s)
                                    PID:4616
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "servicess" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\services.exe'" /rl HIGHEST /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Creates scheduled task(s)
                                    PID:2976
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 9 /tr "'C:\odt\lsass.exe'" /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Creates scheduled task(s)
                                    PID:2180
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\odt\lsass.exe'" /rl HIGHEST /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Creates scheduled task(s)
                                    PID:2284
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 9 /tr "'C:\odt\lsass.exe'" /rl HIGHEST /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Creates scheduled task(s)
                                    PID:3664
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Sidebar\RuntimeBroker.exe'" /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Creates scheduled task(s)
                                    PID:3668
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Sidebar\RuntimeBroker.exe'" /rl HIGHEST /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Creates scheduled task(s)
                                    PID:3144
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Sidebar\RuntimeBroker.exe'" /rl HIGHEST /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Creates scheduled task(s)
                                    PID:4728
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\backgroundTaskHost.exe'" /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Creates scheduled task(s)
                                    PID:2980
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\backgroundTaskHost.exe'" /rl HIGHEST /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Creates scheduled task(s)
                                    PID:1212
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\backgroundTaskHost.exe'" /rl HIGHEST /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Creates scheduled task(s)
                                    PID:4196
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 12 /tr "'C:\odt\dllhost.exe'" /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Creates scheduled task(s)
                                    PID:3056
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\odt\dllhost.exe'" /rl HIGHEST /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Creates scheduled task(s)
                                    PID:1692
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 5 /tr "'C:\odt\dllhost.exe'" /rl HIGHEST /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Creates scheduled task(s)
                                    PID:1800
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "sihosts" /sc MINUTE /mo 5 /tr "'C:\Program Files\VideoLAN\VLC\hrtfs\sihost.exe'" /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Creates scheduled task(s)
                                    PID:2744
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Program Files\VideoLAN\VLC\hrtfs\sihost.exe'" /rl HIGHEST /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Creates scheduled task(s)
                                    PID:3292
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "sihosts" /sc MINUTE /mo 14 /tr "'C:\Program Files\VideoLAN\VLC\hrtfs\sihost.exe'" /rl HIGHEST /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Creates scheduled task(s)
                                    PID:3288
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 9 /tr "'C:\Users\All Users\WindowsHolographicDevices\SpatialStore\SearchApp.exe'" /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Creates scheduled task(s)
                                    PID:4340
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Users\All Users\WindowsHolographicDevices\SpatialStore\SearchApp.exe'" /rl HIGHEST /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Creates scheduled task(s)
                                    PID:3024
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 6 /tr "'C:\Users\All Users\WindowsHolographicDevices\SpatialStore\SearchApp.exe'" /rl HIGHEST /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Creates scheduled task(s)
                                    PID:2804
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows Media Player\es-ES\System.exe'" /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Creates scheduled task(s)
                                    PID:3136
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files\Windows Media Player\es-ES\System.exe'" /rl HIGHEST /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Creates scheduled task(s)
                                    PID:2300
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Media Player\es-ES\System.exe'" /rl HIGHEST /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Creates scheduled task(s)
                                    PID:1772
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\dwm.exe'" /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Creates scheduled task(s)
                                    PID:4304
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\dwm.exe'" /rl HIGHEST /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Creates scheduled task(s)
                                    PID:3048
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\dwm.exe'" /rl HIGHEST /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Creates scheduled task(s)
                                    PID:2840
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\Program Files\Windows Portable Devices\csrss.exe'" /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Creates scheduled task(s)
                                    PID:2504
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Windows Portable Devices\csrss.exe'" /rl HIGHEST /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Creates scheduled task(s)
                                    PID:4116
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows Portable Devices\csrss.exe'" /rl HIGHEST /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Creates scheduled task(s)
                                    PID:4544

                                  Network

                                  MITRE ATT&CK Enterprise v6

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Recovery\WindowsRE\services.exe

                                    Filesize

                                    1.0MB

                                    MD5

                                    bd31e94b4143c4ce49c17d3af46bcad0

                                    SHA1

                                    f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                    SHA256

                                    b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                    SHA512

                                    f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                  • C:\Recovery\WindowsRE\services.exe

                                    Filesize

                                    1.0MB

                                    MD5

                                    bd31e94b4143c4ce49c17d3af46bcad0

                                    SHA1

                                    f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                    SHA256

                                    b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                    SHA512

                                    f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                  • C:\Recovery\WindowsRE\services.exe

                                    Filesize

                                    1.0MB

                                    MD5

                                    bd31e94b4143c4ce49c17d3af46bcad0

                                    SHA1

                                    f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                    SHA256

                                    b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                    SHA512

                                    f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                  • C:\Recovery\WindowsRE\services.exe

                                    Filesize

                                    1.0MB

                                    MD5

                                    bd31e94b4143c4ce49c17d3af46bcad0

                                    SHA1

                                    f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                    SHA256

                                    b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                    SHA512

                                    f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                  • C:\Recovery\WindowsRE\services.exe

                                    Filesize

                                    1.0MB

                                    MD5

                                    bd31e94b4143c4ce49c17d3af46bcad0

                                    SHA1

                                    f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                    SHA256

                                    b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                    SHA512

                                    f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                  • C:\Recovery\WindowsRE\services.exe

                                    Filesize

                                    1.0MB

                                    MD5

                                    bd31e94b4143c4ce49c17d3af46bcad0

                                    SHA1

                                    f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                    SHA256

                                    b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                    SHA512

                                    f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                  • C:\Recovery\WindowsRE\services.exe

                                    Filesize

                                    1.0MB

                                    MD5

                                    bd31e94b4143c4ce49c17d3af46bcad0

                                    SHA1

                                    f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                    SHA256

                                    b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                    SHA512

                                    f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                  • C:\Recovery\WindowsRE\services.exe

                                    Filesize

                                    1.0MB

                                    MD5

                                    bd31e94b4143c4ce49c17d3af46bcad0

                                    SHA1

                                    f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                    SHA256

                                    b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                    SHA512

                                    f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                  • C:\Recovery\WindowsRE\services.exe

                                    Filesize

                                    1.0MB

                                    MD5

                                    bd31e94b4143c4ce49c17d3af46bcad0

                                    SHA1

                                    f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                    SHA256

                                    b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                    SHA512

                                    f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                  • C:\Recovery\WindowsRE\services.exe

                                    Filesize

                                    1.0MB

                                    MD5

                                    bd31e94b4143c4ce49c17d3af46bcad0

                                    SHA1

                                    f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                    SHA256

                                    b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                    SHA512

                                    f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                    Filesize

                                    2KB

                                    MD5

                                    d85ba6ff808d9e5444a4b369f5bc2730

                                    SHA1

                                    31aa9d96590fff6981b315e0b391b575e4c0804a

                                    SHA256

                                    84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                    SHA512

                                    8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\services.exe.log

                                    Filesize

                                    1KB

                                    MD5

                                    baf55b95da4a601229647f25dad12878

                                    SHA1

                                    abc16954ebfd213733c4493fc1910164d825cac8

                                    SHA256

                                    ee954c5d8156fd8890e582c716e5758ed9b33721258f10e758bdc31ccbcb1924

                                    SHA512

                                    24f502fedb1a305d0d7b08857ffc1db9b2359ff34e06d5748ecc84e35c985f29a20d9f0a533bea32d234ab37097ec0481620c63b14ac89b280e75e14d19fd545

                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                    Filesize

                                    944B

                                    MD5

                                    d28a889fd956d5cb3accfbaf1143eb6f

                                    SHA1

                                    157ba54b365341f8ff06707d996b3635da8446f7

                                    SHA256

                                    21e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45

                                    SHA512

                                    0b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c

                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                    Filesize

                                    944B

                                    MD5

                                    77d622bb1a5b250869a3238b9bc1402b

                                    SHA1

                                    d47f4003c2554b9dfc4c16f22460b331886b191b

                                    SHA256

                                    f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb

                                    SHA512

                                    d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9

                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                    Filesize

                                    944B

                                    MD5

                                    77d622bb1a5b250869a3238b9bc1402b

                                    SHA1

                                    d47f4003c2554b9dfc4c16f22460b331886b191b

                                    SHA256

                                    f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb

                                    SHA512

                                    d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9

                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                    Filesize

                                    944B

                                    MD5

                                    77d622bb1a5b250869a3238b9bc1402b

                                    SHA1

                                    d47f4003c2554b9dfc4c16f22460b331886b191b

                                    SHA256

                                    f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb

                                    SHA512

                                    d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9

                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                    Filesize

                                    944B

                                    MD5

                                    d28a889fd956d5cb3accfbaf1143eb6f

                                    SHA1

                                    157ba54b365341f8ff06707d996b3635da8446f7

                                    SHA256

                                    21e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45

                                    SHA512

                                    0b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c

                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                    Filesize

                                    944B

                                    MD5

                                    77d622bb1a5b250869a3238b9bc1402b

                                    SHA1

                                    d47f4003c2554b9dfc4c16f22460b331886b191b

                                    SHA256

                                    f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb

                                    SHA512

                                    d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9

                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                    Filesize

                                    944B

                                    MD5

                                    3a6bad9528f8e23fb5c77fbd81fa28e8

                                    SHA1

                                    f127317c3bc6407f536c0f0600dcbcf1aabfba36

                                    SHA256

                                    986366767de5873f1b170a63f2a33ce05132d1afd90c8f5017afbca8ef1beb05

                                    SHA512

                                    846002154a0ece6f3e9feda6f115d3161dc21b3789525dd62ae1d9188495171293efdbe7be4710666dd8a15e66b557315b5a02918a741ed1d5f3ff0c515b98e2

                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                    Filesize

                                    944B

                                    MD5

                                    3a6bad9528f8e23fb5c77fbd81fa28e8

                                    SHA1

                                    f127317c3bc6407f536c0f0600dcbcf1aabfba36

                                    SHA256

                                    986366767de5873f1b170a63f2a33ce05132d1afd90c8f5017afbca8ef1beb05

                                    SHA512

                                    846002154a0ece6f3e9feda6f115d3161dc21b3789525dd62ae1d9188495171293efdbe7be4710666dd8a15e66b557315b5a02918a741ed1d5f3ff0c515b98e2

                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                    Filesize

                                    944B

                                    MD5

                                    3a6bad9528f8e23fb5c77fbd81fa28e8

                                    SHA1

                                    f127317c3bc6407f536c0f0600dcbcf1aabfba36

                                    SHA256

                                    986366767de5873f1b170a63f2a33ce05132d1afd90c8f5017afbca8ef1beb05

                                    SHA512

                                    846002154a0ece6f3e9feda6f115d3161dc21b3789525dd62ae1d9188495171293efdbe7be4710666dd8a15e66b557315b5a02918a741ed1d5f3ff0c515b98e2

                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                    Filesize

                                    944B

                                    MD5

                                    5f0ddc7f3691c81ee14d17b419ba220d

                                    SHA1

                                    f0ef5fde8bab9d17c0b47137e014c91be888ee53

                                    SHA256

                                    a31805264b8b13ce4145f272cb2830728c186c46e314b48514d636866217add5

                                    SHA512

                                    2ce7c2a0833f581297c13dd88ccfcd36bf129d2b5d7718c52b1d67c97cbd8fc93abc085a040229a0fd712e880c690de7f6b996b0b47c46a091fabb7931be58d3

                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                    Filesize

                                    944B

                                    MD5

                                    5f0ddc7f3691c81ee14d17b419ba220d

                                    SHA1

                                    f0ef5fde8bab9d17c0b47137e014c91be888ee53

                                    SHA256

                                    a31805264b8b13ce4145f272cb2830728c186c46e314b48514d636866217add5

                                    SHA512

                                    2ce7c2a0833f581297c13dd88ccfcd36bf129d2b5d7718c52b1d67c97cbd8fc93abc085a040229a0fd712e880c690de7f6b996b0b47c46a091fabb7931be58d3

                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                    Filesize

                                    944B

                                    MD5

                                    e243a38635ff9a06c87c2a61a2200656

                                    SHA1

                                    ecd95ed5bf1a9fbe96a8448fc2814a0210fa2afc

                                    SHA256

                                    af5782703f3f2d5a29fb313dae6680a64134db26064d4a321a3f23b75f6ca00f

                                    SHA512

                                    4418957a1b10eee44cf270c81816ae707352411c4f5ac14b6b61ab537c91480e24e0a0a2c276a6291081b4984c123cf673a45dcedb0ceeef682054ba0fc19cb4

                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                    Filesize

                                    944B

                                    MD5

                                    5f0ddc7f3691c81ee14d17b419ba220d

                                    SHA1

                                    f0ef5fde8bab9d17c0b47137e014c91be888ee53

                                    SHA256

                                    a31805264b8b13ce4145f272cb2830728c186c46e314b48514d636866217add5

                                    SHA512

                                    2ce7c2a0833f581297c13dd88ccfcd36bf129d2b5d7718c52b1d67c97cbd8fc93abc085a040229a0fd712e880c690de7f6b996b0b47c46a091fabb7931be58d3

                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                    Filesize

                                    944B

                                    MD5

                                    5f0ddc7f3691c81ee14d17b419ba220d

                                    SHA1

                                    f0ef5fde8bab9d17c0b47137e014c91be888ee53

                                    SHA256

                                    a31805264b8b13ce4145f272cb2830728c186c46e314b48514d636866217add5

                                    SHA512

                                    2ce7c2a0833f581297c13dd88ccfcd36bf129d2b5d7718c52b1d67c97cbd8fc93abc085a040229a0fd712e880c690de7f6b996b0b47c46a091fabb7931be58d3

                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                    Filesize

                                    944B

                                    MD5

                                    588e5b3406537204588ef39f4c84259f

                                    SHA1

                                    c6056b8139c0796cc6272b7b71fca2085f62b785

                                    SHA256

                                    3b7e7c56deb0f16483d67e60a42a5f0a58ee557790fe0f312d036e4ecc31f7f0

                                    SHA512

                                    f85ea8f8f0c3ea56840a84f42a188f125c13cea8b23f86ddcce8eb28758e816dd6d871154dfe63d250ef369b153f72c587a7a8bccd0a2728b7bc922dd7436e96

                                  • C:\Users\Admin\AppData\Local\Temp\0uTXzTWsAa.bat

                                    Filesize

                                    199B

                                    MD5

                                    809304d18092c233b78e247a02e02456

                                    SHA1

                                    8ff4b8b827142cf1a655a86cd8fa46e3fdb2caf8

                                    SHA256

                                    3fc5aec91701c01001568958aec1819563aab7c5b7e530f6f5773f73fd8c5ac7

                                    SHA512

                                    5b6e8eefba39de8d64ec56685f2238f11f6bdd23c76e785852ec6dc186bd45607fae16bb623bc5feea061d51051327c353ec18555f188835b997ce1385a321b0

                                  • C:\Users\Admin\AppData\Local\Temp\2qVagYZlTM.bat

                                    Filesize

                                    199B

                                    MD5

                                    4aab188058d1268ee344736439ed4b54

                                    SHA1

                                    faaa4492eae1f04e30afe7ffad468d1a2214363c

                                    SHA256

                                    9329cdb616e20442b0e1c088fe1601fc200558dabc290fef9c3596ebf9dfbe6f

                                    SHA512

                                    303ff06a6fb609c3b84431af07e04925f2cb4bc571ae597c8f9e4731da8944cc47c5dedf9cf3e168862fed02f9d3f46d6d0dfd0ba1a0ce43d1320435f8044630

                                  • C:\Users\Admin\AppData\Local\Temp\Ljju5cbnZy.bat

                                    Filesize

                                    199B

                                    MD5

                                    524f283384c7036d2b159cd3de72dfa5

                                    SHA1

                                    eb3564095d358815bc2db8c79387f430f6d5f8c0

                                    SHA256

                                    c62848d5b5e0990437d48dce23854368db887db4cba436b630014a4fe638423e

                                    SHA512

                                    043219bef99d798aa7c2d5a76085d13a5c1cd1d097e49d5d777366b44bd89f5eacefb019cd0b290d1b0cf17489b4fcb6584dcfd8be250f2342cb4673b123e02a

                                  • C:\Users\Admin\AppData\Local\Temp\SNhzeWIHcH.bat

                                    Filesize

                                    199B

                                    MD5

                                    931e3d371903438540ff866165f59f4a

                                    SHA1

                                    82d5b519c1ac79cfe770fdf5b4547a77c2c586ca

                                    SHA256

                                    98c32bc11a17e99b311083653cc45d7ef7b2d278e5688d288d6026eada78e479

                                    SHA512

                                    24a60e695746473a7f52fe1137bb4265a83e093e3c0fa3d3683af5587c59a1132cbb00d8f46dae63fd52fd23c6a3ad0952a86dfbc75f3bdcf37ee3d30551268f

                                  • C:\Users\Admin\AppData\Local\Temp\XFk51gP3Gp.bat

                                    Filesize

                                    199B

                                    MD5

                                    98a9bff8d217114416cf748cc0700d6d

                                    SHA1

                                    8f03e0590a5532a0e7799f88dd65a444d8e5ef10

                                    SHA256

                                    f1679e4873c9238746cbc466040dd6ca793dd3cc1278713e2d299c6ae5ffeed4

                                    SHA512

                                    be0509e071d44553179a0bdcf1d270ad21e64e005903460d7aca9438f9e74502dcd1e40a32035227d03c95192c62008a49a929ca3aae192a664dd5f27692b817

                                  • C:\Users\Admin\AppData\Local\Temp\XFk51gP3Gp.bat

                                    Filesize

                                    199B

                                    MD5

                                    98a9bff8d217114416cf748cc0700d6d

                                    SHA1

                                    8f03e0590a5532a0e7799f88dd65a444d8e5ef10

                                    SHA256

                                    f1679e4873c9238746cbc466040dd6ca793dd3cc1278713e2d299c6ae5ffeed4

                                    SHA512

                                    be0509e071d44553179a0bdcf1d270ad21e64e005903460d7aca9438f9e74502dcd1e40a32035227d03c95192c62008a49a929ca3aae192a664dd5f27692b817

                                  • C:\Users\Admin\AppData\Local\Temp\eNTIt1NKYH.bat

                                    Filesize

                                    199B

                                    MD5

                                    60159919d7833a8d2d1a155f640c42de

                                    SHA1

                                    2567e7d99d691035527ea7c9ed934587a4ce1c07

                                    SHA256

                                    2f9f5d323bddb84e4bee7fe4cb63af7aa7766dfae324204c244d21fc12a24709

                                    SHA512

                                    e076dbbd920a9dd8b0ca3ca764ee355af1d0be955be064df0860b33c23f9365fdc900102b2c2d99f3855ce9732228c6747014d8fceeb2050ec3cf3dfcc8f0c27

                                  • C:\Users\Admin\AppData\Local\Temp\o4pIGJu18c.bat

                                    Filesize

                                    199B

                                    MD5

                                    4dfe2c1ecdc258b42eb872347bcc1d32

                                    SHA1

                                    18f03042289c9997ad35d271d16a894fbf037d35

                                    SHA256

                                    c8eecb41afc36b64fe88d8d8768bdbab2224892806216e1e3317bcb53434061b

                                    SHA512

                                    7e05dd6252daef1227ad12e0e3cc5f2f10862d3d64792239a6b8548b662f82485284fcd2d5a9f80d7e70d448d09b69449b23a8ce9cf7ea4ab5c6705257821289

                                  • C:\Users\Admin\AppData\Local\Temp\t6OOvELCCF.bat

                                    Filesize

                                    199B

                                    MD5

                                    8824c7951172ee0a90bf2f4f01361c6c

                                    SHA1

                                    ac0dc8f05f2950384fddd4e154875142f0f33685

                                    SHA256

                                    9dee2fc482c30ca55bbbbb6ff71477903e58538f1049f8ab40a24bdc2c185fc7

                                    SHA512

                                    d39b0d65311f268547d31afd2487e6d3445b2ef041c5dd98e1123e061ebb3b8729c230c1d4668cc2b0add5c06587abdfd7516591d144a7354cf802d736d8db3a

                                  • C:\providercommon\1zu9dW.bat

                                    Filesize

                                    36B

                                    MD5

                                    6783c3ee07c7d151ceac57f1f9c8bed7

                                    SHA1

                                    17468f98f95bf504cc1f83c49e49a78526b3ea03

                                    SHA256

                                    8ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322

                                    SHA512

                                    c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8

                                  • C:\providercommon\DllCommonsvc.exe

                                    Filesize

                                    1.0MB

                                    MD5

                                    bd31e94b4143c4ce49c17d3af46bcad0

                                    SHA1

                                    f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                    SHA256

                                    b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                    SHA512

                                    f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                  • C:\providercommon\DllCommonsvc.exe

                                    Filesize

                                    1.0MB

                                    MD5

                                    bd31e94b4143c4ce49c17d3af46bcad0

                                    SHA1

                                    f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                    SHA256

                                    b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                    SHA512

                                    f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                  • C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe

                                    Filesize

                                    197B

                                    MD5

                                    8088241160261560a02c84025d107592

                                    SHA1

                                    083121f7027557570994c9fc211df61730455bb5

                                    SHA256

                                    2072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1

                                    SHA512

                                    20d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478

                                  • memory/224-166-0x0000000000000000-mapping.dmp

                                  • memory/224-179-0x00007FFC3A940000-0x00007FFC3B401000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/224-215-0x00007FFC3A940000-0x00007FFC3B401000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/1008-195-0x00007FFC3A940000-0x00007FFC3B401000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/1008-163-0x00007FFC3A940000-0x00007FFC3B401000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/1008-147-0x0000000000000000-mapping.dmp

                                  • memory/1188-238-0x00007FFC3A190000-0x00007FFC3AC51000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/1188-232-0x0000000000000000-mapping.dmp

                                  • memory/1188-234-0x00007FFC3A190000-0x00007FFC3AC51000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/1272-242-0x0000000000000000-mapping.dmp

                                  • memory/1540-252-0x00007FFC3A240000-0x00007FFC3AD01000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/1540-246-0x0000000000000000-mapping.dmp

                                  • memory/1540-248-0x00007FFC3A240000-0x00007FFC3AD01000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/1596-231-0x00007FFC3A190000-0x00007FFC3AC51000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/1596-227-0x00007FFC3A190000-0x00007FFC3AC51000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/1596-224-0x0000000000000000-mapping.dmp

                                  • memory/1596-226-0x00007FFC3A190000-0x00007FFC3AC51000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/1672-157-0x00007FFC3A940000-0x00007FFC3B401000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/1672-186-0x00007FFC3A940000-0x00007FFC3B401000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/1672-237-0x0000000000000000-mapping.dmp

                                  • memory/1672-144-0x0000000000000000-mapping.dmp

                                  • memory/1816-255-0x00007FFC3A240000-0x00007FFC3AD01000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/1816-259-0x00007FFC3A240000-0x00007FFC3AD01000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/1816-253-0x0000000000000000-mapping.dmp

                                  • memory/1824-159-0x0000000000000000-mapping.dmp

                                  • memory/1824-208-0x00007FFC3A940000-0x00007FFC3B401000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/1824-167-0x00007FFC3A940000-0x00007FFC3B401000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/1900-245-0x00007FFC3A190000-0x00007FFC3AC51000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/1900-239-0x0000000000000000-mapping.dmp

                                  • memory/1900-241-0x00007FFC3A190000-0x00007FFC3AC51000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/1976-175-0x00007FFC3A940000-0x00007FFC3B401000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/1976-149-0x0000000000000000-mapping.dmp

                                  • memory/1976-199-0x00007FFC3A940000-0x00007FFC3B401000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/2064-265-0x0000000000000000-mapping.dmp

                                  • memory/2260-135-0x0000000000000000-mapping.dmp

                                  • memory/2348-189-0x00007FFC3A940000-0x00007FFC3B401000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/2348-150-0x00007FFC3A940000-0x00007FFC3B401000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/2348-141-0x0000000000000000-mapping.dmp

                                  • memory/2348-162-0x00000287F3130000-0x00000287F3152000-memory.dmp

                                    Filesize

                                    136KB

                                  • memory/2468-249-0x0000000000000000-mapping.dmp

                                  • memory/2572-262-0x00007FFC3A240000-0x00007FFC3AD01000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/2572-266-0x00007FFC3A240000-0x00007FFC3AD01000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/2572-260-0x0000000000000000-mapping.dmp

                                  • memory/2756-136-0x0000000000000000-mapping.dmp

                                  • memory/2756-139-0x0000000000A40000-0x0000000000B50000-memory.dmp

                                    Filesize

                                    1.1MB

                                  • memory/2756-140-0x00007FFC3A940000-0x00007FFC3B401000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/2756-212-0x0000000000000000-mapping.dmp

                                  • memory/2756-171-0x00007FFC3A940000-0x00007FFC3B401000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/2984-156-0x0000000000000000-mapping.dmp

                                  • memory/2984-204-0x00007FFC3A940000-0x00007FFC3B401000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/2984-177-0x00007FFC3A940000-0x00007FFC3B401000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/3012-146-0x0000000000000000-mapping.dmp

                                  • memory/3012-160-0x00007FFC3A940000-0x00007FFC3B401000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/3012-188-0x00007FFC3A940000-0x00007FFC3B401000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/3120-220-0x0000000000000000-mapping.dmp

                                  • memory/3128-153-0x00007FFC3A940000-0x00007FFC3B401000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/3128-142-0x0000000000000000-mapping.dmp

                                  • memory/3128-187-0x00007FFC3A940000-0x00007FFC3B401000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/3640-222-0x0000000000000000-mapping.dmp

                                  • memory/3804-258-0x0000000000000000-mapping.dmp

                                  • memory/4072-158-0x0000000000000000-mapping.dmp

                                  • memory/4072-178-0x00007FFC3A940000-0x00007FFC3B401000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/4072-209-0x00007FFC3A940000-0x00007FFC3B401000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/4120-263-0x0000000000000000-mapping.dmp

                                  • memory/4160-132-0x0000000000000000-mapping.dmp

                                  • memory/4164-155-0x0000000000000000-mapping.dmp

                                  • memory/4164-165-0x00007FFC3A940000-0x00007FFC3B401000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/4164-197-0x00007FFC3A940000-0x00007FFC3B401000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/4280-214-0x0000000000000000-mapping.dmp

                                  • memory/4288-230-0x0000000000000000-mapping.dmp

                                  • memory/4376-216-0x0000000000000000-mapping.dmp

                                  • memory/4376-223-0x00007FFC3A130000-0x00007FFC3ABF1000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/4376-219-0x00007FFC3A130000-0x00007FFC3ABF1000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/4592-170-0x00007FFC3A940000-0x00007FFC3B401000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/4592-211-0x00007FFC3A940000-0x00007FFC3B401000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/4592-161-0x0000000000000000-mapping.dmp

                                  • memory/4676-154-0x0000000000000000-mapping.dmp

                                  • memory/4676-207-0x00007FFC3A940000-0x00007FFC3B401000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/4676-164-0x00007FFC3A940000-0x00007FFC3B401000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/4680-176-0x00007FFC3A940000-0x00007FFC3B401000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/4680-206-0x00007FFC3A940000-0x00007FFC3B401000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/4680-152-0x0000000000000000-mapping.dmp

                                  • memory/4796-151-0x0000000000000000-mapping.dmp

                                  • memory/4840-192-0x00007FFC3A940000-0x00007FFC3B401000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/4840-143-0x0000000000000000-mapping.dmp

                                  • memory/4840-172-0x00007FFC3A940000-0x00007FFC3B401000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/4852-193-0x00007FFC3A940000-0x00007FFC3B401000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/4852-173-0x00007FFC3A940000-0x00007FFC3B401000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/4852-145-0x0000000000000000-mapping.dmp

                                  • memory/5064-148-0x0000000000000000-mapping.dmp

                                  • memory/5064-191-0x00007FFC3A940000-0x00007FFC3B401000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/5064-174-0x00007FFC3A940000-0x00007FFC3B401000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/5160-251-0x0000000000000000-mapping.dmp

                                  • memory/5164-256-0x0000000000000000-mapping.dmp

                                  • memory/5212-272-0x0000000000000000-mapping.dmp

                                  • memory/5436-228-0x0000000000000000-mapping.dmp

                                  • memory/5592-244-0x0000000000000000-mapping.dmp

                                  • memory/5652-267-0x0000000000000000-mapping.dmp

                                  • memory/5652-269-0x00007FFC3A240000-0x00007FFC3AD01000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/5652-273-0x00007FFC3A240000-0x00007FFC3AD01000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/5828-270-0x0000000000000000-mapping.dmp

                                  • memory/5892-235-0x0000000000000000-mapping.dmp