Analysis
-
max time kernel
46s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
04-08-2022 15:18
Behavioral task
behavioral1
Sample
Service.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
Service.exe
Resource
win10v2004-20220721-en
General
-
Target
Service.exe
-
Size
400KB
-
MD5
9519c85c644869f182927d93e8e25a33
-
SHA1
eadc9026e041f7013056f80e068ecf95940ea060
-
SHA256
f0dc8fa1a18901ac46f4448e434c3885a456865a3a309840a1c4ac67fd56895b
-
SHA512
dcc1dd25bba19aaf75ec4a1a69dc215eb519e9ee3b8f7b1bd16164b736b3aa81389c076ed4e8a17a1cbfaec2e0b3155df039d1bca3c7186cfeb9950369bccf23
Malware Config
Extracted
privateloader
http://163.123.143.4/proxies.txt
http://107.182.129.251/server.txt
pastebin.com/raw/A7dSG1te
http://wfsdragon.ru/api/setStats.php
163.123.143.12
http://91.241.19.125/pub.php?pub=one
http://sarfoods.com/index.php
-
payload_url
https://cdn.discordapp.com/attachments/1003879548242374749/1003976870611669043/NiceProcessX64.bmp
https://cdn.discordapp.com/attachments/1003879548242374749/1003976754358124554/NiceProcessX32.bmp
https://cdn.discordapp.com/attachments/910842184708792331/931507465563045909/dingo_20220114120058.bmp
https://c.xyzgamec.com/userdown/2202/random.exe
http://193.56.146.76/Proxytest.exe
http://www.yzsyjyjh.com/askhelp23/askinstall23.exe
http://privacy-tools-for-you-780.com/downloads/toolspab3.exe
http://luminati-china.xyz/aman/casper2.exe
https://innovicservice.net/assets/vendor/counterup/RobCleanerInstlr95038215.exe
http://tg8.cllgxx.com/hp8/g1/yrpp1047.exe
https://cdn.discordapp.com/attachments/910842184708792331/930849718240698368/Roll.bmp
https://cdn.discordapp.com/attachments/910842184708792331/930850766787330068/real1201.bmp
https://cdn.discordapp.com/attachments/910842184708792331/930882959131693096/Installer.bmp
http://185.215.113.208/ferrari.exe
https://cdn.discordapp.com/attachments/910842184708792331/931233371110141962/LingeringsAntiphon.bmp
https://cdn.discordapp.com/attachments/910842184708792331/931285223709225071/russ.bmp
https://cdn.discordapp.com/attachments/910842184708792331/932720393201016842/filinnn.bmp
https://cdn.discordapp.com/attachments/910842184708792331/933436611427979305/build20k.bmp
https://c.xyzgamec.com/userdown/2202/random.exe
http://mnbuiy.pw/adsli/note8876.exe
http://www.yzsyjyjh.com/askhelp23/askinstall23.exe
http://luminati-china.xyz/aman/casper2.exe
https://suprimax.vet.br/css/fonts/OneCleanerInst942914.exe
http://tg8.cllgxx.com/hp8/g1/ssaa1047.exe
https://www.deezloader.app/files/Deezloader_Remix_Installer_64_bit_4.3.0_Setup.exe
https://www.deezloader.app/files/Deezloader_Remix_Installer_32_bit_4.3.0_Setup.exe
https://cdn.discordapp.com/attachments/910281601559167006/911516400005296219/anyname.exe
https://cdn.discordapp.com/attachments/910281601559167006/911516894660530226/PBsecond.exe
https://cdn.discordapp.com/attachments/910842184708792331/914047763304550410/Xpadder.bmp
http://185.215.113.208/ferrari4.exe
Extracted
nymaim
208.67.104.9
212.192.241.16
Extracted
djvu
http://acacaca.org/test2/get.php
-
extension
.vvyu
-
offline_id
rE5LpDv2ftYRXAo7bC18EpzfRMTHSGjgfyIMfZt1
-
payload_url
http://rgyui.top/dl/build2.exe
http://acacaca.org/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-QsoSRIeAK6 Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: support@bestyourmail.ch Reserve e-mail address to contact us: datarestorehelp@airmail.cc Your personal ID: 0531Jhyjd
Signatures
-
Detected Djvu ransomware 11 IoCs
Processes:
resource yara_rule behavioral2/memory/2568-194-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3716-196-0x0000000002260000-0x000000000237B000-memory.dmp family_djvu behavioral2/memory/2568-197-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2568-199-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2568-189-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2568-244-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2568-286-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/5372-299-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/5372-303-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/5372-305-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/5372-333-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Processes:
MeXmZemsbyWGZW8yKKiQjIiN.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection MeXmZemsbyWGZW8yKKiQjIiN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" MeXmZemsbyWGZW8yKKiQjIiN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" MeXmZemsbyWGZW8yKKiQjIiN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" MeXmZemsbyWGZW8yKKiQjIiN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" MeXmZemsbyWGZW8yKKiQjIiN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" MeXmZemsbyWGZW8yKKiQjIiN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRawWriteNotification = "1" MeXmZemsbyWGZW8yKKiQjIiN.exe -
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rundll32.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2272 2668 rundll32.exe -
Blocklisted process makes network request 15 IoCs
Processes:
schtasks.exeflow pid process 83 2576 schtasks.exe 91 2576 schtasks.exe 92 2576 schtasks.exe 93 2576 schtasks.exe 94 2576 schtasks.exe 95 2576 schtasks.exe 96 2576 schtasks.exe 99 2576 schtasks.exe 100 2576 schtasks.exe 101 2576 schtasks.exe 102 2576 schtasks.exe 108 2576 schtasks.exe 109 2576 schtasks.exe 111 2576 schtasks.exe 112 2576 schtasks.exe -
Downloads MZ/PE file
-
Executes dropped EXE 11 IoCs
Processes:
MeXmZemsbyWGZW8yKKiQjIiN.exeNiceProcessX64.bmp.exemixinte04.bmp.exeddoAKFf.exe.exeyare1095.exe.exeWEFdanE.exe.exeutube.bmp.exebuild.exe.exesetup331.exe.exeAdblockInstaller.exe.exeB2BCH2.exe.exepid process 2576 MeXmZemsbyWGZW8yKKiQjIiN.exe 4584 NiceProcessX64.bmp.exe 4048 mixinte04.bmp.exe 1364 ddoAKFf.exe.exe 2732 yare1095.exe.exe 4024 WEFdanE.exe.exe 4756 utube.bmp.exe 3716 build.exe.exe 3208 setup331.exe.exe 1756 AdblockInstaller.exe.exe 4224 B2BCH2.exe.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Processes:
resource yara_rule C:\Users\Admin\Pictures\Adobe Films\yare1095.exe.exe vmprotect C:\Users\Admin\Pictures\Adobe Films\yare1095.exe.exe vmprotect behavioral2/memory/2732-163-0x0000000140000000-0x000000014067E000-memory.dmp vmprotect behavioral2/memory/2072-326-0x0000000140000000-0x0000000140684000-memory.dmp vmprotect -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Service.exeMeXmZemsbyWGZW8yKKiQjIiN.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\Control Panel\International\Geo\Nation Service.exe Key value queried \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\Control Panel\International\Geo\Nation MeXmZemsbyWGZW8yKKiQjIiN.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
WEFdanE.exe.exeddoAKFf.exe.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce WEFdanE.exe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" WEFdanE.exe.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ddoAKFf.exe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ddoAKFf.exe.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 9 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 114 ip-api.com 189 api.2ip.ua 16 ipinfo.io 33 ipinfo.io 126 api.2ip.ua 188 api.2ip.ua 271 ip-api.com 15 ipinfo.io 124 api.2ip.ua -
Drops file in Program Files directory 2 IoCs
Processes:
Service.exedescription ioc process File created C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe Service.exe File opened for modification C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe Service.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 5 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2216 2732 WerFault.exe yare1095.exe.exe 4440 4048 WerFault.exe mixinte04.bmp.exe 4872 5676 WerFault.exe gcleaner.exe 2328 2072 WerFault.exe rmaa1045.exe 724 1836 WerFault.exe rundll32.exe -
Creates scheduled task(s) 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 6092 schtasks.exe 2312 schtasks.exe 2820 schtasks.exe 4060 schtasks.exe 2292 schtasks.exe 2332 schtasks.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
Processes:
tasklist.exetasklist.exepid process 3600 tasklist.exe 2604 tasklist.exe -
Kills process with taskkill 3 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exepid process 4888 taskkill.exe 4168 taskkill.exe 5656 taskkill.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Runs ping.exe 1 TTPs 2 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
MeXmZemsbyWGZW8yKKiQjIiN.exeNiceProcessX64.bmp.exepid process 2576 MeXmZemsbyWGZW8yKKiQjIiN.exe 2576 MeXmZemsbyWGZW8yKKiQjIiN.exe 2576 MeXmZemsbyWGZW8yKKiQjIiN.exe 2576 MeXmZemsbyWGZW8yKKiQjIiN.exe 2576 MeXmZemsbyWGZW8yKKiQjIiN.exe 2576 MeXmZemsbyWGZW8yKKiQjIiN.exe 2576 MeXmZemsbyWGZW8yKKiQjIiN.exe 2576 MeXmZemsbyWGZW8yKKiQjIiN.exe 4584 NiceProcessX64.bmp.exe 4584 NiceProcessX64.bmp.exe 4584 NiceProcessX64.bmp.exe 4584 NiceProcessX64.bmp.exe 4584 NiceProcessX64.bmp.exe 4584 NiceProcessX64.bmp.exe 4584 NiceProcessX64.bmp.exe 4584 NiceProcessX64.bmp.exe 4584 NiceProcessX64.bmp.exe 4584 NiceProcessX64.bmp.exe 4584 NiceProcessX64.bmp.exe 4584 NiceProcessX64.bmp.exe 4584 NiceProcessX64.bmp.exe 4584 NiceProcessX64.bmp.exe 4584 NiceProcessX64.bmp.exe 4584 NiceProcessX64.bmp.exe 4584 NiceProcessX64.bmp.exe 4584 NiceProcessX64.bmp.exe 4584 NiceProcessX64.bmp.exe 4584 NiceProcessX64.bmp.exe 4584 NiceProcessX64.bmp.exe 4584 NiceProcessX64.bmp.exe 4584 NiceProcessX64.bmp.exe 4584 NiceProcessX64.bmp.exe 4584 NiceProcessX64.bmp.exe 4584 NiceProcessX64.bmp.exe 4584 NiceProcessX64.bmp.exe 4584 NiceProcessX64.bmp.exe 4584 NiceProcessX64.bmp.exe 4584 NiceProcessX64.bmp.exe 4584 NiceProcessX64.bmp.exe 4584 NiceProcessX64.bmp.exe 4584 NiceProcessX64.bmp.exe 4584 NiceProcessX64.bmp.exe 4584 NiceProcessX64.bmp.exe 4584 NiceProcessX64.bmp.exe 4584 NiceProcessX64.bmp.exe 4584 NiceProcessX64.bmp.exe 4584 NiceProcessX64.bmp.exe 4584 NiceProcessX64.bmp.exe 4584 NiceProcessX64.bmp.exe 4584 NiceProcessX64.bmp.exe 4584 NiceProcessX64.bmp.exe 4584 NiceProcessX64.bmp.exe 4584 NiceProcessX64.bmp.exe 4584 NiceProcessX64.bmp.exe 4584 NiceProcessX64.bmp.exe 4584 NiceProcessX64.bmp.exe 4584 NiceProcessX64.bmp.exe 4584 NiceProcessX64.bmp.exe 4584 NiceProcessX64.bmp.exe 4584 NiceProcessX64.bmp.exe 4584 NiceProcessX64.bmp.exe 4584 NiceProcessX64.bmp.exe 4584 NiceProcessX64.bmp.exe 4584 NiceProcessX64.bmp.exe -
Suspicious use of WriteProcessMemory 43 IoCs
Processes:
Service.exeMeXmZemsbyWGZW8yKKiQjIiN.exeschtasks.exeWEFdanE.exe.exeddoAKFf.exe.exedescription pid process target process PID 5012 wrote to memory of 2576 5012 Service.exe MeXmZemsbyWGZW8yKKiQjIiN.exe PID 5012 wrote to memory of 2576 5012 Service.exe MeXmZemsbyWGZW8yKKiQjIiN.exe PID 5012 wrote to memory of 2576 5012 Service.exe MeXmZemsbyWGZW8yKKiQjIiN.exe PID 5012 wrote to memory of 4060 5012 Service.exe schtasks.exe PID 5012 wrote to memory of 4060 5012 Service.exe schtasks.exe PID 5012 wrote to memory of 4060 5012 Service.exe schtasks.exe PID 5012 wrote to memory of 2292 5012 Service.exe schtasks.exe PID 5012 wrote to memory of 2292 5012 Service.exe schtasks.exe PID 5012 wrote to memory of 2292 5012 Service.exe schtasks.exe PID 2576 wrote to memory of 4584 2576 MeXmZemsbyWGZW8yKKiQjIiN.exe NiceProcessX64.bmp.exe PID 2576 wrote to memory of 4584 2576 MeXmZemsbyWGZW8yKKiQjIiN.exe NiceProcessX64.bmp.exe PID 2576 wrote to memory of 4048 2576 MeXmZemsbyWGZW8yKKiQjIiN.exe mixinte04.bmp.exe PID 2576 wrote to memory of 4048 2576 MeXmZemsbyWGZW8yKKiQjIiN.exe mixinte04.bmp.exe PID 2576 wrote to memory of 4048 2576 MeXmZemsbyWGZW8yKKiQjIiN.exe mixinte04.bmp.exe PID 2576 wrote to memory of 1364 2576 MeXmZemsbyWGZW8yKKiQjIiN.exe ddoAKFf.exe.exe PID 2576 wrote to memory of 1364 2576 MeXmZemsbyWGZW8yKKiQjIiN.exe ddoAKFf.exe.exe PID 2576 wrote to memory of 1364 2576 MeXmZemsbyWGZW8yKKiQjIiN.exe ddoAKFf.exe.exe PID 2576 wrote to memory of 2732 2576 MeXmZemsbyWGZW8yKKiQjIiN.exe yare1095.exe.exe PID 2576 wrote to memory of 2732 2576 MeXmZemsbyWGZW8yKKiQjIiN.exe yare1095.exe.exe PID 2576 wrote to memory of 4024 2576 MeXmZemsbyWGZW8yKKiQjIiN.exe WEFdanE.exe.exe PID 2576 wrote to memory of 4024 2576 MeXmZemsbyWGZW8yKKiQjIiN.exe WEFdanE.exe.exe PID 2576 wrote to memory of 4024 2576 MeXmZemsbyWGZW8yKKiQjIiN.exe WEFdanE.exe.exe PID 2576 wrote to memory of 4756 2576 MeXmZemsbyWGZW8yKKiQjIiN.exe utube.bmp.exe PID 2576 wrote to memory of 4756 2576 MeXmZemsbyWGZW8yKKiQjIiN.exe utube.bmp.exe PID 2576 wrote to memory of 4756 2576 MeXmZemsbyWGZW8yKKiQjIiN.exe utube.bmp.exe PID 2576 wrote to memory of 3716 2576 schtasks.exe build.exe.exe PID 2576 wrote to memory of 3716 2576 schtasks.exe build.exe.exe PID 2576 wrote to memory of 3716 2576 schtasks.exe build.exe.exe PID 2576 wrote to memory of 3208 2576 schtasks.exe setup331.exe.exe PID 2576 wrote to memory of 3208 2576 schtasks.exe setup331.exe.exe PID 2576 wrote to memory of 3208 2576 schtasks.exe setup331.exe.exe PID 4024 wrote to memory of 1500 4024 WEFdanE.exe.exe where.exe PID 4024 wrote to memory of 1500 4024 WEFdanE.exe.exe where.exe PID 4024 wrote to memory of 1500 4024 WEFdanE.exe.exe where.exe PID 1364 wrote to memory of 1532 1364 ddoAKFf.exe.exe where.exe PID 1364 wrote to memory of 1532 1364 ddoAKFf.exe.exe where.exe PID 1364 wrote to memory of 1532 1364 ddoAKFf.exe.exe where.exe PID 2576 wrote to memory of 1756 2576 schtasks.exe AdblockInstaller.exe.exe PID 2576 wrote to memory of 1756 2576 schtasks.exe AdblockInstaller.exe.exe PID 2576 wrote to memory of 1756 2576 schtasks.exe AdblockInstaller.exe.exe PID 2576 wrote to memory of 4224 2576 schtasks.exe B2BCH2.exe.exe PID 2576 wrote to memory of 4224 2576 schtasks.exe B2BCH2.exe.exe PID 2576 wrote to memory of 4224 2576 schtasks.exe B2BCH2.exe.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Service.exe"C:\Users\Admin\AppData\Local\Temp\Service.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Documents\MeXmZemsbyWGZW8yKKiQjIiN.exe"C:\Users\Admin\Documents\MeXmZemsbyWGZW8yKKiQjIiN.exe"2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Pictures\Adobe Films\NiceProcessX64.bmp.exe"C:\Users\Admin\Pictures\Adobe Films\NiceProcessX64.bmp.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\Pictures\Adobe Films\ddoAKFf.exe.exe"C:\Users\Admin\Pictures\Adobe Films\ddoAKFf.exe.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\where.exewhere kkskak993jhfkhjskhdfuhuiwyeuiry789q23489yhkjhsdf /?4⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Calore.sldm & ping -n 5 localhost4⤵
-
C:\Windows\SysWOW64\cmd.execmd5⤵
-
C:\Windows\SysWOW64\tasklist.exetasklist /FI "imagename eq PSUAService.exe"6⤵
- Enumerates processes with tasklist
-
C:\Windows\SysWOW64\find.exefind /I /N "psuaservice.exe"6⤵
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^DSFRIKxgXaTKtMXZByrebjRJrDwrxjAhOWIxSGWRcDMpumUWppHSeWRsqWOyIdTLSGVitCiVojGUmHDEJyUkEHlStdzWSRotKwsm$" Avvenne.sldm6⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Marito.exe.pifMarito.exe.pif x6⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 5 localhost5⤵
- Runs ping.exe
-
C:\Users\Admin\Pictures\Adobe Films\mixinte04.bmp.exe"C:\Users\Admin\Pictures\Adobe Films\mixinte04.bmp.exe"3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "mixinte04.bmp.exe" /f & erase "C:\Users\Admin\Pictures\Adobe Films\mixinte04.bmp.exe" & exit4⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "mixinte04.bmp.exe" /f5⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4048 -s 4924⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\WEFdanE.exe.exe"C:\Users\Admin\Pictures\Adobe Films\WEFdanE.exe.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\where.exewhere kkskak993jhfkhjskhdfuhuiwyeuiry789q23489yhkjhsdf /?4⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Nell.vst & ping -n 5 localhost4⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 5 localhost5⤵
- Runs ping.exe
-
C:\Users\Admin\Pictures\Adobe Films\yare1095.exe.exe"C:\Users\Admin\Pictures\Adobe Films\yare1095.exe.exe"3⤵
- Executes dropped EXE
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2732 -s 6964⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\utube.bmp.exe"C:\Users\Admin\Pictures\Adobe Films\utube.bmp.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zS59F7.tmp\Install.exe.\Install.exe4⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS7649.tmp\Install.exe.\Install.exe /S /site_id "525403"5⤵
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"6⤵
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&7⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:328⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:648⤵
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"6⤵
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&7⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:328⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:648⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gLvwXqanL" /SC once /ST 14:15:24 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gLvwXqanL"6⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gLvwXqanL"6⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bsAbafpwyZvVmVDlMF" /SC once /ST 15:20:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\BInNSjlobDuvYZgQA\dWABRBnWrovPiXF\BSPprLq.exe\" Yz /site_id 525403 /S" /V1 /F6⤵
- Creates scheduled task(s)
-
C:\Users\Admin\Pictures\Adobe Films\build.exe.exe"C:\Users\Admin\Pictures\Adobe Films\build.exe.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\build.exe.exe"C:\Users\Admin\Pictures\Adobe Films\build.exe.exe"4⤵
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\7f012fdb-5b56-4515-b1ca-df1f5699dc2f" /deny *S-1-1-0:(OI)(CI)(DE,DC)5⤵
- Modifies file permissions
-
C:\Users\Admin\Pictures\Adobe Films\build.exe.exe"C:\Users\Admin\Pictures\Adobe Films\build.exe.exe" --Admin IsNotAutoStart IsNotTask5⤵
-
C:\Users\Admin\Pictures\Adobe Films\build.exe.exe"C:\Users\Admin\Pictures\Adobe Films\build.exe.exe" --Admin IsNotAutoStart IsNotTask6⤵
-
C:\Users\Admin\AppData\Local\43d725dd-1a81-4ebc-a1be-6b679653b93c\build2.exe"C:\Users\Admin\AppData\Local\43d725dd-1a81-4ebc-a1be-6b679653b93c\build2.exe"7⤵
-
C:\Users\Admin\AppData\Local\43d725dd-1a81-4ebc-a1be-6b679653b93c\build2.exe"C:\Users\Admin\AppData\Local\43d725dd-1a81-4ebc-a1be-6b679653b93c\build2.exe"8⤵
-
C:\Users\Admin\Pictures\Adobe Films\setup331.exe.exe"C:\Users\Admin\Pictures\Adobe Films\setup331.exe.exe"3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\5VNCVdQR.CPl",4⤵
-
C:\Users\Admin\Pictures\Adobe Films\AdblockInstaller.exe.exe"C:\Users\Admin\Pictures\Adobe Films\AdblockInstaller.exe.exe" /SP- /VERYSILENT /SUPPRESSMSGBOXES /pid=7473⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-G6B83.tmp\AdblockInstaller.exe.tmp"C:\Users\Admin\AppData\Local\Temp\is-G6B83.tmp\AdblockInstaller.exe.tmp" /SL5="$101F4,11860388,791040,C:\Users\Admin\Pictures\Adobe Films\AdblockInstaller.exe.exe" /SP- /VERYSILENT /SUPPRESSMSGBOXES /pid=7474⤵
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im Adblock.exe5⤵
- Kills process with taskkill
-
C:\Users\Admin\Programs\Adblock\Adblock.exe"C:\Users\Admin\Programs\Adblock\Adblock.exe" --installerSessionId=b975079f1659626341 --downloadDate=2022-08-04T15:18:52 --distId=marketator --pid=7475⤵
-
C:\Users\Admin\Programs\Adblock\crashpad_handler.exeC:\Users\Admin\Programs\Adblock\crashpad_handler.exe --no-rate-limit "--database=C:\Users\Admin\AppData\Roaming\Adblock Fast\crashdumps" "--metrics-dir=C:\Users\Admin\AppData\Roaming\Adblock Fast\crashdumps" --url=https://o428832.ingest.sentry.io:443/api/5420194/minidump/?sentry_client=sentry.native/0.4.12&sentry_key=06798e99d7ee416faaf4e01cd2f1faaf "--attachment=C:\Users\Admin\AppData\Roaming\Adblock Fast\crashdumps\d4d7c001-7dc4-4fd9-b139-2e0b17bf28e4.run\__sentry-event" "--attachment=C:\Users\Admin\AppData\Roaming\Adblock Fast\crashdumps\d4d7c001-7dc4-4fd9-b139-2e0b17bf28e4.run\__sentry-breadcrumb1" "--attachment=C:\Users\Admin\AppData\Roaming\Adblock Fast\crashdumps\d4d7c001-7dc4-4fd9-b139-2e0b17bf28e4.run\__sentry-breadcrumb2" --initial-client-data=0x458,0x45c,0x460,0x434,0x464,0x7ff700afbc80,0x7ff700afbca0,0x7ff700afbcb86⤵
-
C:\Windows\system32\netsh.exeC:\Windows\system32\netsh.exe firewall add allowedprogram "C:\Users\Admin\Programs\Adblock\DnsService.exe" AdBlockFast ENABLE6⤵
- Modifies Windows Firewall
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -install6⤵
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -start6⤵
-
C:\Windows\system32\cmd.exe"cmd.exe" /c "reg copy HKLM\Software\Microsoft\Windows\CurrentVersion\Uninstall\{bf5b0da9-8494-48d2-811b-39ea7a64d8e0}_is1 HKCU\Software\Microsoft\Windows\CurrentVersion\Uninstall\{bf5b0da9-8494-48d2-811b-39ea7a64d8e0}_is1 /s /f"5⤵
-
C:\Windows\system32\reg.exereg copy HKLM\Software\Microsoft\Windows\CurrentVersion\Uninstall\{bf5b0da9-8494-48d2-811b-39ea7a64d8e0}_is1 HKCU\Software\Microsoft\Windows\CurrentVersion\Uninstall\{bf5b0da9-8494-48d2-811b-39ea7a64d8e0}_is1 /s /f6⤵
-
C:\Windows\system32\cmd.exe"cmd.exe" /c "reg delete HKLM\Software\Microsoft\Windows\CurrentVersion\Uninstall\{bf5b0da9-8494-48d2-811b-39ea7a64d8e0}_is1 /f"5⤵
-
C:\Windows\system32\reg.exereg delete HKLM\Software\Microsoft\Windows\CurrentVersion\Uninstall\{bf5b0da9-8494-48d2-811b-39ea7a64d8e0}_is1 /f6⤵
- Modifies registry key
-
C:\Users\Admin\Pictures\Adobe Films\B2BCH2.exe.exe"C:\Users\Admin\Pictures\Adobe Films\B2BCH2.exe.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-U69DI.tmp\B2BCH2.exe.tmp"C:\Users\Admin\AppData\Local\Temp\is-U69DI.tmp\B2BCH2.exe.tmp" /SL5="$101EE,254182,170496,C:\Users\Admin\Pictures\Adobe Films\B2BCH2.exe.exe"4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST2⤵
- Creates scheduled task(s)
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 444 -p 2732 -ip 27321⤵
-
C:\Users\Admin\AppData\Local\Temp\is-NMAKE.tmp\djkdj778_______.exe"C:\Users\Admin\AppData\Local\Temp\is-NMAKE.tmp\djkdj778_______.exe" /S /UID=911⤵
-
C:\Users\Admin\AppData\Local\Temp\cc-bf3a1-a8d-f2583-dc45ce029a252\Gegemutaeno.exe"C:\Users\Admin\AppData\Local\Temp\cc-bf3a1-a8d-f2583-dc45ce029a252\Gegemutaeno.exe"2⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.profitabletrustednetwork.com/e2q8zu9hu?key=a971bbe4a40a7216a1a87d8f455f71e63⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff99ed646f8,0x7ff99ed64708,0x7ff99ed647184⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,17359478404356597594,13710420389571144845,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2224 /prefetch:24⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2212,17359478404356597594,13710420389571144845,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:84⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2212,17359478404356597594,13710420389571144845,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:34⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,17359478404356597594,13710420389571144845,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:14⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,17359478404356597594,13710420389571144845,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:14⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2212,17359478404356597594,13710420389571144845,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4920 /prefetch:84⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,17359478404356597594,13710420389571144845,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5676 /prefetch:14⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,17359478404356597594,13710420389571144845,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5688 /prefetch:14⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2212,17359478404356597594,13710420389571144845,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5884 /prefetch:84⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,17359478404356597594,13710420389571144845,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5736 /prefetch:14⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2212,17359478404356597594,13710420389571144845,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5876 /prefetch:84⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2212,17359478404356597594,13710420389571144845,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6188 /prefetch:84⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,17359478404356597594,13710420389571144845,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6464 /prefetch:14⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,17359478404356597594,13710420389571144845,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6480 /prefetch:14⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,17359478404356597594,13710420389571144845,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6008 /prefetch:84⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings4⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x25c,0x260,0x264,0x238,0x268,0x7ff755575460,0x7ff755575470,0x7ff7555754805⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,17359478404356597594,13710420389571144845,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6008 /prefetch:84⤵
-
C:\Users\Admin\AppData\Local\Temp\6a-e36ea-6f9-1168a-94ec29d8edbb4\Hidypenati.exe"C:\Users\Admin\AppData\Local\Temp\6a-e36ea-6f9-1168a-94ec29d8edbb4\Hidypenati.exe"2⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\x2fkz0zx.ih5\gcleaner.exe /mixfive & exit3⤵
-
C:\Users\Admin\AppData\Local\Temp\x2fkz0zx.ih5\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\x2fkz0zx.ih5\gcleaner.exe /mixfive4⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "gcleaner.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\x2fkz0zx.ih5\gcleaner.exe" & exit5⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "gcleaner.exe" /f6⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5676 -s 14645⤵
- Program crash
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\cy2gl04a.xrx\random.exe & exit3⤵
-
C:\Users\Admin\AppData\Local\Temp\cy2gl04a.xrx\random.exeC:\Users\Admin\AppData\Local\Temp\cy2gl04a.xrx\random.exe4⤵
-
C:\Users\Admin\AppData\Local\Temp\cy2gl04a.xrx\random.exe"C:\Users\Admin\AppData\Local\Temp\cy2gl04a.xrx\random.exe" -hq5⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\mqfrz2yg.xud\toolspab3.exe & exit3⤵
-
C:\Users\Admin\AppData\Local\Temp\mqfrz2yg.xud\toolspab3.exeC:\Users\Admin\AppData\Local\Temp\mqfrz2yg.xud\toolspab3.exe4⤵
-
C:\Users\Admin\AppData\Local\Temp\mqfrz2yg.xud\toolspab3.exeC:\Users\Admin\AppData\Local\Temp\mqfrz2yg.xud\toolspab3.exe5⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\dn2f55qz.mui\rmaa1045.exe & exit3⤵
-
C:\Users\Admin\AppData\Local\Temp\dn2f55qz.mui\rmaa1045.exeC:\Users\Admin\AppData\Local\Temp\dn2f55qz.mui\rmaa1045.exe4⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2072 -s 8405⤵
- Program crash
-
C:\Program Files\Windows Portable Devices\NKXMSEOFDD\poweroff.exe"C:\Program Files\Windows Portable Devices\NKXMSEOFDD\poweroff.exe" /VERYSILENT2⤵
-
C:\Users\Admin\AppData\Local\Temp\is-MS0F5.tmp\poweroff.tmp"C:\Users\Admin\AppData\Local\Temp\is-MS0F5.tmp\poweroff.tmp" /SL5="$301E6,490199,350720,C:\Program Files\Windows Portable Devices\NKXMSEOFDD\poweroff.exe" /VERYSILENT3⤵
-
C:\Program Files (x86)\powerOff\Power Off.exe"C:\Program Files (x86)\powerOff\Power Off.exe" -silent -desktopShortcut -programMenu4⤵
-
C:\Windows\SysWOW64\cmd.execmd1⤵
-
C:\Windows\SysWOW64\tasklist.exetasklist /FI "imagename eq PSUAService.exe"2⤵
- Enumerates processes with tasklist
-
C:\Windows\SysWOW64\find.exefind /I /N "psuaservice.exe"2⤵
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^fbpXyeUvKokpHuiTLJQCMdBrjOglErOlAahxaNiKQXgzzuRkquHkiUUZVuLsNJRGzwJfSNBYBuMPeoJyXrlbcCrFbgnkwQWuyHZavCajEJJqotWNbFzJnxkRXtRE$" Mia.vst2⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Voglio.exe.pifVoglio.exe.pif D2⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\5VNCVdQR.CPl",1⤵
-
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\5VNCVdQR.CPl",2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4048 -ip 40481⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\5VNCVdQR.CPl",1⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 5676 -ip 56761⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 524 -p 2072 -ip 20721⤵
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",global1⤵
- Process spawned unexpected child process
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",global2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1836 -s 6003⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 1836 -ip 18361⤵
-
C:\Users\Admin\AppData\Local\Temp\BInNSjlobDuvYZgQA\dWABRBnWrovPiXF\BSPprLq.exeC:\Users\Admin\AppData\Local\Temp\BInNSjlobDuvYZgQA\dWABRBnWrovPiXF\BSPprLq.exe Yz /site_id 525403 /S1⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;"2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\DFQqruzGU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\DFQqruzGU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\HYNzChQHGFrAC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\HYNzChQHGFrAC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\PUGYXcoPCHPXWVCkzFR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\PUGYXcoPCHPXWVCkzFR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\cAMurkQLpHHU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\cAMurkQLpHHU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\xaDtwvIgttUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\xaDtwvIgttUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\UTyLZXhmVkbFYLVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\UTyLZXhmVkbFYLVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\BInNSjlobDuvYZgQA\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\BInNSjlobDuvYZgQA\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\LvGkdVHMKJDKYieT\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\LvGkdVHMKJDKYieT\" /t REG_DWORD /d 0 /reg:64;"2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\DFQqruzGU" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\DFQqruzGU" /t REG_DWORD /d 0 /reg:324⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\DFQqruzGU" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\HYNzChQHGFrAC" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\HYNzChQHGFrAC" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\PUGYXcoPCHPXWVCkzFR" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\PUGYXcoPCHPXWVCkzFR" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\cAMurkQLpHHU2" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\xaDtwvIgttUn" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\xaDtwvIgttUn" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\UTyLZXhmVkbFYLVB /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\UTyLZXhmVkbFYLVB /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\BInNSjlobDuvYZgQA /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\BInNSjlobDuvYZgQA /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\LvGkdVHMKJDKYieT /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\LvGkdVHMKJDKYieT /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\cAMurkQLpHHU2" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gyDOkoXGX" /SC once /ST 04:36:46 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gyDOkoXGX"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gyDOkoXGX"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "DTlRvboJuKuCUrOKN" /SC once /ST 11:03:08 /RU "SYSTEM" /TR "\"C:\Windows\Temp\LvGkdVHMKJDKYieT\OcEHrAExCyHDYVI\bWomvLl.exe\" Mg /site_id 525403 /S" /V1 /F2⤵
- Creates scheduled task(s)
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x510 0x4441⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Persistence
Modify Existing Service
2Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
Modify Registry
3Disabling Security Tools
1File Permissions Modification
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Windows Portable Devices\NKXMSEOFDD\poweroff.exeFilesize
838KB
MD5c0538198613d60407c75c54c55e69d91
SHA1a2d713a098bc7b6d245c428dcdeb5614af3b8edd
SHA256c23f223e4d981eb0e24cadae9dc0c60e40e12ff220d95c9dd2a5b6220fa6d6ed
SHA512121f882471cd14752a1f806472c89028cc56c90fbfb0b645c26937c417f107d5324250f783310032d4526018c8918cdd06c52325949f78220a9d3bab167e3529
-
C:\Program Files\Windows Portable Devices\NKXMSEOFDD\poweroff.exeFilesize
838KB
MD5c0538198613d60407c75c54c55e69d91
SHA1a2d713a098bc7b6d245c428dcdeb5614af3b8edd
SHA256c23f223e4d981eb0e24cadae9dc0c60e40e12ff220d95c9dd2a5b6220fa6d6ed
SHA512121f882471cd14752a1f806472c89028cc56c90fbfb0b645c26937c417f107d5324250f783310032d4526018c8918cdd06c52325949f78220a9d3bab167e3529
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\572BF21E454637C9F000BE1AF9B1E1A9Filesize
506B
MD566a209e234ab78390d9f2fef14c83351
SHA120fbede65baedb17850a01b1ea041741919a283b
SHA256940917cdf26794a31e80bf37ea18ae7134802a48962d00a01117f53ff0701b92
SHA5128ac061219e36e121e901a97c44d2e83420802db6124844f1fef328d5479ad1fb371a797c341b0e541b00c047d8bd236c782f71c284cb5a77bc64728d31099f46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\572BF21E454637C9F000BE1AF9B1E1A9Filesize
248B
MD56d2999e29331dbd93be8bba2730d971a
SHA15f9296aae57d0ed45e914007be5c6ed08647b84b
SHA25645e733c8430d385d66df93d67e87ea8595d2be8a5fb9990c3c2d0f44e6b939a0
SHA512d494a80ef520286a9eabf1df58a80f55dd40c9669f4ee228c8c16eb51db21fe7105093ec511c6eb173c28d13cf06e5c8ae6ace2b364c088ac9186580a3b42e1b
-
C:\Users\Admin\AppData\Local\7f012fdb-5b56-4515-b1ca-df1f5699dc2f\build.exe.exeFilesize
859KB
MD5b928a3c483047a757995aeb4bd856fb8
SHA110492535ba5c73134310edc991e1cce5cc496ae9
SHA256a137ef69c31ccb16b44e956b49a71361b8ad50c06d82b508032239b573677f4d
SHA51220b8f64fab9b2d362fc3ce14a6298777038bd32a2e6c7fcc1ffe980c03da7e966f10f5b7560262bfcb829664a26f445c94184367f2c713993bfcc68b79a3ebe9
-
C:\Users\Admin\AppData\Local\Temp\5VNCVdQR.CPlFilesize
131.1MB
MD597c32eff4e3aa4abfe6eced58a17bc4b
SHA123d478e0130ec3df3bc8182acb5d888be109d142
SHA2564671bb2dd0ff0de4afeed3a8b021d07c24cb03bb60d12101967c2589db93dd22
SHA512e5776a24cadd76fd082b13a1df9c0a07bf3378d22ac8a76e8ca2894e9669c23d62192e5f7d12f7c37c2caf81f947f622359d88d9ffbc9c98e72a3e6344777285
-
C:\Users\Admin\AppData\Local\Temp\5VNCVdQR.cplFilesize
126.8MB
MD53672d3dd07013f6ae4d6175e0d2c5b06
SHA1e6176c9e8d2d59d4dfbb5b52d2bd687e8b1d7961
SHA256b7bdc3111e12d7ce97b07aeb2b8e7c31709b173602b1daf72d48114ce69843ae
SHA512975427cddb748445bf085160e534a7a0193553b1aad3d21130f3ed0c385b534822adb1b88e6c18cee2d2fc166f6e6799796ff15a9e8c7d7430665d853126dee6
-
C:\Users\Admin\AppData\Local\Temp\5VNCVdQR.cplFilesize
132.8MB
MD5eedc0152ce4955d444cb8b25c02881a2
SHA1f218675620605a86c35f8ede88f940995c6b78a3
SHA2561307f7b2b9441490f530dd148e0dc200a7703c0e20ff30553c7faf682668411c
SHA5127ee68232b08543234ff51ac6344a23249907eb4ec916157b95475a54c098fe26ede38786c9395e825c2a7e243a1eeba8ccd8e9f0c3dcc22d3bab34d0e64120a6
-
C:\Users\Admin\AppData\Local\Temp\6a-e36ea-6f9-1168a-94ec29d8edbb4\Hidypenati.exeFilesize
435KB
MD578ace771addfcc39028bd3216e1f9dff
SHA1b1c3ef0ec4193cb6ccb7be1612551008b1a1dec3
SHA256944bba57cbfeecdfd9fa1c0a61681fdcf5f1cca885a66bde958107e18d786bdd
SHA512876e49031c59f159774e4cbdd22388dfef1f66afb7b2ac8ebfc42f991c824cee7b0202be3663babaac00fadb649f589bfd518ab7c119a8962b9f5034504fbf52
-
C:\Users\Admin\AppData\Local\Temp\6a-e36ea-6f9-1168a-94ec29d8edbb4\Hidypenati.exeFilesize
435KB
MD578ace771addfcc39028bd3216e1f9dff
SHA1b1c3ef0ec4193cb6ccb7be1612551008b1a1dec3
SHA256944bba57cbfeecdfd9fa1c0a61681fdcf5f1cca885a66bde958107e18d786bdd
SHA512876e49031c59f159774e4cbdd22388dfef1f66afb7b2ac8ebfc42f991c824cee7b0202be3663babaac00fadb649f589bfd518ab7c119a8962b9f5034504fbf52
-
C:\Users\Admin\AppData\Local\Temp\6a-e36ea-6f9-1168a-94ec29d8edbb4\Hidypenati.exe.configFilesize
1KB
MD598d2687aec923f98c37f7cda8de0eb19
SHA1f6dcfcdcfe570340ecdbbd9e2a61f3cb4f281ba7
SHA2568a94163256a722ef8cc140bcd115a5b8f8725c04fe158b129d47be81cb693465
SHA51295c7290d59749df8df495e04789c1793265e0f34e0d091df5c0d4aefe1af4c8ac1f5460f1f198fc28c4c8c900827b8f22e2851957bbaea5914ea962b3a1d0590
-
C:\Users\Admin\AppData\Local\Temp\7zS59F7.tmp\Install.exeFilesize
6.3MB
MD5bb1bc57d6d77d1820baa0b2f2202bfc2
SHA1ededf38046ea50a3283c6e24618bea36dd7fc888
SHA256e48f064091be84300399ea45d97c048c22ff28312268bbb6304afc11b9c04d4e
SHA512d06c97b2517ef1b00cf1deadbf880cd8c62050980355a5d12c718f018cc54243c0235bff4e8cf73e39fa93b7e8df28cbaa9a20939d363c6cfe092e80099c0373
-
C:\Users\Admin\AppData\Local\Temp\7zS59F7.tmp\Install.exeFilesize
6.3MB
MD5bb1bc57d6d77d1820baa0b2f2202bfc2
SHA1ededf38046ea50a3283c6e24618bea36dd7fc888
SHA256e48f064091be84300399ea45d97c048c22ff28312268bbb6304afc11b9c04d4e
SHA512d06c97b2517ef1b00cf1deadbf880cd8c62050980355a5d12c718f018cc54243c0235bff4e8cf73e39fa93b7e8df28cbaa9a20939d363c6cfe092e80099c0373
-
C:\Users\Admin\AppData\Local\Temp\7zS7649.tmp\Install.exeFilesize
6.8MB
MD53914ad6061cdb09ade58320aa0f5a4a1
SHA12ee210ac01e55a54a282ba67a87e4e72ea023f8a
SHA256f50e0f95bdb02f9582abf6a74df87ab41550fa8fa82d28cf8924e4963e3df297
SHA51202d56ed137846facb58a52107bf44cafd31cc771492814f99149bacb399e31c40c2e81161f3be2e48bae738ce2cf6e9e15f91eae6bee8b883b1fdf0047768377
-
C:\Users\Admin\AppData\Local\Temp\7zS7649.tmp\Install.exeFilesize
6.8MB
MD53914ad6061cdb09ade58320aa0f5a4a1
SHA12ee210ac01e55a54a282ba67a87e4e72ea023f8a
SHA256f50e0f95bdb02f9582abf6a74df87ab41550fa8fa82d28cf8924e4963e3df297
SHA51202d56ed137846facb58a52107bf44cafd31cc771492814f99149bacb399e31c40c2e81161f3be2e48bae738ce2cf6e9e15f91eae6bee8b883b1fdf0047768377
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Calore.sldmFilesize
9KB
MD58d3e1239e664dcb8f43adb6ccd0778c7
SHA18a4efdf95f637a7d8af58ce79e37dbda47a09b46
SHA2568365b7b98c5c569b94a9a6783e7ab0f5242dc77bda1c22a59d063ca29ed21b58
SHA5122570c993a52fa6c064170fa3cbb8cb7f99e404322ed9d9c3ccfc001537cee53848fa70a1c90161d7930771ade6d63b12f89d93a38c28023a480c3ff480431fe6
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Nell.vstFilesize
8KB
MD544c400dcd4a04a7e9d92cbf701dc8dd3
SHA13d403e7d512c1bafe096cf194f985fbcf63acfae
SHA256b9a2d76b7822428f6c8a6ebe4738ce10f64b3fa4d3768f2a35aa0cf69aa5d035
SHA512e778d9b4351b154ddf6e594e6ceaaffc2784927ddb013e7505b3569278ab3e58cb7baa6d6f1fc479af2956ea51f0d88ab1cc7a3d1853dfaf0be56e1f5c37d6e2
-
C:\Users\Admin\AppData\Local\Temp\cc-bf3a1-a8d-f2583-dc45ce029a252\Gegemutaeno.exeFilesize
324KB
MD555f9c8c226d3f434d9518522123c3201
SHA117e8b2629c9ab9122500ecf8802828d894b4aa39
SHA2560869692793e8940ae58615f19957da715c053e7f3e1d5f2aa7d64ea2a9bb077b
SHA512886cd1f6677572abb54b8ec8fa9f2936b895b04fa888df75013dae22ba3e211c1db2271da9b1caad40d8f36e0e29ea8a0ca11e883f6f37938d948f36fe3a8d18
-
C:\Users\Admin\AppData\Local\Temp\cc-bf3a1-a8d-f2583-dc45ce029a252\Gegemutaeno.exeFilesize
324KB
MD555f9c8c226d3f434d9518522123c3201
SHA117e8b2629c9ab9122500ecf8802828d894b4aa39
SHA2560869692793e8940ae58615f19957da715c053e7f3e1d5f2aa7d64ea2a9bb077b
SHA512886cd1f6677572abb54b8ec8fa9f2936b895b04fa888df75013dae22ba3e211c1db2271da9b1caad40d8f36e0e29ea8a0ca11e883f6f37938d948f36fe3a8d18
-
C:\Users\Admin\AppData\Local\Temp\cc-bf3a1-a8d-f2583-dc45ce029a252\Gegemutaeno.exe.configFilesize
1KB
MD598d2687aec923f98c37f7cda8de0eb19
SHA1f6dcfcdcfe570340ecdbbd9e2a61f3cb4f281ba7
SHA2568a94163256a722ef8cc140bcd115a5b8f8725c04fe158b129d47be81cb693465
SHA51295c7290d59749df8df495e04789c1793265e0f34e0d091df5c0d4aefe1af4c8ac1f5460f1f198fc28c4c8c900827b8f22e2851957bbaea5914ea962b3a1d0590
-
C:\Users\Admin\AppData\Local\Temp\is-G6B83.tmp\AdblockInstaller.exe.tmpFilesize
3.0MB
MD564f68f0b5364a0313ef5c2ede5feac47
SHA100ad3dab6e7906ba79ba23ee43809430ed7901b4
SHA25625c367da28a2e61834bbaeed1a594a0ca1e377a8c27215c9ad6ac5d97f671b8b
SHA51275586a619f9dc618652d62849c7de840faf83378adbb78572a342807b2749628fd0baaea79e16124cac5f82aa49bc9f77274af039cd7d52885cc655235658de1
-
C:\Users\Admin\AppData\Local\Temp\is-G6B83.tmp\AdblockInstaller.exe.tmpFilesize
3.0MB
MD564f68f0b5364a0313ef5c2ede5feac47
SHA100ad3dab6e7906ba79ba23ee43809430ed7901b4
SHA25625c367da28a2e61834bbaeed1a594a0ca1e377a8c27215c9ad6ac5d97f671b8b
SHA51275586a619f9dc618652d62849c7de840faf83378adbb78572a342807b2749628fd0baaea79e16124cac5f82aa49bc9f77274af039cd7d52885cc655235658de1
-
C:\Users\Admin\AppData\Local\Temp\is-MM6HK.tmp\PEInjector.dllFilesize
186KB
MD5a4cf124b21795dfd382c12422fd901ca
SHA17e2832f3b8b8e06ae594558d81416e96a81d3898
SHA2569e371a745ea2c92c4ba996772557f4a66545ed5186d02bb2e73e20dc79906ec7
SHA5123ee82d438e4a01d543791a6a17d78e148a68796e5f57d7354da36da0755369091089466e57ee9b786e7e0305a4321c281e03aeb24f6eb4dd07e7408eb3763cdd
-
C:\Users\Admin\AppData\Local\Temp\is-MS0F5.tmp\poweroff.tmpFilesize
981KB
MD501515376348a54ecef04f45b436cb104
SHA1111e709b21bf56181c83057dafba7b71ed41f1b2
SHA2568c1a062cf83fba41daa86670e9ccdb7b7ae3c913fe6d0343284336d40c394ba0
SHA5128d0a31e3694cec61fb99573e58c3696224a6198060d8bfca020805541789516315867b6b83a5e105703660e03fac4906f95f617dc8a3947d6b7982dfd3baea28
-
C:\Users\Admin\AppData\Local\Temp\is-NMAKE.tmp\djkdj778_______.exeFilesize
654KB
MD56c0577d77a62c8bdf98ba2b140785755
SHA19a68170711e2d9fa854523c51ad6b6f52c846024
SHA25602fa861f478283a7030003854fb38447a1d7de8ccdd3b9dd0733984f0002c654
SHA5127463c3d2357a5f53f035ec137e193e5eee27df4f6df8c10b40d963286b221a1dd63906ce5dcb9ffdc1f9931f5df489435a077ef92ae54cdb707969a10e9db798
-
C:\Users\Admin\AppData\Local\Temp\is-NMAKE.tmp\djkdj778_______.exeFilesize
654KB
MD56c0577d77a62c8bdf98ba2b140785755
SHA19a68170711e2d9fa854523c51ad6b6f52c846024
SHA25602fa861f478283a7030003854fb38447a1d7de8ccdd3b9dd0733984f0002c654
SHA5127463c3d2357a5f53f035ec137e193e5eee27df4f6df8c10b40d963286b221a1dd63906ce5dcb9ffdc1f9931f5df489435a077ef92ae54cdb707969a10e9db798
-
C:\Users\Admin\AppData\Local\Temp\is-NMAKE.tmp\idp.dllFilesize
216KB
MD58f995688085bced38ba7795f60a5e1d3
SHA15b1ad67a149c05c50d6e388527af5c8a0af4343a
SHA256203d7b61eac96de865ab3b586160e72c78d93ab5532b13d50ef27174126fd006
SHA512043d41947ab69fc9297dcb5ad238acc2c35250d1172869945ed1a56894c10f93855f0210cbca41ceee9efb55fd56a35a4ec03c77e252409edc64bfb5fb821c35
-
C:\Users\Admin\AppData\Local\Temp\is-U69DI.tmp\B2BCH2.exe.tmpFilesize
805KB
MD5bf8662a2311eb606e0549451323fa2ba
SHA179fbb3b94c91becb56d531806daab15cba55f31c
SHA2564748736cfa0ff8f469c483cd864166c943d30ff9c3ba0f8cdf0b6b9378a89456
SHA512e191a8a50e97800d3fb3cb449d01f1d06dda36d85845355f68d3038e30c3a2a7aa8d87e29f0f638ae85d2badd68eccc26a279f17fb91a38de2fa14a015ed3cc0
-
C:\Users\Admin\Documents\MeXmZemsbyWGZW8yKKiQjIiN.exeFilesize
351KB
MD5312ad3b67a1f3a75637ea9297df1cedb
SHA17d922b102a52241d28f1451d3542db12b0265b75
SHA2563b4c1d0a112668872c1d4f9c9d76087a2afe7a8281a6cb6b972c95fb2f4eb28e
SHA512848db7d47dc37a9025e3df0dda4fbf1c84d9a9191febae38621d9c9b09342a987ff0587108cccfd874cb900c88c5f9f9ca0548f3027f6515ed85c92fd26f8515
-
C:\Users\Admin\Documents\MeXmZemsbyWGZW8yKKiQjIiN.exeFilesize
351KB
MD5312ad3b67a1f3a75637ea9297df1cedb
SHA17d922b102a52241d28f1451d3542db12b0265b75
SHA2563b4c1d0a112668872c1d4f9c9d76087a2afe7a8281a6cb6b972c95fb2f4eb28e
SHA512848db7d47dc37a9025e3df0dda4fbf1c84d9a9191febae38621d9c9b09342a987ff0587108cccfd874cb900c88c5f9f9ca0548f3027f6515ed85c92fd26f8515
-
C:\Users\Admin\Pictures\Adobe Films\AdblockInstaller.exe.exeFilesize
12.1MB
MD519b20fc498d366730c470bacab083fe7
SHA19d63950c73423991e2884392bc9682d836f9e031
SHA2568a227b80714a2ee25f04541f20c7bcee3063d96541dde42e9c99523e2cd74341
SHA5120c03e865381fab1e06b2c42f70a3183bd96b06eaa6524f9d254ff708859b89c92a5f7c7186c84888bd543ad1cbf3d45ca4125acdaec059751e9ba2097f90dedb
-
C:\Users\Admin\Pictures\Adobe Films\AdblockInstaller.exe.exeFilesize
12.1MB
MD519b20fc498d366730c470bacab083fe7
SHA19d63950c73423991e2884392bc9682d836f9e031
SHA2568a227b80714a2ee25f04541f20c7bcee3063d96541dde42e9c99523e2cd74341
SHA5120c03e865381fab1e06b2c42f70a3183bd96b06eaa6524f9d254ff708859b89c92a5f7c7186c84888bd543ad1cbf3d45ca4125acdaec059751e9ba2097f90dedb
-
C:\Users\Admin\Pictures\Adobe Films\B2BCH2.exe.exeFilesize
521KB
MD5300156dc1d3849922f353f244bda0dfb
SHA11f5d047002625fb63f5f4a85b18cd3c7dabc690f
SHA256d311534b6a4a31102eb47cb0be36386237fa1e07d614553b053523cc6c72bf26
SHA512a804e87ae5abdd44ebfdc3598bb4a2a23890550017b3ad5794dd404634c0ad82602b2eb8182416b5a8b803e0dc2408f260b852e78f3387ac771863ed8091958a
-
C:\Users\Admin\Pictures\Adobe Films\B2BCH2.exe.exeFilesize
521KB
MD5300156dc1d3849922f353f244bda0dfb
SHA11f5d047002625fb63f5f4a85b18cd3c7dabc690f
SHA256d311534b6a4a31102eb47cb0be36386237fa1e07d614553b053523cc6c72bf26
SHA512a804e87ae5abdd44ebfdc3598bb4a2a23890550017b3ad5794dd404634c0ad82602b2eb8182416b5a8b803e0dc2408f260b852e78f3387ac771863ed8091958a
-
C:\Users\Admin\Pictures\Adobe Films\NiceProcessX64.bmp.exeFilesize
318KB
MD53f22bd82ee1b38f439e6354c60126d6d
SHA163b57d818f86ea64ebc8566faeb0c977839defde
SHA256265c2ddc8a21e6fa8dfaa38ef0e77df8a2e98273a1abfb575aef93c0cc8ee96a
SHA512b73e8e17e5e99d0e9edfb690ece8b0c15befb4d48b1c4f2fe77c5e3daf01df35858c06e1403a8636f86363708b80123d12122cb821a86b575b184227c760988f
-
C:\Users\Admin\Pictures\Adobe Films\NiceProcessX64.bmp.exeFilesize
318KB
MD53f22bd82ee1b38f439e6354c60126d6d
SHA163b57d818f86ea64ebc8566faeb0c977839defde
SHA256265c2ddc8a21e6fa8dfaa38ef0e77df8a2e98273a1abfb575aef93c0cc8ee96a
SHA512b73e8e17e5e99d0e9edfb690ece8b0c15befb4d48b1c4f2fe77c5e3daf01df35858c06e1403a8636f86363708b80123d12122cb821a86b575b184227c760988f
-
C:\Users\Admin\Pictures\Adobe Films\WEFdanE.exe.exeFilesize
937KB
MD530bf97b0d9cfc24ddb76d6240f4dd041
SHA150c81bc2df517c6239468e3bd30c964c789720db
SHA25687d338b6e921a78c634dbfa9ec6d03e144e6f0e9f7f1aee2133f3ea0c6c2c8fd
SHA51287d5b1c15394e44507478541752f43af0507d44cd931f79e8cb635625316432b196583fdfaa4533ee93adca9fac4b0218c873c366fb7ed956bc4aaa416415cdd
-
C:\Users\Admin\Pictures\Adobe Films\WEFdanE.exe.exeFilesize
937KB
MD530bf97b0d9cfc24ddb76d6240f4dd041
SHA150c81bc2df517c6239468e3bd30c964c789720db
SHA25687d338b6e921a78c634dbfa9ec6d03e144e6f0e9f7f1aee2133f3ea0c6c2c8fd
SHA51287d5b1c15394e44507478541752f43af0507d44cd931f79e8cb635625316432b196583fdfaa4533ee93adca9fac4b0218c873c366fb7ed956bc4aaa416415cdd
-
C:\Users\Admin\Pictures\Adobe Films\build.exe.exeFilesize
859KB
MD5b928a3c483047a757995aeb4bd856fb8
SHA110492535ba5c73134310edc991e1cce5cc496ae9
SHA256a137ef69c31ccb16b44e956b49a71361b8ad50c06d82b508032239b573677f4d
SHA51220b8f64fab9b2d362fc3ce14a6298777038bd32a2e6c7fcc1ffe980c03da7e966f10f5b7560262bfcb829664a26f445c94184367f2c713993bfcc68b79a3ebe9
-
C:\Users\Admin\Pictures\Adobe Films\build.exe.exeFilesize
859KB
MD5b928a3c483047a757995aeb4bd856fb8
SHA110492535ba5c73134310edc991e1cce5cc496ae9
SHA256a137ef69c31ccb16b44e956b49a71361b8ad50c06d82b508032239b573677f4d
SHA51220b8f64fab9b2d362fc3ce14a6298777038bd32a2e6c7fcc1ffe980c03da7e966f10f5b7560262bfcb829664a26f445c94184367f2c713993bfcc68b79a3ebe9
-
C:\Users\Admin\Pictures\Adobe Films\build.exe.exeFilesize
859KB
MD5b928a3c483047a757995aeb4bd856fb8
SHA110492535ba5c73134310edc991e1cce5cc496ae9
SHA256a137ef69c31ccb16b44e956b49a71361b8ad50c06d82b508032239b573677f4d
SHA51220b8f64fab9b2d362fc3ce14a6298777038bd32a2e6c7fcc1ffe980c03da7e966f10f5b7560262bfcb829664a26f445c94184367f2c713993bfcc68b79a3ebe9
-
C:\Users\Admin\Pictures\Adobe Films\ddoAKFf.exe.exeFilesize
836KB
MD561c0ced89e41898e1bd7298d7917dfcb
SHA176a34faa0558de5209725cf66c56ce177fda1717
SHA256e873934da3fd78f5ab8b52c84cec3485524ba9aa798568ff9883aea697474d85
SHA512f9749177d2b6169566a4f43276aa48dfa947b4b3896d7cb84192ddec3699b86aa9d10116066788fc5947d451e72c58f19b836673e437b83db8e7e14dc42d138f
-
C:\Users\Admin\Pictures\Adobe Films\ddoAKFf.exe.exeFilesize
836KB
MD561c0ced89e41898e1bd7298d7917dfcb
SHA176a34faa0558de5209725cf66c56ce177fda1717
SHA256e873934da3fd78f5ab8b52c84cec3485524ba9aa798568ff9883aea697474d85
SHA512f9749177d2b6169566a4f43276aa48dfa947b4b3896d7cb84192ddec3699b86aa9d10116066788fc5947d451e72c58f19b836673e437b83db8e7e14dc42d138f
-
C:\Users\Admin\Pictures\Adobe Films\mixinte04.bmp.exeFilesize
425KB
MD549c0c567c85b7409ee92a75dc0b60d87
SHA1f8998a6bf639b5c7d18e6c71ef889ade22d39874
SHA256bba6479adae33b5748f46cd5a2c41749212ba6265081f88a02c1f3785564c036
SHA512af53109bd6b4122fa5af996245548ad9b2d81460637565fdc55cd3783796bce16734b813505cb7d9d380692547bc101b7b5c9057ad64df6c2e8bca0e06031078
-
C:\Users\Admin\Pictures\Adobe Films\mixinte04.bmp.exeFilesize
425KB
MD549c0c567c85b7409ee92a75dc0b60d87
SHA1f8998a6bf639b5c7d18e6c71ef889ade22d39874
SHA256bba6479adae33b5748f46cd5a2c41749212ba6265081f88a02c1f3785564c036
SHA512af53109bd6b4122fa5af996245548ad9b2d81460637565fdc55cd3783796bce16734b813505cb7d9d380692547bc101b7b5c9057ad64df6c2e8bca0e06031078
-
C:\Users\Admin\Pictures\Adobe Films\setup331.exe.exeFilesize
2.2MB
MD51acbbd0d2db6190acabea64657cb9506
SHA1e83b205dda27c8ccd9011143c7ee9f5f4d5c0fbf
SHA2566e2ebe98a36e46cc25f6bdc0ee02941f3d8334b065e336ab7983775827344bf7
SHA5128508a3a0fcc4f14e847505d5645aaa2bfcb0b51512890db009738b2895b32b65ee0cf09976457d8f03c8f2bce16108a90568ddde28a9ede0be3b21cf293b5dc1
-
C:\Users\Admin\Pictures\Adobe Films\setup331.exe.exeFilesize
2.2MB
MD51acbbd0d2db6190acabea64657cb9506
SHA1e83b205dda27c8ccd9011143c7ee9f5f4d5c0fbf
SHA2566e2ebe98a36e46cc25f6bdc0ee02941f3d8334b065e336ab7983775827344bf7
SHA5128508a3a0fcc4f14e847505d5645aaa2bfcb0b51512890db009738b2895b32b65ee0cf09976457d8f03c8f2bce16108a90568ddde28a9ede0be3b21cf293b5dc1
-
C:\Users\Admin\Pictures\Adobe Films\utube.bmp.exeFilesize
7.3MB
MD5ef024db8f16ffdb1b94650c81d1b7373
SHA19bfe522d355879d74555deff3c32a4599301f794
SHA2564e6580672fc24155c9f780b55295a30784bb4413f2d59c73e3d5c9146bb12280
SHA512fba6e9ae174d45f8cda630c1f9dc900a1163a8a59f37ca0db8ab71f9e8606eda98f791ec5bbf917b41599a1bc5d2f67c89c7025746ea31eef083b8f39a5cef5f
-
C:\Users\Admin\Pictures\Adobe Films\utube.bmp.exeFilesize
7.3MB
MD5ef024db8f16ffdb1b94650c81d1b7373
SHA19bfe522d355879d74555deff3c32a4599301f794
SHA2564e6580672fc24155c9f780b55295a30784bb4413f2d59c73e3d5c9146bb12280
SHA512fba6e9ae174d45f8cda630c1f9dc900a1163a8a59f37ca0db8ab71f9e8606eda98f791ec5bbf917b41599a1bc5d2f67c89c7025746ea31eef083b8f39a5cef5f
-
C:\Users\Admin\Pictures\Adobe Films\yare1095.exe.exeFilesize
3.7MB
MD53ac9935f586cde7304918ddb746bff63
SHA170e920d6a5b8e0682c4625537db9e2e012ffd290
SHA256456e70950a269120e32e349857c3a5624accf0c691af8952987785c319ef0485
SHA51233fa10b0337ef6006c452422cbde366826134b9fedf3f1baa3b8c5281b7c381f19ac570321f30e5f52c785411844ee7fdb73e673e2747f000d38bc7125f9672a
-
C:\Users\Admin\Pictures\Adobe Films\yare1095.exe.exeFilesize
3.7MB
MD53ac9935f586cde7304918ddb746bff63
SHA170e920d6a5b8e0682c4625537db9e2e012ffd290
SHA256456e70950a269120e32e349857c3a5624accf0c691af8952987785c319ef0485
SHA51233fa10b0337ef6006c452422cbde366826134b9fedf3f1baa3b8c5281b7c381f19ac570321f30e5f52c785411844ee7fdb73e673e2747f000d38bc7125f9672a
-
C:\Users\Admin\Programs\Adblock\Adblock.exeFilesize
5.5MB
MD5e0a6b273c481e7f046be45457166927f
SHA14fe433957a243df328c194d365feb3efe56e080c
SHA256d9fe4ac404d4f610f0a94d78f4968005f7c5ab9718199d37ada3be5db50e8cfb
SHA5121c239d20dd9f6b6a2c96d332e7658c4d9b12b6e1e1153bfb04b5bcf101fe91f4df28fa9c4801ad4fa5843a77f3fa99419b0c99a0c4ae5e5b6e76ac0777eb9c2a
-
C:\Users\Admin\Programs\Adblock\Adblock.exeFilesize
5.5MB
MD5e0a6b273c481e7f046be45457166927f
SHA14fe433957a243df328c194d365feb3efe56e080c
SHA256d9fe4ac404d4f610f0a94d78f4968005f7c5ab9718199d37ada3be5db50e8cfb
SHA5121c239d20dd9f6b6a2c96d332e7658c4d9b12b6e1e1153bfb04b5bcf101fe91f4df28fa9c4801ad4fa5843a77f3fa99419b0c99a0c4ae5e5b6e76ac0777eb9c2a
-
C:\Users\Admin\Programs\Adblock\MassiveService.dllFilesize
3.5MB
MD59a00d1d190c8d2f96a63f85efb3b6bd7
SHA17919fe3ef84f6f71647093732a31a494136e96b4
SHA2562ae72c5c7569bfc3729606ecf23d43a70ac5448f683128c08263410f788b4cd9
SHA51213bf806a1dae7a8de2407abaf5562d3f18a2f02d2508f80e500406b6322723dcecfcf202c05b1293045575a10c1c7a2b67e567aaa9102e66620158c794e5d38c
-
C:\Users\Admin\Programs\Adblock\MassiveService.dllFilesize
3.5MB
MD59a00d1d190c8d2f96a63f85efb3b6bd7
SHA17919fe3ef84f6f71647093732a31a494136e96b4
SHA2562ae72c5c7569bfc3729606ecf23d43a70ac5448f683128c08263410f788b4cd9
SHA51213bf806a1dae7a8de2407abaf5562d3f18a2f02d2508f80e500406b6322723dcecfcf202c05b1293045575a10c1c7a2b67e567aaa9102e66620158c794e5d38c
-
C:\Users\Admin\Programs\Adblock\MiningGpu.dllFilesize
643KB
MD5a700a38b69b46c6bd84e562cb84016cd
SHA17ed3c9cf3b2b06504eae208f91fafdf6445876e7
SHA2566ffdb8ce8af7c66fdd95e2f622a7be6c35c6fa8097e3888a8821f7e12e812252
SHA51277b3d0cb076d365f623a285564d586e62d79e56587171f5413cddf97127abe02b1e931b7b283076aa880f662bcc262659fa7921b98d9a84eecd5afcae389d531
-
C:\Users\Admin\Programs\Adblock\MiningGpu.dllFilesize
643KB
MD5a700a38b69b46c6bd84e562cb84016cd
SHA17ed3c9cf3b2b06504eae208f91fafdf6445876e7
SHA2566ffdb8ce8af7c66fdd95e2f622a7be6c35c6fa8097e3888a8821f7e12e812252
SHA51277b3d0cb076d365f623a285564d586e62d79e56587171f5413cddf97127abe02b1e931b7b283076aa880f662bcc262659fa7921b98d9a84eecd5afcae389d531
-
C:\Users\Admin\Programs\Adblock\SysGpuInfoEx.dllFilesize
95KB
MD59174cce86288e15d5add9e199fec063b
SHA13bdee46513e084529220904040af11bb0b1f82c8
SHA25652b31a0b3b8cfacdfbe0b408a722f77d1d553d5bc81383d118ca592ff8732a4e
SHA5127e08336390ae6cb32a4d58242b9538a2d6086e4d949c29e87eb9931b4cbb306a7ae6e819a79ea53c4206de89928373136f9e60da27b9513c0b41c76870fbf034
-
C:\Users\Admin\Programs\Adblock\SysGpuInfoEx.dllFilesize
95KB
MD59174cce86288e15d5add9e199fec063b
SHA13bdee46513e084529220904040af11bb0b1f82c8
SHA25652b31a0b3b8cfacdfbe0b408a722f77d1d553d5bc81383d118ca592ff8732a4e
SHA5127e08336390ae6cb32a4d58242b9538a2d6086e4d949c29e87eb9931b4cbb306a7ae6e819a79ea53c4206de89928373136f9e60da27b9513c0b41c76870fbf034
-
C:\Users\Admin\Programs\Adblock\WinSparkle.dllFilesize
2.3MB
MD5dc301b230db0b280502f7664ef36d979
SHA1dc5dd76ae2b099eda3dfe42412ff1f7707614254
SHA256d4bf5352011fce73574618d067b5bbbecbef135d0caf4de5161dff8462623a60
SHA51226fcc52c6ad1e4dca774127f5dc2c228169cea1eb024fe2e096fc033f8426496c4447eab63c6271620259ff929c7a35998b11396ae596a64f1e1bd87c27ce1f6
-
C:\Users\Admin\Programs\Adblock\WinSparkle.dllFilesize
2.3MB
MD5dc301b230db0b280502f7664ef36d979
SHA1dc5dd76ae2b099eda3dfe42412ff1f7707614254
SHA256d4bf5352011fce73574618d067b5bbbecbef135d0caf4de5161dff8462623a60
SHA51226fcc52c6ad1e4dca774127f5dc2c228169cea1eb024fe2e096fc033f8426496c4447eab63c6271620259ff929c7a35998b11396ae596a64f1e1bd87c27ce1f6
-
C:\Users\Admin\Programs\Adblock\nvml.dllFilesize
988KB
MD5f252ec984a4101c1d6e54c66467a4513
SHA1eac5ed1f80feab9173939c35cf6336d5e2d5cf23
SHA256843f614089a543857dc5b19e866983db322c26857d1aee49a3e0b56b2827e6c1
SHA512b4467ac983ab1711ec0d2d598cddffaa821b52e956142b240a9d0dc94274db007c28067d08e66035397d4536ae81fc5f25779846fcd043153b1d53ab91a14325
-
C:\Users\Admin\Programs\Adblock\xmrBridge.dllFilesize
182KB
MD5912dd91af5715a889cdbcae92d7cf504
SHA1521e3f78dec4aad475b23fa6dfdda5cec2515bfe
SHA256c66f31400961f68b58157b7c131f233caef8f5fc9175dd410adf1d8055109659
SHA512132eadbddcaa0b0cf397ffb7613f78f5ef3f345432a18fd798c7deb4d6dfbf50c07d9d5c7af3f482ee08135a61bd71f75fd4753b932e2899e9e527f2fa79fa37
-
C:\Users\Admin\Programs\Adblock\xmrBridge.dllFilesize
182KB
MD5912dd91af5715a889cdbcae92d7cf504
SHA1521e3f78dec4aad475b23fa6dfdda5cec2515bfe
SHA256c66f31400961f68b58157b7c131f233caef8f5fc9175dd410adf1d8055109659
SHA512132eadbddcaa0b0cf397ffb7613f78f5ef3f345432a18fd798c7deb4d6dfbf50c07d9d5c7af3f482ee08135a61bd71f75fd4753b932e2899e9e527f2fa79fa37
-
memory/372-256-0x00007FF9A0750000-0x00007FF9A1186000-memory.dmpFilesize
10.2MB
-
memory/372-249-0x0000000000000000-mapping.dmp
-
memory/532-378-0x0000000003E30000-0x0000000004458000-memory.dmpFilesize
6.2MB
-
memory/532-380-0x00000000045C0000-0x00000000045E2000-memory.dmpFilesize
136KB
-
memory/532-382-0x0000000004840000-0x00000000048A6000-memory.dmpFilesize
408KB
-
memory/532-381-0x00000000047D0000-0x0000000004836000-memory.dmpFilesize
408KB
-
memory/532-377-0x00000000037C0000-0x00000000037F6000-memory.dmpFilesize
216KB
-
memory/532-383-0x0000000003A80000-0x0000000003A9E000-memory.dmpFilesize
120KB
-
memory/676-185-0x0000000000000000-mapping.dmp
-
memory/1136-280-0x0000000000000000-mapping.dmp
-
memory/1136-282-0x00007FF9A0750000-0x00007FF9A1186000-memory.dmpFilesize
10.2MB
-
memory/1364-140-0x0000000000000000-mapping.dmp
-
memory/1420-213-0x0000000000000000-mapping.dmp
-
memory/1488-222-0x0000000002750000-0x0000000003750000-memory.dmpFilesize
16.0MB
-
memory/1488-283-0x000000002E830000-0x000000002E8F9000-memory.dmpFilesize
804KB
-
memory/1488-285-0x000000002D4A0000-0x000000002D593000-memory.dmpFilesize
972KB
-
memory/1488-217-0x0000000000000000-mapping.dmp
-
memory/1488-240-0x000000002D4A0000-0x000000002D593000-memory.dmpFilesize
972KB
-
memory/1488-238-0x000000002D370000-0x000000002D495000-memory.dmpFilesize
1.1MB
-
memory/1488-287-0x000000002E900000-0x000000002E9B2000-memory.dmpFilesize
712KB
-
memory/1500-159-0x0000000000000000-mapping.dmp
-
memory/1532-161-0x0000000000000000-mapping.dmp
-
memory/1756-232-0x0000000000400000-0x00000000004CE000-memory.dmpFilesize
824KB
-
memory/1756-334-0x0000000000400000-0x00000000004CE000-memory.dmpFilesize
824KB
-
memory/1756-171-0x0000000000400000-0x00000000004CE000-memory.dmpFilesize
824KB
-
memory/1756-166-0x0000000000000000-mapping.dmp
-
memory/1840-216-0x0000000000000000-mapping.dmp
-
memory/1980-208-0x0000000010000000-0x0000000010D69000-memory.dmpFilesize
13.4MB
-
memory/1980-203-0x0000000000000000-mapping.dmp
-
memory/2072-326-0x0000000140000000-0x0000000140684000-memory.dmpFilesize
6.5MB
-
memory/2100-262-0x0000000000000000-mapping.dmp
-
memory/2292-134-0x0000000000000000-mapping.dmp
-
memory/2332-243-0x0000000000000000-mapping.dmp
-
memory/2388-384-0x00007FF98B0B0000-0x00007FF98BB71000-memory.dmpFilesize
10.8MB
-
memory/2552-348-0x0000000000400000-0x0000000000459000-memory.dmpFilesize
356KB
-
memory/2552-345-0x0000000000400000-0x0000000000459000-memory.dmpFilesize
356KB
-
memory/2552-343-0x0000000000400000-0x0000000000459000-memory.dmpFilesize
356KB
-
memory/2552-352-0x0000000060900000-0x0000000060992000-memory.dmpFilesize
584KB
-
memory/2552-379-0x0000000000400000-0x0000000000459000-memory.dmpFilesize
356KB
-
memory/2552-349-0x0000000000400000-0x0000000000459000-memory.dmpFilesize
356KB
-
memory/2568-197-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/2568-189-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/2568-244-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/2568-286-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/2568-186-0x0000000000000000-mapping.dmp
-
memory/2568-199-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/2568-194-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/2576-229-0x00000000034F0000-0x0000000003696000-memory.dmpFilesize
1.6MB
-
memory/2576-130-0x0000000000000000-mapping.dmp
-
memory/2576-135-0x00000000034F0000-0x0000000003696000-memory.dmpFilesize
1.6MB
-
memory/2576-255-0x0000000000000000-mapping.dmp
-
memory/2576-145-0x00000000034F0000-0x0000000003696000-memory.dmpFilesize
1.6MB
-
memory/2732-163-0x0000000140000000-0x000000014067E000-memory.dmpFilesize
6.5MB
-
memory/2732-141-0x0000000000000000-mapping.dmp
-
memory/2804-184-0x0000000000000000-mapping.dmp
-
memory/2848-228-0x0000000000000000-mapping.dmp
-
memory/3108-271-0x0000000000000000-mapping.dmp
-
memory/3208-158-0x0000000000000000-mapping.dmp
-
memory/3492-230-0x0000000000000000-mapping.dmp
-
memory/3548-192-0x0000000000000000-mapping.dmp
-
memory/3644-347-0x000000000077D000-0x00000000007A6000-memory.dmpFilesize
164KB
-
memory/3644-346-0x00000000005C0000-0x0000000000606000-memory.dmpFilesize
280KB
-
memory/3644-344-0x000000000077D000-0x00000000007A6000-memory.dmpFilesize
164KB
-
memory/3656-179-0x0000000000000000-mapping.dmp
-
memory/3716-151-0x0000000000000000-mapping.dmp
-
memory/3716-195-0x000000000209A000-0x000000000212C000-memory.dmpFilesize
584KB
-
memory/3716-196-0x0000000002260000-0x000000000237B000-memory.dmpFilesize
1.1MB
-
memory/4024-144-0x0000000000000000-mapping.dmp
-
memory/4048-235-0x0000000000400000-0x0000000000479000-memory.dmpFilesize
484KB
-
memory/4048-183-0x00000000005D8000-0x00000000005FE000-memory.dmpFilesize
152KB
-
memory/4048-234-0x00000000005D8000-0x00000000005FE000-memory.dmpFilesize
152KB
-
memory/4048-190-0x0000000000400000-0x0000000000479000-memory.dmpFilesize
484KB
-
memory/4048-139-0x0000000000000000-mapping.dmp
-
memory/4048-187-0x00000000020D0000-0x000000000210F000-memory.dmpFilesize
252KB
-
memory/4060-132-0x0000000000000000-mapping.dmp
-
memory/4168-231-0x0000000000000000-mapping.dmp
-
memory/4196-227-0x0000000000000000-mapping.dmp
-
memory/4216-233-0x0000000000000000-mapping.dmp
-
memory/4224-174-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/4224-236-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/4224-170-0x0000000000000000-mapping.dmp
-
memory/4224-178-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/4224-277-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/4344-200-0x0000000000000000-mapping.dmp
-
memory/4364-219-0x00007FF9A0750000-0x00007FF9A1186000-memory.dmpFilesize
10.2MB
-
memory/4364-209-0x0000000000000000-mapping.dmp
-
memory/4512-264-0x0000000000000000-mapping.dmp
-
memory/4524-242-0x0000000000000000-mapping.dmp
-
memory/4540-259-0x0000000000400000-0x000000000045C000-memory.dmpFilesize
368KB
-
memory/4540-302-0x0000000000400000-0x000000000045C000-memory.dmpFilesize
368KB
-
memory/4540-257-0x0000000000000000-mapping.dmp
-
memory/4544-225-0x0000000000000000-mapping.dmp
-
memory/4584-136-0x0000000000000000-mapping.dmp
-
memory/4612-284-0x0000000000000000-mapping.dmp
-
memory/4612-301-0x000000000066A000-0x00000000006FC000-memory.dmpFilesize
584KB
-
memory/4636-237-0x0000000000000000-mapping.dmp
-
memory/4672-313-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/4672-327-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/4672-321-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/4696-251-0x00007FF9A0750000-0x00007FF9A1186000-memory.dmpFilesize
10.2MB
-
memory/4696-245-0x0000000000000000-mapping.dmp
-
memory/4740-224-0x0000000000000000-mapping.dmp
-
memory/4756-148-0x0000000000000000-mapping.dmp
-
memory/4772-223-0x0000000000000000-mapping.dmp
-
memory/4784-182-0x0000000000000000-mapping.dmp
-
memory/4840-281-0x0000000000000000-mapping.dmp
-
memory/4872-241-0x0000000000000000-mapping.dmp
-
memory/4888-226-0x0000000000000000-mapping.dmp
-
memory/5144-291-0x0000000000000000-mapping.dmp
-
memory/5208-292-0x0000000000000000-mapping.dmp
-
memory/5288-293-0x0000000000000000-mapping.dmp
-
memory/5316-294-0x0000000000000000-mapping.dmp
-
memory/5336-295-0x0000000000000000-mapping.dmp
-
memory/5348-296-0x0000000000000000-mapping.dmp
-
memory/5372-297-0x0000000000000000-mapping.dmp
-
memory/5372-299-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/5372-333-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/5372-305-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/5372-303-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/5492-307-0x0000000002820000-0x0000000003820000-memory.dmpFilesize
16.0MB
-
memory/5492-337-0x000000002EA90000-0x000000002EB42000-memory.dmpFilesize
712KB
-
memory/5492-335-0x000000002E9C0000-0x000000002EA89000-memory.dmpFilesize
804KB
-
memory/5492-341-0x000000002E8C0000-0x000000002E9B3000-memory.dmpFilesize
972KB
-
memory/5492-300-0x0000000000000000-mapping.dmp
-
memory/5492-324-0x000000002E8C0000-0x000000002E9B3000-memory.dmpFilesize
972KB
-
memory/5492-323-0x000000002D400000-0x000000002D525000-memory.dmpFilesize
1.1MB
-
memory/5564-371-0x0000000010000000-0x0000000010D69000-memory.dmpFilesize
13.4MB
-
memory/5600-318-0x0000000000580000-0x0000000000589000-memory.dmpFilesize
36KB
-
memory/5600-315-0x000000000070D000-0x000000000071D000-memory.dmpFilesize
64KB
-
memory/5600-304-0x0000000000000000-mapping.dmp
-
memory/5632-306-0x0000000000000000-mapping.dmp
-
memory/5668-308-0x0000000000000000-mapping.dmp
-
memory/5676-338-0x0000000000400000-0x0000000000485000-memory.dmpFilesize
532KB
-
memory/5676-336-0x0000000000688000-0x00000000006AE000-memory.dmpFilesize
152KB
-
memory/5676-320-0x0000000000400000-0x0000000000485000-memory.dmpFilesize
532KB
-
memory/5676-317-0x0000000000688000-0x00000000006AE000-memory.dmpFilesize
152KB
-
memory/5676-319-0x00000000005F0000-0x000000000062F000-memory.dmpFilesize
252KB
-
memory/5676-309-0x0000000000000000-mapping.dmp
-
memory/5712-310-0x0000000000000000-mapping.dmp
-
memory/5792-289-0x0000000000000000-mapping.dmp