Analysis
-
max time kernel
147s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 09:20
Behavioral task
behavioral1
Sample
JaffaCakes118_bbefaee3fc1949ecba177204a371973ba1d0ead0d74b8592e5b52102d7c376f8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_bbefaee3fc1949ecba177204a371973ba1d0ead0d74b8592e5b52102d7c376f8.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_bbefaee3fc1949ecba177204a371973ba1d0ead0d74b8592e5b52102d7c376f8.exe
-
Size
1.3MB
-
MD5
5efcdbd14229f83aaa5bc54e04efc7d7
-
SHA1
f46fcfdccca4069cca052b518257d72ef83d8e71
-
SHA256
bbefaee3fc1949ecba177204a371973ba1d0ead0d74b8592e5b52102d7c376f8
-
SHA512
ce9ddec0916908bb48e49d106f6863d17ed19fdbcdf1d2f7b57d366c8c9c0ee4d2fca0b465f9f4925ff2d326bdc1467dafb4f1d42655a76a28001b34d7ef8b49
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 57 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2832 2728 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2940 2728 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2656 2728 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2640 2728 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2688 2728 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2228 2728 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1684 2728 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 992 2728 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2012 2728 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1268 2728 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1976 2728 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2052 2728 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1736 2728 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 896 2728 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2672 2728 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1132 2728 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2584 2728 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1124 2728 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1956 2728 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1692 2728 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1788 2728 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2988 2728 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2308 2728 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2252 2728 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2992 2728 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1616 2728 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2508 2728 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 592 2728 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1724 2728 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1400 2728 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 708 2728 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1556 2728 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1544 2728 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 396 2728 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2484 2728 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1540 2728 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2452 2728 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1264 2728 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1012 2728 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1676 2728 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2992 2728 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2124 2728 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 108 2728 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2480 2728 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2744 2728 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2968 2728 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1808 2728 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1360 2728 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2972 2728 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2816 2728 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1524 2728 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 764 2728 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1252 2728 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1172 2728 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 464 2728 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2192 2728 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 692 2728 schtasks.exe 34 -
resource yara_rule behavioral1/files/0x00080000000160d5-9.dat dcrat behavioral1/memory/2716-13-0x0000000000BB0000-0x0000000000CC0000-memory.dmp dcrat behavioral1/memory/2924-177-0x0000000000840000-0x0000000000950000-memory.dmp dcrat behavioral1/memory/2552-236-0x00000000003E0000-0x00000000004F0000-memory.dmp dcrat behavioral1/memory/2528-297-0x0000000000940000-0x0000000000A50000-memory.dmp dcrat behavioral1/memory/696-357-0x0000000000C40000-0x0000000000D50000-memory.dmp dcrat behavioral1/memory/2164-417-0x0000000001380000-0x0000000001490000-memory.dmp dcrat behavioral1/memory/2680-477-0x0000000000060000-0x0000000000170000-memory.dmp dcrat behavioral1/memory/592-537-0x0000000000B70000-0x0000000000C80000-memory.dmp dcrat behavioral1/memory/2656-597-0x0000000000260000-0x0000000000370000-memory.dmp dcrat behavioral1/memory/1540-658-0x0000000000100000-0x0000000000210000-memory.dmp dcrat behavioral1/memory/2216-718-0x0000000000C30000-0x0000000000D40000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 21 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1664 powershell.exe 2920 powershell.exe 2104 powershell.exe 2824 powershell.exe 776 powershell.exe 988 powershell.exe 2336 powershell.exe 1688 powershell.exe 1452 powershell.exe 1488 powershell.exe 1612 powershell.exe 2004 powershell.exe 1428 powershell.exe 2472 powershell.exe 2280 powershell.exe 704 powershell.exe 2264 powershell.exe 2676 powershell.exe 2640 powershell.exe 1272 powershell.exe 864 powershell.exe -
Executes dropped EXE 12 IoCs
pid Process 2716 DllCommonsvc.exe 1872 DllCommonsvc.exe 2924 OSPPSVC.exe 2552 OSPPSVC.exe 2528 OSPPSVC.exe 696 OSPPSVC.exe 2164 OSPPSVC.exe 2680 OSPPSVC.exe 592 OSPPSVC.exe 2656 OSPPSVC.exe 1540 OSPPSVC.exe 2216 OSPPSVC.exe -
Loads dropped DLL 2 IoCs
pid Process 1172 cmd.exe 1172 cmd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 10 IoCs
flow ioc 23 raw.githubusercontent.com 34 raw.githubusercontent.com 5 raw.githubusercontent.com 12 raw.githubusercontent.com 16 raw.githubusercontent.com 26 raw.githubusercontent.com 30 raw.githubusercontent.com 4 raw.githubusercontent.com 9 raw.githubusercontent.com 19 raw.githubusercontent.com -
Drops file in Program Files directory 15 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\1033\886983d96e3d3e DllCommonsvc.exe File created C:\Program Files\Java\jre7\24dbde2999530e DllCommonsvc.exe File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\1033\OSPPSVC.exe DllCommonsvc.exe File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\1033\1610b97d3ab4a7 DllCommonsvc.exe File created C:\Program Files\Windows Journal\de-DE\wininit.exe DllCommonsvc.exe File created C:\Program Files\Java\jre7\WmiPrvSE.exe DllCommonsvc.exe File created C:\Program Files (x86)\Internet Explorer\en-US\audiodg.exe DllCommonsvc.exe File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\csrss.exe DllCommonsvc.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\1033\csrss.exe DllCommonsvc.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\1033\OSPPSVC.exe DllCommonsvc.exe File created C:\Program Files\Windows Journal\de-DE\56085415360792 DllCommonsvc.exe File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\886983d96e3d3e DllCommonsvc.exe File created C:\Program Files\Windows Portable Devices\System.exe DllCommonsvc.exe File created C:\Program Files\Windows Portable Devices\27d1bcfc3c54e0 DllCommonsvc.exe File created C:\Program Files (x86)\Internet Explorer\en-US\42af1c969fbb7b DllCommonsvc.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Vss\Writers\Application\69ddcba757bf72 DllCommonsvc.exe File created C:\Windows\es-ES\sppsvc.exe DllCommonsvc.exe File created C:\Windows\es-ES\0a1fd5f707cd16 DllCommonsvc.exe File created C:\Windows\Vss\Writers\Application\smss.exe DllCommonsvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_bbefaee3fc1949ecba177204a371973ba1d0ead0d74b8592e5b52102d7c376f8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 57 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2480 schtasks.exe 2640 schtasks.exe 2992 schtasks.exe 2452 schtasks.exe 1544 schtasks.exe 1540 schtasks.exe 2992 schtasks.exe 2972 schtasks.exe 764 schtasks.exe 2656 schtasks.exe 1736 schtasks.exe 708 schtasks.exe 692 schtasks.exe 2228 schtasks.exe 1976 schtasks.exe 2584 schtasks.exe 1524 schtasks.exe 2508 schtasks.exe 2744 schtasks.exe 1360 schtasks.exe 1264 schtasks.exe 1808 schtasks.exe 1252 schtasks.exe 1268 schtasks.exe 2672 schtasks.exe 2252 schtasks.exe 1616 schtasks.exe 396 schtasks.exe 2052 schtasks.exe 896 schtasks.exe 2308 schtasks.exe 2968 schtasks.exe 1172 schtasks.exe 1788 schtasks.exe 1012 schtasks.exe 1684 schtasks.exe 2484 schtasks.exe 1556 schtasks.exe 2124 schtasks.exe 2816 schtasks.exe 464 schtasks.exe 2012 schtasks.exe 1132 schtasks.exe 592 schtasks.exe 1400 schtasks.exe 1676 schtasks.exe 2832 schtasks.exe 2988 schtasks.exe 1724 schtasks.exe 108 schtasks.exe 1692 schtasks.exe 2688 schtasks.exe 992 schtasks.exe 1956 schtasks.exe 2940 schtasks.exe 1124 schtasks.exe 2192 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 35 IoCs
pid Process 2716 DllCommonsvc.exe 2716 DllCommonsvc.exe 2716 DllCommonsvc.exe 2264 powershell.exe 864 powershell.exe 1664 powershell.exe 2472 powershell.exe 1272 powershell.exe 2920 powershell.exe 704 powershell.exe 1428 powershell.exe 2004 powershell.exe 2336 powershell.exe 2104 powershell.exe 988 powershell.exe 2280 powershell.exe 1872 DllCommonsvc.exe 2824 powershell.exe 1488 powershell.exe 776 powershell.exe 1452 powershell.exe 2676 powershell.exe 2640 powershell.exe 1688 powershell.exe 1612 powershell.exe 2924 OSPPSVC.exe 2552 OSPPSVC.exe 2528 OSPPSVC.exe 696 OSPPSVC.exe 2164 OSPPSVC.exe 2680 OSPPSVC.exe 592 OSPPSVC.exe 2656 OSPPSVC.exe 1540 OSPPSVC.exe 2216 OSPPSVC.exe -
Suspicious use of AdjustPrivilegeToken 33 IoCs
description pid Process Token: SeDebugPrivilege 2716 DllCommonsvc.exe Token: SeDebugPrivilege 2264 powershell.exe Token: SeDebugPrivilege 864 powershell.exe Token: SeDebugPrivilege 1664 powershell.exe Token: SeDebugPrivilege 2472 powershell.exe Token: SeDebugPrivilege 1272 powershell.exe Token: SeDebugPrivilege 2920 powershell.exe Token: SeDebugPrivilege 704 powershell.exe Token: SeDebugPrivilege 1428 powershell.exe Token: SeDebugPrivilege 2004 powershell.exe Token: SeDebugPrivilege 2336 powershell.exe Token: SeDebugPrivilege 2104 powershell.exe Token: SeDebugPrivilege 988 powershell.exe Token: SeDebugPrivilege 2280 powershell.exe Token: SeDebugPrivilege 1872 DllCommonsvc.exe Token: SeDebugPrivilege 2824 powershell.exe Token: SeDebugPrivilege 1488 powershell.exe Token: SeDebugPrivilege 776 powershell.exe Token: SeDebugPrivilege 1452 powershell.exe Token: SeDebugPrivilege 2676 powershell.exe Token: SeDebugPrivilege 2640 powershell.exe Token: SeDebugPrivilege 1688 powershell.exe Token: SeDebugPrivilege 1612 powershell.exe Token: SeDebugPrivilege 2924 OSPPSVC.exe Token: SeDebugPrivilege 2552 OSPPSVC.exe Token: SeDebugPrivilege 2528 OSPPSVC.exe Token: SeDebugPrivilege 696 OSPPSVC.exe Token: SeDebugPrivilege 2164 OSPPSVC.exe Token: SeDebugPrivilege 2680 OSPPSVC.exe Token: SeDebugPrivilege 592 OSPPSVC.exe Token: SeDebugPrivilege 2656 OSPPSVC.exe Token: SeDebugPrivilege 1540 OSPPSVC.exe Token: SeDebugPrivilege 2216 OSPPSVC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2400 wrote to memory of 1100 2400 JaffaCakes118_bbefaee3fc1949ecba177204a371973ba1d0ead0d74b8592e5b52102d7c376f8.exe 30 PID 2400 wrote to memory of 1100 2400 JaffaCakes118_bbefaee3fc1949ecba177204a371973ba1d0ead0d74b8592e5b52102d7c376f8.exe 30 PID 2400 wrote to memory of 1100 2400 JaffaCakes118_bbefaee3fc1949ecba177204a371973ba1d0ead0d74b8592e5b52102d7c376f8.exe 30 PID 2400 wrote to memory of 1100 2400 JaffaCakes118_bbefaee3fc1949ecba177204a371973ba1d0ead0d74b8592e5b52102d7c376f8.exe 30 PID 1100 wrote to memory of 1172 1100 WScript.exe 31 PID 1100 wrote to memory of 1172 1100 WScript.exe 31 PID 1100 wrote to memory of 1172 1100 WScript.exe 31 PID 1100 wrote to memory of 1172 1100 WScript.exe 31 PID 1172 wrote to memory of 2716 1172 cmd.exe 33 PID 1172 wrote to memory of 2716 1172 cmd.exe 33 PID 1172 wrote to memory of 2716 1172 cmd.exe 33 PID 1172 wrote to memory of 2716 1172 cmd.exe 33 PID 2716 wrote to memory of 1664 2716 DllCommonsvc.exe 71 PID 2716 wrote to memory of 1664 2716 DllCommonsvc.exe 71 PID 2716 wrote to memory of 1664 2716 DllCommonsvc.exe 71 PID 2716 wrote to memory of 1272 2716 DllCommonsvc.exe 72 PID 2716 wrote to memory of 1272 2716 DllCommonsvc.exe 72 PID 2716 wrote to memory of 1272 2716 DllCommonsvc.exe 72 PID 2716 wrote to memory of 2472 2716 DllCommonsvc.exe 73 PID 2716 wrote to memory of 2472 2716 DllCommonsvc.exe 73 PID 2716 wrote to memory of 2472 2716 DllCommonsvc.exe 73 PID 2716 wrote to memory of 864 2716 DllCommonsvc.exe 74 PID 2716 wrote to memory of 864 2716 DllCommonsvc.exe 74 PID 2716 wrote to memory of 864 2716 DllCommonsvc.exe 74 PID 2716 wrote to memory of 1428 2716 DllCommonsvc.exe 76 PID 2716 wrote to memory of 1428 2716 DllCommonsvc.exe 76 PID 2716 wrote to memory of 1428 2716 DllCommonsvc.exe 76 PID 2716 wrote to memory of 2104 2716 DllCommonsvc.exe 78 PID 2716 wrote to memory of 2104 2716 DllCommonsvc.exe 78 PID 2716 wrote to memory of 2104 2716 DllCommonsvc.exe 78 PID 2716 wrote to memory of 2004 2716 DllCommonsvc.exe 79 PID 2716 wrote to memory of 2004 2716 DllCommonsvc.exe 79 PID 2716 wrote to memory of 2004 2716 DllCommonsvc.exe 79 PID 2716 wrote to memory of 2920 2716 DllCommonsvc.exe 81 PID 2716 wrote to memory of 2920 2716 DllCommonsvc.exe 81 PID 2716 wrote to memory of 2920 2716 DllCommonsvc.exe 81 PID 2716 wrote to memory of 2264 2716 DllCommonsvc.exe 82 PID 2716 wrote to memory of 2264 2716 DllCommonsvc.exe 82 PID 2716 wrote to memory of 2264 2716 DllCommonsvc.exe 82 PID 2716 wrote to memory of 2336 2716 DllCommonsvc.exe 83 PID 2716 wrote to memory of 2336 2716 DllCommonsvc.exe 83 PID 2716 wrote to memory of 2336 2716 DllCommonsvc.exe 83 PID 2716 wrote to memory of 988 2716 DllCommonsvc.exe 85 PID 2716 wrote to memory of 988 2716 DllCommonsvc.exe 85 PID 2716 wrote to memory of 988 2716 DllCommonsvc.exe 85 PID 2716 wrote to memory of 2280 2716 DllCommonsvc.exe 87 PID 2716 wrote to memory of 2280 2716 DllCommonsvc.exe 87 PID 2716 wrote to memory of 2280 2716 DllCommonsvc.exe 87 PID 2716 wrote to memory of 704 2716 DllCommonsvc.exe 88 PID 2716 wrote to memory of 704 2716 DllCommonsvc.exe 88 PID 2716 wrote to memory of 704 2716 DllCommonsvc.exe 88 PID 2716 wrote to memory of 1884 2716 DllCommonsvc.exe 97 PID 2716 wrote to memory of 1884 2716 DllCommonsvc.exe 97 PID 2716 wrote to memory of 1884 2716 DllCommonsvc.exe 97 PID 1884 wrote to memory of 2456 1884 cmd.exe 99 PID 1884 wrote to memory of 2456 1884 cmd.exe 99 PID 1884 wrote to memory of 2456 1884 cmd.exe 99 PID 1884 wrote to memory of 1872 1884 cmd.exe 100 PID 1884 wrote to memory of 1872 1884 cmd.exe 100 PID 1884 wrote to memory of 1872 1884 cmd.exe 100 PID 1872 wrote to memory of 2676 1872 DllCommonsvc.exe 122 PID 1872 wrote to memory of 2676 1872 DllCommonsvc.exe 122 PID 1872 wrote to memory of 2676 1872 DllCommonsvc.exe 122 PID 1872 wrote to memory of 2824 1872 DllCommonsvc.exe 123 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bbefaee3fc1949ecba177204a371973ba1d0ead0d74b8592e5b52102d7c376f8.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bbefaee3fc1949ecba177204a371973ba1d0ead0d74b8592e5b52102d7c376f8.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\providercommon\1zu9dW.bat" "3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1664
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default User\lsm.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1272
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Public\Libraries\conhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2472
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\DllCommonsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:864
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\csrss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1428
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\1033\csrss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2104
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\All Users\Documents\smss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2004
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\spoolsv.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2920
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\Local Settings\explorer.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2264
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\explorer.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2336
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\Local Settings\conhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:988
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Java\jre7\WmiPrvSE.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2280
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\WmiPrvSE.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:704
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\s6AutamUC9.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:2456
-
-
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"6⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2676
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\1033\OSPPSVC.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2824
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Portable Devices\System.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:776
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Internet Explorer\en-US\audiodg.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2640
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Vss\Writers\Application\smss.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1688
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Journal\de-DE\wininit.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1452
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\WmiPrvSE.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1488
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\es-ES\sppsvc.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1612
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Re6gLBgubP.bat"7⤵PID:1624
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:28⤵PID:2864
-
-
C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\1033\OSPPSVC.exe"C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\1033\OSPPSVC.exe"8⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2924 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ktiZWDSHsI.bat"9⤵PID:2276
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:210⤵PID:1900
-
-
C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\1033\OSPPSVC.exe"C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\1033\OSPPSVC.exe"10⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2552 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\wHaMzi6eYE.bat"11⤵PID:2100
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:212⤵PID:2016
-
-
C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\1033\OSPPSVC.exe"C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\1033\OSPPSVC.exe"12⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2528 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\nokcDIWAC5.bat"13⤵PID:2320
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:214⤵PID:1488
-
-
C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\1033\OSPPSVC.exe"C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\1033\OSPPSVC.exe"14⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:696 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\7aJ3FmDw0K.bat"15⤵PID:676
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:216⤵PID:1212
-
-
C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\1033\OSPPSVC.exe"C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\1033\OSPPSVC.exe"16⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2164 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\tfVhKC50lX.bat"17⤵PID:2352
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:218⤵PID:888
-
-
C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\1033\OSPPSVC.exe"C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\1033\OSPPSVC.exe"18⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2680 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\xEoBbgPmrR.bat"19⤵PID:1864
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:220⤵PID:2660
-
-
C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\1033\OSPPSVC.exe"C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\1033\OSPPSVC.exe"20⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:592 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\WRY5ahHPmz.bat"21⤵PID:2256
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:222⤵PID:2036
-
-
C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\1033\OSPPSVC.exe"C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\1033\OSPPSVC.exe"22⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2656 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\hGpPWS23Hw.bat"23⤵PID:576
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:224⤵PID:984
-
-
C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\1033\OSPPSVC.exe"C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\1033\OSPPSVC.exe"24⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1540 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\HD5NsnfB5C.bat"25⤵PID:1892
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:226⤵PID:784
-
-
C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\1033\OSPPSVC.exe"C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\1033\OSPPSVC.exe"26⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2216
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 11 /tr "'C:\Users\Default User\lsm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2940
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Users\Default User\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2832
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 11 /tr "'C:\Users\Default User\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2656
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 14 /tr "'C:\Users\Public\Libraries\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2640
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Users\Public\Libraries\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2688
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 11 /tr "'C:\Users\Public\Libraries\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2228
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvcD" /sc MINUTE /mo 9 /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\DllCommonsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1684
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvc" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\DllCommonsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:992
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvcD" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\DllCommonsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2012
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1268
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1976
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2052
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\1033\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1736
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\1033\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:896
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\1033\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2672
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 10 /tr "'C:\Users\All Users\Documents\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1132
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Users\All Users\Documents\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2584
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 11 /tr "'C:\Users\All Users\Documents\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1124
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1956
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1692
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1788
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 9 /tr "'C:\Users\Admin\Local Settings\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2988
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Users\Admin\Local Settings\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2308
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 10 /tr "'C:\Users\Admin\Local Settings\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2252
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 14 /tr "'C:\providercommon\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2992
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\providercommon\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1616
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 14 /tr "'C:\providercommon\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2508
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 8 /tr "'C:\Users\Admin\Local Settings\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:592
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Users\Admin\Local Settings\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1724
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 8 /tr "'C:\Users\Admin\Local Settings\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1400
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 10 /tr "'C:\Program Files\Java\jre7\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:708
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Program Files\Java\jre7\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1544
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 14 /tr "'C:\Program Files\Java\jre7\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1556
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 5 /tr "'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:396
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2484
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1540
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\1033\OSPPSVC.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1012
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\1033\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1264
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\1033\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2452
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 12 /tr "'C:\Program Files\Windows Portable Devices\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1676
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files\Windows Portable Devices\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2992
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Portable Devices\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2124
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Internet Explorer\en-US\audiodg.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:108
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Program Files (x86)\Internet Explorer\en-US\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2480
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Internet Explorer\en-US\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2744
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 6 /tr "'C:\Windows\Vss\Writers\Application\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2968
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Windows\Vss\Writers\Application\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1808
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 12 /tr "'C:\Windows\Vss\Writers\Application\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1360
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows Journal\de-DE\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2972
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Program Files\Windows Journal\de-DE\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2816
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Journal\de-DE\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1524
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 8 /tr "'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:764
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1252
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 9 /tr "'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1172
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 8 /tr "'C:\Windows\es-ES\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:464
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Windows\es-ES\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2192
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 10 /tr "'C:\Windows\es-ES\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:692
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d822b1db5759ce4d34c31ffc8971ca88
SHA1d7eaf813723bc97ebe068766d4524e094c5ac6c0
SHA2564069827e7a084ab210a68d4e96023173df7f22fb2793f8ab494ec4500ae8fe02
SHA51200db8655a12c85db9ead25e83c71aac0a846b3418763e2ab425e2894883f7e6f8251384b9a8cf48d8f5fbb81bd2215ed9509390d569e96e2aa0e887cc9613fd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52030b6933595d9ae98c883a36fc5ea95
SHA170c840b9162009d5f2ff4a553772e01d3c5f68eb
SHA2566836d057dda59675b276144bc9c70a97d25ffefdbc834a8935966e64f6ac95eb
SHA512a002cddba6dfbb53b333b5f7e05b200579272f9e465ba860dcc5b9543d8994b5789843792567bd234d11bb492c94a907a3d681a0997069206533310d3a9cee49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e84056ac8ff611ae414ae160ae4a625
SHA1f393a278e6e29f2745b9795ca7538092301f0f9a
SHA2565efd6914582d041e1249ec95f482d3019ecf1538ad3c94cbe96ee7fc83cf5cdf
SHA5122a365a9efd64451d34c7ae2547c23fb08dfe0a80a7fe7ceb1a18bd69713bd5e07d9b1c45403175c18b8cb6fd5daef704df373b6e6f8c3f062c3c3eff5350e8d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e60c0c3bf83654c191e220b8ab270ad7
SHA1fa47acc4bfd10068cd8343ec557dd6f19399a823
SHA256ca9cda8ba4c19484ebf361c53750f18f35d692ee02d6b0875f74af4cc8598c4f
SHA5124bc7ccacaf1dc19d78d4945f93b7023efd800c75a939d702c48dd5815294f422f541429d46cf4416f417b582303f0f530d02a7c8cce1e8dae9b8b50f36210851
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d483864b5d24819a2ce8ad20b55248c2
SHA16d5446644f30f3fbd6b709086e1ea45429134102
SHA2567ac7298bd1eab9fdfda95ff951fa5acc2cad059adb0ffdc69ec5eafd8ad07da1
SHA51291eb228e95db361ac4bf4658a83638cd046305b8d62e1a5cfa59cc089b1f90249af21e3914b621faeb6ea190887e756ca1cc904524aea91e3ebfbc96d8936a6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffa228da203cc96a04d64c0e8b7bd9dd
SHA10ae1cbe2ac5f7d082b884a28964b00eff042b385
SHA25668ff5e123a3fd93fb66aafa93788a2e119f88fb7645ef380a8c2c11f7746732d
SHA512cc22f99b961e372e18492414e3afee60430e75dabf5e53dbbfb305b8bf20f80d725c6010a23a428d23011dcb13281021d50980a3d6ab66d2c0a035e82d6dfc8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b433115be0599bb8d0befe9f4a6a8ad
SHA13233a75b24ff050f77f97a17cd2fb99aeee308bc
SHA25655acdceb7cabbe39cb7cac2f5e0f2042bd14fdf7917cc7ad64c550dc1b06835f
SHA51278e265ed6dd7e473917efc39fe8fec315b047736f46a11a4b9ce5f7b0560c64edc9db7603cf651e373eabcb2c730a219fcddcb98f379db9f89fce456e95f6e14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b51e7391aa474be80638d8cdbcb81fce
SHA14742676d718eb4371516a1be50f6a4595904cf1a
SHA256bff4f729c40b8127e2dcd6696616eceaf66b98edb4bb701b739464bdeefb4c09
SHA512c05755ef8916d2fccb6d2f916e829a624844567cc774306eba1b5417024723aeaf7dc0518d0b63c71cacde41a89e1699d2728bfc1f867b2352365389c609451c
-
Filesize
254B
MD5dcb6f855b567df0bcdd79e66d1af04a9
SHA1df9407a2270a14b6e8c6812472893a2e3ab3d751
SHA2561109677bdca36a997018fbf1e4cfe08c5f52d7aefbc6f003467fed0a30c86ac8
SHA51226e57a9101890e1bd34a67256d70bfdaf1e61ebcd2d09c9005e3b2dd1697f4d3ce0fd570b4f24a91488096d28a890244dcc3e1e817ed5d381d93ea75ee42dd48
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
254B
MD5f9aa2913eb122b422467863b252b3d8c
SHA1dbb5352f83ccfade3372ece27d4fd42cbdf2b549
SHA256b9d74991d37f5b906e2deca0c6ace0c692114e3a1b6a9b1a88a8294956a0cba2
SHA512222759deea918bcceb77962d1aca2dfd703729e59fd6d4a815c16c30df63e496e58b1a572971e5bfcdc42d0cd819f4f04140e921f98fcaea5810a0acfc89ba50
-
Filesize
254B
MD55cdd1aa567992762befd8780bd7f73af
SHA12d237cada36c634530993a5f117fe6c624227103
SHA256f6f436aeb94d4d94010c89da2e88e7ff9fa5089a46c5be1176c564c3278d0114
SHA512fc4a9aff058ddbf5f99d84654a11ea8449efed7ba56c792b2ccfa44e15598e7548e080ddf0c51338174cb863e06307c109eb262acd34e32f825019101dfa1ed2
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
254B
MD58ed9ad2b07fa447c56402712e5fe0f70
SHA1573516c5d50a55df0c397e58af3fa9466faae349
SHA2562e43b393b45ce05c0a1dc63b599f035ddc6e7aa9a4701cfb89a29e1723e8e4fa
SHA512dba1f2fea2729f032709941ad1fc7908c38e3a28098e04497534d20701cf5075ead6b2b4fca2caa4cbf158ddbe133112b47d023afabb86c06d729a04f026f301
-
Filesize
254B
MD59fe4e9a96d51c51904a0ace218122e21
SHA14579c6bb1a65aea5ed31d2dd787f5daf0b8c0e20
SHA256389a252a2f726c2e45aa9ee002148eef103af8ed243cbd25dacf6cb11f671be7
SHA51268a61956ca1759ddb262bb6d930d2bb4e26a8609a6628a08a5e8c8046d65f0fe7df36caa5b22357f3b85acc4799f74a4e45c942302248508d212e21cb555a97e
-
Filesize
254B
MD5821d35bea64e7306f8744721a9dd7742
SHA183fd2715a2038e04faa007e9732979af26119043
SHA2565399949ca69e191c08600f25a4fecb398e23a61b06ca480773937e2479efb95c
SHA5129820b4a2e263ebb6681660b2a783f4c17e7438c07aad932f825ed54423664f46a6a23c0112f959b5e3938c474c0e054e1022e8fcf19902c4481256bc733ad4e6
-
Filesize
254B
MD549488e0782dca3ce5dad61d987281e7a
SHA12a76b48a991106be59263623884706ec83d211b6
SHA256299778c9d86a97be8ad5235716082fe79532f4bcf16a7d16a3f90728b5098d4c
SHA512344d2e3f192106bdf1ab597bf34dbd1753ba359251b14806382adf9fba827ea0dfcfa2d492f1916016cd290f6c7e419b457784cdf9655017c06fbc9321e3c0de
-
Filesize
199B
MD5cad4f5a7f48df61d55e21618c7501e30
SHA19fc73eb5faa079370c4d8d37aec75f854c8fdab5
SHA256a90202a69db2655193f6c97d61cbb77d7fe4fc5727a9da61c92ef5223c0eaef6
SHA5124ca1e9d7bc5e2ba54a8d830b1a7968fb0805282d3c6f8c468a248b60593868914859b4453f5999ad1a07e5ed416240cc6f73fc5ec7c4beb3df5f3bcec98c523c
-
Filesize
254B
MD56fc144af4a66f2d0dc9500b358fe31df
SHA159161492219be6e5a0bfa9b844add98d63ab2cbb
SHA256b00a5622335331337d11b93b917d4bd8e0a5a431f903342eff90438a85bc1420
SHA51259077f5adb09aefcb8544db0a8993f3b9448a3f16c9f4c00a2b48abd8e409fba271310153e637cfe5fccd95780df8efb47e46a66fa12db389e3b4c3e7efd85ba
-
Filesize
254B
MD5c2e76c1bc9904d9208f700099050adfa
SHA12443d85366134d553a80287170a47fa26835a4cd
SHA256bab6958d1040b188d819444a50fb0074847698f02c6a5295a3a70d7c9923ad04
SHA512ad88f6578e0daae49b9d815cc53c1e910fe373d12c0ff113a0b17722fd4c3e82d5ece3995c85a49114a7a9158876821ec36fa446a70255dfa656217cb9a701d9
-
Filesize
254B
MD5115e2fc68a76ea80b52533ddb2b9bd92
SHA15a13f65fb5e2ad212ff00cd981f5ef3b35d93486
SHA256010793c1318c25355ba187f9044c0436c34334ad524677a4b5ed562f9c9e423b
SHA51224f4e93a1a2e1f47712baa1aa7def10ff87cb4ad91a4d4ec85fd227822ea030a88d99044ced5b0abad232fc2130ecc22193ca0265f52d9fa5db23f811850be37
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD590cf84df3fe8108b66e9140918feb92f
SHA17d10526300327b03b062d1091f1040ae04cfecb7
SHA256212199860b87e529ca2bb9fa2bed4d33458608896a8378bcee9246840666e9ed
SHA51256f21d665bd80ab86f98aaa86c501133f24774f1bb80ae8faa972c5c24a3d3642d97d57310b30bb2e6e0eece96677023e1589a327cefe4d78ab50a23a0354c69
-
Filesize
36B
MD56783c3ee07c7d151ceac57f1f9c8bed7
SHA117468f98f95bf504cc1f83c49e49a78526b3ea03
SHA2568ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322
SHA512c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8
-
Filesize
197B
MD58088241160261560a02c84025d107592
SHA1083121f7027557570994c9fc211df61730455bb5
SHA2562072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1
SHA51220d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394