Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    306s
  • max time network
    325s
  • platform
    windows10-1703_x64
  • resource
    win10-20231020-en
  • resource tags

    arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system
  • submitted
    15/11/2023, 03:45

General

  • Target

    8324dd03377ae4f738b328a10f99ccb4def68ed4a4f578c4ff89bb185a16e695.exe

  • Size

    1.7MB

  • MD5

    1293f563c73464bc5d7f43aac04bbcd8

  • SHA1

    2104dc4168aae58bbb281fdc0ca746cb207f50f7

  • SHA256

    8324dd03377ae4f738b328a10f99ccb4def68ed4a4f578c4ff89bb185a16e695

  • SHA512

    e1fe8d3d8b063adabbd5b6f3e6327a67ba0d23f6cdd82bfa954270e99a368dc8394b0d2a70caece6edd60ee09651873c3162b27e3b8e28f407021f8bee28a559

  • SSDEEP

    24576:rQa+rRep38knZGbO4oFya8ZbRxaiXvnEc3Suvb7sNPwEFfTPCRi4Vz:rZ+rRe3zn4ioa8ZbRMiXO07sNPwERWV

Score
10/10

Malware Config

Signatures

  • Detect ZGRat V1 29 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Executes dropped EXE 26 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Drops file in Program Files directory 5 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 27 IoCs
  • Runs ping.exe 1 TTPs 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8324dd03377ae4f738b328a10f99ccb4def68ed4a4f578c4ff89bb185a16e695.exe
    "C:\Users\Admin\AppData\Local\Temp\8324dd03377ae4f738b328a10f99ccb4def68ed4a4f578c4ff89bb185a16e695.exe"
    1⤵
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2264
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows NT\Accessories\spoolsv.exe'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3732
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\explorer.exe'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2184
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\spoolsv.exe'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2812
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Photo Viewer\dllhost.exe'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3076
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\fr-FR\RuntimeBroker.exe'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4396
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\1ZNGF7YCFm.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2664
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:4916
        • C:\Windows\system32\PING.EXE
          ping -n 10 localhost
          3⤵
          • Runs ping.exe
          PID:4736
        • C:\Recovery\WindowsRE\spoolsv.exe
          "C:\Recovery\WindowsRE\spoolsv.exe"
          3⤵
          • Executes dropped EXE
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2636
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ErLL4imMUD.bat"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:384
            • C:\Windows\system32\chcp.com
              chcp 65001
              5⤵
                PID:2092
              • C:\Windows\system32\w32tm.exe
                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                5⤵
                  PID:2256
                • C:\Recovery\WindowsRE\spoolsv.exe
                  "C:\Recovery\WindowsRE\spoolsv.exe"
                  5⤵
                  • Executes dropped EXE
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:4148
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\W80Ek08hxD.bat"
                    6⤵
                    • Suspicious use of WriteProcessMemory
                    PID:2516
                    • C:\Windows\system32\chcp.com
                      chcp 65001
                      7⤵
                        PID:3624
                      • C:\Windows\system32\w32tm.exe
                        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                        7⤵
                          PID:2732
                        • C:\Recovery\WindowsRE\spoolsv.exe
                          "C:\Recovery\WindowsRE\spoolsv.exe"
                          7⤵
                          • Executes dropped EXE
                          • Modifies registry class
                          • Suspicious use of WriteProcessMemory
                          PID:4312
                          • C:\Windows\System32\cmd.exe
                            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\9j9zErPDE6.bat"
                            8⤵
                            • Suspicious use of WriteProcessMemory
                            PID:2468
                            • C:\Windows\system32\chcp.com
                              chcp 65001
                              9⤵
                                PID:704
                              • C:\Windows\system32\w32tm.exe
                                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                9⤵
                                  PID:2472
                                • C:\Recovery\WindowsRE\spoolsv.exe
                                  "C:\Recovery\WindowsRE\spoolsv.exe"
                                  9⤵
                                  • Executes dropped EXE
                                  • Modifies registry class
                                  • Suspicious use of WriteProcessMemory
                                  PID:4360
                                  • C:\Windows\System32\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\1lJXnITmEE.bat"
                                    10⤵
                                    • Suspicious use of WriteProcessMemory
                                    PID:4500
                                    • C:\Windows\system32\chcp.com
                                      chcp 65001
                                      11⤵
                                        PID:2296
                                      • C:\Windows\system32\PING.EXE
                                        ping -n 10 localhost
                                        11⤵
                                        • Runs ping.exe
                                        PID:4676
                                      • C:\Recovery\WindowsRE\spoolsv.exe
                                        "C:\Recovery\WindowsRE\spoolsv.exe"
                                        11⤵
                                        • Executes dropped EXE
                                        • Modifies registry class
                                        • Suspicious use of WriteProcessMemory
                                        PID:3720
                                        • C:\Windows\System32\cmd.exe
                                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Hf3c4kdafJ.bat"
                                          12⤵
                                          • Suspicious use of WriteProcessMemory
                                          PID:2704
                                          • C:\Windows\system32\chcp.com
                                            chcp 65001
                                            13⤵
                                              PID:1016
                                            • C:\Windows\system32\w32tm.exe
                                              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                              13⤵
                                                PID:2980
                                              • C:\Recovery\WindowsRE\spoolsv.exe
                                                "C:\Recovery\WindowsRE\spoolsv.exe"
                                                13⤵
                                                • Executes dropped EXE
                                                • Modifies registry class
                                                • Suspicious use of WriteProcessMemory
                                                PID:2720
                                                • C:\Windows\System32\cmd.exe
                                                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\9TWO8Gj4g3.bat"
                                                  14⤵
                                                  • Suspicious use of WriteProcessMemory
                                                  PID:2868
                                                  • C:\Windows\system32\chcp.com
                                                    chcp 65001
                                                    15⤵
                                                      PID:2616
                                                    • C:\Windows\system32\w32tm.exe
                                                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                      15⤵
                                                        PID:3648
                                                      • C:\Recovery\WindowsRE\spoolsv.exe
                                                        "C:\Recovery\WindowsRE\spoolsv.exe"
                                                        15⤵
                                                        • Executes dropped EXE
                                                        • Modifies registry class
                                                        PID:2984
                                                        • C:\Windows\System32\cmd.exe
                                                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\b6xYfwFNBo.bat"
                                                          16⤵
                                                            PID:4200
                                                            • C:\Windows\system32\chcp.com
                                                              chcp 65001
                                                              17⤵
                                                                PID:4972
                                                              • C:\Windows\system32\w32tm.exe
                                                                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                17⤵
                                                                  PID:2092
                                                                • C:\Recovery\WindowsRE\spoolsv.exe
                                                                  "C:\Recovery\WindowsRE\spoolsv.exe"
                                                                  17⤵
                                                                  • Executes dropped EXE
                                                                  • Modifies registry class
                                                                  PID:1204
                                                                  • C:\Windows\System32\cmd.exe
                                                                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ldsg1wMtok.bat"
                                                                    18⤵
                                                                      PID:1044
                                                                      • C:\Windows\system32\chcp.com
                                                                        chcp 65001
                                                                        19⤵
                                                                          PID:1672
                                                                        • C:\Windows\system32\PING.EXE
                                                                          ping -n 10 localhost
                                                                          19⤵
                                                                          • Runs ping.exe
                                                                          PID:3340
                                                                        • C:\Recovery\WindowsRE\spoolsv.exe
                                                                          "C:\Recovery\WindowsRE\spoolsv.exe"
                                                                          19⤵
                                                                          • Executes dropped EXE
                                                                          • Modifies registry class
                                                                          PID:3176
                                                                          • C:\Windows\System32\cmd.exe
                                                                            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\4KPDhjeqrI.bat"
                                                                            20⤵
                                                                              PID:1588
                                                                              • C:\Windows\system32\chcp.com
                                                                                chcp 65001
                                                                                21⤵
                                                                                  PID:1480
                                                                                • C:\Windows\system32\PING.EXE
                                                                                  ping -n 10 localhost
                                                                                  21⤵
                                                                                  • Runs ping.exe
                                                                                  PID:4344
                                                                                • C:\Recovery\WindowsRE\spoolsv.exe
                                                                                  "C:\Recovery\WindowsRE\spoolsv.exe"
                                                                                  21⤵
                                                                                  • Executes dropped EXE
                                                                                  • Modifies registry class
                                                                                  PID:640
                                                                                  • C:\Windows\System32\cmd.exe
                                                                                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\kSioVLOLDa.bat"
                                                                                    22⤵
                                                                                      PID:1992
                                                                                      • C:\Windows\system32\chcp.com
                                                                                        chcp 65001
                                                                                        23⤵
                                                                                          PID:2552
                                                                                        • C:\Windows\system32\PING.EXE
                                                                                          ping -n 10 localhost
                                                                                          23⤵
                                                                                          • Runs ping.exe
                                                                                          PID:68
                                                                                        • C:\Recovery\WindowsRE\spoolsv.exe
                                                                                          "C:\Recovery\WindowsRE\spoolsv.exe"
                                                                                          23⤵
                                                                                          • Executes dropped EXE
                                                                                          • Modifies registry class
                                                                                          PID:1092
                                                                                          • C:\Windows\System32\cmd.exe
                                                                                            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\GGCz4Ehy5l.bat"
                                                                                            24⤵
                                                                                              PID:428
                                                                                              • C:\Windows\system32\chcp.com
                                                                                                chcp 65001
                                                                                                25⤵
                                                                                                  PID:2900
                                                                                                • C:\Windows\system32\w32tm.exe
                                                                                                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                                  25⤵
                                                                                                    PID:4956
                                                                                                  • C:\Recovery\WindowsRE\spoolsv.exe
                                                                                                    "C:\Recovery\WindowsRE\spoolsv.exe"
                                                                                                    25⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Modifies registry class
                                                                                                    PID:4360
                                                                                                    • C:\Windows\System32\cmd.exe
                                                                                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\SA3vp411kb.bat"
                                                                                                      26⤵
                                                                                                        PID:3612
                                                                                                        • C:\Windows\system32\chcp.com
                                                                                                          chcp 65001
                                                                                                          27⤵
                                                                                                            PID:3672
                                                                                                          • C:\Windows\system32\w32tm.exe
                                                                                                            w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                                            27⤵
                                                                                                              PID:916
                                                                                                            • C:\Recovery\WindowsRE\spoolsv.exe
                                                                                                              "C:\Recovery\WindowsRE\spoolsv.exe"
                                                                                                              27⤵
                                                                                                              • Executes dropped EXE
                                                                                                              • Modifies registry class
                                                                                                              PID:1476
                                                                                                              • C:\Windows\System32\cmd.exe
                                                                                                                "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ErLL4imMUD.bat"
                                                                                                                28⤵
                                                                                                                  PID:2304
                                                                                                                  • C:\Windows\system32\chcp.com
                                                                                                                    chcp 65001
                                                                                                                    29⤵
                                                                                                                      PID:2260
                                                                                                                    • C:\Windows\system32\w32tm.exe
                                                                                                                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                                                      29⤵
                                                                                                                        PID:2012
                                                                                                                      • C:\Recovery\WindowsRE\spoolsv.exe
                                                                                                                        "C:\Recovery\WindowsRE\spoolsv.exe"
                                                                                                                        29⤵
                                                                                                                        • Executes dropped EXE
                                                                                                                        • Modifies registry class
                                                                                                                        PID:4520
                                                                                                                        • C:\Windows\System32\cmd.exe
                                                                                                                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\5VZ5DKdOSS.bat"
                                                                                                                          30⤵
                                                                                                                            PID:2348
                                                                                                                            • C:\Windows\system32\chcp.com
                                                                                                                              chcp 65001
                                                                                                                              31⤵
                                                                                                                                PID:3656
                                                                                                                              • C:\Windows\system32\w32tm.exe
                                                                                                                                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                                                                31⤵
                                                                                                                                  PID:1308
                                                                                                                                • C:\Recovery\WindowsRE\spoolsv.exe
                                                                                                                                  "C:\Recovery\WindowsRE\spoolsv.exe"
                                                                                                                                  31⤵
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • Modifies registry class
                                                                                                                                  PID:4424
                                                                                                                                  • C:\Windows\System32\cmd.exe
                                                                                                                                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\OC6cu7vKWz.bat"
                                                                                                                                    32⤵
                                                                                                                                      PID:2716
                                                                                                                                      • C:\Windows\system32\chcp.com
                                                                                                                                        chcp 65001
                                                                                                                                        33⤵
                                                                                                                                          PID:1444
                                                                                                                                        • C:\Windows\system32\w32tm.exe
                                                                                                                                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                                                                          33⤵
                                                                                                                                            PID:240
                                                                                                                                          • C:\Recovery\WindowsRE\spoolsv.exe
                                                                                                                                            "C:\Recovery\WindowsRE\spoolsv.exe"
                                                                                                                                            33⤵
                                                                                                                                            • Executes dropped EXE
                                                                                                                                            • Modifies registry class
                                                                                                                                            PID:4056
                                                                                                                                            • C:\Windows\System32\cmd.exe
                                                                                                                                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ErLL4imMUD.bat"
                                                                                                                                              34⤵
                                                                                                                                                PID:4772
                                                                                                                                                • C:\Windows\system32\chcp.com
                                                                                                                                                  chcp 65001
                                                                                                                                                  35⤵
                                                                                                                                                    PID:4928
                                                                                                                                                  • C:\Windows\system32\w32tm.exe
                                                                                                                                                    w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                                                                                    35⤵
                                                                                                                                                      PID:2180
                                                                                                                                                    • C:\Recovery\WindowsRE\spoolsv.exe
                                                                                                                                                      "C:\Recovery\WindowsRE\spoolsv.exe"
                                                                                                                                                      35⤵
                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                      • Modifies registry class
                                                                                                                                                      PID:1448
                                                                                                                                                      • C:\Windows\System32\cmd.exe
                                                                                                                                                        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\i4n06VBpBg.bat"
                                                                                                                                                        36⤵
                                                                                                                                                          PID:4476
                                                                                                                                                          • C:\Windows\system32\chcp.com
                                                                                                                                                            chcp 65001
                                                                                                                                                            37⤵
                                                                                                                                                              PID:1488
                                                                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                                                                              ping -n 10 localhost
                                                                                                                                                              37⤵
                                                                                                                                                              • Runs ping.exe
                                                                                                                                                              PID:4592
                                                                                                                                                            • C:\Recovery\WindowsRE\spoolsv.exe
                                                                                                                                                              "C:\Recovery\WindowsRE\spoolsv.exe"
                                                                                                                                                              37⤵
                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                              • Modifies registry class
                                                                                                                                                              PID:4492
                                                                                                                                                              • C:\Windows\System32\cmd.exe
                                                                                                                                                                "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\YXrskW4JYl.bat"
                                                                                                                                                                38⤵
                                                                                                                                                                  PID:3916
                                                                                                                                                                  • C:\Windows\system32\chcp.com
                                                                                                                                                                    chcp 65001
                                                                                                                                                                    39⤵
                                                                                                                                                                      PID:4388
                                                                                                                                                                    • C:\Windows\system32\w32tm.exe
                                                                                                                                                                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                                                                                                      39⤵
                                                                                                                                                                        PID:2532
                                                                                                                                                                      • C:\Recovery\WindowsRE\spoolsv.exe
                                                                                                                                                                        "C:\Recovery\WindowsRE\spoolsv.exe"
                                                                                                                                                                        39⤵
                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                        • Modifies registry class
                                                                                                                                                                        PID:4692
                                                                                                                                                                        • C:\Windows\System32\cmd.exe
                                                                                                                                                                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\0MStmnXAeg.bat"
                                                                                                                                                                          40⤵
                                                                                                                                                                            PID:2816
                                                                                                                                                                            • C:\Windows\system32\chcp.com
                                                                                                                                                                              chcp 65001
                                                                                                                                                                              41⤵
                                                                                                                                                                                PID:432
                                                                                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                                                                                ping -n 10 localhost
                                                                                                                                                                                41⤵
                                                                                                                                                                                • Runs ping.exe
                                                                                                                                                                                PID:3704
                                                                                                                                                                              • C:\Recovery\WindowsRE\spoolsv.exe
                                                                                                                                                                                "C:\Recovery\WindowsRE\spoolsv.exe"
                                                                                                                                                                                41⤵
                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                • Modifies registry class
                                                                                                                                                                                PID:996
                                                                                                                                                                                • C:\Windows\System32\cmd.exe
                                                                                                                                                                                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ZxjVk2zv8J.bat"
                                                                                                                                                                                  42⤵
                                                                                                                                                                                    PID:2876
                                                                                                                                                                                    • C:\Windows\system32\chcp.com
                                                                                                                                                                                      chcp 65001
                                                                                                                                                                                      43⤵
                                                                                                                                                                                        PID:4564
                                                                                                                                                                                      • C:\Windows\system32\PING.EXE
                                                                                                                                                                                        ping -n 10 localhost
                                                                                                                                                                                        43⤵
                                                                                                                                                                                        • Runs ping.exe
                                                                                                                                                                                        PID:4548
                                                                                                                                                                                      • C:\Recovery\WindowsRE\spoolsv.exe
                                                                                                                                                                                        "C:\Recovery\WindowsRE\spoolsv.exe"
                                                                                                                                                                                        43⤵
                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                        • Modifies registry class
                                                                                                                                                                                        PID:4420
                                                                                                                                                                                        • C:\Windows\System32\cmd.exe
                                                                                                                                                                                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\BrSCX6wbix.bat"
                                                                                                                                                                                          44⤵
                                                                                                                                                                                            PID:3652
                                                                                                                                                                                            • C:\Windows\system32\chcp.com
                                                                                                                                                                                              chcp 65001
                                                                                                                                                                                              45⤵
                                                                                                                                                                                                PID:2260
                                                                                                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                ping -n 10 localhost
                                                                                                                                                                                                45⤵
                                                                                                                                                                                                • Runs ping.exe
                                                                                                                                                                                                PID:2044
                                                                                                                                                                                              • C:\Recovery\WindowsRE\spoolsv.exe
                                                                                                                                                                                                "C:\Recovery\WindowsRE\spoolsv.exe"
                                                                                                                                                                                                45⤵
                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                • Modifies registry class
                                                                                                                                                                                                PID:404
                                                                                                                                                                                                • C:\Windows\System32\cmd.exe
                                                                                                                                                                                                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Id7nS4uU7f.bat"
                                                                                                                                                                                                  46⤵
                                                                                                                                                                                                    PID:3368
                                                                                                                                                                                                    • C:\Windows\system32\chcp.com
                                                                                                                                                                                                      chcp 65001
                                                                                                                                                                                                      47⤵
                                                                                                                                                                                                        PID:4556
                                                                                                                                                                                                      • C:\Windows\system32\w32tm.exe
                                                                                                                                                                                                        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                                                                                                                                        47⤵
                                                                                                                                                                                                          PID:3076
                                                                                                                                                                                                        • C:\Recovery\WindowsRE\spoolsv.exe
                                                                                                                                                                                                          "C:\Recovery\WindowsRE\spoolsv.exe"
                                                                                                                                                                                                          47⤵
                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                          • Modifies registry class
                                                                                                                                                                                                          PID:4308
                                                                                                                                                                                                          • C:\Windows\System32\cmd.exe
                                                                                                                                                                                                            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\SA3vp411kb.bat"
                                                                                                                                                                                                            48⤵
                                                                                                                                                                                                              PID:4976
                                                                                                                                                                                                              • C:\Windows\system32\chcp.com
                                                                                                                                                                                                                chcp 65001
                                                                                                                                                                                                                49⤵
                                                                                                                                                                                                                  PID:3348
                                                                                                                                                                                                                • C:\Windows\system32\w32tm.exe
                                                                                                                                                                                                                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                                                                                                                                                  49⤵
                                                                                                                                                                                                                    PID:4904
                                                                                                                                                                                                                  • C:\Recovery\WindowsRE\spoolsv.exe
                                                                                                                                                                                                                    "C:\Recovery\WindowsRE\spoolsv.exe"
                                                                                                                                                                                                                    49⤵
                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                    • Modifies registry class
                                                                                                                                                                                                                    PID:1740
                                                                                                                                                                                                                    • C:\Windows\System32\cmd.exe
                                                                                                                                                                                                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ylROGge0Sy.bat"
                                                                                                                                                                                                                      50⤵
                                                                                                                                                                                                                        PID:4744
                                                                                                                                                                                                                        • C:\Windows\system32\chcp.com
                                                                                                                                                                                                                          chcp 65001
                                                                                                                                                                                                                          51⤵
                                                                                                                                                                                                                            PID:1000
                                                                                                                                                                                                                          • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                            ping -n 10 localhost
                                                                                                                                                                                                                            51⤵
                                                                                                                                                                                                                            • Runs ping.exe
                                                                                                                                                                                                                            PID:3796
                                                                                                                                                                                                                          • C:\Recovery\WindowsRE\spoolsv.exe
                                                                                                                                                                                                                            "C:\Recovery\WindowsRE\spoolsv.exe"
                                                                                                                                                                                                                            51⤵
                                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                                            • Modifies registry class
                                                                                                                                                                                                                            PID:4056
                                                                                                                                                                                                                            • C:\Windows\System32\cmd.exe
                                                                                                                                                                                                                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\1lJXnITmEE.bat"
                                                                                                                                                                                                                              52⤵
                                                                                                                                                                                                                                PID:688
                                                                                                                                                                                                                                • C:\Windows\system32\chcp.com
                                                                                                                                                                                                                                  chcp 65001
                                                                                                                                                                                                                                  53⤵
                                                                                                                                                                                                                                    PID:2120
                                                                                                                                                                                                                                  • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                    ping -n 10 localhost
                                                                                                                                                                                                                                    53⤵
                                                                                                                                                                                                                                    • Runs ping.exe
                                                                                                                                                                                                                                    PID:956
                                                                                                                                                                                                                                  • C:\Recovery\WindowsRE\spoolsv.exe
                                                                                                                                                                                                                                    "C:\Recovery\WindowsRE\spoolsv.exe"
                                                                                                                                                                                                                                    53⤵
                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                    • Modifies registry class
                                                                                                                                                                                                                                    PID:2520
                                                                                                                                                                                                                                    • C:\Windows\System32\cmd.exe
                                                                                                                                                                                                                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\1lJXnITmEE.bat"
                                                                                                                                                                                                                                      54⤵
                                                                                                                                                                                                                                        PID:3488
                                                                                                                                                                                                                                        • C:\Windows\system32\chcp.com
                                                                                                                                                                                                                                          chcp 65001
                                                                                                                                                                                                                                          55⤵
                                                                                                                                                                                                                                            PID:444
                                                                                                                                                                                                                                          • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                            ping -n 10 localhost
                                                                                                                                                                                                                                            55⤵
                                                                                                                                                                                                                                            • Runs ping.exe
                                                                                                                                                                                                                                            PID:4936

                                                                                                                              Network

                                                                                                                              MITRE ATT&CK Enterprise v15

                                                                                                                              Replay Monitor

                                                                                                                              Loading Replay Monitor...

                                                                                                                              Downloads

                                                                                                                              • C:\Recovery\WindowsRE\explorer.exe

                                                                                                                                Filesize

                                                                                                                                1.7MB

                                                                                                                                MD5

                                                                                                                                1293f563c73464bc5d7f43aac04bbcd8

                                                                                                                                SHA1

                                                                                                                                2104dc4168aae58bbb281fdc0ca746cb207f50f7

                                                                                                                                SHA256

                                                                                                                                8324dd03377ae4f738b328a10f99ccb4def68ed4a4f578c4ff89bb185a16e695

                                                                                                                                SHA512

                                                                                                                                e1fe8d3d8b063adabbd5b6f3e6327a67ba0d23f6cdd82bfa954270e99a368dc8394b0d2a70caece6edd60ee09651873c3162b27e3b8e28f407021f8bee28a559

                                                                                                                              • C:\Recovery\WindowsRE\spoolsv.exe

                                                                                                                                Filesize

                                                                                                                                1.7MB

                                                                                                                                MD5

                                                                                                                                1293f563c73464bc5d7f43aac04bbcd8

                                                                                                                                SHA1

                                                                                                                                2104dc4168aae58bbb281fdc0ca746cb207f50f7

                                                                                                                                SHA256

                                                                                                                                8324dd03377ae4f738b328a10f99ccb4def68ed4a4f578c4ff89bb185a16e695

                                                                                                                                SHA512

                                                                                                                                e1fe8d3d8b063adabbd5b6f3e6327a67ba0d23f6cdd82bfa954270e99a368dc8394b0d2a70caece6edd60ee09651873c3162b27e3b8e28f407021f8bee28a559

                                                                                                                              • C:\Recovery\WindowsRE\spoolsv.exe

                                                                                                                                Filesize

                                                                                                                                1.7MB

                                                                                                                                MD5

                                                                                                                                1293f563c73464bc5d7f43aac04bbcd8

                                                                                                                                SHA1

                                                                                                                                2104dc4168aae58bbb281fdc0ca746cb207f50f7

                                                                                                                                SHA256

                                                                                                                                8324dd03377ae4f738b328a10f99ccb4def68ed4a4f578c4ff89bb185a16e695

                                                                                                                                SHA512

                                                                                                                                e1fe8d3d8b063adabbd5b6f3e6327a67ba0d23f6cdd82bfa954270e99a368dc8394b0d2a70caece6edd60ee09651873c3162b27e3b8e28f407021f8bee28a559

                                                                                                                              • C:\Recovery\WindowsRE\spoolsv.exe

                                                                                                                                Filesize

                                                                                                                                1.7MB

                                                                                                                                MD5

                                                                                                                                1293f563c73464bc5d7f43aac04bbcd8

                                                                                                                                SHA1

                                                                                                                                2104dc4168aae58bbb281fdc0ca746cb207f50f7

                                                                                                                                SHA256

                                                                                                                                8324dd03377ae4f738b328a10f99ccb4def68ed4a4f578c4ff89bb185a16e695

                                                                                                                                SHA512

                                                                                                                                e1fe8d3d8b063adabbd5b6f3e6327a67ba0d23f6cdd82bfa954270e99a368dc8394b0d2a70caece6edd60ee09651873c3162b27e3b8e28f407021f8bee28a559

                                                                                                                              • C:\Recovery\WindowsRE\spoolsv.exe

                                                                                                                                Filesize

                                                                                                                                1.7MB

                                                                                                                                MD5

                                                                                                                                1293f563c73464bc5d7f43aac04bbcd8

                                                                                                                                SHA1

                                                                                                                                2104dc4168aae58bbb281fdc0ca746cb207f50f7

                                                                                                                                SHA256

                                                                                                                                8324dd03377ae4f738b328a10f99ccb4def68ed4a4f578c4ff89bb185a16e695

                                                                                                                                SHA512

                                                                                                                                e1fe8d3d8b063adabbd5b6f3e6327a67ba0d23f6cdd82bfa954270e99a368dc8394b0d2a70caece6edd60ee09651873c3162b27e3b8e28f407021f8bee28a559

                                                                                                                              • C:\Recovery\WindowsRE\spoolsv.exe

                                                                                                                                Filesize

                                                                                                                                1.7MB

                                                                                                                                MD5

                                                                                                                                1293f563c73464bc5d7f43aac04bbcd8

                                                                                                                                SHA1

                                                                                                                                2104dc4168aae58bbb281fdc0ca746cb207f50f7

                                                                                                                                SHA256

                                                                                                                                8324dd03377ae4f738b328a10f99ccb4def68ed4a4f578c4ff89bb185a16e695

                                                                                                                                SHA512

                                                                                                                                e1fe8d3d8b063adabbd5b6f3e6327a67ba0d23f6cdd82bfa954270e99a368dc8394b0d2a70caece6edd60ee09651873c3162b27e3b8e28f407021f8bee28a559

                                                                                                                              • C:\Recovery\WindowsRE\spoolsv.exe

                                                                                                                                Filesize

                                                                                                                                1.7MB

                                                                                                                                MD5

                                                                                                                                1293f563c73464bc5d7f43aac04bbcd8

                                                                                                                                SHA1

                                                                                                                                2104dc4168aae58bbb281fdc0ca746cb207f50f7

                                                                                                                                SHA256

                                                                                                                                8324dd03377ae4f738b328a10f99ccb4def68ed4a4f578c4ff89bb185a16e695

                                                                                                                                SHA512

                                                                                                                                e1fe8d3d8b063adabbd5b6f3e6327a67ba0d23f6cdd82bfa954270e99a368dc8394b0d2a70caece6edd60ee09651873c3162b27e3b8e28f407021f8bee28a559

                                                                                                                              • C:\Recovery\WindowsRE\spoolsv.exe

                                                                                                                                Filesize

                                                                                                                                1.7MB

                                                                                                                                MD5

                                                                                                                                1293f563c73464bc5d7f43aac04bbcd8

                                                                                                                                SHA1

                                                                                                                                2104dc4168aae58bbb281fdc0ca746cb207f50f7

                                                                                                                                SHA256

                                                                                                                                8324dd03377ae4f738b328a10f99ccb4def68ed4a4f578c4ff89bb185a16e695

                                                                                                                                SHA512

                                                                                                                                e1fe8d3d8b063adabbd5b6f3e6327a67ba0d23f6cdd82bfa954270e99a368dc8394b0d2a70caece6edd60ee09651873c3162b27e3b8e28f407021f8bee28a559

                                                                                                                              • C:\Recovery\WindowsRE\spoolsv.exe

                                                                                                                                Filesize

                                                                                                                                1.7MB

                                                                                                                                MD5

                                                                                                                                1293f563c73464bc5d7f43aac04bbcd8

                                                                                                                                SHA1

                                                                                                                                2104dc4168aae58bbb281fdc0ca746cb207f50f7

                                                                                                                                SHA256

                                                                                                                                8324dd03377ae4f738b328a10f99ccb4def68ed4a4f578c4ff89bb185a16e695

                                                                                                                                SHA512

                                                                                                                                e1fe8d3d8b063adabbd5b6f3e6327a67ba0d23f6cdd82bfa954270e99a368dc8394b0d2a70caece6edd60ee09651873c3162b27e3b8e28f407021f8bee28a559

                                                                                                                              • C:\Recovery\WindowsRE\spoolsv.exe

                                                                                                                                Filesize

                                                                                                                                1.7MB

                                                                                                                                MD5

                                                                                                                                1293f563c73464bc5d7f43aac04bbcd8

                                                                                                                                SHA1

                                                                                                                                2104dc4168aae58bbb281fdc0ca746cb207f50f7

                                                                                                                                SHA256

                                                                                                                                8324dd03377ae4f738b328a10f99ccb4def68ed4a4f578c4ff89bb185a16e695

                                                                                                                                SHA512

                                                                                                                                e1fe8d3d8b063adabbd5b6f3e6327a67ba0d23f6cdd82bfa954270e99a368dc8394b0d2a70caece6edd60ee09651873c3162b27e3b8e28f407021f8bee28a559

                                                                                                                              • C:\Recovery\WindowsRE\spoolsv.exe

                                                                                                                                Filesize

                                                                                                                                1.7MB

                                                                                                                                MD5

                                                                                                                                1293f563c73464bc5d7f43aac04bbcd8

                                                                                                                                SHA1

                                                                                                                                2104dc4168aae58bbb281fdc0ca746cb207f50f7

                                                                                                                                SHA256

                                                                                                                                8324dd03377ae4f738b328a10f99ccb4def68ed4a4f578c4ff89bb185a16e695

                                                                                                                                SHA512

                                                                                                                                e1fe8d3d8b063adabbd5b6f3e6327a67ba0d23f6cdd82bfa954270e99a368dc8394b0d2a70caece6edd60ee09651873c3162b27e3b8e28f407021f8bee28a559

                                                                                                                              • C:\Recovery\WindowsRE\spoolsv.exe

                                                                                                                                Filesize

                                                                                                                                1.7MB

                                                                                                                                MD5

                                                                                                                                1293f563c73464bc5d7f43aac04bbcd8

                                                                                                                                SHA1

                                                                                                                                2104dc4168aae58bbb281fdc0ca746cb207f50f7

                                                                                                                                SHA256

                                                                                                                                8324dd03377ae4f738b328a10f99ccb4def68ed4a4f578c4ff89bb185a16e695

                                                                                                                                SHA512

                                                                                                                                e1fe8d3d8b063adabbd5b6f3e6327a67ba0d23f6cdd82bfa954270e99a368dc8394b0d2a70caece6edd60ee09651873c3162b27e3b8e28f407021f8bee28a559

                                                                                                                              • C:\Recovery\WindowsRE\spoolsv.exe

                                                                                                                                Filesize

                                                                                                                                1.7MB

                                                                                                                                MD5

                                                                                                                                1293f563c73464bc5d7f43aac04bbcd8

                                                                                                                                SHA1

                                                                                                                                2104dc4168aae58bbb281fdc0ca746cb207f50f7

                                                                                                                                SHA256

                                                                                                                                8324dd03377ae4f738b328a10f99ccb4def68ed4a4f578c4ff89bb185a16e695

                                                                                                                                SHA512

                                                                                                                                e1fe8d3d8b063adabbd5b6f3e6327a67ba0d23f6cdd82bfa954270e99a368dc8394b0d2a70caece6edd60ee09651873c3162b27e3b8e28f407021f8bee28a559

                                                                                                                              • C:\Recovery\WindowsRE\spoolsv.exe

                                                                                                                                Filesize

                                                                                                                                1.7MB

                                                                                                                                MD5

                                                                                                                                1293f563c73464bc5d7f43aac04bbcd8

                                                                                                                                SHA1

                                                                                                                                2104dc4168aae58bbb281fdc0ca746cb207f50f7

                                                                                                                                SHA256

                                                                                                                                8324dd03377ae4f738b328a10f99ccb4def68ed4a4f578c4ff89bb185a16e695

                                                                                                                                SHA512

                                                                                                                                e1fe8d3d8b063adabbd5b6f3e6327a67ba0d23f6cdd82bfa954270e99a368dc8394b0d2a70caece6edd60ee09651873c3162b27e3b8e28f407021f8bee28a559

                                                                                                                              • C:\Recovery\WindowsRE\spoolsv.exe

                                                                                                                                Filesize

                                                                                                                                1.7MB

                                                                                                                                MD5

                                                                                                                                1293f563c73464bc5d7f43aac04bbcd8

                                                                                                                                SHA1

                                                                                                                                2104dc4168aae58bbb281fdc0ca746cb207f50f7

                                                                                                                                SHA256

                                                                                                                                8324dd03377ae4f738b328a10f99ccb4def68ed4a4f578c4ff89bb185a16e695

                                                                                                                                SHA512

                                                                                                                                e1fe8d3d8b063adabbd5b6f3e6327a67ba0d23f6cdd82bfa954270e99a368dc8394b0d2a70caece6edd60ee09651873c3162b27e3b8e28f407021f8bee28a559

                                                                                                                              • C:\Recovery\WindowsRE\spoolsv.exe

                                                                                                                                Filesize

                                                                                                                                1.7MB

                                                                                                                                MD5

                                                                                                                                1293f563c73464bc5d7f43aac04bbcd8

                                                                                                                                SHA1

                                                                                                                                2104dc4168aae58bbb281fdc0ca746cb207f50f7

                                                                                                                                SHA256

                                                                                                                                8324dd03377ae4f738b328a10f99ccb4def68ed4a4f578c4ff89bb185a16e695

                                                                                                                                SHA512

                                                                                                                                e1fe8d3d8b063adabbd5b6f3e6327a67ba0d23f6cdd82bfa954270e99a368dc8394b0d2a70caece6edd60ee09651873c3162b27e3b8e28f407021f8bee28a559

                                                                                                                              • C:\Recovery\WindowsRE\spoolsv.exe

                                                                                                                                Filesize

                                                                                                                                1.7MB

                                                                                                                                MD5

                                                                                                                                1293f563c73464bc5d7f43aac04bbcd8

                                                                                                                                SHA1

                                                                                                                                2104dc4168aae58bbb281fdc0ca746cb207f50f7

                                                                                                                                SHA256

                                                                                                                                8324dd03377ae4f738b328a10f99ccb4def68ed4a4f578c4ff89bb185a16e695

                                                                                                                                SHA512

                                                                                                                                e1fe8d3d8b063adabbd5b6f3e6327a67ba0d23f6cdd82bfa954270e99a368dc8394b0d2a70caece6edd60ee09651873c3162b27e3b8e28f407021f8bee28a559

                                                                                                                              • C:\Recovery\WindowsRE\spoolsv.exe

                                                                                                                                Filesize

                                                                                                                                1.7MB

                                                                                                                                MD5

                                                                                                                                1293f563c73464bc5d7f43aac04bbcd8

                                                                                                                                SHA1

                                                                                                                                2104dc4168aae58bbb281fdc0ca746cb207f50f7

                                                                                                                                SHA256

                                                                                                                                8324dd03377ae4f738b328a10f99ccb4def68ed4a4f578c4ff89bb185a16e695

                                                                                                                                SHA512

                                                                                                                                e1fe8d3d8b063adabbd5b6f3e6327a67ba0d23f6cdd82bfa954270e99a368dc8394b0d2a70caece6edd60ee09651873c3162b27e3b8e28f407021f8bee28a559

                                                                                                                              • C:\Recovery\WindowsRE\spoolsv.exe

                                                                                                                                Filesize

                                                                                                                                1.7MB

                                                                                                                                MD5

                                                                                                                                1293f563c73464bc5d7f43aac04bbcd8

                                                                                                                                SHA1

                                                                                                                                2104dc4168aae58bbb281fdc0ca746cb207f50f7

                                                                                                                                SHA256

                                                                                                                                8324dd03377ae4f738b328a10f99ccb4def68ed4a4f578c4ff89bb185a16e695

                                                                                                                                SHA512

                                                                                                                                e1fe8d3d8b063adabbd5b6f3e6327a67ba0d23f6cdd82bfa954270e99a368dc8394b0d2a70caece6edd60ee09651873c3162b27e3b8e28f407021f8bee28a559

                                                                                                                              • C:\Recovery\WindowsRE\spoolsv.exe

                                                                                                                                Filesize

                                                                                                                                1.7MB

                                                                                                                                MD5

                                                                                                                                1293f563c73464bc5d7f43aac04bbcd8

                                                                                                                                SHA1

                                                                                                                                2104dc4168aae58bbb281fdc0ca746cb207f50f7

                                                                                                                                SHA256

                                                                                                                                8324dd03377ae4f738b328a10f99ccb4def68ed4a4f578c4ff89bb185a16e695

                                                                                                                                SHA512

                                                                                                                                e1fe8d3d8b063adabbd5b6f3e6327a67ba0d23f6cdd82bfa954270e99a368dc8394b0d2a70caece6edd60ee09651873c3162b27e3b8e28f407021f8bee28a559

                                                                                                                              • C:\Recovery\WindowsRE\spoolsv.exe

                                                                                                                                Filesize

                                                                                                                                1.7MB

                                                                                                                                MD5

                                                                                                                                1293f563c73464bc5d7f43aac04bbcd8

                                                                                                                                SHA1

                                                                                                                                2104dc4168aae58bbb281fdc0ca746cb207f50f7

                                                                                                                                SHA256

                                                                                                                                8324dd03377ae4f738b328a10f99ccb4def68ed4a4f578c4ff89bb185a16e695

                                                                                                                                SHA512

                                                                                                                                e1fe8d3d8b063adabbd5b6f3e6327a67ba0d23f6cdd82bfa954270e99a368dc8394b0d2a70caece6edd60ee09651873c3162b27e3b8e28f407021f8bee28a559

                                                                                                                              • C:\Recovery\WindowsRE\spoolsv.exe

                                                                                                                                Filesize

                                                                                                                                1.7MB

                                                                                                                                MD5

                                                                                                                                1293f563c73464bc5d7f43aac04bbcd8

                                                                                                                                SHA1

                                                                                                                                2104dc4168aae58bbb281fdc0ca746cb207f50f7

                                                                                                                                SHA256

                                                                                                                                8324dd03377ae4f738b328a10f99ccb4def68ed4a4f578c4ff89bb185a16e695

                                                                                                                                SHA512

                                                                                                                                e1fe8d3d8b063adabbd5b6f3e6327a67ba0d23f6cdd82bfa954270e99a368dc8394b0d2a70caece6edd60ee09651873c3162b27e3b8e28f407021f8bee28a559

                                                                                                                              • C:\Recovery\WindowsRE\spoolsv.exe

                                                                                                                                Filesize

                                                                                                                                1.7MB

                                                                                                                                MD5

                                                                                                                                1293f563c73464bc5d7f43aac04bbcd8

                                                                                                                                SHA1

                                                                                                                                2104dc4168aae58bbb281fdc0ca746cb207f50f7

                                                                                                                                SHA256

                                                                                                                                8324dd03377ae4f738b328a10f99ccb4def68ed4a4f578c4ff89bb185a16e695

                                                                                                                                SHA512

                                                                                                                                e1fe8d3d8b063adabbd5b6f3e6327a67ba0d23f6cdd82bfa954270e99a368dc8394b0d2a70caece6edd60ee09651873c3162b27e3b8e28f407021f8bee28a559

                                                                                                                              • C:\Recovery\WindowsRE\spoolsv.exe

                                                                                                                                Filesize

                                                                                                                                1.7MB

                                                                                                                                MD5

                                                                                                                                1293f563c73464bc5d7f43aac04bbcd8

                                                                                                                                SHA1

                                                                                                                                2104dc4168aae58bbb281fdc0ca746cb207f50f7

                                                                                                                                SHA256

                                                                                                                                8324dd03377ae4f738b328a10f99ccb4def68ed4a4f578c4ff89bb185a16e695

                                                                                                                                SHA512

                                                                                                                                e1fe8d3d8b063adabbd5b6f3e6327a67ba0d23f6cdd82bfa954270e99a368dc8394b0d2a70caece6edd60ee09651873c3162b27e3b8e28f407021f8bee28a559

                                                                                                                              • C:\Recovery\WindowsRE\spoolsv.exe

                                                                                                                                Filesize

                                                                                                                                1.7MB

                                                                                                                                MD5

                                                                                                                                1293f563c73464bc5d7f43aac04bbcd8

                                                                                                                                SHA1

                                                                                                                                2104dc4168aae58bbb281fdc0ca746cb207f50f7

                                                                                                                                SHA256

                                                                                                                                8324dd03377ae4f738b328a10f99ccb4def68ed4a4f578c4ff89bb185a16e695

                                                                                                                                SHA512

                                                                                                                                e1fe8d3d8b063adabbd5b6f3e6327a67ba0d23f6cdd82bfa954270e99a368dc8394b0d2a70caece6edd60ee09651873c3162b27e3b8e28f407021f8bee28a559

                                                                                                                              • C:\Recovery\WindowsRE\spoolsv.exe

                                                                                                                                Filesize

                                                                                                                                1.7MB

                                                                                                                                MD5

                                                                                                                                1293f563c73464bc5d7f43aac04bbcd8

                                                                                                                                SHA1

                                                                                                                                2104dc4168aae58bbb281fdc0ca746cb207f50f7

                                                                                                                                SHA256

                                                                                                                                8324dd03377ae4f738b328a10f99ccb4def68ed4a4f578c4ff89bb185a16e695

                                                                                                                                SHA512

                                                                                                                                e1fe8d3d8b063adabbd5b6f3e6327a67ba0d23f6cdd82bfa954270e99a368dc8394b0d2a70caece6edd60ee09651873c3162b27e3b8e28f407021f8bee28a559

                                                                                                                              • C:\Recovery\WindowsRE\spoolsv.exe

                                                                                                                                Filesize

                                                                                                                                1.7MB

                                                                                                                                MD5

                                                                                                                                1293f563c73464bc5d7f43aac04bbcd8

                                                                                                                                SHA1

                                                                                                                                2104dc4168aae58bbb281fdc0ca746cb207f50f7

                                                                                                                                SHA256

                                                                                                                                8324dd03377ae4f738b328a10f99ccb4def68ed4a4f578c4ff89bb185a16e695

                                                                                                                                SHA512

                                                                                                                                e1fe8d3d8b063adabbd5b6f3e6327a67ba0d23f6cdd82bfa954270e99a368dc8394b0d2a70caece6edd60ee09651873c3162b27e3b8e28f407021f8bee28a559

                                                                                                                              • C:\Recovery\WindowsRE\spoolsv.exe

                                                                                                                                Filesize

                                                                                                                                1.7MB

                                                                                                                                MD5

                                                                                                                                1293f563c73464bc5d7f43aac04bbcd8

                                                                                                                                SHA1

                                                                                                                                2104dc4168aae58bbb281fdc0ca746cb207f50f7

                                                                                                                                SHA256

                                                                                                                                8324dd03377ae4f738b328a10f99ccb4def68ed4a4f578c4ff89bb185a16e695

                                                                                                                                SHA512

                                                                                                                                e1fe8d3d8b063adabbd5b6f3e6327a67ba0d23f6cdd82bfa954270e99a368dc8394b0d2a70caece6edd60ee09651873c3162b27e3b8e28f407021f8bee28a559

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                                Filesize

                                                                                                                                3KB

                                                                                                                                MD5

                                                                                                                                ad5cd538ca58cb28ede39c108acb5785

                                                                                                                                SHA1

                                                                                                                                1ae910026f3dbe90ed025e9e96ead2b5399be877

                                                                                                                                SHA256

                                                                                                                                c9e6cb04d6c893458d5a7e12eb575cf97c3172f5e312b1f63a667cbbc5f0c033

                                                                                                                                SHA512

                                                                                                                                c066c5d9b276a68fa636647bb29aea05bfa2292217bc77f5324d9c1d93117772ee8277e1f7cff91ec8d6b7c05ca078f929cecfdbb09582522a9067f54740af13

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\spoolsv.exe.log

                                                                                                                                Filesize

                                                                                                                                1KB

                                                                                                                                MD5

                                                                                                                                d9fbbda32f03209ae8e2d8e1ce595b32

                                                                                                                                SHA1

                                                                                                                                04996e2efdd89a0a7f5172690f96d34abe28ccc6

                                                                                                                                SHA256

                                                                                                                                d3f038da27a23a26f88df2466c10c4a846acfdbb323987d5cdd235ade8c16a60

                                                                                                                                SHA512

                                                                                                                                5ff8493732d18f6439e548a8149d291e619ad98d4d2280367add07e8fcf38d55803bf2396dba897a239ae0ed1455b157f3a7f827432196c52bc94c5f4154db6e

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                Filesize

                                                                                                                                1KB

                                                                                                                                MD5

                                                                                                                                00a91c4c518cfebfbe24e490abe0f129

                                                                                                                                SHA1

                                                                                                                                3a3d1d53a8123b0fa1ba8d3a69cd64e9ee88cb2f

                                                                                                                                SHA256

                                                                                                                                5e806ed47f1895831dd1c9e3fd93050dd50125330ffb2630d18e70dafaa4a211

                                                                                                                                SHA512

                                                                                                                                5189418607936fc322b041f6db7fc823d764fadac61fc3615a64f173721cc789162002bf5a55cd4a8ad947d9b5fc5ea6ccf707525ea6e84336b37e8f0fe7fc5b

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                Filesize

                                                                                                                                1KB

                                                                                                                                MD5

                                                                                                                                00a91c4c518cfebfbe24e490abe0f129

                                                                                                                                SHA1

                                                                                                                                3a3d1d53a8123b0fa1ba8d3a69cd64e9ee88cb2f

                                                                                                                                SHA256

                                                                                                                                5e806ed47f1895831dd1c9e3fd93050dd50125330ffb2630d18e70dafaa4a211

                                                                                                                                SHA512

                                                                                                                                5189418607936fc322b041f6db7fc823d764fadac61fc3615a64f173721cc789162002bf5a55cd4a8ad947d9b5fc5ea6ccf707525ea6e84336b37e8f0fe7fc5b

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                Filesize

                                                                                                                                1KB

                                                                                                                                MD5

                                                                                                                                00a91c4c518cfebfbe24e490abe0f129

                                                                                                                                SHA1

                                                                                                                                3a3d1d53a8123b0fa1ba8d3a69cd64e9ee88cb2f

                                                                                                                                SHA256

                                                                                                                                5e806ed47f1895831dd1c9e3fd93050dd50125330ffb2630d18e70dafaa4a211

                                                                                                                                SHA512

                                                                                                                                5189418607936fc322b041f6db7fc823d764fadac61fc3615a64f173721cc789162002bf5a55cd4a8ad947d9b5fc5ea6ccf707525ea6e84336b37e8f0fe7fc5b

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                Filesize

                                                                                                                                1KB

                                                                                                                                MD5

                                                                                                                                ddc4b761ab37538f567dad4fae73d0da

                                                                                                                                SHA1

                                                                                                                                29502c980623baceb9778203d7fa1cfd5dde6b9b

                                                                                                                                SHA256

                                                                                                                                cc3fdf4e38f129ff82444e0a530dd32a88dfbe135cb6c4397db12a0dca9c59d6

                                                                                                                                SHA512

                                                                                                                                717832d1474d9cf0d3172834d6d86b52c82bb2e5eb9d68ab680df6a2b8ede7c40d5c68cdae77cf88dc04ce402ecd92ea6a2bce518dae4d980b7b423825470538

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\0MStmnXAeg.bat

                                                                                                                                Filesize

                                                                                                                                161B

                                                                                                                                MD5

                                                                                                                                325a9eeb182bc5938d1f6508e711a3e8

                                                                                                                                SHA1

                                                                                                                                135df9863f9cf3c4306058ee6785bc5d64c96796

                                                                                                                                SHA256

                                                                                                                                cc89b367828f84db4712c991a18d622110c3dcbad8ec09ce7d8d796748dc12a7

                                                                                                                                SHA512

                                                                                                                                cf68f903fc561abcebad448b2cbb13f8ec2e0a5621a3c020115ac12fe09200d1ad0285f6b8815b3cfabd0027f8cf1b8dc7525ab7eb16df173d24005b46ea3cf9

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1ZNGF7YCFm.bat

                                                                                                                                Filesize

                                                                                                                                161B

                                                                                                                                MD5

                                                                                                                                d0e4bd80d63285a3de50e42d4da71202

                                                                                                                                SHA1

                                                                                                                                5ee64fd65ec8abc219b85177ae9ffe53bb0798ec

                                                                                                                                SHA256

                                                                                                                                7555c30667cc438b6282e5d27b91c103a23c2df7d333ae8f9651001540ed76b8

                                                                                                                                SHA512

                                                                                                                                d20b4f54853bcee57dee4857d36b3029345f1cff990de45a70a57a48b114aa78bcd607291de5d99cd7bbd321a22e7ccf694df319123b62333754c1feb67c5181

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1lJXnITmEE.bat

                                                                                                                                Filesize

                                                                                                                                161B

                                                                                                                                MD5

                                                                                                                                f48609051160043587fa3ea22aa5ab4c

                                                                                                                                SHA1

                                                                                                                                a401bdaed291e70706e489e77f70adf46e638e83

                                                                                                                                SHA256

                                                                                                                                5cd0716432878badb8ded371ad55ab1702b5dba23b7d2475eaede431589a761d

                                                                                                                                SHA512

                                                                                                                                ba7421fd57946c7976c739843ada9f46f4579b4df1d9256fe920901c753d80444454579d2b3707b05a05a7bb4465bd319d7857453b5fdf4429c83381e74c64fc

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1lJXnITmEE.bat

                                                                                                                                Filesize

                                                                                                                                161B

                                                                                                                                MD5

                                                                                                                                f48609051160043587fa3ea22aa5ab4c

                                                                                                                                SHA1

                                                                                                                                a401bdaed291e70706e489e77f70adf46e638e83

                                                                                                                                SHA256

                                                                                                                                5cd0716432878badb8ded371ad55ab1702b5dba23b7d2475eaede431589a761d

                                                                                                                                SHA512

                                                                                                                                ba7421fd57946c7976c739843ada9f46f4579b4df1d9256fe920901c753d80444454579d2b3707b05a05a7bb4465bd319d7857453b5fdf4429c83381e74c64fc

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1lJXnITmEE.bat

                                                                                                                                Filesize

                                                                                                                                161B

                                                                                                                                MD5

                                                                                                                                f48609051160043587fa3ea22aa5ab4c

                                                                                                                                SHA1

                                                                                                                                a401bdaed291e70706e489e77f70adf46e638e83

                                                                                                                                SHA256

                                                                                                                                5cd0716432878badb8ded371ad55ab1702b5dba23b7d2475eaede431589a761d

                                                                                                                                SHA512

                                                                                                                                ba7421fd57946c7976c739843ada9f46f4579b4df1d9256fe920901c753d80444454579d2b3707b05a05a7bb4465bd319d7857453b5fdf4429c83381e74c64fc

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1lJXnITmEE.bat

                                                                                                                                Filesize

                                                                                                                                161B

                                                                                                                                MD5

                                                                                                                                f48609051160043587fa3ea22aa5ab4c

                                                                                                                                SHA1

                                                                                                                                a401bdaed291e70706e489e77f70adf46e638e83

                                                                                                                                SHA256

                                                                                                                                5cd0716432878badb8ded371ad55ab1702b5dba23b7d2475eaede431589a761d

                                                                                                                                SHA512

                                                                                                                                ba7421fd57946c7976c739843ada9f46f4579b4df1d9256fe920901c753d80444454579d2b3707b05a05a7bb4465bd319d7857453b5fdf4429c83381e74c64fc

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\4KPDhjeqrI.bat

                                                                                                                                Filesize

                                                                                                                                161B

                                                                                                                                MD5

                                                                                                                                95dab7efd42cc460a28ac5f85f5e58d0

                                                                                                                                SHA1

                                                                                                                                388aee9614a7e7a3a21f0a3cc9e1dd4401632e54

                                                                                                                                SHA256

                                                                                                                                760f6259cb9c1ec23bbee10c8968bd918ec6cdd8c31dce74d9dbfdf10a175264

                                                                                                                                SHA512

                                                                                                                                90346798634feb156b13133e9a469f092bee64bfe533e397de53f782f19b23a09edbd0492a7faadf5eb5a8037eaa4a64610e217e1bddebe37c9f6029fc48b34f

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\5VZ5DKdOSS.bat

                                                                                                                                Filesize

                                                                                                                                209B

                                                                                                                                MD5

                                                                                                                                38f987bb3d72239900313197d4634027

                                                                                                                                SHA1

                                                                                                                                750590b2ad8ef0baa7cd4fe2d9dbb6f047fed218

                                                                                                                                SHA256

                                                                                                                                178106e4e1106bb0e6bd5b49db7db1452a21e5f724f9457056a8e39181e6a6c7

                                                                                                                                SHA512

                                                                                                                                ee993374d1e8716a48cd8d503aa6013ecffc8ec472958dae72855a29a2084881685a1c9280a070e9b4e35c969253007cc7af7b3b9d35cf0fd8a047b0dfc13a36

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\9TWO8Gj4g3.bat

                                                                                                                                Filesize

                                                                                                                                209B

                                                                                                                                MD5

                                                                                                                                e8066b577c2aac2c972faafe1304be81

                                                                                                                                SHA1

                                                                                                                                3a70bed40bcef41d09ae20b562df1788c3629fb7

                                                                                                                                SHA256

                                                                                                                                21a60c43b4f12da684d839a2d9b88168b6bf1dfd2c56bbbaea02aa9fb31c6ee4

                                                                                                                                SHA512

                                                                                                                                32cc99a16cf7321b63c8474aabaf74e7450e47ba36960a43be01469ae72694a26e4a932d69d165d1c19ff249b41bd56ff03151467732fcfbb5136c1147f74a78

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\9j9zErPDE6.bat

                                                                                                                                Filesize

                                                                                                                                209B

                                                                                                                                MD5

                                                                                                                                785f18ee7e2fa3ed7b994665db2a93e1

                                                                                                                                SHA1

                                                                                                                                bb11638b64114a6eb376b4d347b4b6ee04f20aeb

                                                                                                                                SHA256

                                                                                                                                3e5023eb51b320fc3126bdb1b1e2c74aa43ca2c9b9719e3528a1205624bb99c4

                                                                                                                                SHA512

                                                                                                                                ab90d36d6c3c4af9d28aff3accc2381909fb1c84f529b4fec74cf3dd8f4527e0cb8ae48b78ca87781a42bff7e6163922926acdaf507f3f4eac41eadc2cacb67e

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\BrSCX6wbix.bat

                                                                                                                                Filesize

                                                                                                                                161B

                                                                                                                                MD5

                                                                                                                                35dafc5397cf23e0d9402d89b92cc502

                                                                                                                                SHA1

                                                                                                                                05d9b493b467b0f1bd79db3cc188d63518fd62a8

                                                                                                                                SHA256

                                                                                                                                5e72cc66211c4537dcd711192cf0080348ba28970c8e9019285701bbe9697b8f

                                                                                                                                SHA512

                                                                                                                                0222c1a16f62c546a3d60de70ea9bbef39c0398b4d0532e53ea653b448f581316d38c683497ae8e17167cb66e8b2604ae59ade266757cedef70fd6cf24407fb6

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\ErLL4imMUD.bat

                                                                                                                                Filesize

                                                                                                                                209B

                                                                                                                                MD5

                                                                                                                                1f47adc83309335997a2392b0501b51a

                                                                                                                                SHA1

                                                                                                                                fa754454981c7636c04f5bc023772d97fcedb4b9

                                                                                                                                SHA256

                                                                                                                                044d47c66a5c78b19d62120b71e3a6f4de430373b3e6b5c5027f6626c1d76256

                                                                                                                                SHA512

                                                                                                                                6fd3754e4b07bb81bb57fa8c6b99c1aa954fc10abfa3d1a761468b4a16e5745f0c91afe62ae20f725f13792b6990953702a4ed8c2519694f66f2d5b2c0db08c2

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\ErLL4imMUD.bat

                                                                                                                                Filesize

                                                                                                                                209B

                                                                                                                                MD5

                                                                                                                                1f47adc83309335997a2392b0501b51a

                                                                                                                                SHA1

                                                                                                                                fa754454981c7636c04f5bc023772d97fcedb4b9

                                                                                                                                SHA256

                                                                                                                                044d47c66a5c78b19d62120b71e3a6f4de430373b3e6b5c5027f6626c1d76256

                                                                                                                                SHA512

                                                                                                                                6fd3754e4b07bb81bb57fa8c6b99c1aa954fc10abfa3d1a761468b4a16e5745f0c91afe62ae20f725f13792b6990953702a4ed8c2519694f66f2d5b2c0db08c2

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\ErLL4imMUD.bat

                                                                                                                                Filesize

                                                                                                                                209B

                                                                                                                                MD5

                                                                                                                                1f47adc83309335997a2392b0501b51a

                                                                                                                                SHA1

                                                                                                                                fa754454981c7636c04f5bc023772d97fcedb4b9

                                                                                                                                SHA256

                                                                                                                                044d47c66a5c78b19d62120b71e3a6f4de430373b3e6b5c5027f6626c1d76256

                                                                                                                                SHA512

                                                                                                                                6fd3754e4b07bb81bb57fa8c6b99c1aa954fc10abfa3d1a761468b4a16e5745f0c91afe62ae20f725f13792b6990953702a4ed8c2519694f66f2d5b2c0db08c2

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\ErLL4imMUD.bat

                                                                                                                                Filesize

                                                                                                                                209B

                                                                                                                                MD5

                                                                                                                                1f47adc83309335997a2392b0501b51a

                                                                                                                                SHA1

                                                                                                                                fa754454981c7636c04f5bc023772d97fcedb4b9

                                                                                                                                SHA256

                                                                                                                                044d47c66a5c78b19d62120b71e3a6f4de430373b3e6b5c5027f6626c1d76256

                                                                                                                                SHA512

                                                                                                                                6fd3754e4b07bb81bb57fa8c6b99c1aa954fc10abfa3d1a761468b4a16e5745f0c91afe62ae20f725f13792b6990953702a4ed8c2519694f66f2d5b2c0db08c2

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\GGCz4Ehy5l.bat

                                                                                                                                Filesize

                                                                                                                                209B

                                                                                                                                MD5

                                                                                                                                f8a34b4f073893838a20fae04e46b0c7

                                                                                                                                SHA1

                                                                                                                                a8169391845562d9b126c3b792708c63b718e4ee

                                                                                                                                SHA256

                                                                                                                                b206746ac016f31759c3988de951f5d42a7c56bf5085b8e5d21239e55a7fcb9a

                                                                                                                                SHA512

                                                                                                                                19582f0564944774a80e0ea548b467549dd342a0d95bcc78a90559fdd348acaf35e4a3eebb42728cd039598986c77d7b03054a0764f60dc0a7c5d482ef7ce8ff

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Hf3c4kdafJ.bat

                                                                                                                                Filesize

                                                                                                                                209B

                                                                                                                                MD5

                                                                                                                                0245c4778aa68b0e3e5badee6276ef4b

                                                                                                                                SHA1

                                                                                                                                1033b403b4d595588c44210c4ce091a6d97d5006

                                                                                                                                SHA256

                                                                                                                                a853bc572db7fae5c9243b4a20d1d7d7578a88935559fa47ba9e8bbd575f5a14

                                                                                                                                SHA512

                                                                                                                                b54e0ff4768e09601e9e8faca7eca08b8fb3c8c67e78118b9eda555da46a20bc2716b2e9df92f0a5ec91bbd40623d4dd7047f027029c85a65021cec1e43911f3

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Id7nS4uU7f.bat

                                                                                                                                Filesize

                                                                                                                                209B

                                                                                                                                MD5

                                                                                                                                0228cd11d2b1fe2ee32cc2e79b236fe6

                                                                                                                                SHA1

                                                                                                                                c1e2ed744a991db1de601ead75812e4c153273d6

                                                                                                                                SHA256

                                                                                                                                69512e1a03e0c0204c20fe8894071e335f77a1daa0b1fbcd31d90f0ae01e26a1

                                                                                                                                SHA512

                                                                                                                                d7d2082b3dc0e53db376ecb247460208605b90eb0f3c7e296114bf99c80f725b37f0a2357e77377eb8df4351040c19adeb48ff7f8bb4c5caeeddf1da74f197a4

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\OC6cu7vKWz.bat

                                                                                                                                Filesize

                                                                                                                                209B

                                                                                                                                MD5

                                                                                                                                e931aad93c1ee25d52b5fd83ee92264e

                                                                                                                                SHA1

                                                                                                                                4eac11fe81b777a6d3c9bef71c1ae3f28f9eb9de

                                                                                                                                SHA256

                                                                                                                                b7a7cbdd55171a82c6297fce0fb959b41054dfa1027451358516fea1c03cb9d0

                                                                                                                                SHA512

                                                                                                                                cda6c162c23c152ebf3dbfaf902d45ad30e6468d8aba1e53fe542876e640cffd47c91818cdf7d26a683e7a71f0a25c174f727d6e383ee45b192f2f5728ac8234

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\SA3vp411kb.bat

                                                                                                                                Filesize

                                                                                                                                209B

                                                                                                                                MD5

                                                                                                                                5057405e97c6f207a4d56c4f30381c7f

                                                                                                                                SHA1

                                                                                                                                8982290bb88e420d364251412e7eb20bf7eb1eab

                                                                                                                                SHA256

                                                                                                                                cdcd112e765720ca25d1c528ab7c8c19712e0c14a2769a6f6514f83f0b309030

                                                                                                                                SHA512

                                                                                                                                2a80a0e885eceec4987c98aad2677ddcd78f791171f3cb67f5901abe6f607b149a8af2c4676117fc0e7d776033557e3c9c2744e8d809bc88db0e547f8bdf1ad3

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\SA3vp411kb.bat

                                                                                                                                Filesize

                                                                                                                                209B

                                                                                                                                MD5

                                                                                                                                5057405e97c6f207a4d56c4f30381c7f

                                                                                                                                SHA1

                                                                                                                                8982290bb88e420d364251412e7eb20bf7eb1eab

                                                                                                                                SHA256

                                                                                                                                cdcd112e765720ca25d1c528ab7c8c19712e0c14a2769a6f6514f83f0b309030

                                                                                                                                SHA512

                                                                                                                                2a80a0e885eceec4987c98aad2677ddcd78f791171f3cb67f5901abe6f607b149a8af2c4676117fc0e7d776033557e3c9c2744e8d809bc88db0e547f8bdf1ad3

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\W80Ek08hxD.bat

                                                                                                                                Filesize

                                                                                                                                209B

                                                                                                                                MD5

                                                                                                                                62c8f9fd215ccd2a65acbd7b3e52a9a4

                                                                                                                                SHA1

                                                                                                                                4e1a676abd88d0517a8b2eaac2d18bfb54ca3e14

                                                                                                                                SHA256

                                                                                                                                4299e14cd88a7536948abacaea7db7388122b12e562dff8fa2d3b0e23e518f98

                                                                                                                                SHA512

                                                                                                                                d4b93703c22e17f98afc395c53f8de7ba41b06fa55306c3855ce2a503ae7bed13830960a86954f7d5f7877be0500c1d17ee3eec0b058beee764a1e3e7cc31947

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\YXrskW4JYl.bat

                                                                                                                                Filesize

                                                                                                                                209B

                                                                                                                                MD5

                                                                                                                                5cbc157ef3aad358baf8f7f996d58488

                                                                                                                                SHA1

                                                                                                                                b061a743db47912ad34c4ba94564b4544cd3b417

                                                                                                                                SHA256

                                                                                                                                8b124fa89297c62fd6dab0f6cd3e6300a1408760f65a117a497e2d781bbf4b88

                                                                                                                                SHA512

                                                                                                                                1fb17f37665d5224f3d9aac4ef7ed644e8768ed3304a7498f6b397cdfce5291f83e988e0e46d0425907019d31d4c47c3c2785caf84166e20eada8beb2fcb8c77

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\ZxjVk2zv8J.bat

                                                                                                                                Filesize

                                                                                                                                161B

                                                                                                                                MD5

                                                                                                                                ba881e915eeaa272c24243ddf3d61d21

                                                                                                                                SHA1

                                                                                                                                6847c81ad917347c3b21eea19c7aebc8be4c6a03

                                                                                                                                SHA256

                                                                                                                                bdb0c6230cd60430ca4eac6a3ad89c8af5c8c40da2f6f06307632c0433527248

                                                                                                                                SHA512

                                                                                                                                39e30ac8cf373c42e1cf5aa9bf062c3fe9c89a7b852b7d0ae3c090225970eb86542c8b2e042bfccb4e03a9a19ca2a1c8e7123b2b87ed1e63a6364a66bf1207b0

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_lt3iyc43.thi.ps1

                                                                                                                                Filesize

                                                                                                                                1B

                                                                                                                                MD5

                                                                                                                                c4ca4238a0b923820dcc509a6f75849b

                                                                                                                                SHA1

                                                                                                                                356a192b7913b04c54574d18c28d46e6395428ab

                                                                                                                                SHA256

                                                                                                                                6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

                                                                                                                                SHA512

                                                                                                                                4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\b6xYfwFNBo.bat

                                                                                                                                Filesize

                                                                                                                                209B

                                                                                                                                MD5

                                                                                                                                fac768d3ff9457e10c53abd32ccffee8

                                                                                                                                SHA1

                                                                                                                                ebe3a99272fc3cec879dcc78400471b56efbbbe2

                                                                                                                                SHA256

                                                                                                                                0b266443ee856a0dcd5b220212e3f52a83776a01bcbd8037c5ce0193a0752d18

                                                                                                                                SHA512

                                                                                                                                e5de0cf48792f525c2a4982b464f15941f32ade1bddc77471b1e434a8dc33911eb6f80ec11cf319cf07b5b955a77472fe65b86a575f937dde56261726082da7b

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\i4n06VBpBg.bat

                                                                                                                                Filesize

                                                                                                                                161B

                                                                                                                                MD5

                                                                                                                                0dbaf1ac2a48f8da0d5ed860acbc532e

                                                                                                                                SHA1

                                                                                                                                1d86ade65aafec62302496145ab5eb7d2b928b36

                                                                                                                                SHA256

                                                                                                                                7b20a57688e67a5bd0be74d9dabf3366f45e74ac15a6770a9dfd05d400d797b2

                                                                                                                                SHA512

                                                                                                                                6c5eb57227f57fb276fe0a4ac53aa600aaebaabca88f6e46f0bec3dc77be9722f22631ae8cfe33005468337dcdad40d456c0a9e6db5c34695594e6015836574e

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\kSioVLOLDa.bat

                                                                                                                                Filesize

                                                                                                                                161B

                                                                                                                                MD5

                                                                                                                                bad3beb8b46b036a565bcfefcbc97721

                                                                                                                                SHA1

                                                                                                                                8ac4ebd07afa4540ef84fb513188dc42fe081889

                                                                                                                                SHA256

                                                                                                                                bdcfd4eb7439461ae759c6764d1a470c61b4a83099b4ad3fbf07a346025527c1

                                                                                                                                SHA512

                                                                                                                                58407037aa0788b027cf97ada1b89dcdbbe15c76128c236ee17867025eaa08576a04f09df912ee1653de9468130bb9c65ededb46a1b444c8930991338e2cf735

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\ldsg1wMtok.bat

                                                                                                                                Filesize

                                                                                                                                161B

                                                                                                                                MD5

                                                                                                                                7d2b91725222dec6f664b4c108cbcf26

                                                                                                                                SHA1

                                                                                                                                8deb6b8be50f9faebef0f5e74633050e25ead9a7

                                                                                                                                SHA256

                                                                                                                                43308551cc7c1a4dde8c4c3d063cc8a42beb158feda83a379ec32883d6e064fe

                                                                                                                                SHA512

                                                                                                                                6bc2d576a24bc59c7c47ef87d4d9f94fd288acb96a62aa86693c6baa28d11d3772a2d2d05268d5a29d3ac764beab7ef1bff8ff2be413a232a2a2c5285b8b8634

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\ylROGge0Sy.bat

                                                                                                                                Filesize

                                                                                                                                161B

                                                                                                                                MD5

                                                                                                                                c4260a4d1c2c1b6e2055893b724f9a4e

                                                                                                                                SHA1

                                                                                                                                08113fa1500987f922a0757f8a536aa4563cda10

                                                                                                                                SHA256

                                                                                                                                2482c550f8ee8b45313a30973e8760e4cf98ec0bb90f58244b3fc3ebdd245cfb

                                                                                                                                SHA512

                                                                                                                                0dbbdc4cd4b8036c28fac28035d10ce17add54c20845c02b4079951b8f18a458e7d94b8ab91b851613f9995303888fa2f46519e7bb612de4e529774bd19e799c

                                                                                                                              • memory/2184-80-0x00007FF9FAA80000-0x00007FF9FB46C000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                9.9MB

                                                                                                                              • memory/2184-279-0x00007FF9FAA80000-0x00007FF9FB46C000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                9.9MB

                                                                                                                              • memory/2184-67-0x000001C84C900000-0x000001C84C910000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                64KB

                                                                                                                              • memory/2184-173-0x000001C84C900000-0x000001C84C910000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                64KB

                                                                                                                              • memory/2184-251-0x000001C84C900000-0x000001C84C910000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                64KB

                                                                                                                              • memory/2184-66-0x000001C84C900000-0x000001C84C910000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                64KB

                                                                                                                              • memory/2264-8-0x0000000003050000-0x000000000305E000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                56KB

                                                                                                                              • memory/2264-12-0x00007FFA0A770000-0x00007FFA0A771000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/2264-55-0x00007FF9FAA80000-0x00007FF9FB46C000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                9.9MB

                                                                                                                              • memory/2264-1-0x00007FF9FAA80000-0x00007FF9FB46C000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                9.9MB

                                                                                                                              • memory/2264-3-0x000000001BB70000-0x000000001BB80000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                64KB

                                                                                                                              • memory/2264-2-0x0000000001620000-0x0000000001621000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/2264-4-0x000000001BB70000-0x000000001BB80000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                64KB

                                                                                                                              • memory/2264-0-0x0000000000CE0000-0x0000000000EA0000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                1.8MB

                                                                                                                              • memory/2264-33-0x00007FF9FAA80000-0x00007FF9FB46C000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                9.9MB

                                                                                                                              • memory/2264-5-0x000000001BB70000-0x000000001BB80000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                64KB

                                                                                                                              • memory/2264-17-0x0000000003090000-0x000000000309C000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                48KB

                                                                                                                              • memory/2264-15-0x00007FFA0A760000-0x00007FFA0A761000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/2264-6-0x00007FFA0A790000-0x00007FFA0A791000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/2264-14-0x0000000003070000-0x000000000307C000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                48KB

                                                                                                                              • memory/2264-10-0x0000000003060000-0x000000000306E000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                56KB

                                                                                                                              • memory/2264-11-0x00007FFA0A780000-0x00007FFA0A781000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/2636-291-0x0000000000BB0000-0x0000000000BB1000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/2636-290-0x000000001B0A0000-0x000000001B0B0000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                64KB

                                                                                                                              • memory/2636-297-0x00007FFA0A780000-0x00007FFA0A781000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/2636-295-0x00007FFA0A790000-0x00007FFA0A791000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/2636-301-0x00007FFA0A760000-0x00007FFA0A761000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/2636-299-0x00007FFA0A770000-0x00007FFA0A771000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/2636-294-0x000000001B0A0000-0x000000001B0B0000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                64KB

                                                                                                                              • memory/2636-308-0x00007FF9FAA80000-0x00007FF9FB46C000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                9.9MB

                                                                                                                              • memory/2636-292-0x000000001B0A0000-0x000000001B0B0000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                64KB

                                                                                                                              • memory/2636-289-0x00007FF9FAA80000-0x00007FF9FB46C000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                9.9MB

                                                                                                                              • memory/2812-154-0x000002563A640000-0x000002563A650000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                64KB

                                                                                                                              • memory/2812-45-0x00007FF9FAA80000-0x00007FF9FB46C000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                9.9MB

                                                                                                                              • memory/2812-263-0x00007FF9FAA80000-0x00007FF9FB46C000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                9.9MB

                                                                                                                              • memory/2812-284-0x00007FF9FAA80000-0x00007FF9FB46C000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                9.9MB

                                                                                                                              • memory/2812-61-0x000002563A640000-0x000002563A650000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                64KB

                                                                                                                              • memory/2812-65-0x000002563A640000-0x000002563A650000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                64KB

                                                                                                                              • memory/2812-257-0x000002563A640000-0x000002563A650000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                64KB

                                                                                                                              • memory/3076-56-0x00007FF9FAA80000-0x00007FF9FB46C000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                9.9MB

                                                                                                                              • memory/3076-63-0x00000253BE2D0000-0x00000253BE2E0000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                64KB

                                                                                                                              • memory/3076-62-0x00000253BE2D0000-0x00000253BE2E0000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                64KB

                                                                                                                              • memory/3076-264-0x00000253BE2D0000-0x00000253BE2E0000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                64KB

                                                                                                                              • memory/3076-163-0x00000253BE2D0000-0x00000253BE2E0000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                64KB

                                                                                                                              • memory/3076-285-0x00007FF9FAA80000-0x00007FF9FB46C000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                9.9MB

                                                                                                                              • memory/3732-160-0x00000208C77E0000-0x00000208C77F0000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                64KB

                                                                                                                              • memory/3732-278-0x00007FF9FAA80000-0x00007FF9FB46C000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                9.9MB

                                                                                                                              • memory/3732-60-0x00000208C77E0000-0x00000208C77F0000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                64KB

                                                                                                                              • memory/3732-254-0x00000208C77E0000-0x00000208C77F0000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                64KB

                                                                                                                              • memory/3732-70-0x00007FF9FAA80000-0x00007FF9FB46C000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                9.9MB

                                                                                                                              • memory/3732-83-0x00000208C77E0000-0x00000208C77F0000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                64KB

                                                                                                                              • memory/4148-313-0x0000000001790000-0x0000000001791000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/4148-314-0x000000001BCD0000-0x000000001BCE0000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                64KB

                                                                                                                              • memory/4148-312-0x000000001BCD0000-0x000000001BCE0000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                64KB

                                                                                                                              • memory/4148-311-0x00007FF9FAA80000-0x00007FF9FB46C000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                9.9MB

                                                                                                                              • memory/4396-71-0x0000021D49CD0000-0x0000021D49D46000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                472KB

                                                                                                                              • memory/4396-262-0x0000021D31740000-0x0000021D31750000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                64KB

                                                                                                                              • memory/4396-261-0x00007FF9FAA80000-0x00007FF9FB46C000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                9.9MB

                                                                                                                              • memory/4396-280-0x00007FF9FAA80000-0x00007FF9FB46C000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                9.9MB

                                                                                                                              • memory/4396-119-0x0000021D31740000-0x0000021D31750000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                64KB

                                                                                                                              • memory/4396-37-0x00007FF9FAA80000-0x00007FF9FB46C000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                9.9MB

                                                                                                                              • memory/4396-64-0x0000021D49B10000-0x0000021D49B32000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                136KB

                                                                                                                              • memory/4396-58-0x0000021D31740000-0x0000021D31750000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                64KB

                                                                                                                              • memory/4396-59-0x0000021D31740000-0x0000021D31750000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                64KB