Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22/12/2024, 20:11
Behavioral task
behavioral1
Sample
JaffaCakes118_7620123fbfdc6fa1451aa54bff6a7ef82d81b5884d4df7f8aa5366b7e358e1ab.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_7620123fbfdc6fa1451aa54bff6a7ef82d81b5884d4df7f8aa5366b7e358e1ab.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_7620123fbfdc6fa1451aa54bff6a7ef82d81b5884d4df7f8aa5366b7e358e1ab.exe
-
Size
1.3MB
-
MD5
6aa661e6b800ab0511e8d84e404b57de
-
SHA1
5324343aa8d6bb53b34fe6f17e5d45da865bda52
-
SHA256
7620123fbfdc6fa1451aa54bff6a7ef82d81b5884d4df7f8aa5366b7e358e1ab
-
SHA512
392ed7b40e671314957f9705dc80c7fccae70e199c790bbdab14438081a908d2374c3d4e80268f20c6e7880586e362bf5b6c0ea442aeeabff0cc083d234c27b7
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 57 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1448 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2800 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1668 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2656 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3052 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2600 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 664 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 108 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1788 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2932 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2504 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2364 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2056 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1052 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1592 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 952 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1724 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1732 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1020 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1988 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3044 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3028 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2948 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 620 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2608 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2540 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2216 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2276 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 444 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2352 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1460 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1312 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 696 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1708 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1936 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1948 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 928 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1256 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2188 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1280 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 972 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2008 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2212 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1644 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1528 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2548 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1440 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 300 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1848 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 688 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2136 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2240 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2560 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2864 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2900 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2620 2904 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2764 2904 schtasks.exe 34 -
resource yara_rule behavioral1/files/0x0007000000016d1f-9.dat dcrat behavioral1/memory/2784-13-0x0000000000C60000-0x0000000000D70000-memory.dmp dcrat behavioral1/memory/1472-153-0x0000000000EF0000-0x0000000001000000-memory.dmp dcrat behavioral1/memory/1628-223-0x00000000000C0000-0x00000000001D0000-memory.dmp dcrat behavioral1/memory/1368-284-0x00000000009D0000-0x0000000000AE0000-memory.dmp dcrat behavioral1/memory/2140-403-0x0000000000AF0000-0x0000000000C00000-memory.dmp dcrat behavioral1/memory/1112-463-0x0000000000B80000-0x0000000000C90000-memory.dmp dcrat behavioral1/memory/1636-523-0x00000000013E0000-0x00000000014F0000-memory.dmp dcrat behavioral1/memory/2376-642-0x0000000000280000-0x0000000000390000-memory.dmp dcrat behavioral1/memory/1916-702-0x0000000000D00000-0x0000000000E10000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 20 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2516 powershell.exe 2024 powershell.exe 1744 powershell.exe 3060 powershell.exe 2676 powershell.exe 576 powershell.exe 3048 powershell.exe 2688 powershell.exe 2044 powershell.exe 1544 powershell.exe 2468 powershell.exe 2672 powershell.exe 1568 powershell.exe 2920 powershell.exe 1572 powershell.exe 1108 powershell.exe 1448 powershell.exe 624 powershell.exe 2528 powershell.exe 2040 powershell.exe -
Executes dropped EXE 11 IoCs
pid Process 2784 DllCommonsvc.exe 1472 WmiPrvSE.exe 1628 WmiPrvSE.exe 1368 WmiPrvSE.exe 1544 WmiPrvSE.exe 2140 WmiPrvSE.exe 1112 WmiPrvSE.exe 1636 WmiPrvSE.exe 2772 WmiPrvSE.exe 2376 WmiPrvSE.exe 1916 WmiPrvSE.exe -
Loads dropped DLL 2 IoCs
pid Process 2768 cmd.exe 2768 cmd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 11 IoCs
flow ioc 16 raw.githubusercontent.com 19 raw.githubusercontent.com 23 raw.githubusercontent.com 34 raw.githubusercontent.com 4 raw.githubusercontent.com 5 raw.githubusercontent.com 9 raw.githubusercontent.com 12 raw.githubusercontent.com 38 raw.githubusercontent.com 26 raw.githubusercontent.com 30 raw.githubusercontent.com -
Drops file in Program Files directory 9 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\spoolsv.exe DllCommonsvc.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\spoolsv.exe DllCommonsvc.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\cmd.exe DllCommonsvc.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\ebf1f9fa8afd6d DllCommonsvc.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\24dbde2999530e DllCommonsvc.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\f3b6ecef712a24 DllCommonsvc.exe File created C:\Program Files (x86)\Windows Portable Devices\services.exe DllCommonsvc.exe File created C:\Program Files (x86)\Windows Portable Devices\c5b4cb5e9653cc DllCommonsvc.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\WmiPrvSE.exe DllCommonsvc.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\Media\Afternoon\explorer.exe DllCommonsvc.exe File created C:\Windows\Media\Afternoon\7a0fd90576e088 DllCommonsvc.exe File created C:\Windows\winsxs\amd64_microsoft-windows-l..ultimatee.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_eb806fad92a5e1bd\System.exe DllCommonsvc.exe File created C:\Windows\tracing\wininit.exe DllCommonsvc.exe File created C:\Windows\tracing\56085415360792 DllCommonsvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_7620123fbfdc6fa1451aa54bff6a7ef82d81b5884d4df7f8aa5366b7e358e1ab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 57 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2656 schtasks.exe 1312 schtasks.exe 1256 schtasks.exe 2008 schtasks.exe 1848 schtasks.exe 688 schtasks.exe 1988 schtasks.exe 2548 schtasks.exe 300 schtasks.exe 2240 schtasks.exe 2764 schtasks.exe 952 schtasks.exe 2948 schtasks.exe 2276 schtasks.exe 2620 schtasks.exe 664 schtasks.exe 1788 schtasks.exe 1052 schtasks.exe 1592 schtasks.exe 696 schtasks.exe 2136 schtasks.exe 108 schtasks.exe 3044 schtasks.exe 2540 schtasks.exe 2216 schtasks.exe 1460 schtasks.exe 1280 schtasks.exe 3028 schtasks.exe 3052 schtasks.exe 444 schtasks.exe 2560 schtasks.exe 2600 schtasks.exe 2504 schtasks.exe 2608 schtasks.exe 928 schtasks.exe 2188 schtasks.exe 2800 schtasks.exe 1732 schtasks.exe 2352 schtasks.exe 972 schtasks.exe 1528 schtasks.exe 2900 schtasks.exe 1448 schtasks.exe 1440 schtasks.exe 1668 schtasks.exe 1020 schtasks.exe 620 schtasks.exe 1708 schtasks.exe 2212 schtasks.exe 1936 schtasks.exe 2364 schtasks.exe 1724 schtasks.exe 2932 schtasks.exe 2056 schtasks.exe 1948 schtasks.exe 1644 schtasks.exe 2864 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 35 IoCs
pid Process 2784 DllCommonsvc.exe 2784 DllCommonsvc.exe 2784 DllCommonsvc.exe 2784 DllCommonsvc.exe 2784 DllCommonsvc.exe 3048 powershell.exe 2672 powershell.exe 2044 powershell.exe 1572 powershell.exe 2676 powershell.exe 2024 powershell.exe 2040 powershell.exe 624 powershell.exe 1108 powershell.exe 1744 powershell.exe 1448 powershell.exe 2516 powershell.exe 1568 powershell.exe 2920 powershell.exe 2688 powershell.exe 3060 powershell.exe 2468 powershell.exe 576 powershell.exe 2528 powershell.exe 1544 powershell.exe 1472 WmiPrvSE.exe 1628 WmiPrvSE.exe 1368 WmiPrvSE.exe 1544 WmiPrvSE.exe 2140 WmiPrvSE.exe 1112 WmiPrvSE.exe 1636 WmiPrvSE.exe 2772 WmiPrvSE.exe 2376 WmiPrvSE.exe 1916 WmiPrvSE.exe -
Suspicious use of AdjustPrivilegeToken 31 IoCs
description pid Process Token: SeDebugPrivilege 2784 DllCommonsvc.exe Token: SeDebugPrivilege 3048 powershell.exe Token: SeDebugPrivilege 2672 powershell.exe Token: SeDebugPrivilege 2044 powershell.exe Token: SeDebugPrivilege 1572 powershell.exe Token: SeDebugPrivilege 2676 powershell.exe Token: SeDebugPrivilege 2024 powershell.exe Token: SeDebugPrivilege 2040 powershell.exe Token: SeDebugPrivilege 624 powershell.exe Token: SeDebugPrivilege 1108 powershell.exe Token: SeDebugPrivilege 1744 powershell.exe Token: SeDebugPrivilege 1448 powershell.exe Token: SeDebugPrivilege 2516 powershell.exe Token: SeDebugPrivilege 1568 powershell.exe Token: SeDebugPrivilege 2920 powershell.exe Token: SeDebugPrivilege 2688 powershell.exe Token: SeDebugPrivilege 3060 powershell.exe Token: SeDebugPrivilege 2468 powershell.exe Token: SeDebugPrivilege 576 powershell.exe Token: SeDebugPrivilege 2528 powershell.exe Token: SeDebugPrivilege 1544 powershell.exe Token: SeDebugPrivilege 1472 WmiPrvSE.exe Token: SeDebugPrivilege 1628 WmiPrvSE.exe Token: SeDebugPrivilege 1368 WmiPrvSE.exe Token: SeDebugPrivilege 1544 WmiPrvSE.exe Token: SeDebugPrivilege 2140 WmiPrvSE.exe Token: SeDebugPrivilege 1112 WmiPrvSE.exe Token: SeDebugPrivilege 1636 WmiPrvSE.exe Token: SeDebugPrivilege 2772 WmiPrvSE.exe Token: SeDebugPrivilege 2376 WmiPrvSE.exe Token: SeDebugPrivilege 1916 WmiPrvSE.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1832 wrote to memory of 2092 1832 JaffaCakes118_7620123fbfdc6fa1451aa54bff6a7ef82d81b5884d4df7f8aa5366b7e358e1ab.exe 30 PID 1832 wrote to memory of 2092 1832 JaffaCakes118_7620123fbfdc6fa1451aa54bff6a7ef82d81b5884d4df7f8aa5366b7e358e1ab.exe 30 PID 1832 wrote to memory of 2092 1832 JaffaCakes118_7620123fbfdc6fa1451aa54bff6a7ef82d81b5884d4df7f8aa5366b7e358e1ab.exe 30 PID 1832 wrote to memory of 2092 1832 JaffaCakes118_7620123fbfdc6fa1451aa54bff6a7ef82d81b5884d4df7f8aa5366b7e358e1ab.exe 30 PID 2092 wrote to memory of 2768 2092 WScript.exe 31 PID 2092 wrote to memory of 2768 2092 WScript.exe 31 PID 2092 wrote to memory of 2768 2092 WScript.exe 31 PID 2092 wrote to memory of 2768 2092 WScript.exe 31 PID 2768 wrote to memory of 2784 2768 cmd.exe 33 PID 2768 wrote to memory of 2784 2768 cmd.exe 33 PID 2768 wrote to memory of 2784 2768 cmd.exe 33 PID 2768 wrote to memory of 2784 2768 cmd.exe 33 PID 2784 wrote to memory of 3048 2784 DllCommonsvc.exe 93 PID 2784 wrote to memory of 3048 2784 DllCommonsvc.exe 93 PID 2784 wrote to memory of 3048 2784 DllCommonsvc.exe 93 PID 2784 wrote to memory of 2468 2784 DllCommonsvc.exe 94 PID 2784 wrote to memory of 2468 2784 DllCommonsvc.exe 94 PID 2784 wrote to memory of 2468 2784 DllCommonsvc.exe 94 PID 2784 wrote to memory of 2516 2784 DllCommonsvc.exe 95 PID 2784 wrote to memory of 2516 2784 DllCommonsvc.exe 95 PID 2784 wrote to memory of 2516 2784 DllCommonsvc.exe 95 PID 2784 wrote to memory of 624 2784 DllCommonsvc.exe 96 PID 2784 wrote to memory of 624 2784 DllCommonsvc.exe 96 PID 2784 wrote to memory of 624 2784 DllCommonsvc.exe 96 PID 2784 wrote to memory of 1568 2784 DllCommonsvc.exe 97 PID 2784 wrote to memory of 1568 2784 DllCommonsvc.exe 97 PID 2784 wrote to memory of 1568 2784 DllCommonsvc.exe 97 PID 2784 wrote to memory of 2672 2784 DllCommonsvc.exe 98 PID 2784 wrote to memory of 2672 2784 DllCommonsvc.exe 98 PID 2784 wrote to memory of 2672 2784 DllCommonsvc.exe 98 PID 2784 wrote to memory of 1448 2784 DllCommonsvc.exe 99 PID 2784 wrote to memory of 1448 2784 DllCommonsvc.exe 99 PID 2784 wrote to memory of 1448 2784 DllCommonsvc.exe 99 PID 2784 wrote to memory of 1108 2784 DllCommonsvc.exe 100 PID 2784 wrote to memory of 1108 2784 DllCommonsvc.exe 100 PID 2784 wrote to memory of 1108 2784 DllCommonsvc.exe 100 PID 2784 wrote to memory of 2044 2784 DllCommonsvc.exe 101 PID 2784 wrote to memory of 2044 2784 DllCommonsvc.exe 101 PID 2784 wrote to memory of 2044 2784 DllCommonsvc.exe 101 PID 2784 wrote to memory of 2040 2784 DllCommonsvc.exe 102 PID 2784 wrote to memory of 2040 2784 DllCommonsvc.exe 102 PID 2784 wrote to memory of 2040 2784 DllCommonsvc.exe 102 PID 2784 wrote to memory of 2688 2784 DllCommonsvc.exe 103 PID 2784 wrote to memory of 2688 2784 DllCommonsvc.exe 103 PID 2784 wrote to memory of 2688 2784 DllCommonsvc.exe 103 PID 2784 wrote to memory of 1572 2784 DllCommonsvc.exe 104 PID 2784 wrote to memory of 1572 2784 DllCommonsvc.exe 104 PID 2784 wrote to memory of 1572 2784 DllCommonsvc.exe 104 PID 2784 wrote to memory of 2920 2784 DllCommonsvc.exe 105 PID 2784 wrote to memory of 2920 2784 DllCommonsvc.exe 105 PID 2784 wrote to memory of 2920 2784 DllCommonsvc.exe 105 PID 2784 wrote to memory of 2024 2784 DllCommonsvc.exe 106 PID 2784 wrote to memory of 2024 2784 DllCommonsvc.exe 106 PID 2784 wrote to memory of 2024 2784 DllCommonsvc.exe 106 PID 2784 wrote to memory of 1744 2784 DllCommonsvc.exe 107 PID 2784 wrote to memory of 1744 2784 DllCommonsvc.exe 107 PID 2784 wrote to memory of 1744 2784 DllCommonsvc.exe 107 PID 2784 wrote to memory of 3060 2784 DllCommonsvc.exe 108 PID 2784 wrote to memory of 3060 2784 DllCommonsvc.exe 108 PID 2784 wrote to memory of 3060 2784 DllCommonsvc.exe 108 PID 2784 wrote to memory of 2676 2784 DllCommonsvc.exe 109 PID 2784 wrote to memory of 2676 2784 DllCommonsvc.exe 109 PID 2784 wrote to memory of 2676 2784 DllCommonsvc.exe 109 PID 2784 wrote to memory of 576 2784 DllCommonsvc.exe 127 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7620123fbfdc6fa1451aa54bff6a7ef82d81b5884d4df7f8aa5366b7e358e1ab.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7620123fbfdc6fa1451aa54bff6a7ef82d81b5884d4df7f8aa5366b7e358e1ab.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\providercommon\1zu9dW.bat" "3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3048
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\spoolsv.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2468
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\smss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2516
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\conhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:624
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\audiodg.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1568
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\taskhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2672
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.es\System.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1448
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\wininit.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1108
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\System.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2044
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Portable Devices\services.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2040
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Media\Afternoon\explorer.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2688
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\WmiPrvSE.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1572
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\WmiPrvSE.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2920
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\csrss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2024
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\All Users\Documents\System.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1744
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default User\OSPPSVC.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3060
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\WmiPrvSE.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2676
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\cmd.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:576
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\tracing\wininit.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2528
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\winlogon.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1544
-
-
C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\WmiPrvSE.exe"C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\WmiPrvSE.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1472 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Xnyek1SZun.bat"6⤵PID:1604
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:27⤵PID:1956
-
-
C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\WmiPrvSE.exe"C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\WmiPrvSE.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1628 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\hc9iMPvVJ4.bat"8⤵PID:1632
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:29⤵PID:2000
-
-
C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\WmiPrvSE.exe"C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\WmiPrvSE.exe"9⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1368 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\jBrSCX6wbi.bat"10⤵PID:2864
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:211⤵PID:2868
-
-
C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\WmiPrvSE.exe"C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\WmiPrvSE.exe"11⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1544 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\biigBqxW9T.bat"12⤵PID:1704
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:213⤵PID:2776
-
-
C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\WmiPrvSE.exe"C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\WmiPrvSE.exe"13⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2140 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\qpvm5o68kg.bat"14⤵PID:2340
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:215⤵PID:1552
-
-
C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\WmiPrvSE.exe"C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\WmiPrvSE.exe"15⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1112 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\AXFqcUy7ES.bat"16⤵PID:2704
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:217⤵PID:2932
-
-
C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\WmiPrvSE.exe"C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\WmiPrvSE.exe"17⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1636 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\w2PRcJO5W1.bat"18⤵PID:1984
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:219⤵PID:2036
-
-
C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\WmiPrvSE.exe"C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\WmiPrvSE.exe"19⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2772 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\00pP7nIBMq.bat"20⤵PID:2420
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:221⤵PID:3040
-
-
C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\WmiPrvSE.exe"C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\WmiPrvSE.exe"21⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2376 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\gQkyN2upze.bat"22⤵PID:2356
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:223⤵PID:2240
-
-
C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\WmiPrvSE.exe"C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\WmiPrvSE.exe"23⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1916 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Nc51i3GWIc.bat"24⤵PID:2188
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:225⤵PID:2232
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1448
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2800
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1668
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 11 /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2656
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2600
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 12 /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3052
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 8 /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:664
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1592
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 14 /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1052
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 10 /tr "'C:\providercommon\audiodg.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:108
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\providercommon\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1788
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 10 /tr "'C:\providercommon\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2932
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\taskhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2056
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2504
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2364
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 11 /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.es\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:952
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.es\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1724
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 5 /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.es\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1732
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 13 /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1020
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1988
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 5 /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3044
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 9 /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3028
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2948
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 8 /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:620
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Portable Devices\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2608
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Portable Devices\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2540
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Portable Devices\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2216
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 6 /tr "'C:\Windows\Media\Afternoon\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2276
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Windows\Media\Afternoon\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:444
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 5 /tr "'C:\Windows\Media\Afternoon\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2352
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 8 /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1460
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1312
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:696
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 8 /tr "'C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1708
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1936
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 8 /tr "'C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2136
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\providercommon\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1948
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\providercommon\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:688
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\providercommon\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:928
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 9 /tr "'C:\Users\All Users\Documents\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1256
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Users\All Users\Documents\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2188
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 10 /tr "'C:\Users\All Users\Documents\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1280
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 5 /tr "'C:\Users\Default User\OSPPSVC.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1848
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Users\Default User\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:972
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 12 /tr "'C:\Users\Default User\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:300
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 10 /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2008
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1440
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 10 /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2212
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 6 /tr "'C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\cmd.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2548
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1528
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 9 /tr "'C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1644
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 7 /tr "'C:\Windows\tracing\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2240
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Windows\tracing\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2560
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 11 /tr "'C:\Windows\tracing\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2864
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 10 /tr "'C:\MSOCache\All Users\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2900
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\MSOCache\All Users\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2764
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2620
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56be8bda7dba1ac094b71ba35a5458890
SHA1f412d12fe47f20f9a662684c9521cd0d217ef458
SHA256c30dde821599a6a77643dfa177fc1a8fd9c0a957c387b021cb4c57807dd778b6
SHA5122f1b0bd6b5b86ea2dedce55500afc41b32c954516d1316db0c1d009841a5f7a9af19e676e8db7b200d4370ccd26d330172681e7022596aca27c0354c3d841092
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55af96657cb94138dc473599089b2c654
SHA100efad9f85a1e1127bdcdf07297ce6d61a6c462e
SHA25600c52591f2726635b8013a68b9319195c49a973883255740a9318af6f1def451
SHA5120a5d56c3313d7667db4e7af1cd887cdb7e1ddc2b08dfc9d971f2ae4a7a8c1552a91ade3beb9c3ab9e668e834e3f6faaa7a4882d998402ce6eafd4454798d2845
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fb372f8c6a6598a0ca39da480f2c368
SHA1208b550e68d4bf2cac40c4d04f555ab3ab90bfb6
SHA2567d965104dd21a398e1d4ef7a7ab260912c71a869ed80f092956db00bf6f579a2
SHA5126688fe83fbdf3cf2930a6b49cf5b0643bed5136b606c991b4af271067efcc9e010bf918c62a68a82b5f44843bccbe3fd9a44096ef5dc8daf0ab5168fb1a5af59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5321a48fe623b0e734315ac4c3fb22a51
SHA18a45c5f566de3b2aada13794c0b4c6572af04706
SHA256ec46bfd6c8a93472a9e99beee0df40820debd184b98e4b635be6bc64dde6c76d
SHA512a9f55ef7b744b8e2976ff5b4fd2b2575fcd923f271f6c961144c3d48ae3f22e1a39f434be7e385f61e34f94d412b8851287393dea7bcb194265a5246c542cf0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fbcc4d1cea01aff91ab721243016f6f
SHA1ebc32b01d1a8d328285a45dbcf4a1aab2083b080
SHA256211f219628237b0e74e5cbce2c5cd41d23a297760d18902f89ab6f77cfbed6a0
SHA512312c77f26cf0ac66a3c317747b888811cd32477d9bf28288831549a5276b9e5ac386e2ad19e5fdb34b2675ea728f4f6b6a52a1d19a39bb3720cdaf8189b5f48f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559f47bc5173d7b38ed6431f29add0d06
SHA11b86f10f00bdf3ed2c4f3a12769704e6f308767d
SHA25689fbfd165bb15ec588cd9969a066302930c0d585432fa57a2a419b57ff996857
SHA512b845a95cee83293ea61a28adece5153fcb0eb0995f27f1c04ec21882c500d2c3b4cd7de01eaa6fecb365b36f591a0fd90f7d3eeb49bdffda9df24f3d1cbfa653
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57899a5f3a8a9a749063c28a1c15f56d1
SHA1b63840f68ca219a423fa60405d317cbdc2acba38
SHA25608be55834fba34a8ba138ced4366116537737fc3267b690e5fec9f6663cd6f44
SHA51205b9aad0cebeaab6a61995c2cd2fda3fe8a894f128e24b0fb72c420c07669ea5dadc756b67d4642313d3b502f0950e0a7ae95cf35578734b37259a592bc401db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525abbdff83bfb9b92f8e0ace3affa176
SHA168a281c5faadcc3e237721be55bfd05577df6178
SHA256723b222cb4f196809b999f59d348886d0914164eb4a6e8444d61c973e7ab37fa
SHA512e54b2bd4a71db94603c624115369db46c1cb056143d7866818f6952effff6a15c9a9482bf329613addd14527e9b826a1cf7b0627cf5307dc0ec5542e943f5370
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d2c45e793b503acf0439a9673f7ad13
SHA1529d279b207c96e3d0ad762813a4e30c0cf71d45
SHA256f8e7dbd2650a1968bf22eb6e4ce1026a92ba790ecb58fccd074a0a47c4b3df52
SHA512cb92b863ce650ee47b8334c5f11f02abfa114d8304b30c94d4bb8d986540162ac7dc99329c093ff1e7a810bfb32e04eecc238c360447f985bd9f9a952e53af14
-
Filesize
243B
MD54076a91ba59c4d0597efd6e373409cca
SHA11b2ef5fe3d94644e4da72e768e30c48811703d29
SHA25652e6e7994bad9743ebde6d04a206ebb7707e4df9a1c65b2e89396e69c724e80e
SHA512ae2bfb59f1ab7baff3f46bc42705fc65a1522fb459168da72a435b6f075eb14dc505d53146ea8d528462e2770a7a1f75a9fb6107748e773054d9436cb472efb2
-
Filesize
243B
MD518900e7e2cf6f0e4d5b3712aabb47190
SHA1837729c4498dfaefdcc6d3803562fe1e7dd166fb
SHA2567d55fe8756570cbdf187e125211797107992fea0a560ebfc80c5cdb0baf2cc35
SHA5128844b5c2a224ae8b7947ae9f7d71f309db58554d69fdade41c17bacb7e6a7e73cb7a32649c569fc19ca74a2c672a14db115e02d44b7add94ff8c61439847b0e6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
243B
MD5d9a2c9a66d9eaed0092a854050e1921a
SHA1450b1ee080497b47a1ec264fc5f6b1e3fef95e88
SHA2565c6a39111967dea39bb9e754d53c23d83b8528801b684842f7ec1a7a3f581d0d
SHA51231d0509c1e9068caaa037b2669444b9943143f66b9f181421790d094447ba2af247eea8c9946eec7d49b7ad60a493fac5574ccd0d8a557d8246de33f0ebadff8
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
243B
MD52e3863a126e0d0225e7d5c5f83fa3716
SHA1a7cd6e2f2d78c2fa5c2c2039cf51874d7eab3973
SHA2568e8e532effc11cdf4be7a0c0b5eb2052a98164cbe4d137a5a7d6f7d366d87156
SHA512d93b1a052b0bf3c9e8d65f26a2a04d53e845c6e06142338fc030724537531d9b53ff7ab72563925c2a8480a3ea737836de8c1e0ed42e6d9521885cc09110398b
-
Filesize
243B
MD5b0519752a1a5246867b6815471e986d0
SHA1955524d6cc35204fecf5ea9b2f3dad14b84eb893
SHA256335e5836cffbec52d24004b9a4878b1aa6bdae684457b6fac9dd993df51c7950
SHA512f7e94f5131586d78ce71fb302143b9dfafc901557781b5818d5fe5ca0e232f5b06a7d8fed954e9fe7468a306e88c9ae64a31076a52054975843bd9217c373cc3
-
Filesize
243B
MD51f329632f9bb65e331a36bedda9152be
SHA10867b24bfa586175087582446c0821b6b50a2cd6
SHA256b65afd1012cbb7302b558919d7b23d063c97fc4c09863b47612708307b6fb8c0
SHA512deed9d25513dfc2f4200b4fc617365e683c475e35349d150f90a96845444308c1e9844035507b6b8605065fac9b4e2b076ae7cde3fb2303ed17b02558ce32592
-
Filesize
243B
MD50a6c8dbb695e572410790feab1ca9a8a
SHA10b358036a1b6dd5f88d93465824eae9c4bd38d81
SHA2565fd9a355b7b4e9ed9e37915052dce21d19092f814128e0e0c9305e33d2de2a71
SHA51298d263c6d886c6a37c91f8eca6d7f4dd366993fd30aabe52aab265af114967930edaf608c2ed1119be5ed08364bf50b99222f370c7b71ea8924c306d846ca4b7
-
Filesize
243B
MD54c58331989c24b47b50bca9d40e0dce4
SHA1897777bdf9a9b12863d68eb70ccb114944a11c90
SHA256178605f6b16869aa10da16fad9dcf7ea1700efecebdd0f00f777892be75830c2
SHA5122cb6d51f500b39a27b72e9888b2a33a1cd74edd2e827061531a8ef216b6ab01457998f47d70f20029661903f4ff034dd17280f210a47d65453dd2e1f138dc0d4
-
Filesize
243B
MD57c0c13cffa1f06b3943214a26df5cd49
SHA12f21ed95386d50772346371747273aec2d139e74
SHA2565f68da7ff87c7072c406c0b153cb18e278ca0ff34fe4bd219a03251ca48a5718
SHA5126bb09727ab4bb1bdf415502d9d801e68949ed9de968301f19c39e6dded58dfcfb37dc45f3c388da20919bc421f4d8dfee77b70bbeeafc5c6c33fad1d0fae6c39
-
Filesize
243B
MD5603695373805ee84e0414932bee21650
SHA1e771fdd5bc317e0d150d551e20f8575addb3e222
SHA25609bb902c3031a78649226febc03704f97222378c52408db239194f6fe7c5149d
SHA51223899e7d4a0884db02f9571c86afd867a5b0d1e8e2e619fad390b8488d841e6625fd048ff6c484ec810e107050685a74bd624e1c921519f8ae2cddfecfc4bf6d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD59b2ce65e140ec8facbe443d54b9c99f3
SHA1f302b50ab071f3dc12ff41652b837cf527dc9143
SHA25696077508c34e488af58487ce8e9be43e94485105ca9406648ab9a35186cbf534
SHA512eb5ec922acc497d76913686a84881a5b9e119e71733dc16d7befb83d7757c5a65c823c0d1d1ba4225a213d7448941e0eb04d24bba61cb2d90e54ac32f3a12f04
-
Filesize
36B
MD56783c3ee07c7d151ceac57f1f9c8bed7
SHA117468f98f95bf504cc1f83c49e49a78526b3ea03
SHA2568ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322
SHA512c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8
-
Filesize
197B
MD58088241160261560a02c84025d107592
SHA1083121f7027557570994c9fc211df61730455bb5
SHA2562072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1
SHA51220d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394