Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-12-2024 17:25
Behavioral task
behavioral1
Sample
79f0b4bfe4cda1bb1a974b2ba91baf5c6e92f1ee55914a91ed50173cf368d2bb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
79f0b4bfe4cda1bb1a974b2ba91baf5c6e92f1ee55914a91ed50173cf368d2bb.exe
Resource
win10v2004-20241007-en
General
-
Target
79f0b4bfe4cda1bb1a974b2ba91baf5c6e92f1ee55914a91ed50173cf368d2bb.exe
-
Size
1.3MB
-
MD5
cad4b3ae554d4b8ab8bfa1e6c67c18e4
-
SHA1
9566b8d24a582ba40749294765be1eedc6096b8c
-
SHA256
79f0b4bfe4cda1bb1a974b2ba91baf5c6e92f1ee55914a91ed50173cf368d2bb
-
SHA512
1399351ff267aa004aacd39efe27eab881cd0ed3175d1cf7a04b4750ac857de8da5b8da54a2a80caba00d58b12eaa792874fcbe6b7463a87d99c9e8080b6ba25
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 33 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2628 3008 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2732 3008 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2760 3008 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2608 3008 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3020 3008 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2684 3008 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2712 3008 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2756 3008 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2504 3008 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2540 3008 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2300 3008 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2068 3008 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2524 3008 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1780 3008 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1784 3008 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2380 3008 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1668 3008 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1400 3008 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2028 3008 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2452 3008 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1768 3008 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 624 3008 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2024 3008 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1940 3008 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1908 3008 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2572 3008 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2708 3008 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2520 3008 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2932 3008 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2316 3008 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2804 3008 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1132 3008 schtasks.exe 32 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2808 3008 schtasks.exe 32 -
resource yara_rule behavioral1/files/0x0008000000016d13-9.dat dcrat behavioral1/memory/1064-13-0x0000000000DF0000-0x0000000000F00000-memory.dmp dcrat behavioral1/memory/2336-105-0x0000000000140000-0x0000000000250000-memory.dmp dcrat behavioral1/memory/912-165-0x0000000000B50000-0x0000000000C60000-memory.dmp dcrat behavioral1/memory/2124-226-0x0000000000040000-0x0000000000150000-memory.dmp dcrat behavioral1/memory/1628-405-0x0000000001200000-0x0000000001310000-memory.dmp dcrat behavioral1/memory/2928-465-0x0000000001210000-0x0000000001320000-memory.dmp dcrat behavioral1/memory/1916-643-0x0000000000230000-0x0000000000340000-memory.dmp dcrat behavioral1/memory/876-703-0x00000000008E0000-0x00000000009F0000-memory.dmp dcrat behavioral1/memory/2024-763-0x0000000000010000-0x0000000000120000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 12 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 536 powershell.exe 1660 powershell.exe 1068 powershell.exe 3016 powershell.exe 928 powershell.exe 704 powershell.exe 320 powershell.exe 2060 powershell.exe 496 powershell.exe 1288 powershell.exe 1596 powershell.exe 388 powershell.exe -
Executes dropped EXE 13 IoCs
pid Process 1064 DllCommonsvc.exe 2336 conhost.exe 912 conhost.exe 2124 conhost.exe 2740 conhost.exe 1884 conhost.exe 1628 conhost.exe 2928 conhost.exe 1716 conhost.exe 2688 conhost.exe 1916 conhost.exe 876 conhost.exe 2024 conhost.exe -
Loads dropped DLL 2 IoCs
pid Process 1724 cmd.exe 1724 cmd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 12 IoCs
flow ioc 4 raw.githubusercontent.com 5 raw.githubusercontent.com 15 raw.githubusercontent.com 28 raw.githubusercontent.com 31 raw.githubusercontent.com 35 raw.githubusercontent.com 38 raw.githubusercontent.com 9 raw.githubusercontent.com 12 raw.githubusercontent.com 19 raw.githubusercontent.com 22 raw.githubusercontent.com 25 raw.githubusercontent.com -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\Msdtc\Trace\explorer.exe DllCommonsvc.exe File created C:\Windows\System32\Msdtc\Trace\7a0fd90576e088 DllCommonsvc.exe -
Drops file in Program Files directory 7 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Media Player\Network Sharing\b75386f1303e64 DllCommonsvc.exe File created C:\Program Files\Windows Journal\de-DE\spoolsv.exe DllCommonsvc.exe File opened for modification C:\Program Files\Windows Journal\de-DE\spoolsv.exe DllCommonsvc.exe File created C:\Program Files\Windows Journal\de-DE\f3b6ecef712a24 DllCommonsvc.exe File created C:\Program Files\Windows Mail\en-US\conhost.exe DllCommonsvc.exe File created C:\Program Files\Windows Mail\en-US\088424020bedd6 DllCommonsvc.exe File created C:\Program Files (x86)\Windows Media Player\Network Sharing\taskhost.exe DllCommonsvc.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File created C:\Windows\TAPI\conhost.exe DllCommonsvc.exe File created C:\Windows\TAPI\088424020bedd6 DllCommonsvc.exe File created C:\Windows\Installer\{90140000-006E-0409-0000-0000000FF1CE}\dllhost.exe DllCommonsvc.exe File created C:\Windows\Installer\{90140000-006E-0409-0000-0000000FF1CE}\5940a34987c991 DllCommonsvc.exe File created C:\Windows\schemas\csrss.exe DllCommonsvc.exe File created C:\Windows\schemas\886983d96e3d3e DllCommonsvc.exe File created C:\Windows\BitLockerDiscoveryVolumeContents\conhost.exe DllCommonsvc.exe File created C:\Windows\BitLockerDiscoveryVolumeContents\088424020bedd6 DllCommonsvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 79f0b4bfe4cda1bb1a974b2ba91baf5c6e92f1ee55914a91ed50173cf368d2bb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 33 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2628 schtasks.exe 2608 schtasks.exe 1400 schtasks.exe 1768 schtasks.exe 1940 schtasks.exe 2708 schtasks.exe 2520 schtasks.exe 2808 schtasks.exe 2732 schtasks.exe 2684 schtasks.exe 1668 schtasks.exe 624 schtasks.exe 2504 schtasks.exe 2300 schtasks.exe 1780 schtasks.exe 2452 schtasks.exe 2316 schtasks.exe 2760 schtasks.exe 3020 schtasks.exe 2024 schtasks.exe 2540 schtasks.exe 2572 schtasks.exe 2804 schtasks.exe 2712 schtasks.exe 2756 schtasks.exe 2524 schtasks.exe 1784 schtasks.exe 2028 schtasks.exe 1908 schtasks.exe 2932 schtasks.exe 2068 schtasks.exe 2380 schtasks.exe 1132 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 1064 DllCommonsvc.exe 1064 DllCommonsvc.exe 1064 DllCommonsvc.exe 1064 DllCommonsvc.exe 1064 DllCommonsvc.exe 3016 powershell.exe 704 powershell.exe 1660 powershell.exe 496 powershell.exe 388 powershell.exe 536 powershell.exe 1068 powershell.exe 320 powershell.exe 2060 powershell.exe 1596 powershell.exe 928 powershell.exe 1288 powershell.exe 2336 conhost.exe 912 conhost.exe 2124 conhost.exe 2740 conhost.exe 1884 conhost.exe 1628 conhost.exe 2928 conhost.exe 1716 conhost.exe 2688 conhost.exe 1916 conhost.exe 876 conhost.exe 2024 conhost.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
description pid Process Token: SeDebugPrivilege 1064 DllCommonsvc.exe Token: SeDebugPrivilege 3016 powershell.exe Token: SeDebugPrivilege 704 powershell.exe Token: SeDebugPrivilege 1660 powershell.exe Token: SeDebugPrivilege 496 powershell.exe Token: SeDebugPrivilege 388 powershell.exe Token: SeDebugPrivilege 536 powershell.exe Token: SeDebugPrivilege 1068 powershell.exe Token: SeDebugPrivilege 320 powershell.exe Token: SeDebugPrivilege 2060 powershell.exe Token: SeDebugPrivilege 1596 powershell.exe Token: SeDebugPrivilege 928 powershell.exe Token: SeDebugPrivilege 1288 powershell.exe Token: SeDebugPrivilege 2336 conhost.exe Token: SeDebugPrivilege 912 conhost.exe Token: SeDebugPrivilege 2124 conhost.exe Token: SeDebugPrivilege 2740 conhost.exe Token: SeDebugPrivilege 1884 conhost.exe Token: SeDebugPrivilege 1628 conhost.exe Token: SeDebugPrivilege 2928 conhost.exe Token: SeDebugPrivilege 1716 conhost.exe Token: SeDebugPrivilege 2688 conhost.exe Token: SeDebugPrivilege 1916 conhost.exe Token: SeDebugPrivilege 876 conhost.exe Token: SeDebugPrivilege 2024 conhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2440 wrote to memory of 2124 2440 79f0b4bfe4cda1bb1a974b2ba91baf5c6e92f1ee55914a91ed50173cf368d2bb.exe 28 PID 2440 wrote to memory of 2124 2440 79f0b4bfe4cda1bb1a974b2ba91baf5c6e92f1ee55914a91ed50173cf368d2bb.exe 28 PID 2440 wrote to memory of 2124 2440 79f0b4bfe4cda1bb1a974b2ba91baf5c6e92f1ee55914a91ed50173cf368d2bb.exe 28 PID 2440 wrote to memory of 2124 2440 79f0b4bfe4cda1bb1a974b2ba91baf5c6e92f1ee55914a91ed50173cf368d2bb.exe 28 PID 2124 wrote to memory of 1724 2124 WScript.exe 29 PID 2124 wrote to memory of 1724 2124 WScript.exe 29 PID 2124 wrote to memory of 1724 2124 WScript.exe 29 PID 2124 wrote to memory of 1724 2124 WScript.exe 29 PID 1724 wrote to memory of 1064 1724 cmd.exe 31 PID 1724 wrote to memory of 1064 1724 cmd.exe 31 PID 1724 wrote to memory of 1064 1724 cmd.exe 31 PID 1724 wrote to memory of 1064 1724 cmd.exe 31 PID 1064 wrote to memory of 928 1064 DllCommonsvc.exe 66 PID 1064 wrote to memory of 928 1064 DllCommonsvc.exe 66 PID 1064 wrote to memory of 928 1064 DllCommonsvc.exe 66 PID 1064 wrote to memory of 1660 1064 DllCommonsvc.exe 67 PID 1064 wrote to memory of 1660 1064 DllCommonsvc.exe 67 PID 1064 wrote to memory of 1660 1064 DllCommonsvc.exe 67 PID 1064 wrote to memory of 536 1064 DllCommonsvc.exe 68 PID 1064 wrote to memory of 536 1064 DllCommonsvc.exe 68 PID 1064 wrote to memory of 536 1064 DllCommonsvc.exe 68 PID 1064 wrote to memory of 704 1064 DllCommonsvc.exe 69 PID 1064 wrote to memory of 704 1064 DllCommonsvc.exe 69 PID 1064 wrote to memory of 704 1064 DllCommonsvc.exe 69 PID 1064 wrote to memory of 320 1064 DllCommonsvc.exe 70 PID 1064 wrote to memory of 320 1064 DllCommonsvc.exe 70 PID 1064 wrote to memory of 320 1064 DllCommonsvc.exe 70 PID 1064 wrote to memory of 2060 1064 DllCommonsvc.exe 71 PID 1064 wrote to memory of 2060 1064 DllCommonsvc.exe 71 PID 1064 wrote to memory of 2060 1064 DllCommonsvc.exe 71 PID 1064 wrote to memory of 1068 1064 DllCommonsvc.exe 72 PID 1064 wrote to memory of 1068 1064 DllCommonsvc.exe 72 PID 1064 wrote to memory of 1068 1064 DllCommonsvc.exe 72 PID 1064 wrote to memory of 496 1064 DllCommonsvc.exe 73 PID 1064 wrote to memory of 496 1064 DllCommonsvc.exe 73 PID 1064 wrote to memory of 496 1064 DllCommonsvc.exe 73 PID 1064 wrote to memory of 1288 1064 DllCommonsvc.exe 74 PID 1064 wrote to memory of 1288 1064 DllCommonsvc.exe 74 PID 1064 wrote to memory of 1288 1064 DllCommonsvc.exe 74 PID 1064 wrote to memory of 1596 1064 DllCommonsvc.exe 75 PID 1064 wrote to memory of 1596 1064 DllCommonsvc.exe 75 PID 1064 wrote to memory of 1596 1064 DllCommonsvc.exe 75 PID 1064 wrote to memory of 388 1064 DllCommonsvc.exe 76 PID 1064 wrote to memory of 388 1064 DllCommonsvc.exe 76 PID 1064 wrote to memory of 388 1064 DllCommonsvc.exe 76 PID 1064 wrote to memory of 3016 1064 DllCommonsvc.exe 77 PID 1064 wrote to memory of 3016 1064 DllCommonsvc.exe 77 PID 1064 wrote to memory of 3016 1064 DllCommonsvc.exe 77 PID 1064 wrote to memory of 1100 1064 DllCommonsvc.exe 90 PID 1064 wrote to memory of 1100 1064 DllCommonsvc.exe 90 PID 1064 wrote to memory of 1100 1064 DllCommonsvc.exe 90 PID 1100 wrote to memory of 344 1100 cmd.exe 92 PID 1100 wrote to memory of 344 1100 cmd.exe 92 PID 1100 wrote to memory of 344 1100 cmd.exe 92 PID 1100 wrote to memory of 2336 1100 cmd.exe 93 PID 1100 wrote to memory of 2336 1100 cmd.exe 93 PID 1100 wrote to memory of 2336 1100 cmd.exe 93 PID 2336 wrote to memory of 316 2336 conhost.exe 94 PID 2336 wrote to memory of 316 2336 conhost.exe 94 PID 2336 wrote to memory of 316 2336 conhost.exe 94 PID 316 wrote to memory of 1776 316 cmd.exe 96 PID 316 wrote to memory of 1776 316 cmd.exe 96 PID 316 wrote to memory of 1776 316 cmd.exe 96 PID 316 wrote to memory of 912 316 cmd.exe 99 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\79f0b4bfe4cda1bb1a974b2ba91baf5c6e92f1ee55914a91ed50173cf368d2bb.exe"C:\Users\Admin\AppData\Local\Temp\79f0b4bfe4cda1bb1a974b2ba91baf5c6e92f1ee55914a91ed50173cf368d2bb.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\providercommon\1zu9dW.bat" "3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:928
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Journal\de-DE\spoolsv.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1660
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Mail\en-US\conhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:536
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\Cookies\lsm.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:704
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Media Player\Network Sharing\taskhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:320
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\TAPI\conhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2060
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\dllhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1068
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\dllhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:496
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Installer\{90140000-006E-0409-0000-0000000FF1CE}\dllhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1288
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\schemas\csrss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1596
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\BitLockerDiscoveryVolumeContents\conhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:388
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\System32\Msdtc\Trace\explorer.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3016
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\4vGW9nsit8.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:344
-
-
C:\Windows\TAPI\conhost.exe"C:\Windows\TAPI\conhost.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\mNrvcGFykN.bat"7⤵
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:28⤵PID:1776
-
-
C:\Windows\TAPI\conhost.exe"C:\Windows\TAPI\conhost.exe"8⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:912 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Yvohz7Nokj.bat"9⤵PID:1480
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:210⤵PID:2956
-
-
C:\Windows\TAPI\conhost.exe"C:\Windows\TAPI\conhost.exe"10⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2124 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\FdUsM3mSuD.bat"11⤵PID:2164
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:212⤵PID:832
-
-
C:\Windows\TAPI\conhost.exe"C:\Windows\TAPI\conhost.exe"12⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2740 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\XC59y11ueh.bat"13⤵PID:2108
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:214⤵PID:2816
-
-
C:\Windows\TAPI\conhost.exe"C:\Windows\TAPI\conhost.exe"14⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1884 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\XErLL4imMU.bat"15⤵PID:544
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:216⤵PID:1200
-
-
C:\Windows\TAPI\conhost.exe"C:\Windows\TAPI\conhost.exe"16⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1628 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\zHC6P4FzNT.bat"17⤵PID:384
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:218⤵PID:1152
-
-
C:\Windows\TAPI\conhost.exe"C:\Windows\TAPI\conhost.exe"18⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2928 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\J6LEBq1ChC.bat"19⤵PID:1036
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:220⤵PID:2732
-
-
C:\Windows\TAPI\conhost.exe"C:\Windows\TAPI\conhost.exe"20⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1716 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\uVa8TbDE3p.bat"21⤵PID:888
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:222⤵PID:2336
-
-
C:\Windows\TAPI\conhost.exe"C:\Windows\TAPI\conhost.exe"22⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2688 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\kOAwrWovpT.bat"23⤵PID:496
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:224⤵PID:3032
-
-
C:\Windows\TAPI\conhost.exe"C:\Windows\TAPI\conhost.exe"24⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1916 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\p8yPRkR6MR.bat"25⤵PID:2204
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:226⤵PID:2812
-
-
C:\Windows\TAPI\conhost.exe"C:\Windows\TAPI\conhost.exe"26⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:876 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\IrGY9odMle.bat"27⤵PID:2568
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:228⤵PID:2916
-
-
C:\Windows\TAPI\conhost.exe"C:\Windows\TAPI\conhost.exe"28⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2024
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 12 /tr "'C:\Program Files\Windows Journal\de-DE\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2628
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files\Windows Journal\de-DE\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2732
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Journal\de-DE\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2760
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 12 /tr "'C:\Program Files\Windows Mail\en-US\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2608
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Program Files\Windows Mail\en-US\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3020
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows Mail\en-US\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2684
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 7 /tr "'C:\Users\Default\Cookies\lsm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2504
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Users\Default\Cookies\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2712
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 6 /tr "'C:\Users\Default\Cookies\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2756
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Media Player\Network Sharing\taskhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2540
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Media Player\Network Sharing\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2300
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows Media Player\Network Sharing\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2068
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 5 /tr "'C:\Windows\TAPI\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2524
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Windows\TAPI\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1780
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 12 /tr "'C:\Windows\TAPI\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1784
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 6 /tr "'C:\providercommon\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2380
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\providercommon\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1668
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 6 /tr "'C:\providercommon\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1400
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 11 /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2028
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2452
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 11 /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1768
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 12 /tr "'C:\Windows\Installer\{90140000-006E-0409-0000-0000000FF1CE}\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:624
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\Installer\{90140000-006E-0409-0000-0000000FF1CE}\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2024
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 10 /tr "'C:\Windows\Installer\{90140000-006E-0409-0000-0000000FF1CE}\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1940
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\Windows\schemas\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1908
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\schemas\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2572
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\Windows\schemas\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2708
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 13 /tr "'C:\Windows\BitLockerDiscoveryVolumeContents\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2520
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Windows\BitLockerDiscoveryVolumeContents\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2932
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 7 /tr "'C:\Windows\BitLockerDiscoveryVolumeContents\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2316
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 12 /tr "'C:\Windows\System32\Msdtc\Trace\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2804
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Windows\System32\Msdtc\Trace\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1132
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 6 /tr "'C:\Windows\System32\Msdtc\Trace\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2808
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e82fd642d8347b93ffc5f66f5255fdeb
SHA1bd4aabb23000cd27c7fe654aa41afb02f9604f42
SHA256429e1c8ee4fdf5bee2e63e0e379f7155e6341cce4f9f0f2db500e635e2f40d63
SHA5129e6c24a6895017e1d509060e55e6628d3793b2e81f32a49d15c53a14356bb1c14d4841ecdf3ade3367dce1e08120de8ff1dc257bf97d83ba6227ba40b44eaa7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c360d6818ffaa5e10433a10a582cc151
SHA18177893843f3492d78b3914b880e79d361a3a921
SHA256c01dcf33f2bf2c24bebd7a04121ba2eed7dcd2d5b29c1d47bcb92a232999e1ab
SHA5121050f17effb377f7c6a2fa6ee91671dcf83d2ad8b73013e457b00b70f2cf6e283d9758507d86a611ab259f7fce14e6f8ba0d3bfa419309ec21185b190d0c6f9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535c8e134ecbca80c7633e857946879e5
SHA17b862eeb00acfbb7f587e02ee6aac53199991953
SHA25631a30b80552b79eb00ab5b5e4f40c0ddc40d17f0941f2ba88f3d6795a29615c9
SHA512798c2f527b7eea958c53ac80bba3d93abcb8a748dd0de5caa8215e897adbf9d07ce258db95e93a792494e6fc2f05be9ec3b5cac957eb0cde70f2e25600acda87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59479e468a174c7a3cebf64d96a5515f3
SHA1f14ac63b161d5550a552f48f195d0347ea023e31
SHA2566feb955d5265b3bf226fd000740febca49c6a2f56dd7a14eaac0693fd29aee20
SHA512f0d004794ec4cf64b143a157ce18c3ff63812d8303dfdd6531d78cb7d2877cd39112e54c7654a6a79ad6de29060f0aa87c5d9349c87459d530b7478282d0bd1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566f30f36e3224d2ff9d91ab700b5eb1d
SHA1149e430e17802d8154a711a1f45a410ea9a837b2
SHA256ad9cbe868c2d1ba162dbf6c80dd142f7125e9c031e5acebd3fc1246f3c468f9b
SHA5122ffba39e53e377a34264a8a148399066d987917253862127da1e15708ac7b8254d3cb4f86d66cc33b582796b2e1847a946bc08ee304f8904ecc3882f7272bbf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bac402078213357d699c2791a853243b
SHA15494aaad020f571696cf436ee28f0503e85fd0b2
SHA256f0f7e97cd74c378b4c525b0c8557fdc48cba898cdc4d1179575cbccf8c0bf23c
SHA5123e27cb5caee3e74359c6862bd479df1e0ab524beaeef310d7d6db0b64405b4387ef31025b866b290673f572497192b1cdd96bbee76874854954ffc67fc6f5c05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5105d9b3a4c5d88ab188650139836a8d5
SHA12c4b29519c88447f6513e3fb3fe1e4cee552ccdf
SHA256ea6ed63c64d0dc1cdef8703ead85a4aedd054a65f9a2c3de71823296997a0abf
SHA512094691a81156e49b48a3b4a1be2bec44bc3b7fa05342141fadd17b6983264d228b1e0468c73db2daac24dc511fb2a415f1c7a84ef9d50e70a6dae08cf0efe11b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589211270c1aa452840ff9ced8b10303c
SHA1c4b7263e5d23d271a5b0117c7f52f269e66c7bb7
SHA2560353f537571621ea9993ae765fbccfbad00f46184d4234f1a48ccc512336380a
SHA5124609eda6bfb33f3678a114d2081aa88e6ac14254cb4169066c6d58f649de308f1b36bce2121af44159e4408df9d608a3df31b5c7d086a098132b107988701cbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50792bd1af46d2c4e7083c03864065270
SHA1331c943372c52c905c6f5b657659aae5f40d10fe
SHA2567cc73c1c3b009c494ce235d42b836d6d9a31cb030c771f92199e6f84dd72d87b
SHA512dfa539a816cd17288dfa7d320193205d22bf7591fd0eff5ef2aa0c08826061f36103c2293e33ee2b68ff9c83023e1807362fa8bee4c1b94e738385903613fed6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584c095bcac2257ad502467b4ea1531c6
SHA13b4a2d68a9bfd8fa62f79cc50fbe398f1cd051a7
SHA256c358391ef268c705a0d5c04a028dd6d866a95d0b176055fc06906496858b1387
SHA512c55b88355470200934dbe19f10af0486c41be871877a7a5a886f005ebff6e3059187723d18a9b26390591dc4083c24b396ba313f9d1e40cea1e899721f93f531
-
Filesize
192B
MD5f481db8138694b5b28606006b719dee3
SHA1b81dbd8297be89c4cac04dc4f1af1749f5149223
SHA256115acb6181bdac55299528d3d40babbb7fb5ef52c0dd4ceee99f1c6ac292c517
SHA51230fd12589463a196100390fc83115150d7e55d26b097a6b9b2efda1492c75597e38e363c4b81788492caf8b1a5b7b091ce31017dd2225075c4b9dc0c827fc19b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
192B
MD5a5fed3bb51d5cbaa989d57f7d0971d5c
SHA14a379cd2cbe64f85ae43c2daaf124c84ef26ae7c
SHA25615e0d688713a5e16ed586d3ebaa080a8cda8cf0a7e163ef9574eea6bdd7a9004
SHA512dc9f84f455afc0ac9937545d56fed8f55711491cbb1a767a5976eed0b4bb4836a5c63758467f453f9a91b097bfa92ef274f3e77b3d5e00df148a52213a688b83
-
Filesize
192B
MD5b62dcc7fc0aa616eceedeb363c31898e
SHA1c35863f871234d3a216ccb5f2a1d623a2bc32a4a
SHA2567a590620988b0b9a2c79c8df299245972776b155ae014f71fc9c698299d175a2
SHA512f5ace3e33c3389fe4fc96435cb5614dbe7d4eac65992e64717fedd3c9516f8d687ebe6bf5b7bd32bde15105a946a5fff66143a9e38d31c4b503356ced26d4474
-
Filesize
192B
MD5d38aa35b424a1e05c68015c4dbf5c9bb
SHA1adc2f206129babe64765f99a0da2d49d26fbd4a3
SHA25663c87e291009dd4ae483b5890338f5e28e9cc19483fb7a70df8061ed97e7bb40
SHA512cb8035c797ac20beb3da2113028b130f7fe359f17b81a1c87d9cbd4c75fd39efe6a231a8d12d28961882c7212cb740b8c9dfa51bc5eff73f48dcc1984055a8ea
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
192B
MD5e8137ab51f3520316450643470d4557f
SHA1f0373b626b4fd61f2f20f544e13977bda10b4fb8
SHA256deee37bd550040540a3bb7b93ac2916fddc20aecc0c369945b72d81df454ccf7
SHA512cd0d00ae4d59847f6bc7b1d6dbcbe26492d5d44292fc9c7d7b287b0f8edd2b420aa0975585a4cf3d2e4663e041fb2e8a4a62544e0fe1ee05fd882e530ff1cd83
-
Filesize
192B
MD5107423f93fe1b1440ed6d1585a27d82f
SHA14da065d245334d6903b9317f2f6ca3fe1ae680e4
SHA2566d8fa31bd330311f8f2d14888df6e66f017741fc0285ec56b7a2bb315e0fb481
SHA512850e0afac12c664f0e2cd1dc19be5db4409bbe5ded99a0ca4f02ce1897592d6530285c80149d775e6accef79fde63a69f70890dc3e80669be3e69a00958f4061
-
Filesize
192B
MD5220e13578b1b0234681eed43818710bd
SHA1ddf26a59cf4a241c0e9cc79d3c3b89a760a5152f
SHA256f4617a60032052af4e0104542cc3c73a56fe2aa4f3c0240a4a329429556f80cf
SHA512398aa4dc3b72e6bea467db26ca8a9b7681baa3c5b2363847d492806e7ed3bca995e11b118f6d8cb1b7e02f6eee8cafcae984e9f8bc0c7a0c9fcc11083baa39e7
-
Filesize
192B
MD52867b2451dbbcd36b99f8ec6b8aa2256
SHA1013022eb66d632facd527126a5d1f6ca803e55a9
SHA2567f0d030bc6fbc240111ea3ef4fe2ac147be2c72be9b12cc7568be1a695ad3633
SHA51287bad701d8e3a71f39b575930eb7ebcbc7fc5da694b0dddc13a2728a82c2dd7273dda19e2f6287f74cfec62737714a71711c2ec71744eaa2ac83e3abc9e2c8a8
-
Filesize
192B
MD5b972e7af6668ac70df6031b64f6972b9
SHA129528ef141f53dcc82f6ee8108faa4e0c1f17126
SHA256e19c539ec6ebb997d11c132e470dc77098daf04ac7b73a0f5672756052ebbe05
SHA5123e1ec435f6ae7b13248429f2128acf072811e0fcb4c5b8ecfa926d1ab3a4ad8123c707fb3f0f122190410ed2aa7c4b193093c628cc99284024308a1216b8869a
-
Filesize
192B
MD5db33df85068fa2f772fd18bb70f66fb1
SHA1ab792179143759e903f1505429b6546a662d56ef
SHA2564ab198eef99627257662d6bc0a5437f1f30dfb805c9f00ea858b7578c9b131a6
SHA5121d4f9f663323c2fb85591395a4c96aca44d2d5e23760efae43e7d3863c1ff4f9ef85527658f7b436c20d24c92125663b574491424e1ce36cfed885e6935991d7
-
Filesize
192B
MD56f25ec2b68ada4d7c8cc9193e03c0f12
SHA1d64b87e3544672b074df954e77838f5ff32654da
SHA2566607cc0b199e56af11f0287d6c1943e33684387323acda43b77bfadc5dd810e6
SHA512434cfa0656fce99b93c1972289e9c576c60899647a3411b0f235fcc8e66d92120075593169c08b7e595e20a86845c31fdf738d36556dd6c8e63bc07305587024
-
Filesize
192B
MD5938b0c1e5e00b13c6e5d0790b2026e4b
SHA1112cc43edc672f0e7743b5da5e4ebdd7aa6fd0f3
SHA256e13869b1b09cc72a08d3113f296b1c96f22630fc6e565040cd77c58640be9b52
SHA5128eea6f5919a57c108b50f1ec55d4378a40f9128042766c292484a627de7fe25bba11ba5c232001095ffd9f55dbc5ea89d853f6f53f35c4c3150b2a22c9e41a12
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5b48017b73e56d6f86c024cb6c61e4ea9
SHA1422df9ab0648e97364afa72eba5ad419a11be748
SHA2560d6c9a9af430e28abcbed6623ca9ac35baa1ce737f8532289c5b996ba9ef03a5
SHA512752ff14a5b97516dc61c00c8a45b496cdd6e96409e47199d97a037b51911fbe7d873cbee64b60e44bcff3dcde239265562b38f2c53f9f910e17b7c6b872829f4
-
Filesize
36B
MD56783c3ee07c7d151ceac57f1f9c8bed7
SHA117468f98f95bf504cc1f83c49e49a78526b3ea03
SHA2568ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322
SHA512c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8
-
Filesize
197B
MD58088241160261560a02c84025d107592
SHA1083121f7027557570994c9fc211df61730455bb5
SHA2562072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1
SHA51220d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394