Analysis
-
max time kernel
65s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
16-01-2023 18:58
Behavioral task
behavioral1
Sample
a2719b1149f9c0b195701ccb3050b8bb6ae5facb1845f8b562bbe48b96c69a56.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a2719b1149f9c0b195701ccb3050b8bb6ae5facb1845f8b562bbe48b96c69a56.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
tmp.exe
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
tmp.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
tmp.exe
Resource
win7-20220901-en
Behavioral task
behavioral6
Sample
tmp.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
e6b6a16d17784fdcb240af7ff962b014d7d61d391a99293c8d2fad5dc2805458.exe
Resource
win7-20221111-en
Behavioral task
behavioral8
Sample
e6b6a16d17784fdcb240af7ff962b014d7d61d391a99293c8d2fad5dc2805458.exe
Resource
win10v2004-20220812-en
General
-
Target
tmp.exe
-
Size
1.1MB
-
MD5
1466f001f010dfed5838484c2fb25a56
-
SHA1
489c707fd9d43574e536b4da4f15d3965d57c2fc
-
SHA256
d3c18746bd2a2cb25e714a40be7a3e94d5bab0d924db7160ef8cc82a7f0848bc
-
SHA512
35fb65a70892c86f3e8ae97e84648d089e7bad8ff567503d2322d24fbee953a7ccef49611c8e4ad98b29cd0b926699a48d11a10c189e7e903dcb529ed23a75e0
-
SSDEEP
12288:4epPM2lx+HOqRo1lEBht1ylUyeewN3eJE3/oZ4DFWX4DBYFn9ducCSLEelT+wsHu:X0Vey/Olg5pwZesvCStZsbqSNz6
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 57 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1884 1868 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1620 1868 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1768 1868 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1448 1868 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1888 1868 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1512 1868 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 820 1868 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1484 1868 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 784 1868 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 760 1868 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 920 1868 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1064 1868 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 620 1868 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1376 1868 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1992 1868 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 824 1868 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1280 1868 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1092 1868 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1440 1868 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 276 1868 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1236 1868 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 924 1868 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1816 1868 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 436 1868 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1232 1868 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1884 1868 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1916 1868 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 972 1868 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 744 1868 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1448 1868 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1652 1868 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 908 1868 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 880 1868 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1512 1868 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 748 1868 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 560 1868 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 296 1868 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 332 1868 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 760 1868 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1940 1868 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 620 1868 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1064 1868 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1376 1868 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1368 1868 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1116 1868 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 980 1868 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 744 1868 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1008 1868 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1360 1868 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 276 1868 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1640 1868 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 924 1868 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2072 1868 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2096 1868 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2120 1868 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2140 1868 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2164 1868 schtasks.exe -
Processes:
resource yara_rule behavioral5/memory/112-71-0x0000000000400000-0x000000000053A000-memory.dmp dcrat behavioral5/memory/112-70-0x0000000000400000-0x000000000053A000-memory.dmp dcrat behavioral5/memory/112-72-0x0000000000400000-0x000000000053A000-memory.dmp dcrat behavioral5/memory/112-77-0x0000000000400000-0x000000000053A000-memory.dmp dcrat behavioral5/memory/112-75-0x0000000000400000-0x000000000053A000-memory.dmp dcrat behavioral5/memory/112-73-0x000000000053510E-mapping.dmp dcrat -
Drops file in Drivers directory 1 IoCs
Processes:
tmp.exedescription ioc process File opened for modification C:\Windows\System32\drivers\etc\hosts tmp.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
tmp.exedescription pid process target process PID 1268 set thread context of 112 1268 tmp.exe tmp.exe -
Drops file in Program Files directory 14 IoCs
Processes:
tmp.exedescription ioc process File created C:\Program Files (x86)\Microsoft Visual Studio 8\SDK\lsm.exe tmp.exe File created C:\Program Files\Common Files\taskhost.exe tmp.exe File created C:\Program Files\Microsoft Games\SpiderSolitaire\it-IT\System.exe tmp.exe File created C:\Program Files\Microsoft Games\SpiderSolitaire\it-IT\27d1bcfc3c54e0 tmp.exe File created C:\Program Files\Microsoft Games\Multiplayer\Checkers\fr-FR\wininit.exe tmp.exe File created C:\Program Files\Common Files\b75386f1303e64 tmp.exe File created C:\Program Files (x86)\Google\Policies\taskhost.exe tmp.exe File created C:\Program Files (x86)\Windows NT\TableTextService\ja-JP\services.exe tmp.exe File created C:\Program Files (x86)\Windows NT\TableTextService\ja-JP\c5b4cb5e9653cc tmp.exe File created C:\Program Files (x86)\Google\Policies\b75386f1303e64 tmp.exe File created C:\Program Files\Common Files\System\explorer.exe tmp.exe File created C:\Program Files\Microsoft Games\Multiplayer\Checkers\fr-FR\56085415360792 tmp.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\SDK\101b941d020240 tmp.exe File created C:\Program Files\Common Files\System\7a0fd90576e088 tmp.exe -
Drops file in Windows directory 6 IoCs
Processes:
tmp.exedescription ioc process File created C:\Windows\LiveKernelReports\f3b6ecef712a24 tmp.exe File created C:\Windows\PLA\Templates\winlogon.exe tmp.exe File created C:\Windows\PLA\Templates\cc11b995f2a76d tmp.exe File created C:\Windows\fr-FR\wininit.exe tmp.exe File created C:\Windows\fr-FR\56085415360792 tmp.exe File created C:\Windows\LiveKernelReports\spoolsv.exe tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 57 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 1484 schtasks.exe 436 schtasks.exe 1652 schtasks.exe 1008 schtasks.exe 1888 schtasks.exe 784 schtasks.exe 920 schtasks.exe 1448 schtasks.exe 1640 schtasks.exe 1512 schtasks.exe 1236 schtasks.exe 744 schtasks.exe 2096 schtasks.exe 1768 schtasks.exe 748 schtasks.exe 1064 schtasks.exe 2164 schtasks.exe 1376 schtasks.exe 1440 schtasks.exe 908 schtasks.exe 276 schtasks.exe 276 schtasks.exe 1884 schtasks.exe 1116 schtasks.exe 1620 schtasks.exe 1992 schtasks.exe 824 schtasks.exe 296 schtasks.exe 1376 schtasks.exe 1360 schtasks.exe 1064 schtasks.exe 1816 schtasks.exe 1368 schtasks.exe 820 schtasks.exe 760 schtasks.exe 620 schtasks.exe 1232 schtasks.exe 560 schtasks.exe 880 schtasks.exe 980 schtasks.exe 2072 schtasks.exe 1884 schtasks.exe 1280 schtasks.exe 1092 schtasks.exe 924 schtasks.exe 972 schtasks.exe 2120 schtasks.exe 1916 schtasks.exe 760 schtasks.exe 2140 schtasks.exe 744 schtasks.exe 1512 schtasks.exe 332 schtasks.exe 1940 schtasks.exe 924 schtasks.exe 1448 schtasks.exe 620 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 19 IoCs
Processes:
powershell.exepowershell.exetmp.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 1608 powershell.exe 1476 powershell.exe 112 tmp.exe 112 tmp.exe 112 tmp.exe 2184 powershell.exe 2196 powershell.exe 2220 powershell.exe 2260 powershell.exe 2240 powershell.exe 2404 powershell.exe 2560 powershell.exe 2528 powershell.exe 2452 powershell.exe 2596 powershell.exe 2644 powershell.exe 2292 powershell.exe 2356 powershell.exe 2696 powershell.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
Processes:
tmp.exepowershell.exepowershell.exetmp.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 1268 tmp.exe Token: SeDebugPrivilege 1608 powershell.exe Token: SeDebugPrivilege 1476 powershell.exe Token: SeDebugPrivilege 112 tmp.exe Token: SeDebugPrivilege 2184 powershell.exe Token: SeDebugPrivilege 2196 powershell.exe Token: SeDebugPrivilege 2220 powershell.exe Token: SeDebugPrivilege 2260 powershell.exe Token: SeDebugPrivilege 2240 powershell.exe Token: SeDebugPrivilege 2404 powershell.exe Token: SeDebugPrivilege 2560 powershell.exe Token: SeDebugPrivilege 2528 powershell.exe Token: SeDebugPrivilege 2452 powershell.exe Token: SeDebugPrivilege 2596 powershell.exe Token: SeDebugPrivilege 2644 powershell.exe Token: SeDebugPrivilege 2292 powershell.exe Token: SeDebugPrivilege 2356 powershell.exe Token: SeDebugPrivilege 2696 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
tmp.execmd.exetmp.exedescription pid process target process PID 1268 wrote to memory of 1608 1268 tmp.exe powershell.exe PID 1268 wrote to memory of 1608 1268 tmp.exe powershell.exe PID 1268 wrote to memory of 1608 1268 tmp.exe powershell.exe PID 1268 wrote to memory of 1608 1268 tmp.exe powershell.exe PID 1268 wrote to memory of 2000 1268 tmp.exe cmd.exe PID 1268 wrote to memory of 2000 1268 tmp.exe cmd.exe PID 1268 wrote to memory of 2000 1268 tmp.exe cmd.exe PID 1268 wrote to memory of 2000 1268 tmp.exe cmd.exe PID 2000 wrote to memory of 1476 2000 cmd.exe powershell.exe PID 2000 wrote to memory of 1476 2000 cmd.exe powershell.exe PID 2000 wrote to memory of 1476 2000 cmd.exe powershell.exe PID 2000 wrote to memory of 1476 2000 cmd.exe powershell.exe PID 1268 wrote to memory of 112 1268 tmp.exe tmp.exe PID 1268 wrote to memory of 112 1268 tmp.exe tmp.exe PID 1268 wrote to memory of 112 1268 tmp.exe tmp.exe PID 1268 wrote to memory of 112 1268 tmp.exe tmp.exe PID 1268 wrote to memory of 112 1268 tmp.exe tmp.exe PID 1268 wrote to memory of 112 1268 tmp.exe tmp.exe PID 1268 wrote to memory of 112 1268 tmp.exe tmp.exe PID 1268 wrote to memory of 112 1268 tmp.exe tmp.exe PID 1268 wrote to memory of 112 1268 tmp.exe tmp.exe PID 112 wrote to memory of 2184 112 tmp.exe powershell.exe PID 112 wrote to memory of 2184 112 tmp.exe powershell.exe PID 112 wrote to memory of 2184 112 tmp.exe powershell.exe PID 112 wrote to memory of 2184 112 tmp.exe powershell.exe PID 112 wrote to memory of 2196 112 tmp.exe powershell.exe PID 112 wrote to memory of 2196 112 tmp.exe powershell.exe PID 112 wrote to memory of 2196 112 tmp.exe powershell.exe PID 112 wrote to memory of 2196 112 tmp.exe powershell.exe PID 112 wrote to memory of 2220 112 tmp.exe powershell.exe PID 112 wrote to memory of 2220 112 tmp.exe powershell.exe PID 112 wrote to memory of 2220 112 tmp.exe powershell.exe PID 112 wrote to memory of 2220 112 tmp.exe powershell.exe PID 112 wrote to memory of 2240 112 tmp.exe powershell.exe PID 112 wrote to memory of 2240 112 tmp.exe powershell.exe PID 112 wrote to memory of 2240 112 tmp.exe powershell.exe PID 112 wrote to memory of 2240 112 tmp.exe powershell.exe PID 112 wrote to memory of 2260 112 tmp.exe powershell.exe PID 112 wrote to memory of 2260 112 tmp.exe powershell.exe PID 112 wrote to memory of 2260 112 tmp.exe powershell.exe PID 112 wrote to memory of 2260 112 tmp.exe powershell.exe PID 112 wrote to memory of 2292 112 tmp.exe powershell.exe PID 112 wrote to memory of 2292 112 tmp.exe powershell.exe PID 112 wrote to memory of 2292 112 tmp.exe powershell.exe PID 112 wrote to memory of 2292 112 tmp.exe powershell.exe PID 112 wrote to memory of 2356 112 tmp.exe powershell.exe PID 112 wrote to memory of 2356 112 tmp.exe powershell.exe PID 112 wrote to memory of 2356 112 tmp.exe powershell.exe PID 112 wrote to memory of 2356 112 tmp.exe powershell.exe PID 112 wrote to memory of 2404 112 tmp.exe powershell.exe PID 112 wrote to memory of 2404 112 tmp.exe powershell.exe PID 112 wrote to memory of 2404 112 tmp.exe powershell.exe PID 112 wrote to memory of 2404 112 tmp.exe powershell.exe PID 112 wrote to memory of 2452 112 tmp.exe powershell.exe PID 112 wrote to memory of 2452 112 tmp.exe powershell.exe PID 112 wrote to memory of 2452 112 tmp.exe powershell.exe PID 112 wrote to memory of 2452 112 tmp.exe powershell.exe PID 112 wrote to memory of 2528 112 tmp.exe powershell.exe PID 112 wrote to memory of 2528 112 tmp.exe powershell.exe PID 112 wrote to memory of 2528 112 tmp.exe powershell.exe PID 112 wrote to memory of 2528 112 tmp.exe powershell.exe PID 112 wrote to memory of 2560 112 tmp.exe powershell.exe PID 112 wrote to memory of 2560 112 tmp.exe powershell.exe PID 112 wrote to memory of 2560 112 tmp.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgA2AA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell -ENC cwBlAHQALQBtAHAAcAByAGUAZgBlAHIAZQBuAGMAZQAgAC0AZQB4AGMAbAB1AHMAaQBvAG4AcABhAHQAaAAgAEMAOgBcAA==2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -ENC cwBlAHQALQBtAHAAcAByAGUAZgBlAHIAZQBuAGMAZQAgAC0AZQB4AGMAbAB1AHMAaQBvAG4AcABhAHQAaAAgAEMAOgBcAA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp.exe2⤵
- Drops file in Drivers directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\tmp.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\31001cc2-2a3d-11ed-9244-9c23e66b04e4\sppsvc.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Google\Policies\taskhost.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\fr-FR\wininit.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\LiveKernelReports\spoolsv.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Microsoft Games\SpiderSolitaire\it-IT\System.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Microsoft Games\Multiplayer\Checkers\fr-FR\wininit.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Microsoft Visual Studio 8\SDK\lsm.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\lsass.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\explorer.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default User\taskhost.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\31001cc2-2a3d-11ed-9244-9c23e66b04e4\System.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\PLA\Templates\winlogon.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\31001cc2-2a3d-11ed-9244-9c23e66b04e4\lsass.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\Music\taskhost.exe'3⤵
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 13 /tr "'C:\Recovery\31001cc2-2a3d-11ed-9244-9c23e66b04e4\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Recovery\31001cc2-2a3d-11ed-9244-9c23e66b04e4\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 12 /tr "'C:\Recovery\31001cc2-2a3d-11ed-9244-9c23e66b04e4\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Google\Policies\taskhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Google\Policies\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Google\Policies\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 12 /tr "'C:\Windows\fr-FR\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Windows\fr-FR\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 6 /tr "'C:\Windows\fr-FR\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 10 /tr "'C:\Windows\LiveKernelReports\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Windows\LiveKernelReports\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 6 /tr "'C:\Windows\LiveKernelReports\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 14 /tr "'C:\Program Files\Microsoft Games\SpiderSolitaire\it-IT\System.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files\Microsoft Games\SpiderSolitaire\it-IT\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 5 /tr "'C:\Program Files\Microsoft Games\SpiderSolitaire\it-IT\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 6 /tr "'C:\Program Files\Microsoft Games\Multiplayer\Checkers\fr-FR\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Program Files\Microsoft Games\Multiplayer\Checkers\fr-FR\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 10 /tr "'C:\Program Files\Microsoft Games\Multiplayer\Checkers\fr-FR\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Microsoft Visual Studio 8\SDK\lsm.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Visual Studio 8\SDK\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Microsoft Visual Studio 8\SDK\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 9 /tr "'C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 7 /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 7 /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 13 /tr "'C:\Users\Default User\taskhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Users\Default User\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 13 /tr "'C:\Users\Default User\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 10 /tr "'C:\Recovery\31001cc2-2a3d-11ed-9244-9c23e66b04e4\System.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Recovery\31001cc2-2a3d-11ed-9244-9c23e66b04e4\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 14 /tr "'C:\Recovery\31001cc2-2a3d-11ed-9244-9c23e66b04e4\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 5 /tr "'C:\Windows\PLA\Templates\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Windows\PLA\Templates\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 9 /tr "'C:\Windows\PLA\Templates\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 13 /tr "'C:\Recovery\31001cc2-2a3d-11ed-9244-9c23e66b04e4\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Recovery\31001cc2-2a3d-11ed-9244-9c23e66b04e4\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 8 /tr "'C:\Recovery\31001cc2-2a3d-11ed-9244-9c23e66b04e4\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 8 /tr "'C:\Users\Default\Music\taskhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Users\Default\Music\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 12 /tr "'C:\Users\Default\Music\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "tmpt" /sc MINUTE /mo 6 /tr "'C:\Users\All Users\Favorites\tmp.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "tmp" /sc ONLOGON /tr "'C:\Users\All Users\Favorites\tmp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "tmpt" /sc MINUTE /mo 8 /tr "'C:\Users\All Users\Favorites\tmp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 9 /tr "'C:\Users\All Users\Microsoft\taskhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Users\All Users\Microsoft\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 10 /tr "'C:\Users\All Users\Microsoft\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows NT\TableTextService\ja-JP\services.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows NT\TableTextService\ja-JP\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows NT\TableTextService\ja-JP\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 8 /tr "'C:\Program Files\Common Files\System\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files\Common Files\System\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 5 /tr "'C:\Program Files\Common Files\System\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 9 /tr "'C:\Program Files\Common Files\taskhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Program Files\Common Files\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 5 /tr "'C:\Program Files\Common Files\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD511745748c581814be1bd6e54c99240c0
SHA1a6932005a793d779dff903ca7b2d4d2e6686f922
SHA256f8285f4499ea9aafa8ec4170675b171027b85bc54a1655d654d7e0eb9278bb7a
SHA512d95954c8f4a0d24c705275267d91a383608e35e349d8f8f0f954783b6f06f849519ebfd55106c995bec0421b8666ddb24de0efe1cc19aa61f675f1e68118ae49
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD511745748c581814be1bd6e54c99240c0
SHA1a6932005a793d779dff903ca7b2d4d2e6686f922
SHA256f8285f4499ea9aafa8ec4170675b171027b85bc54a1655d654d7e0eb9278bb7a
SHA512d95954c8f4a0d24c705275267d91a383608e35e349d8f8f0f954783b6f06f849519ebfd55106c995bec0421b8666ddb24de0efe1cc19aa61f675f1e68118ae49
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD511745748c581814be1bd6e54c99240c0
SHA1a6932005a793d779dff903ca7b2d4d2e6686f922
SHA256f8285f4499ea9aafa8ec4170675b171027b85bc54a1655d654d7e0eb9278bb7a
SHA512d95954c8f4a0d24c705275267d91a383608e35e349d8f8f0f954783b6f06f849519ebfd55106c995bec0421b8666ddb24de0efe1cc19aa61f675f1e68118ae49
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD5b11a77aa7f25bb0f968e5efc1f7be34f
SHA14991ed1f2a6a7fa9dd3cbffd0681f02224bcb738
SHA25608752f1376f3e3aff5343a571f44d2a5fce1eeb2dfe7d0f143db3504bd8a25bb
SHA5121a06fc14f2856f8a98060e91c43e2af4734cffd0f739ded5656ff73c9408a697a5f6c3d13ccbb312fb8567391714ffe3545be685979307878207eff468ede550
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD511745748c581814be1bd6e54c99240c0
SHA1a6932005a793d779dff903ca7b2d4d2e6686f922
SHA256f8285f4499ea9aafa8ec4170675b171027b85bc54a1655d654d7e0eb9278bb7a
SHA512d95954c8f4a0d24c705275267d91a383608e35e349d8f8f0f954783b6f06f849519ebfd55106c995bec0421b8666ddb24de0efe1cc19aa61f675f1e68118ae49
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD511745748c581814be1bd6e54c99240c0
SHA1a6932005a793d779dff903ca7b2d4d2e6686f922
SHA256f8285f4499ea9aafa8ec4170675b171027b85bc54a1655d654d7e0eb9278bb7a
SHA512d95954c8f4a0d24c705275267d91a383608e35e349d8f8f0f954783b6f06f849519ebfd55106c995bec0421b8666ddb24de0efe1cc19aa61f675f1e68118ae49
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD511745748c581814be1bd6e54c99240c0
SHA1a6932005a793d779dff903ca7b2d4d2e6686f922
SHA256f8285f4499ea9aafa8ec4170675b171027b85bc54a1655d654d7e0eb9278bb7a
SHA512d95954c8f4a0d24c705275267d91a383608e35e349d8f8f0f954783b6f06f849519ebfd55106c995bec0421b8666ddb24de0efe1cc19aa61f675f1e68118ae49
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD5b11a77aa7f25bb0f968e5efc1f7be34f
SHA14991ed1f2a6a7fa9dd3cbffd0681f02224bcb738
SHA25608752f1376f3e3aff5343a571f44d2a5fce1eeb2dfe7d0f143db3504bd8a25bb
SHA5121a06fc14f2856f8a98060e91c43e2af4734cffd0f739ded5656ff73c9408a697a5f6c3d13ccbb312fb8567391714ffe3545be685979307878207eff468ede550
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD511745748c581814be1bd6e54c99240c0
SHA1a6932005a793d779dff903ca7b2d4d2e6686f922
SHA256f8285f4499ea9aafa8ec4170675b171027b85bc54a1655d654d7e0eb9278bb7a
SHA512d95954c8f4a0d24c705275267d91a383608e35e349d8f8f0f954783b6f06f849519ebfd55106c995bec0421b8666ddb24de0efe1cc19aa61f675f1e68118ae49
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD511745748c581814be1bd6e54c99240c0
SHA1a6932005a793d779dff903ca7b2d4d2e6686f922
SHA256f8285f4499ea9aafa8ec4170675b171027b85bc54a1655d654d7e0eb9278bb7a
SHA512d95954c8f4a0d24c705275267d91a383608e35e349d8f8f0f954783b6f06f849519ebfd55106c995bec0421b8666ddb24de0efe1cc19aa61f675f1e68118ae49
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD511745748c581814be1bd6e54c99240c0
SHA1a6932005a793d779dff903ca7b2d4d2e6686f922
SHA256f8285f4499ea9aafa8ec4170675b171027b85bc54a1655d654d7e0eb9278bb7a
SHA512d95954c8f4a0d24c705275267d91a383608e35e349d8f8f0f954783b6f06f849519ebfd55106c995bec0421b8666ddb24de0efe1cc19aa61f675f1e68118ae49
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD511745748c581814be1bd6e54c99240c0
SHA1a6932005a793d779dff903ca7b2d4d2e6686f922
SHA256f8285f4499ea9aafa8ec4170675b171027b85bc54a1655d654d7e0eb9278bb7a
SHA512d95954c8f4a0d24c705275267d91a383608e35e349d8f8f0f954783b6f06f849519ebfd55106c995bec0421b8666ddb24de0efe1cc19aa61f675f1e68118ae49
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD511745748c581814be1bd6e54c99240c0
SHA1a6932005a793d779dff903ca7b2d4d2e6686f922
SHA256f8285f4499ea9aafa8ec4170675b171027b85bc54a1655d654d7e0eb9278bb7a
SHA512d95954c8f4a0d24c705275267d91a383608e35e349d8f8f0f954783b6f06f849519ebfd55106c995bec0421b8666ddb24de0efe1cc19aa61f675f1e68118ae49
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD511745748c581814be1bd6e54c99240c0
SHA1a6932005a793d779dff903ca7b2d4d2e6686f922
SHA256f8285f4499ea9aafa8ec4170675b171027b85bc54a1655d654d7e0eb9278bb7a
SHA512d95954c8f4a0d24c705275267d91a383608e35e349d8f8f0f954783b6f06f849519ebfd55106c995bec0421b8666ddb24de0efe1cc19aa61f675f1e68118ae49
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD511745748c581814be1bd6e54c99240c0
SHA1a6932005a793d779dff903ca7b2d4d2e6686f922
SHA256f8285f4499ea9aafa8ec4170675b171027b85bc54a1655d654d7e0eb9278bb7a
SHA512d95954c8f4a0d24c705275267d91a383608e35e349d8f8f0f954783b6f06f849519ebfd55106c995bec0421b8666ddb24de0efe1cc19aa61f675f1e68118ae49
-
memory/112-70-0x0000000000400000-0x000000000053A000-memory.dmpFilesize
1.2MB
-
memory/112-90-0x0000000002260000-0x000000000226A000-memory.dmpFilesize
40KB
-
memory/112-75-0x0000000000400000-0x000000000053A000-memory.dmpFilesize
1.2MB
-
memory/112-73-0x000000000053510E-mapping.dmp
-
memory/112-77-0x0000000000400000-0x000000000053A000-memory.dmpFilesize
1.2MB
-
memory/112-80-0x0000000000640000-0x000000000064E000-memory.dmpFilesize
56KB
-
memory/112-81-0x0000000000840000-0x000000000085C000-memory.dmpFilesize
112KB
-
memory/112-82-0x0000000000870000-0x0000000000886000-memory.dmpFilesize
88KB
-
memory/112-83-0x00000000008A0000-0x00000000008B2000-memory.dmpFilesize
72KB
-
memory/112-84-0x00000000008D0000-0x00000000008E0000-memory.dmpFilesize
64KB
-
memory/112-85-0x00000000008B0000-0x00000000008B8000-memory.dmpFilesize
32KB
-
memory/112-86-0x00000000020A0000-0x00000000020AC000-memory.dmpFilesize
48KB
-
memory/112-87-0x00000000021F0000-0x00000000021F8000-memory.dmpFilesize
32KB
-
memory/112-88-0x0000000002200000-0x000000000220C000-memory.dmpFilesize
48KB
-
memory/112-89-0x0000000002250000-0x0000000002258000-memory.dmpFilesize
32KB
-
memory/112-67-0x0000000000400000-0x000000000053A000-memory.dmpFilesize
1.2MB
-
memory/112-91-0x00000000043A0000-0x00000000043AE000-memory.dmpFilesize
56KB
-
memory/112-92-0x00000000043B0000-0x00000000043BE000-memory.dmpFilesize
56KB
-
memory/112-93-0x00000000043E0000-0x00000000043EC000-memory.dmpFilesize
48KB
-
memory/112-68-0x0000000000400000-0x000000000053A000-memory.dmpFilesize
1.2MB
-
memory/112-71-0x0000000000400000-0x000000000053A000-memory.dmpFilesize
1.2MB
-
memory/112-72-0x0000000000400000-0x000000000053A000-memory.dmpFilesize
1.2MB
-
memory/1268-57-0x00000000757A1000-0x00000000757A3000-memory.dmpFilesize
8KB
-
memory/1268-54-0x0000000000100000-0x0000000000224000-memory.dmpFilesize
1.1MB
-
memory/1268-56-0x0000000002210000-0x00000000022A2000-memory.dmpFilesize
584KB
-
memory/1268-55-0x0000000004860000-0x0000000004982000-memory.dmpFilesize
1.1MB
-
memory/1476-64-0x0000000000000000-mapping.dmp
-
memory/1476-78-0x000000006F440000-0x000000006F9EB000-memory.dmpFilesize
5.7MB
-
memory/1608-58-0x0000000000000000-mapping.dmp
-
memory/1608-60-0x000000006F460000-0x000000006FA0B000-memory.dmpFilesize
5.7MB
-
memory/1608-61-0x000000006F460000-0x000000006FA0B000-memory.dmpFilesize
5.7MB
-
memory/1608-62-0x000000006F460000-0x000000006FA0B000-memory.dmpFilesize
5.7MB
-
memory/2000-63-0x0000000000000000-mapping.dmp
-
memory/2184-116-0x000000006F970000-0x000000006FF1B000-memory.dmpFilesize
5.7MB
-
memory/2184-148-0x000000006F970000-0x000000006FF1B000-memory.dmpFilesize
5.7MB
-
memory/2184-94-0x0000000000000000-mapping.dmp
-
memory/2196-151-0x000000006F970000-0x000000006FF1B000-memory.dmpFilesize
5.7MB
-
memory/2196-117-0x000000006F970000-0x000000006FF1B000-memory.dmpFilesize
5.7MB
-
memory/2196-95-0x0000000000000000-mapping.dmp
-
memory/2220-154-0x000000006F970000-0x000000006FF1B000-memory.dmpFilesize
5.7MB
-
memory/2220-96-0x0000000000000000-mapping.dmp
-
memory/2220-121-0x000000006F970000-0x000000006FF1B000-memory.dmpFilesize
5.7MB
-
memory/2240-141-0x000000006F970000-0x000000006FF1B000-memory.dmpFilesize
5.7MB
-
memory/2240-155-0x000000006F970000-0x000000006FF1B000-memory.dmpFilesize
5.7MB
-
memory/2240-97-0x0000000000000000-mapping.dmp
-
memory/2260-139-0x000000006F970000-0x000000006FF1B000-memory.dmpFilesize
5.7MB
-
memory/2260-153-0x000000006F970000-0x000000006FF1B000-memory.dmpFilesize
5.7MB
-
memory/2260-98-0x0000000000000000-mapping.dmp
-
memory/2292-100-0x0000000000000000-mapping.dmp
-
memory/2292-149-0x000000006F970000-0x000000006FF1B000-memory.dmpFilesize
5.7MB
-
memory/2292-163-0x000000006F970000-0x000000006FF1B000-memory.dmpFilesize
5.7MB
-
memory/2356-164-0x000000006F970000-0x000000006FF1B000-memory.dmpFilesize
5.7MB
-
memory/2356-104-0x0000000000000000-mapping.dmp
-
memory/2356-150-0x000000006F970000-0x000000006FF1B000-memory.dmpFilesize
5.7MB
-
memory/2404-156-0x000000006F970000-0x000000006FF1B000-memory.dmpFilesize
5.7MB
-
memory/2404-108-0x0000000000000000-mapping.dmp
-
memory/2404-142-0x000000006F970000-0x000000006FF1B000-memory.dmpFilesize
5.7MB
-
memory/2452-109-0x0000000000000000-mapping.dmp
-
memory/2452-145-0x000000006F970000-0x000000006FF1B000-memory.dmpFilesize
5.7MB
-
memory/2452-161-0x000000006F970000-0x000000006FF1B000-memory.dmpFilesize
5.7MB
-
memory/2528-114-0x0000000000000000-mapping.dmp
-
memory/2528-144-0x000000006F970000-0x000000006FF1B000-memory.dmpFilesize
5.7MB
-
memory/2528-157-0x000000006F970000-0x000000006FF1B000-memory.dmpFilesize
5.7MB
-
memory/2560-158-0x000000006F970000-0x000000006FF1B000-memory.dmpFilesize
5.7MB
-
memory/2560-115-0x0000000000000000-mapping.dmp
-
memory/2560-143-0x000000006F970000-0x000000006FF1B000-memory.dmpFilesize
5.7MB
-
memory/2596-118-0x0000000000000000-mapping.dmp
-
memory/2596-162-0x000000006F970000-0x000000006FF1B000-memory.dmpFilesize
5.7MB
-
memory/2596-146-0x000000006F970000-0x000000006FF1B000-memory.dmpFilesize
5.7MB
-
memory/2644-122-0x0000000000000000-mapping.dmp
-
memory/2644-159-0x000000006F970000-0x000000006FF1B000-memory.dmpFilesize
5.7MB
-
memory/2644-147-0x000000006F970000-0x000000006FF1B000-memory.dmpFilesize
5.7MB
-
memory/2696-125-0x0000000000000000-mapping.dmp
-
memory/2696-152-0x000000006F970000-0x000000006FF1B000-memory.dmpFilesize
5.7MB
-
memory/2696-160-0x000000006F970000-0x000000006FF1B000-memory.dmpFilesize
5.7MB
-
memory/2740-128-0x0000000000000000-mapping.dmp