Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
23/12/2024, 14:15
Behavioral task
behavioral1
Sample
JaffaCakes118_f7b136459241b99f3071a7c57d6dca9476158dc2cb431800eeca40eeb5fc52e0.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_f7b136459241b99f3071a7c57d6dca9476158dc2cb431800eeca40eeb5fc52e0.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_f7b136459241b99f3071a7c57d6dca9476158dc2cb431800eeca40eeb5fc52e0.exe
-
Size
1.3MB
-
MD5
9c7df870e95d517dfe75ca6164cb8e08
-
SHA1
54788c79f992c8237748024d5397fa049ae45fd4
-
SHA256
f7b136459241b99f3071a7c57d6dca9476158dc2cb431800eeca40eeb5fc52e0
-
SHA512
c50e84ff966397cfdedd07c08dc7ef7ace119a9292905d52537894f481d11d36e3ca9209145f9a95512f6e6e81c1265769ac868ecb8d4b483e3f6c2a68e23a19
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 33 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 984 2724 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1212 2724 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2024 2724 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1524 2724 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1060 2724 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2152 2724 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1504 2724 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2352 2724 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2132 2724 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2488 2724 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2180 2724 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2192 2724 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2768 2724 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2260 2724 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2316 2724 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2632 2724 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2344 2724 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 716 2724 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 548 2724 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 772 2724 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1932 2724 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1148 2724 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2028 2724 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2128 2724 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2284 2724 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2428 2724 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1720 2724 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1376 2724 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1868 2724 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2616 2724 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 976 2724 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1088 2724 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1744 2724 schtasks.exe 34 -
resource yara_rule behavioral1/files/0x000700000001932a-9.dat dcrat behavioral1/memory/2756-13-0x00000000003A0000-0x00000000004B0000-memory.dmp dcrat behavioral1/memory/2400-108-0x0000000000D10000-0x0000000000E20000-memory.dmp dcrat behavioral1/memory/2152-167-0x0000000000E20000-0x0000000000F30000-memory.dmp dcrat behavioral1/memory/2844-227-0x0000000000060000-0x0000000000170000-memory.dmp dcrat behavioral1/memory/884-287-0x00000000013B0000-0x00000000014C0000-memory.dmp dcrat behavioral1/memory/2188-347-0x0000000000100000-0x0000000000210000-memory.dmp dcrat behavioral1/memory/1796-407-0x0000000000310000-0x0000000000420000-memory.dmp dcrat behavioral1/memory/1496-467-0x0000000000BD0000-0x0000000000CE0000-memory.dmp dcrat behavioral1/memory/1036-528-0x0000000000220000-0x0000000000330000-memory.dmp dcrat behavioral1/memory/2664-588-0x00000000009B0000-0x0000000000AC0000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 12 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1552 powershell.exe 1120 powershell.exe 1288 powershell.exe 2244 powershell.exe 2432 powershell.exe 1348 powershell.exe 1352 powershell.exe 1388 powershell.exe 800 powershell.exe 1596 powershell.exe 296 powershell.exe 2596 powershell.exe -
Executes dropped EXE 10 IoCs
pid Process 2756 DllCommonsvc.exe 2400 lsass.exe 2152 lsass.exe 2844 lsass.exe 884 lsass.exe 2188 lsass.exe 1796 lsass.exe 1496 lsass.exe 1036 lsass.exe 2664 lsass.exe -
Loads dropped DLL 2 IoCs
pid Process 3036 cmd.exe 3036 cmd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 9 IoCs
flow ioc 9 raw.githubusercontent.com 16 raw.githubusercontent.com 19 raw.githubusercontent.com 23 raw.githubusercontent.com 26 raw.githubusercontent.com 30 raw.githubusercontent.com 4 raw.githubusercontent.com 12 raw.githubusercontent.com 5 raw.githubusercontent.com -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\DllCommonsvc.exe DllCommonsvc.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\a76d7bf15d8370 DllCommonsvc.exe File created C:\Program Files (x86)\Uninstall Information\dwm.exe DllCommonsvc.exe File created C:\Program Files (x86)\Uninstall Information\6cb0b6c459d5d3 DllCommonsvc.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\twain_32\lsass.exe DllCommonsvc.exe File created C:\Windows\twain_32\6203df4a6bafc7 DllCommonsvc.exe File created C:\Windows\assembly\GAC_MSIL\Microsoft.Office.BusinessApplications.SyncServices\14.0.0.0__71e9bce111e9429c\audiodg.exe DllCommonsvc.exe File created C:\Windows\assembly\GAC_MSIL\Microsoft.Office.BusinessApplications.SyncServices\14.0.0.0__71e9bce111e9429c\42af1c969fbb7b DllCommonsvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_f7b136459241b99f3071a7c57d6dca9476158dc2cb431800eeca40eeb5fc52e0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 33 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 984 schtasks.exe 1868 schtasks.exe 2024 schtasks.exe 1504 schtasks.exe 2132 schtasks.exe 2632 schtasks.exe 548 schtasks.exe 772 schtasks.exe 2128 schtasks.exe 1932 schtasks.exe 2028 schtasks.exe 1744 schtasks.exe 976 schtasks.exe 1088 schtasks.exe 1524 schtasks.exe 2352 schtasks.exe 2192 schtasks.exe 716 schtasks.exe 1720 schtasks.exe 1212 schtasks.exe 2152 schtasks.exe 2488 schtasks.exe 2768 schtasks.exe 2260 schtasks.exe 1148 schtasks.exe 2428 schtasks.exe 2180 schtasks.exe 2344 schtasks.exe 1376 schtasks.exe 2616 schtasks.exe 1060 schtasks.exe 2316 schtasks.exe 2284 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 2756 DllCommonsvc.exe 800 powershell.exe 1352 powershell.exe 2596 powershell.exe 2244 powershell.exe 1552 powershell.exe 296 powershell.exe 1388 powershell.exe 1348 powershell.exe 2432 powershell.exe 1288 powershell.exe 1596 powershell.exe 1120 powershell.exe 2400 lsass.exe 2152 lsass.exe 2844 lsass.exe 884 lsass.exe 2188 lsass.exe 1796 lsass.exe 1496 lsass.exe 1036 lsass.exe 2664 lsass.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeDebugPrivilege 2756 DllCommonsvc.exe Token: SeDebugPrivilege 800 powershell.exe Token: SeDebugPrivilege 1352 powershell.exe Token: SeDebugPrivilege 2596 powershell.exe Token: SeDebugPrivilege 2244 powershell.exe Token: SeDebugPrivilege 1552 powershell.exe Token: SeDebugPrivilege 296 powershell.exe Token: SeDebugPrivilege 1388 powershell.exe Token: SeDebugPrivilege 1348 powershell.exe Token: SeDebugPrivilege 2432 powershell.exe Token: SeDebugPrivilege 1288 powershell.exe Token: SeDebugPrivilege 1596 powershell.exe Token: SeDebugPrivilege 1120 powershell.exe Token: SeDebugPrivilege 2400 lsass.exe Token: SeDebugPrivilege 2152 lsass.exe Token: SeDebugPrivilege 2844 lsass.exe Token: SeDebugPrivilege 884 lsass.exe Token: SeDebugPrivilege 2188 lsass.exe Token: SeDebugPrivilege 1796 lsass.exe Token: SeDebugPrivilege 1496 lsass.exe Token: SeDebugPrivilege 1036 lsass.exe Token: SeDebugPrivilege 2664 lsass.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2888 wrote to memory of 2776 2888 JaffaCakes118_f7b136459241b99f3071a7c57d6dca9476158dc2cb431800eeca40eeb5fc52e0.exe 30 PID 2888 wrote to memory of 2776 2888 JaffaCakes118_f7b136459241b99f3071a7c57d6dca9476158dc2cb431800eeca40eeb5fc52e0.exe 30 PID 2888 wrote to memory of 2776 2888 JaffaCakes118_f7b136459241b99f3071a7c57d6dca9476158dc2cb431800eeca40eeb5fc52e0.exe 30 PID 2888 wrote to memory of 2776 2888 JaffaCakes118_f7b136459241b99f3071a7c57d6dca9476158dc2cb431800eeca40eeb5fc52e0.exe 30 PID 2776 wrote to memory of 3036 2776 WScript.exe 31 PID 2776 wrote to memory of 3036 2776 WScript.exe 31 PID 2776 wrote to memory of 3036 2776 WScript.exe 31 PID 2776 wrote to memory of 3036 2776 WScript.exe 31 PID 3036 wrote to memory of 2756 3036 cmd.exe 33 PID 3036 wrote to memory of 2756 3036 cmd.exe 33 PID 3036 wrote to memory of 2756 3036 cmd.exe 33 PID 3036 wrote to memory of 2756 3036 cmd.exe 33 PID 2756 wrote to memory of 2432 2756 DllCommonsvc.exe 68 PID 2756 wrote to memory of 2432 2756 DllCommonsvc.exe 68 PID 2756 wrote to memory of 2432 2756 DllCommonsvc.exe 68 PID 2756 wrote to memory of 1352 2756 DllCommonsvc.exe 69 PID 2756 wrote to memory of 1352 2756 DllCommonsvc.exe 69 PID 2756 wrote to memory of 1352 2756 DllCommonsvc.exe 69 PID 2756 wrote to memory of 1552 2756 DllCommonsvc.exe 71 PID 2756 wrote to memory of 1552 2756 DllCommonsvc.exe 71 PID 2756 wrote to memory of 1552 2756 DllCommonsvc.exe 71 PID 2756 wrote to memory of 1348 2756 DllCommonsvc.exe 72 PID 2756 wrote to memory of 1348 2756 DllCommonsvc.exe 72 PID 2756 wrote to memory of 1348 2756 DllCommonsvc.exe 72 PID 2756 wrote to memory of 2596 2756 DllCommonsvc.exe 73 PID 2756 wrote to memory of 2596 2756 DllCommonsvc.exe 73 PID 2756 wrote to memory of 2596 2756 DllCommonsvc.exe 73 PID 2756 wrote to memory of 296 2756 DllCommonsvc.exe 74 PID 2756 wrote to memory of 296 2756 DllCommonsvc.exe 74 PID 2756 wrote to memory of 296 2756 DllCommonsvc.exe 74 PID 2756 wrote to memory of 1596 2756 DllCommonsvc.exe 79 PID 2756 wrote to memory of 1596 2756 DllCommonsvc.exe 79 PID 2756 wrote to memory of 1596 2756 DllCommonsvc.exe 79 PID 2756 wrote to memory of 2244 2756 DllCommonsvc.exe 81 PID 2756 wrote to memory of 2244 2756 DllCommonsvc.exe 81 PID 2756 wrote to memory of 2244 2756 DllCommonsvc.exe 81 PID 2756 wrote to memory of 1388 2756 DllCommonsvc.exe 82 PID 2756 wrote to memory of 1388 2756 DllCommonsvc.exe 82 PID 2756 wrote to memory of 1388 2756 DllCommonsvc.exe 82 PID 2756 wrote to memory of 1288 2756 DllCommonsvc.exe 83 PID 2756 wrote to memory of 1288 2756 DllCommonsvc.exe 83 PID 2756 wrote to memory of 1288 2756 DllCommonsvc.exe 83 PID 2756 wrote to memory of 1120 2756 DllCommonsvc.exe 84 PID 2756 wrote to memory of 1120 2756 DllCommonsvc.exe 84 PID 2756 wrote to memory of 1120 2756 DllCommonsvc.exe 84 PID 2756 wrote to memory of 800 2756 DllCommonsvc.exe 86 PID 2756 wrote to memory of 800 2756 DllCommonsvc.exe 86 PID 2756 wrote to memory of 800 2756 DllCommonsvc.exe 86 PID 2756 wrote to memory of 1696 2756 DllCommonsvc.exe 92 PID 2756 wrote to memory of 1696 2756 DllCommonsvc.exe 92 PID 2756 wrote to memory of 1696 2756 DllCommonsvc.exe 92 PID 1696 wrote to memory of 2356 1696 cmd.exe 94 PID 1696 wrote to memory of 2356 1696 cmd.exe 94 PID 1696 wrote to memory of 2356 1696 cmd.exe 94 PID 1696 wrote to memory of 2400 1696 cmd.exe 95 PID 1696 wrote to memory of 2400 1696 cmd.exe 95 PID 1696 wrote to memory of 2400 1696 cmd.exe 95 PID 2400 wrote to memory of 2188 2400 lsass.exe 96 PID 2400 wrote to memory of 2188 2400 lsass.exe 96 PID 2400 wrote to memory of 2188 2400 lsass.exe 96 PID 2188 wrote to memory of 1148 2188 cmd.exe 98 PID 2188 wrote to memory of 1148 2188 cmd.exe 98 PID 2188 wrote to memory of 1148 2188 cmd.exe 98 PID 2188 wrote to memory of 2152 2188 cmd.exe 99 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f7b136459241b99f3071a7c57d6dca9476158dc2cb431800eeca40eeb5fc52e0.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f7b136459241b99f3071a7c57d6dca9476158dc2cb431800eeca40eeb5fc52e0.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\providercommon\1zu9dW.bat" "3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2432
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\explorer.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1352
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Temp\Crashpad\attachments\sppsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1552
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\sppsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1348
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\smss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2596
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\csrss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:296
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\assembly\GAC_MSIL\Microsoft.Office.BusinessApplications.SyncServices\14.0.0.0__71e9bce111e9429c\audiodg.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1596
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\twain_32\lsass.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2244
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\All Users\audiodg.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1388
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\WmiPrvSE.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1288
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\DllCommonsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1120
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Uninstall Information\dwm.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:800
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\aYRWYr5XqL.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:2356
-
-
C:\Windows\twain_32\lsass.exe"C:\Windows\twain_32\lsass.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\a1lJXnITmE.bat"7⤵
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:28⤵PID:1148
-
-
C:\Windows\twain_32\lsass.exe"C:\Windows\twain_32\lsass.exe"8⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2152 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\NpgWdIWSbT.bat"9⤵PID:2140
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:210⤵PID:2904
-
-
C:\Windows\twain_32\lsass.exe"C:\Windows\twain_32\lsass.exe"10⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2844 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\kp2dTY47HA.bat"11⤵PID:2064
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:212⤵PID:1152
-
-
C:\Windows\twain_32\lsass.exe"C:\Windows\twain_32\lsass.exe"12⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:884 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\vF7CrwxjwX.bat"13⤵PID:2400
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:214⤵PID:2372
-
-
C:\Windows\twain_32\lsass.exe"C:\Windows\twain_32\lsass.exe"14⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2188 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\o0FbW2pZd9.bat"15⤵PID:520
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:216⤵PID:2860
-
-
C:\Windows\twain_32\lsass.exe"C:\Windows\twain_32\lsass.exe"16⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1796 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\LZh5ueQJla.bat"17⤵PID:1440
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:218⤵PID:1624
-
-
C:\Windows\twain_32\lsass.exe"C:\Windows\twain_32\lsass.exe"18⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1496 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\VhvmsyECnd.bat"19⤵PID:2316
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:220⤵PID:664
-
-
C:\Windows\twain_32\lsass.exe"C:\Windows\twain_32\lsass.exe"20⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1036 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\yWf31kVUUl.bat"21⤵PID:3048
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:222⤵PID:896
-
-
C:\Windows\twain_32\lsass.exe"C:\Windows\twain_32\lsass.exe"22⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2664
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 8 /tr "'C:\providercommon\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:984
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\providercommon\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1212
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 8 /tr "'C:\providercommon\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2024
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 13 /tr "'C:\Windows\Temp\Crashpad\attachments\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1524
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Windows\Temp\Crashpad\attachments\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1060
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 14 /tr "'C:\Windows\Temp\Crashpad\attachments\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2152
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 8 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1504
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2352
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 14 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2132
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 10 /tr "'C:\providercommon\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2488
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\providercommon\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2180
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 11 /tr "'C:\providercommon\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2192
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2768
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2260
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2316
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 13 /tr "'C:\Windows\assembly\GAC_MSIL\Microsoft.Office.BusinessApplications.SyncServices\14.0.0.0__71e9bce111e9429c\audiodg.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2632
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Windows\assembly\GAC_MSIL\Microsoft.Office.BusinessApplications.SyncServices\14.0.0.0__71e9bce111e9429c\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2344
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 12 /tr "'C:\Windows\assembly\GAC_MSIL\Microsoft.Office.BusinessApplications.SyncServices\14.0.0.0__71e9bce111e9429c\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:716
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 8 /tr "'C:\Windows\twain_32\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:548
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Windows\twain_32\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:772
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 11 /tr "'C:\Windows\twain_32\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1932
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 12 /tr "'C:\Users\All Users\audiodg.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1148
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Users\All Users\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2028
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 5 /tr "'C:\Users\All Users\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2128
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 8 /tr "'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2284
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2428
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1720
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvcD" /sc MINUTE /mo 13 /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\DllCommonsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1376
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvc" /sc ONLOGON /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\DllCommonsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1868
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvcD" /sc MINUTE /mo 10 /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\DllCommonsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2616
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Uninstall Information\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:976
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Program Files (x86)\Uninstall Information\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1088
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Uninstall Information\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f89bd39c472579497920c3cadad82f8
SHA1876cfc58b691c5a9fe8d0df1b7d545175bddae18
SHA256ff01e0535fc66c96e6727342842b1b7f922cd23f6a0ca8af8adb44e6846662db
SHA512ca19d3f9f9c204ba620296946465c51463dedff704ff7e0c40dc794ad677e67b86dca65c5f49deaf792ce534587000d7d4ebdce98a7f1c4f83674e8871201a5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50999e15d3cefa08d7abe1dd6c8fa97a8
SHA1a4aa94803ef52199a73b235798a7dd5b334ed8c4
SHA2565d73fa98d8995564f31b49614c1b27b00ec377c21a1813a10a2182472d3be9e9
SHA512cbd46ac0cd52227a9a3bd4b1c485db7048c9cf59d10e182d20d19ec17e130fb862d8ce28ea817498568dc101b722c4a0a466f30684cda862a714fc34996afa07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8df991a7853a3dbccdf7e37d96a6207
SHA1933bc03f890a529535d863019ccfdd08e8647f0a
SHA256b7f26eb2bce27cd560041fb2d2ecbfe1664ace784340f0bfa54e96106248ca4f
SHA51208a3a415208f14abf2c03b16b436af4b0338b342aed2c8ab273cea5621874b16abce3d103a274fdf448a698c2ad4f7f707b424f4ed4647b9d37663d34941ca16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8a02ea2f9e682563808dc72db89cb70
SHA1012ddadfbd409e10c8cd7c27d96d0905d2842f54
SHA2565623e30e7d710f10c27a3bcc501b3e56533cf6d4ed4a233af2de0f8bad514973
SHA512740497c64faa37e1174d6249b42921b6ad25ab7014954346f9e13fbf2c58dc4481868c9b51e96ddc7923c91ca230092f849594009d1d0b5a33b9e31f5b582a00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52100bfe332988f3455b4af80b60df364
SHA1575dc5d5fbc1f0a5132dad9e525ffc988e170f3e
SHA2562cb968b543e1950b1e7943164a2b7de3a6707c94b0b651deedf5043861ac13b2
SHA5121fca9d109f223ff04923290586d806f4bd9e7a384e0cdee039dde5932705e4b2a9f2ce22f1412cd97ed029d7a4a568a26bb15c88ac7ae9faa1cf2f1d913e8ae8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59878848381a5ea589c7b7af62312132a
SHA1bee56c420502cbbad8548005d241ed0da8fc6751
SHA256a20f0a22ee881a5771d7c44ca5dfe6b661388ad282e531b369e3827e2ce68a86
SHA512beb056a4bea1ace5c89928ddbbd28b0c4f11eef5206cbf3a999e4ad995d284bfdca3092c344255653dcfced03073dbd95305c16b75ac8459df744ce933d69a8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55944348bb98728032f9f9f068d7459fa
SHA175c1fe77d55dde0be87131fbea5916848089a991
SHA256d69e83e44d74f2a1f53b454b3af9aa68d89f550fae758f7fe7b69bcaf0533469
SHA512a42cc1f39b8b3af5489b3d85296506381127da0682da2c2e936f4cc76c44ade805c8f9a5c783616af0f7fe95bdcdb91e6463d78f55d4f34485118f591bcb21d1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
194B
MD57810640da213285cdfbdc913727ddcd4
SHA1db8269a156a25d8e391735096b8b285e5bd2c167
SHA256e49e873766e6274cd0d375abf835f4a34274b3f402b5d70393c1f96410ce0a5e
SHA5124e81d52b37094d5e1114058668008663c038292d304b39764b7610f47f019363d6c36e0aaffcb1053f9ea5ba00529227da145abba1de6aba59f27ceb4f66820f
-
Filesize
194B
MD57361031f1d50651eac3c81fca0b7f715
SHA18a52e08f9191361b50fb4029149cbf17afcffcd3
SHA256d1ae87dd88c44a50d1bd56f62b725ade1cb8f0e7f5e71f88ba310fdbb7bc4777
SHA512a2d927e7d05d8dc1cffe757403cce4704224342d7552fdc22c4ae9fcfb3b005484428407f3f065a1ac7a47372bb07996fd2a721d3dba6d8c175e7d90d1829a8e
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
194B
MD5509e1b28bcec26aad4a9aa2de8a58bd6
SHA18723379fc4de153cdf0a2bb916a2c3e4458b784e
SHA2566229dd47b56f02215709404becba1b91554e4b2ebb112e09e618b686e8abe81b
SHA512c98aa2be8b305b30695786c4458525c39fdea2f0b4046252a593fe23f26f73cc06705721f579a8b4dcc30ec835e529b0f55bebddb16f319e37f2ebff1de87c4c
-
Filesize
194B
MD5e4451134c57691aaab662d067acfabdb
SHA156b9f64b12a6e20debceed04ef961380de781535
SHA25686b6a11102d5829f47a0ec43f2458a26dd8d79a7a0584b9f92078ef5c9c62743
SHA512c53d3710f52e28b19ef4c8bb7784cc54da96c68fed658da7d12b56aea28229ec22859f0a0839656f3ef5ddec7c97658a923f1f7179a8ede08b4e5284685f239d
-
Filesize
194B
MD5ff42c036ec15dffde01b5f81a723b9a7
SHA15eefff6a337fcdef8c6b235290f79cdbe588d493
SHA256bb10ed6e2a10ba60cf814b4a6db9fe9ab30dbb2fe794461d62e8f4679d170537
SHA5124da3ac7a0e544c837053e00cd7e7ba88cc316f809fb681acff7448e4b5d903bc02a179e79c1a72371bc5482b25a6df7c994e9e735408931c7f8175e253321f4b
-
Filesize
194B
MD5b0277a6be4bb12c991d6daa664f2a1a5
SHA15618b4bbdf4f60068f382b9c2c44c153a515d1cc
SHA2561b4f1eebf6c2ab4d041b9a70a1f803e8a6b1d6f37831b5c5a7a2d3ddc73ff284
SHA5128b8b92ea312d9533c79b0683e891c3938a8753ad6ed90dac13de1ee6dc4f86dabae1bb9fc1194bafedd30d802332e3dee74121d7009003d664e6ae31fc2a21ed
-
Filesize
194B
MD5ac894d59907a45fef3b7756bdcd589b8
SHA1f0954125175b6e1318bb6372974493653c514c42
SHA256cd3af9df6002804848c03d51d70591c71848c41d5cc2765074e5576126ea570d
SHA512724f5f5f8a23f6ac5ceafd85dda769a65b9da159b763fe21141407008251c6ca7a3cc1d05da5570d81598a61076296925c79d259f23e609e278b22141afa21dc
-
Filesize
194B
MD55696178b4829b501c98c759dcf457931
SHA18746d92406f0803ff8e221dbe82062d859cda3e8
SHA256612e3fac03ddac951c28f563300803cb47d06e12720eb8a0dcd7df0c64b29fdd
SHA5120c8356212b946b548935bf47829745e6b4d5e87d205a04abc027561e8d8d88f3297a6c0e2f0a6586a850c15e2fc1a9241789032d006a20469130c330890a617d
-
Filesize
194B
MD53745fa3f8468220672053d0871474e7b
SHA17e4a00df1b66c9653e1926e4bb0320000e597b5a
SHA2561eeca1c3f7e36bdfa4d078731adb776ed38279bdc7c20795eea9607e79464cab
SHA512923756ecc1400597e32eb1f4e77bdc9c05a42de5ad029db5e807c42b4fdd24c9b34d70fae108750e99904205d8e2cd79935e8e40f363e01b178f0f60dd610833
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD59c556a8bae66ac756937343929442b57
SHA1a5356f1390e25ac72f8f2b38942cabc12918da9a
SHA256c9a1b076bcd3c2ea38d4e353419446c4fa00b4a5bcc80d73207e53bfae3b44f4
SHA512e5baa894c844bef7cec742e97898387a992a78264f5d632ebe0cc86599912d8c9c9bd02249d375133120d1a9ff10e43668757e658ae4e61716ff542d6cf342a9
-
Filesize
36B
MD56783c3ee07c7d151ceac57f1f9c8bed7
SHA117468f98f95bf504cc1f83c49e49a78526b3ea03
SHA2568ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322
SHA512c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8
-
Filesize
197B
MD58088241160261560a02c84025d107592
SHA1083121f7027557570994c9fc211df61730455bb5
SHA2562072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1
SHA51220d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394