Analysis
-
max time kernel
144s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22/12/2024, 08:21
Behavioral task
behavioral1
Sample
JaffaCakes118_246893f05894bda3c6d7ba680c4abf8be2038e4c2b5e43cae332c88ec8074947.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_246893f05894bda3c6d7ba680c4abf8be2038e4c2b5e43cae332c88ec8074947.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_246893f05894bda3c6d7ba680c4abf8be2038e4c2b5e43cae332c88ec8074947.exe
-
Size
1.3MB
-
MD5
b5b2d22ab8186f9870cfbde2e2f1dcf7
-
SHA1
0d380a258d6bcf31dcc383ef61e1a00828eb6e43
-
SHA256
246893f05894bda3c6d7ba680c4abf8be2038e4c2b5e43cae332c88ec8074947
-
SHA512
fc53a9175840ffab14c4ba9a9bbe80ef83d0834ef55be847f0b244dcdaa27d0f003f5e2943a071c58f67e09a39ac433781b52c83e03c5716f8cf329bdaed28ad
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 39 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2884 2792 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 588 2792 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2828 2792 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2840 2792 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2348 2792 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2716 2792 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2560 2792 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2612 2792 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2952 2792 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 972 2792 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1644 2792 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1700 2792 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 340 2792 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2068 2792 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2456 2792 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1856 2792 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2012 2792 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1076 2792 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1788 2792 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1668 2792 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1164 2792 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1424 2792 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2836 2792 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2844 2792 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2136 2792 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2428 2792 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2200 2792 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2380 2792 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2940 2792 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1476 2792 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2320 2792 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1756 2792 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1116 2792 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1100 2792 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2984 2792 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 880 2792 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1144 2792 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 276 2792 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1796 2792 schtasks.exe 34 -
resource yara_rule behavioral1/files/0x000f000000018662-9.dat dcrat behavioral1/memory/2628-13-0x0000000000230000-0x0000000000340000-memory.dmp dcrat behavioral1/memory/1604-72-0x00000000010A0000-0x00000000011B0000-memory.dmp dcrat behavioral1/memory/1672-295-0x0000000001310000-0x0000000001420000-memory.dmp dcrat behavioral1/memory/2108-473-0x00000000003D0000-0x00000000004E0000-memory.dmp dcrat behavioral1/memory/1508-534-0x0000000000A10000-0x0000000000B20000-memory.dmp dcrat behavioral1/memory/3064-594-0x0000000000F20000-0x0000000001030000-memory.dmp dcrat behavioral1/memory/2228-654-0x0000000001270000-0x0000000001380000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 14 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 596 powershell.exe 484 powershell.exe 3004 powershell.exe 2000 powershell.exe 2180 powershell.exe 2352 powershell.exe 796 powershell.exe 1772 powershell.exe 1792 powershell.exe 2412 powershell.exe 908 powershell.exe 788 powershell.exe 2152 powershell.exe 316 powershell.exe -
Executes dropped EXE 11 IoCs
pid Process 2628 DllCommonsvc.exe 1604 csrss.exe 1028 csrss.exe 2240 csrss.exe 1672 csrss.exe 2504 csrss.exe 380 csrss.exe 2108 csrss.exe 1508 csrss.exe 3064 csrss.exe 2228 csrss.exe -
Loads dropped DLL 2 IoCs
pid Process 2872 cmd.exe 2872 cmd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 10 IoCs
flow ioc 4 raw.githubusercontent.com 12 raw.githubusercontent.com 19 raw.githubusercontent.com 30 raw.githubusercontent.com 26 raw.githubusercontent.com 33 raw.githubusercontent.com 5 raw.githubusercontent.com 9 raw.githubusercontent.com 16 raw.githubusercontent.com 23 raw.githubusercontent.com -
Drops file in Program Files directory 11 IoCs
description ioc Process File created C:\Program Files\Windows Portable Devices\42af1c969fbb7b DllCommonsvc.exe File created C:\Program Files\Google\Chrome\services.exe DllCommonsvc.exe File created C:\Program Files\Google\Chrome\c5b4cb5e9653cc DllCommonsvc.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\taskhost.exe DllCommonsvc.exe File created C:\Program Files (x86)\Windows Sidebar\ja-JP\0a1fd5f707cd16 DllCommonsvc.exe File created C:\Program Files (x86)\Internet Explorer\ja-JP\WmiPrvSE.exe DllCommonsvc.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ja-JP\WmiPrvSE.exe DllCommonsvc.exe File created C:\Program Files (x86)\Internet Explorer\ja-JP\24dbde2999530e DllCommonsvc.exe File created C:\Program Files\Windows Portable Devices\audiodg.exe DllCommonsvc.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\b75386f1303e64 DllCommonsvc.exe File created C:\Program Files (x86)\Windows Sidebar\ja-JP\sppsvc.exe DllCommonsvc.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Microsoft.NET\assembly\GAC_64\42af1c969fbb7b DllCommonsvc.exe File created C:\Windows\fr-FR\explorer.exe DllCommonsvc.exe File created C:\Windows\fr-FR\7a0fd90576e088 DllCommonsvc.exe File created C:\Windows\Microsoft.NET\assembly\GAC_64\audiodg.exe DllCommonsvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_246893f05894bda3c6d7ba680c4abf8be2038e4c2b5e43cae332c88ec8074947.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 39 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2836 schtasks.exe 2348 schtasks.exe 2560 schtasks.exe 1644 schtasks.exe 1856 schtasks.exe 1788 schtasks.exe 2012 schtasks.exe 1164 schtasks.exe 1100 schtasks.exe 276 schtasks.exe 2840 schtasks.exe 1756 schtasks.exe 2068 schtasks.exe 2428 schtasks.exe 2940 schtasks.exe 2320 schtasks.exe 588 schtasks.exe 2200 schtasks.exe 1476 schtasks.exe 880 schtasks.exe 1144 schtasks.exe 2716 schtasks.exe 2952 schtasks.exe 1700 schtasks.exe 1424 schtasks.exe 2136 schtasks.exe 2612 schtasks.exe 1668 schtasks.exe 2844 schtasks.exe 1796 schtasks.exe 1076 schtasks.exe 2380 schtasks.exe 1116 schtasks.exe 2884 schtasks.exe 2828 schtasks.exe 972 schtasks.exe 340 schtasks.exe 2456 schtasks.exe 2984 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 2628 DllCommonsvc.exe 596 powershell.exe 908 powershell.exe 2000 powershell.exe 788 powershell.exe 1772 powershell.exe 316 powershell.exe 1604 csrss.exe 3004 powershell.exe 2352 powershell.exe 796 powershell.exe 2412 powershell.exe 2180 powershell.exe 484 powershell.exe 2152 powershell.exe 1792 powershell.exe 1028 csrss.exe 2240 csrss.exe 1672 csrss.exe 2504 csrss.exe 380 csrss.exe 2108 csrss.exe 1508 csrss.exe 3064 csrss.exe 2228 csrss.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
description pid Process Token: SeDebugPrivilege 2628 DllCommonsvc.exe Token: SeDebugPrivilege 596 powershell.exe Token: SeDebugPrivilege 908 powershell.exe Token: SeDebugPrivilege 2000 powershell.exe Token: SeDebugPrivilege 788 powershell.exe Token: SeDebugPrivilege 1772 powershell.exe Token: SeDebugPrivilege 1604 csrss.exe Token: SeDebugPrivilege 316 powershell.exe Token: SeDebugPrivilege 3004 powershell.exe Token: SeDebugPrivilege 2352 powershell.exe Token: SeDebugPrivilege 796 powershell.exe Token: SeDebugPrivilege 2412 powershell.exe Token: SeDebugPrivilege 2180 powershell.exe Token: SeDebugPrivilege 484 powershell.exe Token: SeDebugPrivilege 2152 powershell.exe Token: SeDebugPrivilege 1792 powershell.exe Token: SeDebugPrivilege 1028 csrss.exe Token: SeDebugPrivilege 2240 csrss.exe Token: SeDebugPrivilege 1672 csrss.exe Token: SeDebugPrivilege 2504 csrss.exe Token: SeDebugPrivilege 380 csrss.exe Token: SeDebugPrivilege 2108 csrss.exe Token: SeDebugPrivilege 1508 csrss.exe Token: SeDebugPrivilege 3064 csrss.exe Token: SeDebugPrivilege 2228 csrss.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2976 wrote to memory of 1632 2976 JaffaCakes118_246893f05894bda3c6d7ba680c4abf8be2038e4c2b5e43cae332c88ec8074947.exe 30 PID 2976 wrote to memory of 1632 2976 JaffaCakes118_246893f05894bda3c6d7ba680c4abf8be2038e4c2b5e43cae332c88ec8074947.exe 30 PID 2976 wrote to memory of 1632 2976 JaffaCakes118_246893f05894bda3c6d7ba680c4abf8be2038e4c2b5e43cae332c88ec8074947.exe 30 PID 2976 wrote to memory of 1632 2976 JaffaCakes118_246893f05894bda3c6d7ba680c4abf8be2038e4c2b5e43cae332c88ec8074947.exe 30 PID 1632 wrote to memory of 2872 1632 WScript.exe 31 PID 1632 wrote to memory of 2872 1632 WScript.exe 31 PID 1632 wrote to memory of 2872 1632 WScript.exe 31 PID 1632 wrote to memory of 2872 1632 WScript.exe 31 PID 2872 wrote to memory of 2628 2872 cmd.exe 33 PID 2872 wrote to memory of 2628 2872 cmd.exe 33 PID 2872 wrote to memory of 2628 2872 cmd.exe 33 PID 2872 wrote to memory of 2628 2872 cmd.exe 33 PID 2628 wrote to memory of 1772 2628 DllCommonsvc.exe 74 PID 2628 wrote to memory of 1772 2628 DllCommonsvc.exe 74 PID 2628 wrote to memory of 1772 2628 DllCommonsvc.exe 74 PID 2628 wrote to memory of 796 2628 DllCommonsvc.exe 75 PID 2628 wrote to memory of 796 2628 DllCommonsvc.exe 75 PID 2628 wrote to memory of 796 2628 DllCommonsvc.exe 75 PID 2628 wrote to memory of 596 2628 DllCommonsvc.exe 76 PID 2628 wrote to memory of 596 2628 DllCommonsvc.exe 76 PID 2628 wrote to memory of 596 2628 DllCommonsvc.exe 76 PID 2628 wrote to memory of 788 2628 DllCommonsvc.exe 78 PID 2628 wrote to memory of 788 2628 DllCommonsvc.exe 78 PID 2628 wrote to memory of 788 2628 DllCommonsvc.exe 78 PID 2628 wrote to memory of 316 2628 DllCommonsvc.exe 79 PID 2628 wrote to memory of 316 2628 DllCommonsvc.exe 79 PID 2628 wrote to memory of 316 2628 DllCommonsvc.exe 79 PID 2628 wrote to memory of 484 2628 DllCommonsvc.exe 81 PID 2628 wrote to memory of 484 2628 DllCommonsvc.exe 81 PID 2628 wrote to memory of 484 2628 DllCommonsvc.exe 81 PID 2628 wrote to memory of 2180 2628 DllCommonsvc.exe 83 PID 2628 wrote to memory of 2180 2628 DllCommonsvc.exe 83 PID 2628 wrote to memory of 2180 2628 DllCommonsvc.exe 83 PID 2628 wrote to memory of 1792 2628 DllCommonsvc.exe 84 PID 2628 wrote to memory of 1792 2628 DllCommonsvc.exe 84 PID 2628 wrote to memory of 1792 2628 DllCommonsvc.exe 84 PID 2628 wrote to memory of 3004 2628 DllCommonsvc.exe 85 PID 2628 wrote to memory of 3004 2628 DllCommonsvc.exe 85 PID 2628 wrote to memory of 3004 2628 DllCommonsvc.exe 85 PID 2628 wrote to memory of 2000 2628 DllCommonsvc.exe 86 PID 2628 wrote to memory of 2000 2628 DllCommonsvc.exe 86 PID 2628 wrote to memory of 2000 2628 DllCommonsvc.exe 86 PID 2628 wrote to memory of 2352 2628 DllCommonsvc.exe 87 PID 2628 wrote to memory of 2352 2628 DllCommonsvc.exe 87 PID 2628 wrote to memory of 2352 2628 DllCommonsvc.exe 87 PID 2628 wrote to memory of 2152 2628 DllCommonsvc.exe 88 PID 2628 wrote to memory of 2152 2628 DllCommonsvc.exe 88 PID 2628 wrote to memory of 2152 2628 DllCommonsvc.exe 88 PID 2628 wrote to memory of 2412 2628 DllCommonsvc.exe 89 PID 2628 wrote to memory of 2412 2628 DllCommonsvc.exe 89 PID 2628 wrote to memory of 2412 2628 DllCommonsvc.exe 89 PID 2628 wrote to memory of 908 2628 DllCommonsvc.exe 90 PID 2628 wrote to memory of 908 2628 DllCommonsvc.exe 90 PID 2628 wrote to memory of 908 2628 DllCommonsvc.exe 90 PID 2628 wrote to memory of 1604 2628 DllCommonsvc.exe 100 PID 2628 wrote to memory of 1604 2628 DllCommonsvc.exe 100 PID 2628 wrote to memory of 1604 2628 DllCommonsvc.exe 100 PID 1604 wrote to memory of 236 1604 csrss.exe 104 PID 1604 wrote to memory of 236 1604 csrss.exe 104 PID 1604 wrote to memory of 236 1604 csrss.exe 104 PID 236 wrote to memory of 1944 236 cmd.exe 106 PID 236 wrote to memory of 1944 236 cmd.exe 106 PID 236 wrote to memory of 1944 236 cmd.exe 106 PID 236 wrote to memory of 1028 236 cmd.exe 107 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_246893f05894bda3c6d7ba680c4abf8be2038e4c2b5e43cae332c88ec8074947.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_246893f05894bda3c6d7ba680c4abf8be2038e4c2b5e43cae332c88ec8074947.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\providercommon\1zu9dW.bat" "3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1772
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Internet Explorer\ja-JP\WmiPrvSE.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:796
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Portable Devices\audiodg.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:596
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\Idle.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:788
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\csrss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:316
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\Music\audiodg.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:484
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Google\Chrome\services.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2180
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\csrss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1792
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\taskhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3004
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\fr-FR\explorer.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2000
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Sidebar\ja-JP\sppsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2352
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Microsoft.NET\assembly\GAC_64\audiodg.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2152
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default User\taskhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2412
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\OSPPSVC.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:908
-
-
C:\providercommon\csrss.exe"C:\providercommon\csrss.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\goxiuQmrpE.bat"6⤵
- Suspicious use of WriteProcessMemory
PID:236 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:27⤵PID:1944
-
-
C:\providercommon\csrss.exe"C:\providercommon\csrss.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1028 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\EzJh52oHEl.bat"8⤵PID:1112
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:29⤵PID:1484
-
-
C:\providercommon\csrss.exe"C:\providercommon\csrss.exe"9⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2240 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\cxnNEsMM51.bat"10⤵PID:560
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:211⤵PID:1700
-
-
C:\providercommon\csrss.exe"C:\providercommon\csrss.exe"11⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1672 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\m47JVZSxDi.bat"12⤵PID:1384
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:213⤵PID:2340
-
-
C:\providercommon\csrss.exe"C:\providercommon\csrss.exe"13⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2504 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\qRj2XQE6t6.bat"14⤵PID:1116
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:215⤵PID:700
-
-
C:\providercommon\csrss.exe"C:\providercommon\csrss.exe"15⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:380 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\r7gOBUt9HL.bat"16⤵PID:2156
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:217⤵PID:1480
-
-
C:\providercommon\csrss.exe"C:\providercommon\csrss.exe"17⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2108 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\DJG58brWjr.bat"18⤵PID:1016
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:219⤵PID:1336
-
-
C:\providercommon\csrss.exe"C:\providercommon\csrss.exe"19⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1508 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\iS8tBRk2Vg.bat"20⤵PID:2776
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:221⤵PID:2144
-
-
C:\providercommon\csrss.exe"C:\providercommon\csrss.exe"21⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3064 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\wtOcRLEbie.bat"22⤵PID:2352
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:223⤵PID:2620
-
-
C:\providercommon\csrss.exe"C:\providercommon\csrss.exe"23⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2228
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Internet Explorer\ja-JP\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2884
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Program Files (x86)\Internet Explorer\ja-JP\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:588
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Internet Explorer\ja-JP\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2828
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows Portable Devices\audiodg.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2840
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Program Files\Windows Portable Devices\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2348
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 12 /tr "'C:\Program Files\Windows Portable Devices\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2716
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 5 /tr "'C:\providercommon\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2560
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\providercommon\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2612
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 6 /tr "'C:\providercommon\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2952
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\providercommon\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:972
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\providercommon\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1644
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\providercommon\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1700
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 8 /tr "'C:\Users\Default\Music\audiodg.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:340
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Users\Default\Music\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2068
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 7 /tr "'C:\Users\Default\Music\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2456
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 12 /tr "'C:\Program Files\Google\Chrome\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1856
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Program Files\Google\Chrome\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2012
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 10 /tr "'C:\Program Files\Google\Chrome\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1076
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\providercommon\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1788
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\providercommon\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1668
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\providercommon\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1164
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\taskhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1424
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2836
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2844
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 7 /tr "'C:\Windows\fr-FR\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2136
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Windows\fr-FR\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2428
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 13 /tr "'C:\Windows\fr-FR\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2200
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Sidebar\ja-JP\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2380
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Sidebar\ja-JP\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2940
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows Sidebar\ja-JP\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1476
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 9 /tr "'C:\Windows\Microsoft.NET\assembly\GAC_64\audiodg.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2320
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Windows\Microsoft.NET\assembly\GAC_64\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1756
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 12 /tr "'C:\Windows\Microsoft.NET\assembly\GAC_64\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1116
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 5 /tr "'C:\Users\Default User\taskhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1100
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Users\Default User\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2984
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 9 /tr "'C:\Users\Default User\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:880
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 6 /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\OSPPSVC.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1144
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:276
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 11 /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1796
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5916719428372b675032c2bee0fc62648
SHA19e3964a57717b3a93231169b1408535ba7be9315
SHA256ad0ab60b9209cde2428b94afb0ea09e74e5ea6846a493efb623653134c0b149d
SHA5129d45f1ce215abf088675a340f28c0c5ba2d5b1d6447b6dc999216fe5f51c0e51bdd6abc31a7a3826d96e9d66b5fa952cae61c7b601aa0fc98c2b03e279133a51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5713145c654217ac745d07bb8b2006d
SHA1dd17561feaffd754b07af931be3f09d04191e83c
SHA256c88fbc29c7cb0a4ec5b04acc0e53bfb16b438c93613e91b4b1fb457ae5d0ba25
SHA512f33f17dba2900c940f2566a4c8882bae6702360f1be595f580d2cbd8154a8d2ae0bdcb243b52425cd53e8f814608267ba59caf2974d4fcd4cd7dfff36f5ed38d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ebde7002e3a9f6bcf45f16ed352969f
SHA11b1b97b60f59430c4b2f7474dd0e24786b6e38f3
SHA256be6a7beba12e985bfe36ce70923bcad88a2fc34061068f13f418c1408f63af52
SHA51296d80f7e0d8e3cf5dff4904015892189db88716c4f6c3a9714afb18b9857f467acc3fdddc9f55a11df3996929d04887ec73402e31876af9f6bf13e9056f6615e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fed5397f8679249d3432f1a5f47a9285
SHA1d8d874bb5019e735167bb984ad54735237c941f6
SHA256110eea6d5cb69b9339fd548a47913985956f52857cc711f6af42e8e36041e9c9
SHA512e0c6eb9f4739f3e7990180b6cfac877e03d728ee6865a7a2480c72d38fa21e622af196589c4cbf8a7b3806e324dbc86252b1aa6b603efa39bfde9627ae314a8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd893a314a674369af4e3aae9d0211ca
SHA1ad75860c0641e514107f43b5f06faf8ef404d203
SHA256790d5c93359beca4d84268b97e18039492ae31dd7ef6ff9e44bfc162b398052e
SHA512396c904044733db103524693d910adc5b25a8ece0007b62c92da6f5cab337ce98dcb9ac6f92e1a6aead70b8f6bff60bff3d1036fa63240c7b66324341eec8a1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c03610eff0569c9d76896848dd56d7d
SHA112badd4f0a61dbe592fa5738038cbc8d03bf4379
SHA25626572af59b240cfb177812a474ee90f08c31660c10a6e12d2dcf6b91fb226c22
SHA51296ec4e60444a51aeb90fb68e9579f70c156f0c7c3f3bdd57060421e64b41c86ffc49cfad2e7dcc891a4758d4395e6a7123023977332dcd14ae505f88b2a0d6ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555b543c5dea09321334a102fca52a015
SHA1e8786db4ba3b9097dd1153cd07e7aad85df8b04a
SHA256e5a97359ad3b2e659499df928f2e422db22925e6064806a8e18399ad156c1c48
SHA512720a7ff51310cac4ee048b594ce9e2503e26c0825567b5b539cf7c506fdb0021acabe017fbec5112c5ddcfc9a521ca94a416afe53afea36147456b627124441d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c39b9b0b0cc32d4f9f9f5aa28a6c5b6
SHA15a615202ccaf9c8c074aef0d21314895c3ee4cc9
SHA256d70ce4eb3ef5e3a4fb5d77b6930b064c97b0912ecae39b9c96deecf304ac0055
SHA5128fe47f0e529107fe6d65c232ea84146783bbbc8325a1aaae242b938deb26f03b9b33527b90ad8983184325167eddf76d82bc9d362c06bf23e78e3344a80a11cb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
192B
MD512fc755062218133354b8ad914b99531
SHA1bd3695e12931e4b3382c67054741ff7a51c7e0b7
SHA256d22d61d78b780757674bf7f1d23be19f303d5c5bfcba01b0e010f9de28cb414a
SHA5129e966b08e9a9f10120ae115b453e14321f3221e9781100c4818f1c4f0317c9d1361f4b0a2c5d3ab461a715bc4fb86c8284cc57aa254ef621eebbf6dd8beb8f3c
-
Filesize
192B
MD5a24250a3a3c05322d3af3f3ff0fadf90
SHA15d03ab3b8909d9a7e8488989e27b63ac2834a39b
SHA256f0a80c864b380c9e8ed6a5f777e487bb9ac8d2d673969874703150be9f9db27c
SHA512ffc64b738bf96e35b6991608d4392a543f0db587cdf83f00540a6a01f22d1fac64a05d787182be92943fd8bce0d12b8c92d7647d47236eee6845669e947600fd
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
192B
MD56073f573df347341c4d9a920d8af2ff4
SHA1ff995ea57ced4c4d7e30a16027e26463240920e0
SHA2569882a7964e38fbd6c657a6aa3d4fb73dd1c049928c626805e5215d792d2072e5
SHA512d9d65037ddc3c57100c967c2b5b7dda10780308692e28c170caa172295db5a2eaef12a83849463d6330697b2ae6beb03159a580ca86df3baf5e9fe183f0512b6
-
Filesize
192B
MD521dd0f6cf3be52fc6fcce0776fc826b3
SHA15b8cdb6aa276346e7714a641c8fc9bc8d026476a
SHA256f1d3998536dd14a8c0c0cf45385bada7ad43e100089e9507083874c01dbc5f96
SHA512db3013e5c05d5984a7cc77aeab1b52fa90042dd08495b0ebd52dc8f90a9d4664d11b1e49f3ea7050264837903a811619f66edcc0fabeaf3a7ed02e36f4ab0aef
-
Filesize
192B
MD529db4688b0a14d5ebe0b3b0a08db8f12
SHA11fc2bc08dac728a4238e156ae6dd8a7bc69f391f
SHA2569feb1233ffaeb4ffac734aeedb626a6cc90936927a7da7b3af901c4bf9c1baaf
SHA512f630a961a7a71e1f4154a977bb74326eae075e3bca4decf26a278d22d717e39ccbe16afb69190bcd94298ac9c3c0699c19c69430f89b187ec6c9421503c04c52
-
Filesize
192B
MD55b20024d7bd3d610f41ac0525d823d0e
SHA18536fb071f9857e90ada8edd291086977e6749b5
SHA256c63aa253494238c7a35fd5117adf04c556e5ba1848c7f686e15802bf09bc476f
SHA5120cefd29de1658318db7edee9d5132e9ee86c0009678d87d00bb4b24960fe92b362deb12c278d24f8163e6f37b986401c404a003ced157d43c2d224b5cf05596c
-
Filesize
192B
MD5447482eba926cf379ebcb5ade8ace0bf
SHA1a506462e4b99e8b29a7b611151698a87d7596b1b
SHA2566cbcb54414bdedc229a671a6727c6eb8e0a164571d304d5c1d94d325a6222bab
SHA512d22f4937f28c3ef22110bee648082607032dde6a10b547429181b1a10a28e2f0c40c778b9582ef17786720b3bd81cdc2e8430c452db003b0a96a79ddbdb92419
-
Filesize
192B
MD5ec9330bbc67650a3579792e4e8a0567c
SHA184161c41fa5e365c6e4ef4f8ee18d2b883428ad7
SHA2566d005abd512f75ed88bafa647a513af3afa1a7ab7dbe695cc5c7eef068beafad
SHA512188b6580a448dccc25ad58445e609a7b5187a3f202c1330050331c88d9ef055e792f0cb536020a1ecce077a5fdf8229735fb730c0fd4aa53082b233c1ed03589
-
Filesize
192B
MD5f4ba63ef1e295b98947ea44c710dd9d5
SHA17e53eada8934ce0fcc8cec3f65255d56b1771292
SHA256c2a6f12055e0b41013b40650c4924f3332b5ecf222af30bb985443667f0f90be
SHA5120e242ba3425bb0a477f086042146d126282e0b4c28ee05df4b8b6b6ba39bdefe27274cf38c5683fd303a01b58b947b3e291d2b0e15f79e2f1f30d68e676432ab
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD560e2444c44201aa06128d6e2e12168c2
SHA11195e21a24a87c6af0fe862ef8aeae72a53c94c4
SHA256e25f4a6283eca587a66854f65d510e4ef267bd237a35b04a4c30cb9b8a7c8b91
SHA5127736d4c32028090d3f6297823dfe759ab20113091a80bd67217e7f6e7c5aabedb3187cd88935b6b724d1831474bd11413e85dc23b2c1374e12ea992dc1377ae9
-
Filesize
36B
MD56783c3ee07c7d151ceac57f1f9c8bed7
SHA117468f98f95bf504cc1f83c49e49a78526b3ea03
SHA2568ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322
SHA512c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8
-
Filesize
197B
MD58088241160261560a02c84025d107592
SHA1083121f7027557570994c9fc211df61730455bb5
SHA2562072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1
SHA51220d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394