Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 12:17
Static task
static1
Behavioral task
behavioral1
Sample
3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe
-
Size
649KB
-
MD5
3057c53c96a70509e952b12edf398b1e
-
SHA1
27c272b38249106e2287cfa5ac8ad8b8108196cd
-
SHA256
b8a6780d631933813dc8f4439d761acf686e4369e615e264a5298ec555b400ad
-
SHA512
62bf7ec7e6e75910e6aeb8bb4c7e3c7072f5544ac78ace3e22c5f1301da06652df369b9508f669efa99b60115795a8f59b33ed2d77e6c51e6db9ea65244a663b
-
SSDEEP
12288:zq20BpltdyUDZX2wh5vA/OSXhVt0rYTGApYIQONYA4gT9CBqwN4IQ:QBTtdyO2wh5I1TPG3ISA4CwN
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2632 netsh.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\wTask = "C:\\Windows\\Media\\LTaskup.exe" 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\lnk_dados_2.dll 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe File created C:\Windows\Media\LTaskup.exe 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
Kills process with taskkill 43 IoCs
pid Process 2684 taskkill.exe 1968 taskkill.exe 2180 taskkill.exe 2792 taskkill.exe 2500 taskkill.exe 864 taskkill.exe 3004 taskkill.exe 2336 taskkill.exe 3472 taskkill.exe 2752 taskkill.exe 2564 taskkill.exe 2672 taskkill.exe 572 taskkill.exe 2728 taskkill.exe 2936 taskkill.exe 2852 taskkill.exe 2992 taskkill.exe 940 taskkill.exe 1868 taskkill.exe 1468 taskkill.exe 2220 taskkill.exe 2924 taskkill.exe 2576 taskkill.exe 3040 taskkill.exe 1620 taskkill.exe 2520 taskkill.exe 2088 taskkill.exe 800 taskkill.exe 2660 taskkill.exe 2768 taskkill.exe 1744 taskkill.exe 2740 taskkill.exe 2084 taskkill.exe 2292 taskkill.exe 2224 taskkill.exe 2600 taskkill.exe 1072 taskkill.exe 2540 taskkill.exe 1936 taskkill.exe 1820 taskkill.exe 3708 taskkill.exe 2616 taskkill.exe 2896 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeDebugPrivilege 2660 taskkill.exe Token: SeDebugPrivilege 2768 taskkill.exe Token: SeDebugPrivilege 2924 taskkill.exe Token: SeDebugPrivilege 2684 taskkill.exe Token: SeDebugPrivilege 2752 taskkill.exe Token: SeDebugPrivilege 2792 taskkill.exe Token: SeDebugPrivilege 2896 taskkill.exe Token: SeDebugPrivilege 1072 taskkill.exe Token: SeDebugPrivilege 2500 taskkill.exe Token: SeDebugPrivilege 2936 taskkill.exe Token: SeDebugPrivilege 940 taskkill.exe Token: SeDebugPrivilege 3040 taskkill.exe Token: SeDebugPrivilege 2540 taskkill.exe Token: SeDebugPrivilege 2224 taskkill.exe Token: SeDebugPrivilege 1468 taskkill.exe Token: SeDebugPrivilege 2740 taskkill.exe Token: SeDebugPrivilege 2564 taskkill.exe Token: SeDebugPrivilege 2220 taskkill.exe Token: SeDebugPrivilege 864 taskkill.exe Token: SeDebugPrivilege 1936 taskkill.exe Token: SeDebugPrivilege 1868 taskkill.exe Token: SeDebugPrivilege 2728 taskkill.exe Token: SeDebugPrivilege 1968 taskkill.exe Token: SeDebugPrivilege 2616 taskkill.exe Token: SeDebugPrivilege 2600 taskkill.exe Token: SeDebugPrivilege 572 taskkill.exe Token: SeDebugPrivilege 2992 taskkill.exe Token: SeDebugPrivilege 1620 taskkill.exe Token: SeDebugPrivilege 2852 taskkill.exe Token: SeDebugPrivilege 3004 taskkill.exe Token: SeDebugPrivilege 2520 taskkill.exe Token: SeDebugPrivilege 2672 taskkill.exe Token: SeDebugPrivilege 2180 taskkill.exe Token: SeDebugPrivilege 2292 taskkill.exe Token: SeDebugPrivilege 2084 taskkill.exe Token: SeDebugPrivilege 2336 taskkill.exe Token: SeDebugPrivilege 1820 taskkill.exe Token: SeDebugPrivilege 800 taskkill.exe Token: SeDebugPrivilege 2576 taskkill.exe Token: SeDebugPrivilege 1744 taskkill.exe Token: SeDebugPrivilege 2088 taskkill.exe Token: SeDebugPrivilege 3708 taskkill.exe Token: SeDebugPrivilege 3472 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2596 wrote to memory of 2632 2596 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe 30 PID 2596 wrote to memory of 2632 2596 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe 30 PID 2596 wrote to memory of 2632 2596 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe 30 PID 2596 wrote to memory of 2632 2596 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe 30 PID 2596 wrote to memory of 2660 2596 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe 31 PID 2596 wrote to memory of 2660 2596 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe 31 PID 2596 wrote to memory of 2660 2596 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe 31 PID 2596 wrote to memory of 2660 2596 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe 31 PID 2596 wrote to memory of 2768 2596 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe 33 PID 2596 wrote to memory of 2768 2596 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe 33 PID 2596 wrote to memory of 2768 2596 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe 33 PID 2596 wrote to memory of 2768 2596 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe 33 PID 2596 wrote to memory of 2752 2596 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe 35 PID 2596 wrote to memory of 2752 2596 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe 35 PID 2596 wrote to memory of 2752 2596 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe 35 PID 2596 wrote to memory of 2752 2596 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe 35 PID 2596 wrote to memory of 2936 2596 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe 36 PID 2596 wrote to memory of 2936 2596 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe 36 PID 2596 wrote to memory of 2936 2596 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe 36 PID 2596 wrote to memory of 2936 2596 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe 36 PID 2596 wrote to memory of 2924 2596 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe 37 PID 2596 wrote to memory of 2924 2596 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe 37 PID 2596 wrote to memory of 2924 2596 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe 37 PID 2596 wrote to memory of 2924 2596 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe 37 PID 2596 wrote to memory of 2792 2596 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe 39 PID 2596 wrote to memory of 2792 2596 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe 39 PID 2596 wrote to memory of 2792 2596 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe 39 PID 2596 wrote to memory of 2792 2596 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe 39 PID 2596 wrote to memory of 1072 2596 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe 40 PID 2596 wrote to memory of 1072 2596 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe 40 PID 2596 wrote to memory of 1072 2596 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe 40 PID 2596 wrote to memory of 1072 2596 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe 40 PID 2596 wrote to memory of 2684 2596 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe 41 PID 2596 wrote to memory of 2684 2596 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe 41 PID 2596 wrote to memory of 2684 2596 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe 41 PID 2596 wrote to memory of 2684 2596 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe 41 PID 2596 wrote to memory of 2540 2596 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe 44 PID 2596 wrote to memory of 2540 2596 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe 44 PID 2596 wrote to memory of 2540 2596 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe 44 PID 2596 wrote to memory of 2540 2596 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe 44 PID 2596 wrote to memory of 2896 2596 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe 46 PID 2596 wrote to memory of 2896 2596 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe 46 PID 2596 wrote to memory of 2896 2596 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe 46 PID 2596 wrote to memory of 2896 2596 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe 46 PID 2596 wrote to memory of 2852 2596 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe 47 PID 2596 wrote to memory of 2852 2596 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe 47 PID 2596 wrote to memory of 2852 2596 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe 47 PID 2596 wrote to memory of 2852 2596 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe 47 PID 2596 wrote to memory of 2672 2596 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe 51 PID 2596 wrote to memory of 2672 2596 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe 51 PID 2596 wrote to memory of 2672 2596 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe 51 PID 2596 wrote to memory of 2672 2596 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe 51 PID 2596 wrote to memory of 2616 2596 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe 52 PID 2596 wrote to memory of 2616 2596 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe 52 PID 2596 wrote to memory of 2616 2596 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe 52 PID 2596 wrote to memory of 2616 2596 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe 52 PID 2596 wrote to memory of 2500 2596 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe 54 PID 2596 wrote to memory of 2500 2596 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe 54 PID 2596 wrote to memory of 2500 2596 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe 54 PID 2596 wrote to memory of 2500 2596 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe 54 PID 2596 wrote to memory of 2576 2596 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe 57 PID 2596 wrote to memory of 2576 2596 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe 57 PID 2596 wrote to memory of 2576 2596 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe 57 PID 2596 wrote to memory of 2576 2596 3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe 57
Processes
-
C:\Users\Admin\AppData\Local\Temp\3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3057c53c96a70509e952b12edf398b1e_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram C:\Windows\Media\LTaskup.exe RPC2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2632
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im nod32kui.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2660
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im KAVPF.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2768
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Kav.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2752
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im mcdash.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2936
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Mcdetect.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2924
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im mcregwiz.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2792
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im McTskshd.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1072
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im mcupdmgr.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2684
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im mcupdui.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2540
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im MpfAgent.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2896
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im MpfConsole.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2852
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im MpfService.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2672
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im MpfTray.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2616
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im MpfWizard.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2500
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im mvtx.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2576
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im mcappins.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2992
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im mcinfo.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3040
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im mghtml.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1620
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im mcinsupd.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3004
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im mcmnhdlr.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2520
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im McShield.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:940
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im McVSEscn.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:864
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im mcvsftsn.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1820
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im mcvsmap.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1936
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im naiavfin.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:572
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im oasclnt.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2600
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im gcasServ.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2224
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im zlclient.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2220
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im avgemc.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1868
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im avgupsvc.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2292
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im avgamsvr.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2740
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im avgcc.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1468
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im ashdisp.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2564
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im ashmaisv.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2728
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im ashserv.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1968
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im ashwebsv.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2336
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im aswupdsv.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1744
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im ccsetmgr.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:800
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im cccproxy.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2088
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im ccapp.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2180
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im ccevtmgr.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2084
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im nod32krn.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3472
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im nod32kui.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3708
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1