Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22/12/2024, 20:58
Behavioral task
behavioral1
Sample
JaffaCakes118_5b5ee730e911900fd3ab1d46bd8882a833f20217243d7a1afa1bacd08a85c50d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_5b5ee730e911900fd3ab1d46bd8882a833f20217243d7a1afa1bacd08a85c50d.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_5b5ee730e911900fd3ab1d46bd8882a833f20217243d7a1afa1bacd08a85c50d.exe
-
Size
1.3MB
-
MD5
c488e6672bd314af4c5a8bb757db815b
-
SHA1
f94aca6ce134471c1e9b3d9de017816419205bb8
-
SHA256
5b5ee730e911900fd3ab1d46bd8882a833f20217243d7a1afa1bacd08a85c50d
-
SHA512
7af03174d26e1b14c7be699b28d0dd8e6ba08166c07fb8850b03f95af7395c7241d7a9d8f5fb8d0e139fded403b82150e7c60cd049a4a8a2bcae59c8e5b9212d
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 45 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1216 3016 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1120 3016 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1416 3016 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2996 3016 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3032 3016 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1924 3016 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2776 3016 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2124 3016 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1448 3016 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2600 3016 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1928 3016 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1636 3016 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1964 3016 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2476 3016 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1008 3016 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2020 3016 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 984 3016 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1720 3016 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2964 3016 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1668 3016 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1132 3016 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1776 3016 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1992 3016 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1376 3016 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2752 3016 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2828 3016 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1632 3016 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2112 3016 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2068 3016 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2264 3016 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2344 3016 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2668 3016 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2560 3016 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2656 3016 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3020 3016 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2636 3016 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2596 3016 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2352 3016 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 484 3016 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1216 3016 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1656 3016 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1860 3016 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2996 3016 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2376 3016 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1792 3016 schtasks.exe 35 -
resource yara_rule behavioral1/files/0x0008000000015d19-10.dat dcrat behavioral1/memory/2708-13-0x0000000000DC0000-0x0000000000ED0000-memory.dmp dcrat behavioral1/memory/1700-114-0x00000000010D0000-0x00000000011E0000-memory.dmp dcrat behavioral1/memory/2516-207-0x00000000001B0000-0x00000000002C0000-memory.dmp dcrat behavioral1/memory/1628-267-0x0000000000AD0000-0x0000000000BE0000-memory.dmp dcrat behavioral1/memory/1864-333-0x00000000013B0000-0x00000000014C0000-memory.dmp dcrat behavioral1/memory/2056-453-0x00000000000B0000-0x00000000001C0000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 17 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2804 powershell.exe 2792 powershell.exe 236 powershell.exe 2648 powershell.exe 1620 powershell.exe 2764 powershell.exe 1976 powershell.exe 712 powershell.exe 2604 powershell.exe 2564 powershell.exe 2368 powershell.exe 2776 powershell.exe 1852 powershell.exe 2556 powershell.exe 2528 powershell.exe 2552 powershell.exe 1468 powershell.exe -
Executes dropped EXE 9 IoCs
pid Process 2708 DllCommonsvc.exe 1704 DllCommonsvc.exe 1700 dwm.exe 2516 dwm.exe 1628 dwm.exe 1480 dwm.exe 1864 dwm.exe 2180 dwm.exe 2056 dwm.exe -
Loads dropped DLL 2 IoCs
pid Process 2876 cmd.exe 2876 cmd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 8 IoCs
flow ioc 17 raw.githubusercontent.com 20 raw.githubusercontent.com 24 raw.githubusercontent.com 27 raw.githubusercontent.com 4 raw.githubusercontent.com 5 raw.githubusercontent.com 9 raw.githubusercontent.com 13 raw.githubusercontent.com -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft.NET\smss.exe DllCommonsvc.exe File created C:\Program Files (x86)\Microsoft.NET\69ddcba757bf72 DllCommonsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Panther\actionqueue\DllCommonsvc.exe DllCommonsvc.exe File created C:\Windows\Panther\actionqueue\a76d7bf15d8370 DllCommonsvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_5b5ee730e911900fd3ab1d46bd8882a833f20217243d7a1afa1bacd08a85c50d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 45 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1860 schtasks.exe 2376 schtasks.exe 1120 schtasks.exe 2776 schtasks.exe 2668 schtasks.exe 2656 schtasks.exe 3020 schtasks.exe 2596 schtasks.exe 2352 schtasks.exe 2996 schtasks.exe 2600 schtasks.exe 2020 schtasks.exe 1668 schtasks.exe 1992 schtasks.exe 1132 schtasks.exe 2112 schtasks.exe 484 schtasks.exe 1928 schtasks.exe 2476 schtasks.exe 1008 schtasks.exe 984 schtasks.exe 1216 schtasks.exe 1636 schtasks.exe 1656 schtasks.exe 1416 schtasks.exe 2264 schtasks.exe 1216 schtasks.exe 1924 schtasks.exe 2124 schtasks.exe 1376 schtasks.exe 2560 schtasks.exe 1776 schtasks.exe 2752 schtasks.exe 2828 schtasks.exe 2068 schtasks.exe 2996 schtasks.exe 3032 schtasks.exe 1964 schtasks.exe 1720 schtasks.exe 1792 schtasks.exe 2636 schtasks.exe 1448 schtasks.exe 2964 schtasks.exe 1632 schtasks.exe 2344 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 2708 DllCommonsvc.exe 1976 powershell.exe 712 powershell.exe 2792 powershell.exe 2764 powershell.exe 2804 powershell.exe 1704 DllCommonsvc.exe 2368 powershell.exe 2776 powershell.exe 2556 powershell.exe 1852 powershell.exe 2604 powershell.exe 1468 powershell.exe 2528 powershell.exe 1620 powershell.exe 2648 powershell.exe 236 powershell.exe 2564 powershell.exe 2552 powershell.exe 1700 dwm.exe 2516 dwm.exe 1628 dwm.exe 1864 dwm.exe 2180 dwm.exe 2056 dwm.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
description pid Process Token: SeDebugPrivilege 2708 DllCommonsvc.exe Token: SeDebugPrivilege 1976 powershell.exe Token: SeDebugPrivilege 712 powershell.exe Token: SeDebugPrivilege 2792 powershell.exe Token: SeDebugPrivilege 2764 powershell.exe Token: SeDebugPrivilege 2804 powershell.exe Token: SeDebugPrivilege 1704 DllCommonsvc.exe Token: SeDebugPrivilege 2368 powershell.exe Token: SeDebugPrivilege 2776 powershell.exe Token: SeDebugPrivilege 2556 powershell.exe Token: SeDebugPrivilege 1852 powershell.exe Token: SeDebugPrivilege 2604 powershell.exe Token: SeDebugPrivilege 1468 powershell.exe Token: SeDebugPrivilege 2528 powershell.exe Token: SeDebugPrivilege 1620 powershell.exe Token: SeDebugPrivilege 2648 powershell.exe Token: SeDebugPrivilege 236 powershell.exe Token: SeDebugPrivilege 2564 powershell.exe Token: SeDebugPrivilege 2552 powershell.exe Token: SeDebugPrivilege 1700 dwm.exe Token: SeDebugPrivilege 2516 dwm.exe Token: SeDebugPrivilege 1628 dwm.exe Token: SeDebugPrivilege 1864 dwm.exe Token: SeDebugPrivilege 2180 dwm.exe Token: SeDebugPrivilege 2056 dwm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2664 wrote to memory of 2692 2664 JaffaCakes118_5b5ee730e911900fd3ab1d46bd8882a833f20217243d7a1afa1bacd08a85c50d.exe 31 PID 2664 wrote to memory of 2692 2664 JaffaCakes118_5b5ee730e911900fd3ab1d46bd8882a833f20217243d7a1afa1bacd08a85c50d.exe 31 PID 2664 wrote to memory of 2692 2664 JaffaCakes118_5b5ee730e911900fd3ab1d46bd8882a833f20217243d7a1afa1bacd08a85c50d.exe 31 PID 2664 wrote to memory of 2692 2664 JaffaCakes118_5b5ee730e911900fd3ab1d46bd8882a833f20217243d7a1afa1bacd08a85c50d.exe 31 PID 2692 wrote to memory of 2876 2692 WScript.exe 32 PID 2692 wrote to memory of 2876 2692 WScript.exe 32 PID 2692 wrote to memory of 2876 2692 WScript.exe 32 PID 2692 wrote to memory of 2876 2692 WScript.exe 32 PID 2876 wrote to memory of 2708 2876 cmd.exe 34 PID 2876 wrote to memory of 2708 2876 cmd.exe 34 PID 2876 wrote to memory of 2708 2876 cmd.exe 34 PID 2876 wrote to memory of 2708 2876 cmd.exe 34 PID 2708 wrote to memory of 1976 2708 DllCommonsvc.exe 48 PID 2708 wrote to memory of 1976 2708 DllCommonsvc.exe 48 PID 2708 wrote to memory of 1976 2708 DllCommonsvc.exe 48 PID 2708 wrote to memory of 712 2708 DllCommonsvc.exe 49 PID 2708 wrote to memory of 712 2708 DllCommonsvc.exe 49 PID 2708 wrote to memory of 712 2708 DllCommonsvc.exe 49 PID 2708 wrote to memory of 2764 2708 DllCommonsvc.exe 50 PID 2708 wrote to memory of 2764 2708 DllCommonsvc.exe 50 PID 2708 wrote to memory of 2764 2708 DllCommonsvc.exe 50 PID 2708 wrote to memory of 2792 2708 DllCommonsvc.exe 52 PID 2708 wrote to memory of 2792 2708 DllCommonsvc.exe 52 PID 2708 wrote to memory of 2792 2708 DllCommonsvc.exe 52 PID 2708 wrote to memory of 2804 2708 DllCommonsvc.exe 54 PID 2708 wrote to memory of 2804 2708 DllCommonsvc.exe 54 PID 2708 wrote to memory of 2804 2708 DllCommonsvc.exe 54 PID 2708 wrote to memory of 2164 2708 DllCommonsvc.exe 58 PID 2708 wrote to memory of 2164 2708 DllCommonsvc.exe 58 PID 2708 wrote to memory of 2164 2708 DllCommonsvc.exe 58 PID 2164 wrote to memory of 1168 2164 cmd.exe 60 PID 2164 wrote to memory of 1168 2164 cmd.exe 60 PID 2164 wrote to memory of 1168 2164 cmd.exe 60 PID 2164 wrote to memory of 1704 2164 cmd.exe 61 PID 2164 wrote to memory of 1704 2164 cmd.exe 61 PID 2164 wrote to memory of 1704 2164 cmd.exe 61 PID 1704 wrote to memory of 2776 1704 DllCommonsvc.exe 95 PID 1704 wrote to memory of 2776 1704 DllCommonsvc.exe 95 PID 1704 wrote to memory of 2776 1704 DllCommonsvc.exe 95 PID 1704 wrote to memory of 2368 1704 DllCommonsvc.exe 96 PID 1704 wrote to memory of 2368 1704 DllCommonsvc.exe 96 PID 1704 wrote to memory of 2368 1704 DllCommonsvc.exe 96 PID 1704 wrote to memory of 1468 1704 DllCommonsvc.exe 97 PID 1704 wrote to memory of 1468 1704 DllCommonsvc.exe 97 PID 1704 wrote to memory of 1468 1704 DllCommonsvc.exe 97 PID 1704 wrote to memory of 2552 1704 DllCommonsvc.exe 99 PID 1704 wrote to memory of 2552 1704 DllCommonsvc.exe 99 PID 1704 wrote to memory of 2552 1704 DllCommonsvc.exe 99 PID 1704 wrote to memory of 1620 1704 DllCommonsvc.exe 100 PID 1704 wrote to memory of 1620 1704 DllCommonsvc.exe 100 PID 1704 wrote to memory of 1620 1704 DllCommonsvc.exe 100 PID 1704 wrote to memory of 2648 1704 DllCommonsvc.exe 101 PID 1704 wrote to memory of 2648 1704 DllCommonsvc.exe 101 PID 1704 wrote to memory of 2648 1704 DllCommonsvc.exe 101 PID 1704 wrote to memory of 2528 1704 DllCommonsvc.exe 102 PID 1704 wrote to memory of 2528 1704 DllCommonsvc.exe 102 PID 1704 wrote to memory of 2528 1704 DllCommonsvc.exe 102 PID 1704 wrote to memory of 2564 1704 DllCommonsvc.exe 103 PID 1704 wrote to memory of 2564 1704 DllCommonsvc.exe 103 PID 1704 wrote to memory of 2564 1704 DllCommonsvc.exe 103 PID 1704 wrote to memory of 2604 1704 DllCommonsvc.exe 104 PID 1704 wrote to memory of 2604 1704 DllCommonsvc.exe 104 PID 1704 wrote to memory of 2604 1704 DllCommonsvc.exe 104 PID 1704 wrote to memory of 236 1704 DllCommonsvc.exe 108 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5b5ee730e911900fd3ab1d46bd8882a833f20217243d7a1afa1bacd08a85c50d.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5b5ee730e911900fd3ab1d46bd8882a833f20217243d7a1afa1bacd08a85c50d.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\providercommon\1zu9dW.bat" "3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"4⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1976
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\taskhost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:712
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2764
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\smss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2792
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Panther\actionqueue\DllCommonsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2804
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\XTIa6NxPJU.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:1168
-
-
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"6⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2776
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\dwm.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2368
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\services.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1468
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\sppsvc.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2552
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default User\Idle.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1620
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\csrss.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2648
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\WmiPrvSE.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2528
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Microsoft.NET\smss.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2564
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\WmiPrvSE.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2604
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\csrss.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:236
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\smss.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2556
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\sppsvc.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1852
-
-
C:\providercommon\dwm.exe"C:\providercommon\dwm.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1700 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\lBSBdtFHPx.bat"8⤵PID:2956
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:29⤵PID:1980
-
-
C:\providercommon\dwm.exe"C:\providercommon\dwm.exe"9⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2516 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\410ZzJtAuR.bat"10⤵PID:924
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:211⤵PID:1108
-
-
C:\providercommon\dwm.exe"C:\providercommon\dwm.exe"11⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1628 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\zDcPfnAXs0.bat"12⤵PID:1120
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:213⤵PID:1668
-
-
C:\providercommon\dwm.exe"C:\providercommon\dwm.exe"13⤵
- Executes dropped EXE
PID:1480 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\6Zqs8041Oe.bat"14⤵PID:272
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:215⤵PID:352
-
-
C:\providercommon\dwm.exe"C:\providercommon\dwm.exe"15⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1864 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\EOPCJ2Obyf.bat"16⤵PID:588
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:217⤵PID:1524
-
-
C:\providercommon\dwm.exe"C:\providercommon\dwm.exe"17⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2180 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\VJj2LbMAw3.bat"18⤵PID:1716
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:219⤵PID:1616
-
-
C:\providercommon\dwm.exe"C:\providercommon\dwm.exe"19⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2056
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 8 /tr "'C:\providercommon\taskhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1216
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\providercommon\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1120
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 12 /tr "'C:\providercommon\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1416
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2996
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3032
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1924
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 5 /tr "'C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2776
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2124
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1448
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvcD" /sc MINUTE /mo 13 /tr "'C:\Windows\Panther\actionqueue\DllCommonsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2600
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvc" /sc ONLOGON /tr "'C:\Windows\Panther\actionqueue\DllCommonsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1928
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvcD" /sc MINUTE /mo 13 /tr "'C:\Windows\Panther\actionqueue\DllCommonsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1636
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 10 /tr "'C:\providercommon\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1964
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\providercommon\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2476
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 13 /tr "'C:\providercommon\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1008
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 11 /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2020
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:984
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1720
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 10 /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2964
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1668
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 5 /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1132
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 8 /tr "'C:\Users\Default User\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1992
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Users\Default User\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1776
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 7 /tr "'C:\Users\Default User\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1376
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\Users\Admin\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2752
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\Admin\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2828
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Users\Admin\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1632
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 6 /tr "'C:\providercommon\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2112
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\providercommon\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2068
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 12 /tr "'C:\providercommon\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2264
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Microsoft.NET\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2344
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft.NET\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2668
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Microsoft.NET\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2560
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 5 /tr "'C:\providercommon\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2656
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\providercommon\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3020
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 8 /tr "'C:\providercommon\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2636
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2596
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2352
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:484
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 5 /tr "'C:\providercommon\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1216
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\providercommon\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1656
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 10 /tr "'C:\providercommon\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1860
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 6 /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2996
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2376
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 14 /tr "'C:\Recovery\1a287102-69f6-11ef-b2ff-62cb582c238c\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1792
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524cddda6ac67412cdefdc8f66311f861
SHA175ead44ff227d8a93451194bcf670703a2f9b022
SHA2567234d34d6a6d013d31008b631c36c460d93098443f3307b99b93d77dc517b195
SHA51258e327db6c41e59ff5cbaf990001b401a4756de87a854438bb47d0ca821d6c6cb99e72717a4c9b0bdadd589c30eab69af6f40c1674b10d15923b2fbe1e902d7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cd2b5c464e7ab8a100ac4a410b7b4b8
SHA104823f0c552841676725e6f77b32b890271a3b0b
SHA256d14ae2019acbf673045f94e58fb24abe51e924323bdbb665f2533c7f378e1993
SHA512efd8a4f265c058f060c5df6255adcf88ecd7c4ee273a882a6a67509304872cc4dd4747d2da1bffa9f0b088b2b88655dbf17d8c8c0691138902eaf24218764aad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540b808c328a81f3c7662b161a0034bad
SHA1b15036df3ad99e368513569768a927bede89ace2
SHA25659ade5c918e794e67b9fec4c983fa7baa7946b33309041f6785a852ec0d579b6
SHA5121b06e0389b74893b76d4d4771a02853394316cadeecba4a047dc685aa8379e9d48e193d109f63480b44482739184eea132557e77a6894c1a95d6926012ed4aee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f502e1158ef7d32a9e7736cc07ba789c
SHA1e5debfc18fb1ab9597b72dd48ffbfc15a183d1cb
SHA2565fcc9de0f339b21741b1c3c5b76302c50facbbcdc0c1cd0391e05a61565251b3
SHA512918adcff150d2a8a0d247ef463aad7ae0ca15a0fc6ab13192c924a7b53aa159a943fe268bdaaad9ce0e584d201160974e8bbf064903b9036b0b85c28dc113ddd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3cdbe883b5a9bbdc69b2fd41d8a9bf4
SHA1557b45b811dfd10f1df1b922f12921e8f826225e
SHA2566b6102b3e91b046d78463533a81603fb3645b543aaaefb33a001a3c8a5c77655
SHA51268bd180219143969068b3ca9bc240292f7562dd2ff05a0117a07e539ab81ae8ff90e1425524086b60981112fe3954b8688435da45e22cc3b830553fa5d7dd4d9
-
Filesize
190B
MD57322149833ff53629e3e1d5fb3c79dd6
SHA1e28967a56f420aa73a85d1d949cbd25b0dacb31c
SHA256eb6093fec93eba667bf0e6fb2a7c49945693f00fac3f36dbc448773ae27b92e0
SHA5125f2553ce3dd1ef0f8a9098738ba9350ff82ec815b58fc1a53dcb7226c019a126742820fb2332a79cf7afb26653d44f2f0751667c034881bd8877b784a9dfe9a0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
190B
MD5c040467efae24adca8f67816bf3e9255
SHA13a5ae265ae5aaad9d0aadc4859583be7a963b7f5
SHA2566a2c47e7fadb3e62d8df63fe8307b6b627b9e9330aa39a6da8bb9db2dd20878e
SHA5123c3ea9a8d6931eea69a806d5faa2fb90007998520d397ebd51f7ec83d50bbce0c9a7ce8c9ac9f6a5adb6b20f9cd0bfc61671fb7263c6f9ab64329865b2a5f7ee
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
190B
MD53537140c5b9cec898b46a457d93d6a86
SHA1b58d4ba2d6bd894c712b81e0c6586f34e64aa0ce
SHA256c69082212a106ac68692652d457eb47d3386300b7b002d10e40d34d0c8562d1c
SHA512de8a5803876ccd23d7789e4d76d4f6f5d880ebe174bf395d2fbc13287a39053a1f8c7d833c3120c709f939913420462f7934866d5da04c22fff89514fc0a6188
-
Filesize
199B
MD5ce8e11c01ba1177ce4e356873a9de9a8
SHA156eb7fec561d559b61af01eedcfd0b5b54ef9463
SHA256e36634bf44de98b0892b2447300ffce3451d65989dd2cd29937859f0a1dbb671
SHA5124f2b842e0dfd4371bc1a8a3295ce5c71099e8fdf7cc2a32342b886689dadf7da78053247b3d1455eb06c063743f9f69e37a429600db3606c34d82f27a855b8d2
-
Filesize
190B
MD5b38984295949dd5a013337213ec5703c
SHA1c7ee89dc8ca0679cd33b7188764466d21fc8f9c7
SHA2565eb501231f5468c1df49835362c56f23a1e7b0b3744bf7dd8117270c9cd5c263
SHA5129cccf32f6b9da7316249eb864d235ee45c3c3680de57c8230b809d41853b05082c963e475b1dfc3ced9158b45a6706030e2a247d383474d667d7936b3bf25236
-
Filesize
190B
MD53ee618ac15b325ed5ccdbcdf2d44cab4
SHA14be87704a461502af96c2ff839e2a8b32084b0ee
SHA256db863c2bcf924919270b23047791cd3503fa838fe71d84ea43715e0627f70870
SHA5122bb4e9cef44e432dcc1712b1b65bda643913308f3f445c378cc508276103d47ad1d2b62838067aaff01f3c662ea2e3d5df63011ab3cb8bba4efc76871ac9b78d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD58e502cfad56e81a597e95bc63e01b8f2
SHA13ea1d8dcdceeb9365b8357265a07ab94ad91b21f
SHA256cf830552df92c751c2750e6b0a0feae572eee1f3ae126a177bebb6f28974af92
SHA512342ba2e668042d102f80f191cfd5de7b8b335ce8d0f27ff068c2be2451c33c3e6e11a744be10859127c73844ad1bd5b72052e3aea8098331a7eb6b888cc69e76
-
Filesize
36B
MD56783c3ee07c7d151ceac57f1f9c8bed7
SHA117468f98f95bf504cc1f83c49e49a78526b3ea03
SHA2568ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322
SHA512c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
Filesize
197B
MD58088241160261560a02c84025d107592
SHA1083121f7027557570994c9fc211df61730455bb5
SHA2562072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1
SHA51220d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478