Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    146s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22/12/2024, 10:03 UTC

General

  • Target

    JaffaCakes118_1dcc91d599ac5227c2512817b99b92a648649332dba6b57eee1598b44a28719c.exe

  • Size

    1.3MB

  • MD5

    729025ccae706f9e22326c6a3b64dbb2

  • SHA1

    27606d28d4aef51d17751dd178e9404719a81ee0

  • SHA256

    1dcc91d599ac5227c2512817b99b92a648649332dba6b57eee1598b44a28719c

  • SHA512

    95061841dcde7b634d0664b83a11e66de6c70dfde657c3f6a5d3c1b9564ebd52991cde2e5c95496b1dacc0133719ea4248c9499eec6e8820de4c6f220d6a5ed1

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 54 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 11 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 19 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 11 IoCs
  • Drops file in Program Files directory 7 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 54 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 36 IoCs
  • Suspicious use of AdjustPrivilegeToken 30 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1dcc91d599ac5227c2512817b99b92a648649332dba6b57eee1598b44a28719c.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1dcc91d599ac5227c2512817b99b92a648649332dba6b57eee1598b44a28719c.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2424
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2076
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\providercommon\1zu9dW.bat" "
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1076
        • C:\providercommon\DllCommonsvc.exe
          "C:\providercommon\DllCommonsvc.exe"
          4⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2800
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2424
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\services.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2408
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\dllhost.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2372
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Public\Libraries\sppsvc.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2696
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\audiodg.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2580
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Photo Viewer\es-ES\dllhost.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2416
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\Saved Games\winlogon.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2540
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\sppsvc.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2388
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Google\Chrome\Application\WmiPrvSE.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2576
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\All Users\WmiPrvSE.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2704
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Google\Chrome\sppsvc.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2816
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\winlogon.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2836
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\lsass.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2860
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\winlogon.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2832
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\OSPPSVC.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2080
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\PolicyDefinitions\ja-JP\lsm.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2728
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\winlogon.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2804
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\wininit.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2636
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\csrss.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2724
          • C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\wininit.exe
            "C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\wininit.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1120
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\4WSxKcEorb.bat"
              6⤵
                PID:380
                • C:\Windows\system32\w32tm.exe
                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                  7⤵
                    PID:2500
                  • C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\wininit.exe
                    "C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\wininit.exe"
                    7⤵
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2096
                    • C:\Windows\System32\cmd.exe
                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Zi7wkUpBKE.bat"
                      8⤵
                        PID:496
                        • C:\Windows\system32\w32tm.exe
                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                          9⤵
                            PID:1104
                          • C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\wininit.exe
                            "C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\wininit.exe"
                            9⤵
                            • Executes dropped EXE
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1720
                            • C:\Windows\System32\cmd.exe
                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\MzhLoGhvPq.bat"
                              10⤵
                                PID:780
                                • C:\Windows\system32\w32tm.exe
                                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                  11⤵
                                    PID:2696
                                  • C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\wininit.exe
                                    "C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\wininit.exe"
                                    11⤵
                                    • Executes dropped EXE
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:640
                                    • C:\Windows\System32\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\BAdWWGXi7E.bat"
                                      12⤵
                                        PID:1816
                                        • C:\Windows\system32\w32tm.exe
                                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                          13⤵
                                            PID:1792
                                          • C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\wininit.exe
                                            "C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\wininit.exe"
                                            13⤵
                                            • Executes dropped EXE
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:1988
                                            • C:\Windows\System32\cmd.exe
                                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\7ezzJRb6cS.bat"
                                              14⤵
                                                PID:1512
                                                • C:\Windows\system32\w32tm.exe
                                                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                  15⤵
                                                    PID:2468
                                                  • C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\wininit.exe
                                                    "C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\wininit.exe"
                                                    15⤵
                                                    • Executes dropped EXE
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:2004
                                                    • C:\Windows\System32\cmd.exe
                                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\lmMgPtgxf2.bat"
                                                      16⤵
                                                        PID:2992
                                                        • C:\Windows\system32\w32tm.exe
                                                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                          17⤵
                                                            PID:284
                                                          • C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\wininit.exe
                                                            "C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\wininit.exe"
                                                            17⤵
                                                            • Executes dropped EXE
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:2996
                                                            • C:\Windows\System32\cmd.exe
                                                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\sJ59Arupck.bat"
                                                              18⤵
                                                                PID:888
                                                                • C:\Windows\system32\w32tm.exe
                                                                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                  19⤵
                                                                    PID:316
                                                                  • C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\wininit.exe
                                                                    "C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\wininit.exe"
                                                                    19⤵
                                                                    • Executes dropped EXE
                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:2556
                                                                    • C:\Windows\System32\cmd.exe
                                                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\fjnbjzFmbP.bat"
                                                                      20⤵
                                                                        PID:1804
                                                                        • C:\Windows\system32\w32tm.exe
                                                                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                          21⤵
                                                                            PID:804
                                                                          • C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\wininit.exe
                                                                            "C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\wininit.exe"
                                                                            21⤵
                                                                            • Executes dropped EXE
                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:2220
                                                                            • C:\Windows\System32\cmd.exe
                                                                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\6raUEgr1vJ.bat"
                                                                              22⤵
                                                                                PID:1980
                                                                                • C:\Windows\system32\w32tm.exe
                                                                                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                  23⤵
                                                                                    PID:3068
                                                                                  • C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\wininit.exe
                                                                                    "C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\wininit.exe"
                                                                                    23⤵
                                                                                    • Executes dropped EXE
                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:2236
                                                                                    • C:\Windows\System32\cmd.exe
                                                                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\8KwMxVG80h.bat"
                                                                                      24⤵
                                                                                        PID:2460
                                                                                        • C:\Windows\system32\w32tm.exe
                                                                                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                          25⤵
                                                                                            PID:1152
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "servicess" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\services.exe'" /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2744
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\services.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:3028
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "servicess" /sc MINUTE /mo 7 /tr "'C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\services.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2536
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\dllhost.exe'" /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2776
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\dllhost.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2612
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 8 /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\dllhost.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2644
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 5 /tr "'C:\Users\Public\Libraries\sppsvc.exe'" /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2524
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Users\Public\Libraries\sppsvc.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2900
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 14 /tr "'C:\Users\Public\Libraries\sppsvc.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2124
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 11 /tr "'C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\audiodg.exe'" /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:848
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\audiodg.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:1492
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 7 /tr "'C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\audiodg.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2956
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Photo Viewer\es-ES\dllhost.exe'" /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2868
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files\Windows Photo Viewer\es-ES\dllhost.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:976
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 7 /tr "'C:\Program Files\Windows Photo Viewer\es-ES\dllhost.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:576
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 10 /tr "'C:\Users\Default\Saved Games\winlogon.exe'" /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2892
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Users\Default\Saved Games\winlogon.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2952
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 11 /tr "'C:\Users\Default\Saved Games\winlogon.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:596
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 7 /tr "'C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\sppsvc.exe'" /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2984
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\sppsvc.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:1984
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 7 /tr "'C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\sppsvc.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:1372
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 8 /tr "'C:\Program Files\Google\Chrome\Application\WmiPrvSE.exe'" /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2652
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Program Files\Google\Chrome\Application\WmiPrvSE.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:3016
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 6 /tr "'C:\Program Files\Google\Chrome\Application\WmiPrvSE.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2708
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 11 /tr "'C:\Users\All Users\WmiPrvSE.exe'" /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2164
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Users\All Users\WmiPrvSE.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:1824
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 12 /tr "'C:\Users\All Users\WmiPrvSE.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2156
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 8 /tr "'C:\Program Files\Google\Chrome\sppsvc.exe'" /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:1740
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Program Files\Google\Chrome\sppsvc.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2228
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 10 /tr "'C:\Program Files\Google\Chrome\sppsvc.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2972
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\winlogon.exe'" /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:648
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\winlogon.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:1028
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 9 /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\winlogon.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:960
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 14 /tr "'C:\providercommon\lsass.exe'" /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2320
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\providercommon\lsass.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:284
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 11 /tr "'C:\providercommon\lsass.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:3052
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 8 /tr "'C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\winlogon.exe'" /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:316
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\winlogon.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:1388
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 5 /tr "'C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\winlogon.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:964
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 5 /tr "'C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\OSPPSVC.exe'" /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2472
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\OSPPSVC.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:1212
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 6 /tr "'C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\OSPPSVC.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:1844
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "lsml" /sc MINUTE /mo 12 /tr "'C:\Windows\PolicyDefinitions\ja-JP\lsm.exe'" /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:1700
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Windows\PolicyDefinitions\ja-JP\lsm.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:1628
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "lsml" /sc MINUTE /mo 6 /tr "'C:\Windows\PolicyDefinitions\ja-JP\lsm.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2584
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 9 /tr "'C:\MSOCache\All Users\winlogon.exe'" /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:1160
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\MSOCache\All Users\winlogon.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:828
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 8 /tr "'C:\MSOCache\All Users\winlogon.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:1760
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 5 /tr "'C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\wininit.exe'" /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2220
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\wininit.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2200
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 10 /tr "'C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\wininit.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2204
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\csrss.exe'" /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:1612
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\csrss.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:1608
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\csrss.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:1452

                                          Network

                                          • flag-us
                                            DNS
                                            raw.githubusercontent.com
                                            wininit.exe
                                            Remote address:
                                            8.8.8.8:53
                                            Request
                                            raw.githubusercontent.com
                                            IN A
                                            Response
                                            raw.githubusercontent.com
                                            IN A
                                            185.199.111.133
                                            raw.githubusercontent.com
                                            IN A
                                            185.199.108.133
                                            raw.githubusercontent.com
                                            IN A
                                            185.199.109.133
                                            raw.githubusercontent.com
                                            IN A
                                            185.199.110.133
                                          • 185.199.111.133:443
                                            raw.githubusercontent.com
                                            tls
                                            wininit.exe
                                            793 B
                                            4.2kB
                                            10
                                            11
                                          • 185.199.111.133:443
                                            raw.githubusercontent.com
                                            tls
                                            wininit.exe
                                            793 B
                                            4.2kB
                                            10
                                            11
                                          • 185.199.111.133:443
                                            raw.githubusercontent.com
                                            tls
                                            wininit.exe
                                            741 B
                                            4.1kB
                                            9
                                            10
                                          • 185.199.111.133:443
                                            raw.githubusercontent.com
                                            tls
                                            wininit.exe
                                            741 B
                                            4.1kB
                                            9
                                            10
                                          • 185.199.111.133:443
                                            raw.githubusercontent.com
                                            tls
                                            wininit.exe
                                            793 B
                                            4.2kB
                                            10
                                            11
                                          • 185.199.111.133:443
                                            raw.githubusercontent.com
                                            tls
                                            wininit.exe
                                            741 B
                                            4.1kB
                                            9
                                            10
                                          • 185.199.111.133:443
                                            raw.githubusercontent.com
                                            tls
                                            wininit.exe
                                            793 B
                                            4.2kB
                                            10
                                            11
                                          • 185.199.111.133:443
                                            raw.githubusercontent.com
                                            tls
                                            wininit.exe
                                            741 B
                                            4.1kB
                                            9
                                            10
                                          • 185.199.111.133:443
                                            raw.githubusercontent.com
                                            tls
                                            wininit.exe
                                            741 B
                                            4.1kB
                                            9
                                            10
                                          • 185.199.111.133:443
                                            raw.githubusercontent.com
                                            tls
                                            wininit.exe
                                            793 B
                                            4.2kB
                                            10
                                            11
                                          • 8.8.8.8:53
                                            raw.githubusercontent.com
                                            dns
                                            wininit.exe
                                            71 B
                                            135 B
                                            1
                                            1

                                            DNS Request

                                            raw.githubusercontent.com

                                            DNS Response

                                            185.199.111.133
                                            185.199.108.133
                                            185.199.109.133
                                            185.199.110.133

                                          MITRE ATT&CK Enterprise v15

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                            Filesize

                                            342B

                                            MD5

                                            4c172d4531c6d363eeb755c5706438e1

                                            SHA1

                                            ee9348390285637f31010750a87b1857c9e5f52d

                                            SHA256

                                            451bc51f69d4a11e852802b4395d612a4bec8a299ec5929a253322562a1e5524

                                            SHA512

                                            6c9ae14f41191fb30db81608bbfc8f54023f42a384fab6adeab9711cd7cbf463fc32d107eb172f162883054ce6cb99ae9ef7b9c4d1583f3d863c70a5d08fa363

                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                            Filesize

                                            342B

                                            MD5

                                            203909bc01124533ee5b6cdceb5f3dba

                                            SHA1

                                            7f4ca02025ba36ffab2c1c7e708a3f5e87ca6ab1

                                            SHA256

                                            709e70153579d3a70c1b9798c13712f62268f5f098c530fec7e0c183312f3135

                                            SHA512

                                            09fa8cbfd7f76b2c8516be884c8216b98d65b58ee3687081e0f18a54dd219b16a2a64148fed1bce2604b80a3bf0ff1be6857c053f224d8f1d2aa1eb4d4899618

                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                            Filesize

                                            342B

                                            MD5

                                            4cb9223389e21564a8b3efa56d9b9dac

                                            SHA1

                                            ea697a08f9235ad12d5a7dbdc312a283cd745c4a

                                            SHA256

                                            ac3f52924fb7d495e43f3e4f2c81c8cc8e4c46381b76a472e5ece7f38202be45

                                            SHA512

                                            60e5269e1299ff64f38e9d7d7a1f08ff94c426b888a70c818c512f35bedae3a187873a5f8afa26b10c0d8c4a743cead14c1ba8bd83416ea5829b482bec7c1e6d

                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                            Filesize

                                            342B

                                            MD5

                                            d57e43f82cefe68e4113a1358795f421

                                            SHA1

                                            51d97f408e1baac8ea3081e2cff0326c3e945948

                                            SHA256

                                            236aadb6bcce3bab6af30ab92efc0e9840d694772a7c2a37b4da1800f0361cde

                                            SHA512

                                            172c55312759d1fea002d9f29a362bcafb6830529b65e04c7dbb0236acf2db22444ceab355b211b4c05d74aeafa800137d7214f19c94b8e45c6c6741daeb62cb

                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                            Filesize

                                            342B

                                            MD5

                                            3c705c5f03905ae14d54a8a80d71321a

                                            SHA1

                                            950f252391d92a0bfaab792fb39bbb882c7dbaf1

                                            SHA256

                                            3c61b4f6bfb34560abfc6729a2c0515bd66b9e8abb4156b8dc030d1b6c1a624d

                                            SHA512

                                            9896e23f09e9c66dc167be382f87dbaa052b596c77e89527497ebbeb21f26c51b81c80759a1ac8ebb463972ae304759aac5477cac4954453419579b6d58c8bfd

                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                            Filesize

                                            342B

                                            MD5

                                            b8efdcc28d9b0ea9b29d653e629dd4ec

                                            SHA1

                                            625def393cdca5fd4e931ae750d8e4a98907324e

                                            SHA256

                                            14ee1a683383543456f59d3587d1c2dbe2d0a9adc1226d416d05d483d9724273

                                            SHA512

                                            1b56bc34e9e62747e29e7d3f59849d1655985637812f56c3c9b41eec61d55dd319f7c0a8f3a6547a8ffdb8d852baa5cb12231062a84468cfbf78400d45a0d45f

                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                            Filesize

                                            342B

                                            MD5

                                            910a6fc2eb75cde0d9b5c64ed96ce3fc

                                            SHA1

                                            c4393c7e0ec37bc2e0d86e01c62cc2e1b240747d

                                            SHA256

                                            882da0b691eae2e693df0721b0c364a2e756944f65c094ccd778b1a0e0240de9

                                            SHA512

                                            b6ebff81ab35575ea4faaddb9e05a1d5a5bfe9344e7dab1348e43c9b4f1889e4ab7591ee613705f76013d00ac62fac95d120ced662f613a5a4bb675b785bd4fd

                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                            Filesize

                                            342B

                                            MD5

                                            9d83b5f195f42250617af861ebf5989e

                                            SHA1

                                            9cb6bc6dafde02a1b894d67ff1a191f0ec904e7e

                                            SHA256

                                            345fcd95f75fa6a2004beee3207f3b61cb72a87e82a305b445d426b5f52ddfc7

                                            SHA512

                                            0ab4c034253d2d83866c40fd9702a3b2eb0daea640b747ab7478dcd2c562c580ae6b5edcaff41b2ee71d25cf2b1ae242581681101a00da5c52a4db704312b797

                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                            Filesize

                                            342B

                                            MD5

                                            4cf3aee867d39c1157ae7737c31ded02

                                            SHA1

                                            d22c00982e24c5ba98675c7817bba8635e34be48

                                            SHA256

                                            59b4b6a2e1b330d47cab5355c90e60b39da9098a6b8d6ac3bec24680546222c1

                                            SHA512

                                            72b61e64500173cede60ac12a0da6b07af0cad56a6acd005a629669311c43ab79a2b4ab15f7b8838635a23f0909f726facfa409eb765df5e7e847557e78fc8d8

                                          • C:\Users\Admin\AppData\Local\Temp\4WSxKcEorb.bat

                                            Filesize

                                            225B

                                            MD5

                                            a73c157c9b0779553223f1163f9ee9f1

                                            SHA1

                                            924e1031cbea266c6967d76346b4ef147d8db999

                                            SHA256

                                            40fee207ad175d4a9ddd5a8d5f9e70b763bb7012c149d30cbc6312d4617c6cf5

                                            SHA512

                                            45c07f08c92ed85fca6c162d74e5c0a729baa976c1e726274287c9d6acca972922a73616794e2545d9ab0d38ea8dc310c77e57b2b35dace9564d8e5d7fd9fad8

                                          • C:\Users\Admin\AppData\Local\Temp\6raUEgr1vJ.bat

                                            Filesize

                                            225B

                                            MD5

                                            d6f0eb7193a31f21d55201103e35ffe9

                                            SHA1

                                            39117f671b2c79e600bdb0eed2d77db08be14acd

                                            SHA256

                                            68fcf3a5c801fab9fb33cca718f563fcf836dd4b4d20c33608462688e8a7506c

                                            SHA512

                                            6534023e96b273706ad4adc59eb96fcb33875b56b12c1101a62a93e5c3affad9c42cb429b52cc6c7836499a3780d9639c27733067e6b2c78a36691c503deceda

                                          • C:\Users\Admin\AppData\Local\Temp\7ezzJRb6cS.bat

                                            Filesize

                                            225B

                                            MD5

                                            b80c260d968ef1818df0858342ba4bcf

                                            SHA1

                                            5421159263e911635774cd0a6c6c7a84fb5b6971

                                            SHA256

                                            1e5151e7aae24e4cc5c4462d0e45b7c65e4820b7bf1d62923083c7c5a1178fd4

                                            SHA512

                                            34589cd0c70897c37f142a10baa59f0b781a593b269f57dd95b51c7243ae7164b065089b42cdeb9b19c93d59ee420fbe8fd9b21e70dbb1813261bc048cfa9c91

                                          • C:\Users\Admin\AppData\Local\Temp\8KwMxVG80h.bat

                                            Filesize

                                            225B

                                            MD5

                                            2cb133b5a5af0fb9d14ed19cec0bcd57

                                            SHA1

                                            93348016d27a3b8837978be72d493abe75ebe5cc

                                            SHA256

                                            9c0291d809e9d90ef556a32d3361a2c17bc5f5d6c019c6f232995ef176a6b966

                                            SHA512

                                            1ea7339870c885b5f9f6cce592c0347e5f9945556d71f2df7cbaaf932a04f2303b47510c83afdbb881eaca7f3dde8c65413209dc477305256ed258f3d10b6401

                                          • C:\Users\Admin\AppData\Local\Temp\BAdWWGXi7E.bat

                                            Filesize

                                            225B

                                            MD5

                                            f0af73a8c1ddf3619da231cf19ab3f43

                                            SHA1

                                            c6cc255c8f42a0855ac178dc73c1eb5006ebfbd2

                                            SHA256

                                            ba2aa7ca9f46be4c4bdb14068f782bcce84198e3604881d241d94689862983d0

                                            SHA512

                                            b3615c8dd57fcab288321ff0f809e8e3a5e03d11218ccd9623b56b5c480fbc1e80282179ef2b545f358a89e8eb86eb5d40768996246670474e0f29b0697a8ab2

                                          • C:\Users\Admin\AppData\Local\Temp\CabF3E2.tmp

                                            Filesize

                                            70KB

                                            MD5

                                            49aebf8cbd62d92ac215b2923fb1b9f5

                                            SHA1

                                            1723be06719828dda65ad804298d0431f6aff976

                                            SHA256

                                            b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                            SHA512

                                            bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                          • C:\Users\Admin\AppData\Local\Temp\MzhLoGhvPq.bat

                                            Filesize

                                            225B

                                            MD5

                                            ec9a78fdb03a6d3f4a3461cc56758390

                                            SHA1

                                            0465ba069efa9d9ab86348d0fb2daade5a5773b5

                                            SHA256

                                            64dec8ee2af595a6e139222c22f11d089045312d1a8b0ec7b4ce883a376f0c5c

                                            SHA512

                                            1538362ee44912a9ef7b71cd288f153bc3be142f940fe049f1c282bcf0a5caa3a8680bd6cff04f980001605989c64ae6ac1ff527ffdb7310cf9ebed5494fe5d9

                                          • C:\Users\Admin\AppData\Local\Temp\TarF405.tmp

                                            Filesize

                                            181KB

                                            MD5

                                            4ea6026cf93ec6338144661bf1202cd1

                                            SHA1

                                            a1dec9044f750ad887935a01430bf49322fbdcb7

                                            SHA256

                                            8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                            SHA512

                                            6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                          • C:\Users\Admin\AppData\Local\Temp\Zi7wkUpBKE.bat

                                            Filesize

                                            225B

                                            MD5

                                            55016379d882c675a4178d80e222eff8

                                            SHA1

                                            1511308da312984326cd8840ea53605983ec040a

                                            SHA256

                                            647e85e4ae2e9c9086f76b5c3044df6deb5b1c5d17ab6801b640b5c882edf076

                                            SHA512

                                            f00b6f61a7f792f897205dbc0832ff3310519060c8abbedb8dd838e45a8c176678f5305f59278fea135310025b940ea0250bf8817c24ca21e07c977324fcdb32

                                          • C:\Users\Admin\AppData\Local\Temp\fjnbjzFmbP.bat

                                            Filesize

                                            225B

                                            MD5

                                            c666b8f920c074ea99006a1c4876a336

                                            SHA1

                                            4a8b7541c676ff185a32f088c49b43e28d277441

                                            SHA256

                                            bb3043db6afb6b9fb6cff3ac4d0dedf087b90af3eb75079f22111d4d868700ca

                                            SHA512

                                            b2f114906d89304e12889afef847664cd9a7c026bc890cb9d353cb7e56efe8008a05ffff046f7acca7253cfa00d9a6dd5fcf796addd6e8d0048d36c29a662c93

                                          • C:\Users\Admin\AppData\Local\Temp\lmMgPtgxf2.bat

                                            Filesize

                                            225B

                                            MD5

                                            0a80b31e84ceb07e2aab4bb707263ccd

                                            SHA1

                                            065da784687ee5c04b9e1c54f0d888677e0d8523

                                            SHA256

                                            1e3fea1c5ccda8c8936a8f06d21c932b7064bfb97545bf5796b7fb9bf0530735

                                            SHA512

                                            2b865412638cdc0795bc919a11dcc5750b63093e4019f17dac3c0349c6aa63740bd083544478d26405dc414fb21c3354afd273fd65eda79856850dc7306a86ca

                                          • C:\Users\Admin\AppData\Local\Temp\sJ59Arupck.bat

                                            Filesize

                                            225B

                                            MD5

                                            23ce2d1b580d761b78bba1d097c7faee

                                            SHA1

                                            8858ce0311b66dd1d37cb7890c8755ee89abc41c

                                            SHA256

                                            58a4797e3db919e0b09b5cc5b9e36b999b116dc41c83ff92e1d2fcd09b9654a0

                                            SHA512

                                            e07ac3df8b53deca82b9b3e4c86e87e760f4dbda89d1c784ff749dc952f21b0c9df148265f3be27615b08eb0c61ff155d88cfccc8b1fb012dcb75109ffb5cec1

                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                            Filesize

                                            7KB

                                            MD5

                                            c0cd586d87118154f72bf35faaec248e

                                            SHA1

                                            f2e2d721525f300fde08a2df58d5d5b768c9db33

                                            SHA256

                                            2e029fdd67acbe8516548e0072c1add1a0d7b6a3c6df5f063ad04a448b11e49e

                                            SHA512

                                            e977faa98a8175fa65e8c0b3d4e15720923d0aff54e8e86858b661c70bb774c6d94e32407307c59d3068080e1ea071609a4cae83a9e87cc51a5b8119ad4a7dc2

                                          • C:\providercommon\1zu9dW.bat

                                            Filesize

                                            36B

                                            MD5

                                            6783c3ee07c7d151ceac57f1f9c8bed7

                                            SHA1

                                            17468f98f95bf504cc1f83c49e49a78526b3ea03

                                            SHA256

                                            8ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322

                                            SHA512

                                            c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8

                                          • C:\providercommon\DllCommonsvc.exe

                                            Filesize

                                            1.0MB

                                            MD5

                                            bd31e94b4143c4ce49c17d3af46bcad0

                                            SHA1

                                            f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                            SHA256

                                            b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                            SHA512

                                            f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                          • C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe

                                            Filesize

                                            197B

                                            MD5

                                            8088241160261560a02c84025d107592

                                            SHA1

                                            083121f7027557570994c9fc211df61730455bb5

                                            SHA256

                                            2072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1

                                            SHA512

                                            20d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478

                                          • memory/640-327-0x0000000000120000-0x0000000000230000-memory.dmp

                                            Filesize

                                            1.1MB

                                          • memory/1120-60-0x00000000009D0000-0x0000000000AE0000-memory.dmp

                                            Filesize

                                            1.1MB

                                          • memory/1120-148-0x0000000000250000-0x0000000000262000-memory.dmp

                                            Filesize

                                            72KB

                                          • memory/1720-267-0x0000000000EC0000-0x0000000000FD0000-memory.dmp

                                            Filesize

                                            1.1MB

                                          • memory/1988-388-0x0000000000450000-0x0000000000462000-memory.dmp

                                            Filesize

                                            72KB

                                          • memory/1988-387-0x0000000000D40000-0x0000000000E50000-memory.dmp

                                            Filesize

                                            1.1MB

                                          • memory/2004-448-0x00000000011A0000-0x00000000012B0000-memory.dmp

                                            Filesize

                                            1.1MB

                                          • memory/2096-207-0x0000000000E10000-0x0000000000F20000-memory.dmp

                                            Filesize

                                            1.1MB

                                          • memory/2220-627-0x0000000000B00000-0x0000000000C10000-memory.dmp

                                            Filesize

                                            1.1MB

                                          • memory/2236-687-0x0000000001150000-0x0000000001260000-memory.dmp

                                            Filesize

                                            1.1MB

                                          • memory/2556-567-0x0000000000010000-0x0000000000120000-memory.dmp

                                            Filesize

                                            1.1MB

                                          • memory/2580-91-0x0000000002230000-0x0000000002238000-memory.dmp

                                            Filesize

                                            32KB

                                          • memory/2580-79-0x000000001B530000-0x000000001B812000-memory.dmp

                                            Filesize

                                            2.9MB

                                          • memory/2800-14-0x0000000000630000-0x0000000000642000-memory.dmp

                                            Filesize

                                            72KB

                                          • memory/2800-13-0x0000000000C90000-0x0000000000DA0000-memory.dmp

                                            Filesize

                                            1.1MB

                                          • memory/2800-15-0x0000000000640000-0x000000000064C000-memory.dmp

                                            Filesize

                                            48KB

                                          • memory/2800-17-0x0000000000660000-0x000000000066C000-memory.dmp

                                            Filesize

                                            48KB

                                          • memory/2800-16-0x0000000000650000-0x000000000065C000-memory.dmp

                                            Filesize

                                            48KB

                                          We care about your privacy.

                                          This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.