Analysis
-
max time kernel
34s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
25-10-2022 14:30
Static task
static1
Behavioral task
behavioral1
Sample
LJK5O5JHPKATxDD0Y366F_yp.exe.0.exe
Resource
win7-20220812-en
General
-
Target
LJK5O5JHPKATxDD0Y366F_yp.exe.0.exe
-
Size
4.8MB
-
MD5
854d5dfe2d5193aa4150765c123df8ad
-
SHA1
1b21d80c4beb90b03d795cf11145619aeb3a4f37
-
SHA256
85b73b7b3c9acc6648beb77ce878ebeea26a2a949bf17c3184f2bd4544d12b45
-
SHA512
48ed604ea966a35cc16631ce5da692bb236badafdb6d3d01ef3a27ab5a9c1ea6a19d6e8209c894ab292614cfbd355c2ca96401fd4dbb9a3abbfd886cddae77cc
-
SSDEEP
98304:GiIOIQKetb5uDv/tFAOoLKSIc5EP61wNYZiu7JfQmEM9:rIbCEA1EP614g9fQm59
Malware Config
Extracted
privateloader
208.67.104.60
http://91.241.19.125/pub.php?pub=one
http://sarfoods.com/index.php
-
payload_url
https://cdn.discordapp.com/attachments/910842184708792331/931507465563045909/dingo_20220114120058.bmp
https://c.xyzgamec.com/userdown/2202/random.exe
http://193.56.146.76/Proxytest.exe
http://www.yzsyjyjh.com/askhelp23/askinstall23.exe
http://privacy-tools-for-you-780.com/downloads/toolspab3.exe
http://luminati-china.xyz/aman/casper2.exe
https://innovicservice.net/assets/vendor/counterup/RobCleanerInstlr95038215.exe
http://tg8.cllgxx.com/hp8/g1/yrpp1047.exe
https://cdn.discordapp.com/attachments/910842184708792331/930849718240698368/Roll.bmp
https://cdn.discordapp.com/attachments/910842184708792331/930850766787330068/real1201.bmp
https://cdn.discordapp.com/attachments/910842184708792331/930882959131693096/Installer.bmp
http://185.215.113.208/ferrari.exe
https://cdn.discordapp.com/attachments/910842184708792331/931233371110141962/LingeringsAntiphon.bmp
https://cdn.discordapp.com/attachments/910842184708792331/931285223709225071/russ.bmp
https://cdn.discordapp.com/attachments/910842184708792331/932720393201016842/filinnn.bmp
https://cdn.discordapp.com/attachments/910842184708792331/933436611427979305/build20k.bmp
https://c.xyzgamec.com/userdown/2202/random.exe
http://mnbuiy.pw/adsli/note8876.exe
http://www.yzsyjyjh.com/askhelp23/askinstall23.exe
http://luminati-china.xyz/aman/casper2.exe
https://suprimax.vet.br/css/fonts/OneCleanerInst942914.exe
http://tg8.cllgxx.com/hp8/g1/ssaa1047.exe
https://www.deezloader.app/files/Deezloader_Remix_Installer_64_bit_4.3.0_Setup.exe
https://www.deezloader.app/files/Deezloader_Remix_Installer_32_bit_4.3.0_Setup.exe
https://cdn.discordapp.com/attachments/910281601559167006/911516400005296219/anyname.exe
https://cdn.discordapp.com/attachments/910281601559167006/911516894660530226/PBsecond.exe
https://cdn.discordapp.com/attachments/910842184708792331/914047763304550410/Xpadder.bmp
Extracted
nymaim
45.139.105.171
85.31.46.167
Extracted
redline
1
80.76.51.172:19241
-
auth_value
4b711fa6f9a5187b40500266349c0baf
Signatures
-
Detects Smokeloader packer 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2940-272-0x0000000002C30000-0x0000000002C39000-memory.dmp family_smokeloader -
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rundll32.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5632 1664 rundll32.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1148-250-0x0000000000400000-0x0000000000428000-memory.dmp family_redline behavioral2/memory/1148-249-0x0000000000000000-mapping.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
LJK5O5JHPKATxDD0Y366F_yp.exe.0.exeJyT1MU1fv8rt8SmYdjsS2rSW.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ LJK5O5JHPKATxDD0Y366F_yp.exe.0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ JyT1MU1fv8rt8SmYdjsS2rSW.exe -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
Processes:
JyT1MU1fv8rt8SmYdjsS2rSW.exehAp_JgYql9Ir69hKfIwxk8ws.exepid process 3820 JyT1MU1fv8rt8SmYdjsS2rSW.exe 3060 hAp_JgYql9Ir69hKfIwxk8ws.exe -
Processes:
resource yara_rule behavioral2/memory/3136-213-0x00000000000B0000-0x0000000000EED000-memory.dmp upx C:\Users\Admin\Pictures\Minor Policy\TeiIbNgO505gB1DBl6OpZtex.exe upx C:\Users\Admin\Pictures\Minor Policy\TeiIbNgO505gB1DBl6OpZtex.exe upx behavioral2/memory/3136-298-0x00000000000B0000-0x0000000000EED000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\892947654.exe upx C:\Users\Admin\AppData\Local\Temp\892947654.exe upx C:\Users\Admin\AppData\Local\Temp\892947654_protected.exe upx behavioral2/memory/5932-347-0x00000000004C0000-0x0000000000CA8000-memory.dmp upx behavioral2/memory/2156-348-0x0000000000DC0000-0x0000000001C75000-memory.dmp upx behavioral2/memory/5932-365-0x00000000004C0000-0x0000000000CA8000-memory.dmp upx behavioral2/memory/2156-359-0x0000000000DC0000-0x0000000001C75000-memory.dmp upx behavioral2/memory/2156-351-0x0000000000DC0000-0x0000000001C75000-memory.dmp upx -
Processes:
resource yara_rule behavioral2/memory/3416-204-0x0000000140000000-0x0000000140623000-memory.dmp vmprotect C:\Users\Admin\Pictures\Minor Policy\08CMyuaqO6zQwr8rxuq9tyE_.exe vmprotect C:\Users\Admin\Pictures\Minor Policy\08CMyuaqO6zQwr8rxuq9tyE_.exe vmprotect behavioral2/memory/5580-374-0x0000000140000000-0x0000000140619000-memory.dmp vmprotect -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
LJK5O5JHPKATxDD0Y366F_yp.exe.0.exeJyT1MU1fv8rt8SmYdjsS2rSW.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion LJK5O5JHPKATxDD0Y366F_yp.exe.0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion JyT1MU1fv8rt8SmYdjsS2rSW.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion JyT1MU1fv8rt8SmYdjsS2rSW.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion LJK5O5JHPKATxDD0Y366F_yp.exe.0.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
LJK5O5JHPKATxDD0Y366F_yp.exe.0.exeJyT1MU1fv8rt8SmYdjsS2rSW.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation LJK5O5JHPKATxDD0Y366F_yp.exe.0.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation JyT1MU1fv8rt8SmYdjsS2rSW.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\892947654_protected.exe themida behavioral2/memory/2156-348-0x0000000000DC0000-0x0000000001C75000-memory.dmp themida behavioral2/memory/2156-359-0x0000000000DC0000-0x0000000001C75000-memory.dmp themida behavioral2/memory/2156-351-0x0000000000DC0000-0x0000000001C75000-memory.dmp themida -
Processes:
LJK5O5JHPKATxDD0Y366F_yp.exe.0.exeJyT1MU1fv8rt8SmYdjsS2rSW.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA LJK5O5JHPKATxDD0Y366F_yp.exe.0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA JyT1MU1fv8rt8SmYdjsS2rSW.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 16 ipinfo.io 17 ipinfo.io 27 ipinfo.io 28 ipinfo.io -
Drops file in System32 directory 4 IoCs
Processes:
JyT1MU1fv8rt8SmYdjsS2rSW.exedescription ioc process File opened for modification C:\Windows\System32\GroupPolicy JyT1MU1fv8rt8SmYdjsS2rSW.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini JyT1MU1fv8rt8SmYdjsS2rSW.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol JyT1MU1fv8rt8SmYdjsS2rSW.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI JyT1MU1fv8rt8SmYdjsS2rSW.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
LJK5O5JHPKATxDD0Y366F_yp.exe.0.exeJyT1MU1fv8rt8SmYdjsS2rSW.exepid process 5012 LJK5O5JHPKATxDD0Y366F_yp.exe.0.exe 3820 JyT1MU1fv8rt8SmYdjsS2rSW.exe -
Drops file in Program Files directory 2 IoCs
Processes:
LJK5O5JHPKATxDD0Y366F_yp.exe.0.exedescription ioc process File created C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe LJK5O5JHPKATxDD0Y366F_yp.exe.0.exe File opened for modification C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe LJK5O5JHPKATxDD0Y366F_yp.exe.0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 19 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4496 4160 WerFault.exe emkGa9V8bEuPzpovxfpWsb3L.exe 4640 5640 WerFault.exe GcleanerEU.exe 5932 5652 WerFault.exe gcleaner.exe 5308 5640 WerFault.exe GcleanerEU.exe 5636 5652 WerFault.exe gcleaner.exe 3164 5640 WerFault.exe GcleanerEU.exe 5256 3708 WerFault.exe rundll32.exe 5312 5652 WerFault.exe gcleaner.exe 4292 5640 WerFault.exe GcleanerEU.exe 1624 5652 WerFault.exe gcleaner.exe 2432 5640 WerFault.exe GcleanerEU.exe 3404 5652 WerFault.exe gcleaner.exe 1472 5640 WerFault.exe GcleanerEU.exe 4280 5652 WerFault.exe gcleaner.exe 3644 5640 WerFault.exe GcleanerEU.exe 1336 5652 WerFault.exe gcleaner.exe 3132 5640 WerFault.exe GcleanerEU.exe 5156 5652 WerFault.exe gcleaner.exe 5896 5640 WerFault.exe GcleanerEU.exe -
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 2960 schtasks.exe 3088 schtasks.exe 748 schtasks.exe 4176 schtasks.exe -
Kills process with taskkill 2 IoCs
Processes:
taskkill.exetaskkill.exepid process 4772 taskkill.exe 1620 taskkill.exe -
Modifies registry class 1 IoCs
Processes:
JyT1MU1fv8rt8SmYdjsS2rSW.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ JyT1MU1fv8rt8SmYdjsS2rSW.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 251 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
LJK5O5JHPKATxDD0Y366F_yp.exe.0.exeJyT1MU1fv8rt8SmYdjsS2rSW.exepid process 5012 LJK5O5JHPKATxDD0Y366F_yp.exe.0.exe 5012 LJK5O5JHPKATxDD0Y366F_yp.exe.0.exe 5012 LJK5O5JHPKATxDD0Y366F_yp.exe.0.exe 5012 LJK5O5JHPKATxDD0Y366F_yp.exe.0.exe 5012 LJK5O5JHPKATxDD0Y366F_yp.exe.0.exe 5012 LJK5O5JHPKATxDD0Y366F_yp.exe.0.exe 3820 JyT1MU1fv8rt8SmYdjsS2rSW.exe 3820 JyT1MU1fv8rt8SmYdjsS2rSW.exe 3820 JyT1MU1fv8rt8SmYdjsS2rSW.exe 3820 JyT1MU1fv8rt8SmYdjsS2rSW.exe 3820 JyT1MU1fv8rt8SmYdjsS2rSW.exe 3820 JyT1MU1fv8rt8SmYdjsS2rSW.exe 3820 JyT1MU1fv8rt8SmYdjsS2rSW.exe 3820 JyT1MU1fv8rt8SmYdjsS2rSW.exe 3820 JyT1MU1fv8rt8SmYdjsS2rSW.exe 3820 JyT1MU1fv8rt8SmYdjsS2rSW.exe 3820 JyT1MU1fv8rt8SmYdjsS2rSW.exe 3820 JyT1MU1fv8rt8SmYdjsS2rSW.exe 3820 JyT1MU1fv8rt8SmYdjsS2rSW.exe 3820 JyT1MU1fv8rt8SmYdjsS2rSW.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
LJK5O5JHPKATxDD0Y366F_yp.exe.0.exeJyT1MU1fv8rt8SmYdjsS2rSW.exedescription pid process target process PID 5012 wrote to memory of 3820 5012 LJK5O5JHPKATxDD0Y366F_yp.exe.0.exe JyT1MU1fv8rt8SmYdjsS2rSW.exe PID 5012 wrote to memory of 3820 5012 LJK5O5JHPKATxDD0Y366F_yp.exe.0.exe JyT1MU1fv8rt8SmYdjsS2rSW.exe PID 5012 wrote to memory of 3820 5012 LJK5O5JHPKATxDD0Y366F_yp.exe.0.exe JyT1MU1fv8rt8SmYdjsS2rSW.exe PID 5012 wrote to memory of 2960 5012 LJK5O5JHPKATxDD0Y366F_yp.exe.0.exe schtasks.exe PID 5012 wrote to memory of 2960 5012 LJK5O5JHPKATxDD0Y366F_yp.exe.0.exe schtasks.exe PID 5012 wrote to memory of 2960 5012 LJK5O5JHPKATxDD0Y366F_yp.exe.0.exe schtasks.exe PID 5012 wrote to memory of 3088 5012 LJK5O5JHPKATxDD0Y366F_yp.exe.0.exe schtasks.exe PID 5012 wrote to memory of 3088 5012 LJK5O5JHPKATxDD0Y366F_yp.exe.0.exe schtasks.exe PID 5012 wrote to memory of 3088 5012 LJK5O5JHPKATxDD0Y366F_yp.exe.0.exe schtasks.exe PID 3820 wrote to memory of 3060 3820 JyT1MU1fv8rt8SmYdjsS2rSW.exe hAp_JgYql9Ir69hKfIwxk8ws.exe PID 3820 wrote to memory of 3060 3820 JyT1MU1fv8rt8SmYdjsS2rSW.exe hAp_JgYql9Ir69hKfIwxk8ws.exe PID 3820 wrote to memory of 3060 3820 JyT1MU1fv8rt8SmYdjsS2rSW.exe hAp_JgYql9Ir69hKfIwxk8ws.exe PID 3820 wrote to memory of 4160 3820 JyT1MU1fv8rt8SmYdjsS2rSW.exe AUDIODG.EXE PID 3820 wrote to memory of 4160 3820 JyT1MU1fv8rt8SmYdjsS2rSW.exe AUDIODG.EXE PID 3820 wrote to memory of 4160 3820 JyT1MU1fv8rt8SmYdjsS2rSW.exe AUDIODG.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\LJK5O5JHPKATxDD0Y366F_yp.exe.0.exe"C:\Users\Admin\AppData\Local\Temp\LJK5O5JHPKATxDD0Y366F_yp.exe.0.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Documents\JyT1MU1fv8rt8SmYdjsS2rSW.exe"C:\Users\Admin\Documents\JyT1MU1fv8rt8SmYdjsS2rSW.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks computer location settings
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Pictures\Minor Policy\emkGa9V8bEuPzpovxfpWsb3L.exe"C:\Users\Admin\Pictures\Minor Policy\emkGa9V8bEuPzpovxfpWsb3L.exe"3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 12324⤵
- Program crash
-
C:\Users\Admin\Pictures\Minor Policy\hAp_JgYql9Ir69hKfIwxk8ws.exe"C:\Users\Admin\Pictures\Minor Policy\hAp_JgYql9Ir69hKfIwxk8ws.exe"3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\QUBEvZ31.CPl",4⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\QUBEvZ31.CPl",5⤵
-
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\QUBEvZ31.CPl",6⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\QUBEvZ31.CPl",7⤵
-
C:\Users\Admin\Pictures\Minor Policy\Ql1Gx0le3xpmEVqIpYdMof5k.exe"C:\Users\Admin\Pictures\Minor Policy\Ql1Gx0le3xpmEVqIpYdMof5k.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\is-PPOSS.tmp\Ql1Gx0le3xpmEVqIpYdMof5k.tmp"C:\Users\Admin\AppData\Local\Temp\is-PPOSS.tmp\Ql1Gx0le3xpmEVqIpYdMof5k.tmp" /SL5="$500E4,254182,170496,C:\Users\Admin\Pictures\Minor Policy\Ql1Gx0le3xpmEVqIpYdMof5k.exe"4⤵
-
C:\Users\Admin\AppData\Local\Temp\is-BO81O.tmp\PowerOff.exe"C:\Users\Admin\AppData\Local\Temp\is-BO81O.tmp\PowerOff.exe" /S /UID=955⤵
-
C:\Users\Admin\AppData\Local\Temp\ad-f1937-9fc-c8aa5-a95b5b65d162b\Qytizhaecaelae.exe"C:\Users\Admin\AppData\Local\Temp\ad-f1937-9fc-c8aa5-a95b5b65d162b\Qytizhaecaelae.exe"6⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\rkl34pc2.kbf\GcleanerEU.exe /eufive & exit7⤵
-
C:\Users\Admin\AppData\Local\Temp\rkl34pc2.kbf\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\rkl34pc2.kbf\GcleanerEU.exe /eufive8⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5640 -s 4529⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5640 -s 7649⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5640 -s 7729⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5640 -s 8169⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5640 -s 7649⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5640 -s 9849⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5640 -s 10129⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5640 -s 13609⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "GcleanerEU.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\rkl34pc2.kbf\GcleanerEU.exe" & exit9⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5640 -s 13809⤵
- Program crash
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\3c1yibjn.5wr\gcleaner.exe /mixfive & exit7⤵
-
C:\Users\Admin\AppData\Local\Temp\3c1yibjn.5wr\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\3c1yibjn.5wr\gcleaner.exe /mixfive8⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5652 -s 4529⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5652 -s 7649⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5652 -s 7729⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5652 -s 8169⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5652 -s 8249⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5652 -s 9849⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5652 -s 10169⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5652 -s 13289⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "gcleaner.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\3c1yibjn.5wr\gcleaner.exe" & exit9⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\pjkdtq1p.0ma\mp3studios_10.exe & exit7⤵
-
C:\Users\Admin\AppData\Local\Temp\pjkdtq1p.0ma\mp3studios_10.exeC:\Users\Admin\AppData\Local\Temp\pjkdtq1p.0ma\mp3studios_10.exe8⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe9⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe10⤵
- Kills process with taskkill
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"9⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7fff38dc4f50,0x7fff38dc4f60,0x7fff38dc4f7010⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1652,5607596606141128081,9622372235454940277,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1912 /prefetch:810⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1652,5607596606141128081,9622372235454940277,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1684 /prefetch:210⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1652,5607596606141128081,9622372235454940277,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2272 /prefetch:810⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,5607596606141128081,9622372235454940277,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3036 /prefetch:110⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,5607596606141128081,9622372235454940277,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2912 /prefetch:110⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,5607596606141128081,9622372235454940277,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3464 /prefetch:110⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,5607596606141128081,9622372235454940277,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3800 /prefetch:110⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,5607596606141128081,9622372235454940277,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4608 /prefetch:810⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,5607596606141128081,9622372235454940277,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4900 /prefetch:810⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,5607596606141128081,9622372235454940277,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4760 /prefetch:810⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\3uurapl3.ntl\random.exe & exit7⤵
-
C:\Users\Admin\AppData\Local\Temp\3uurapl3.ntl\random.exeC:\Users\Admin\AppData\Local\Temp\3uurapl3.ntl\random.exe8⤵
-
C:\Users\Admin\AppData\Local\Temp\3uurapl3.ntl\random.exe"C:\Users\Admin\AppData\Local\Temp\3uurapl3.ntl\random.exe" -q9⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\tdizt2kq.3eb\pb1117.exe & exit7⤵
-
C:\Users\Admin\AppData\Local\Temp\tdizt2kq.3eb\pb1117.exeC:\Users\Admin\AppData\Local\Temp\tdizt2kq.3eb\pb1117.exe8⤵
-
C:\Users\Admin\AppData\Local\Temp\04-bdc9a-e46-35fa0-158c1e621de3c\Lidekuwoshe.exe"C:\Users\Admin\AppData\Local\Temp\04-bdc9a-e46-35fa0-158c1e621de3c\Lidekuwoshe.exe"6⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.profitabletrustednetwork.com/e2q8zu9hu?key=a971bbe4a40a7216a1a87d8f455f71e67⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xf8,0x108,0x7fff3c9d46f8,0x7fff3c9d4708,0x7fff3c9d47188⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,10278638081466054932,6444613938861204157,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2212 /prefetch:28⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2200,10278638081466054932,6444613938861204157,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:38⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2200,10278638081466054932,6444613938861204157,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2568 /prefetch:88⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,10278638081466054932,6444613938861204157,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:18⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,10278638081466054932,6444613938861204157,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4504 /prefetch:18⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,10278638081466054932,6444613938861204157,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:18⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2200,10278638081466054932,6444613938861204157,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4532 /prefetch:88⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,10278638081466054932,6444613938861204157,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:18⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,10278638081466054932,6444613938861204157,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5808 /prefetch:18⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2200,10278638081466054932,6444613938861204157,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3940 /prefetch:88⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,10278638081466054932,6444613938861204157,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5840 /prefetch:18⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2200,10278638081466054932,6444613938861204157,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4684 /prefetch:88⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,10278638081466054932,6444613938861204157,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1816 /prefetch:18⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,10278638081466054932,6444613938861204157,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5884 /prefetch:18⤵
-
C:\Users\Admin\Pictures\Minor Policy\fzO8vObTewkNeYH4413QBpse.exe"C:\Users\Admin\Pictures\Minor Policy\fzO8vObTewkNeYH4413QBpse.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\is-JE4BA.tmp\is-VMTV1.tmp"C:\Users\Admin\AppData\Local\Temp\is-JE4BA.tmp\is-VMTV1.tmp" /SL4 $901FA "C:\Users\Admin\Pictures\Minor Policy\fzO8vObTewkNeYH4413QBpse.exe" 2115285 527364⤵
-
C:\Program Files (x86)\evSearcher\evsearcher59.exe"C:\Program Files (x86)\evSearcher\evsearcher59.exe"5⤵
-
C:\Users\Admin\AppData\Roaming\{d6dc608d-2a27-11ed-a0e3-806e6f6e6963}\ykVKc.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "evsearcher59.exe" /f & erase "C:\Program Files (x86)\evSearcher\evsearcher59.exe" & exit6⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "evsearcher59.exe" /f7⤵
- Kills process with taskkill
-
C:\Users\Admin\Pictures\Minor Policy\TeiIbNgO505gB1DBl6OpZtex.exe"C:\Users\Admin\Pictures\Minor Policy\TeiIbNgO505gB1DBl6OpZtex.exe"3⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "" "Get-WmiObject Win32_PortConnector"4⤵
-
C:\Users\Admin\Pictures\Minor Policy\08CMyuaqO6zQwr8rxuq9tyE_.exe"C:\Users\Admin\Pictures\Minor Policy\08CMyuaqO6zQwr8rxuq9tyE_.exe"3⤵
-
C:\Users\Admin\Pictures\Minor Policy\xbxNvJv0OUfqG8wrgtFLtu1W.exe"C:\Users\Admin\Pictures\Minor Policy\xbxNvJv0OUfqG8wrgtFLtu1W.exe" /SP-/VERYSILENT /SUPPRESSMSGBOXES /INSTALLERSHOWNELSEWHERE /pid=7473⤵
-
C:\Users\Admin\AppData\Local\Temp\is-8F9QA.tmp\xbxNvJv0OUfqG8wrgtFLtu1W.tmp"C:\Users\Admin\AppData\Local\Temp\is-8F9QA.tmp\xbxNvJv0OUfqG8wrgtFLtu1W.tmp" /SL5="$A0066,11860388,791040,C:\Users\Admin\Pictures\Minor Policy\xbxNvJv0OUfqG8wrgtFLtu1W.exe" /SP-/VERYSILENT /SUPPRESSMSGBOXES /INSTALLERSHOWNELSEWHERE /pid=7474⤵
-
C:\Users\Admin\Pictures\Minor Policy\BULnwZnH7Wx7klOoEHXFQV4l.exe"C:\Users\Admin\Pictures\Minor Policy\BULnwZnH7Wx7klOoEHXFQV4l.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS95A8.tmp\Install.exe.\Install.exe4⤵
-
C:\Users\Admin\AppData\Local\Temp\7zSD8CC.tmp\Install.exe.\Install.exe /S /site_id "525403"5⤵
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"6⤵
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&7⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:328⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:648⤵
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"6⤵
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&7⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:328⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:648⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gmxvPcdTC" /SC once /ST 10:21:29 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gmxvPcdTC"6⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gmxvPcdTC"6⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bKFjthDDlmdmBdSpYV" /SC once /ST 14:34:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\LcMDsXLSmMLmtBGQR\VXuqdfXGxZocYTe\kmKklUZ.exe\" JF /site_id 525403 /S" /V1 /F6⤵
- Creates scheduled task(s)
-
C:\Users\Admin\Pictures\Minor Policy\knjeNm2plGG4CXzcXuHEzxL4.exe"C:\Users\Admin\Pictures\Minor Policy\knjeNm2plGG4CXzcXuHEzxL4.exe"3⤵
-
C:\Users\Admin\Pictures\Minor Policy\qL52AbNy0cphJyZATa691Fv0.exe"C:\Users\Admin\Pictures\Minor Policy\qL52AbNy0cphJyZATa691Fv0.exe"3⤵
-
C:\Users\Admin\Pictures\Minor Policy\2WWdG1j7ydOm4yjwp34XAxBe.exe"C:\Users\Admin\Pictures\Minor Policy\2WWdG1j7ydOm4yjwp34XAxBe.exe"3⤵
-
C:\Users\Admin\Pictures\Minor Policy\2WWdG1j7ydOm4yjwp34XAxBe.exe"C:\Users\Admin\Pictures\Minor Policy\2WWdG1j7ydOm4yjwp34XAxBe.exe"4⤵
-
C:\Users\Admin\AppData\Local\Temp\892947654.exe"C:\Users\Admin\AppData\Local\Temp\892947654.exe"5⤵
-
C:\Windows\system32\cmd.execmd.exe /c "del C:\Users\Admin\AppData\Local\Temp\892947654.exe"6⤵
-
C:\Users\Admin\AppData\Local\Temp\892947654_protected.exe"C:\Users\Admin\AppData\Local\Temp\892947654_protected.exe"5⤵
-
C:\Users\Admin\Pictures\Minor Policy\BG3qtignR5hHKQaWXp8C2eFB.exe"C:\Users\Admin\Pictures\Minor Policy\BG3qtignR5hHKQaWXp8C2eFB.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\STOREM~2.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\STOREM~2.EXE4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwA1AA==5⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST2⤵
- Creates scheduled task(s)
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4160 -ip 41601⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 5640 -ip 56401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 5652 -ip 56521⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 5640 -ip 56401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 5652 -ip 56521⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 5640 -ip 56401⤵
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",open1⤵
- Process spawned unexpected child process
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",open2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 6003⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 3708 -ip 37081⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 5652 -ip 56521⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 5640 -ip 56401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 5652 -ip 56521⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 5640 -ip 56401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 5652 -ip 56521⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 5640 -ip 56401⤵
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x300 0x4e81⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 5652 -ip 56521⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 5640 -ip 56401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 5652 -ip 56521⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 5640 -ip 56401⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 5652 -ip 56521⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 5640 -ip 56401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 5652 -ip 56521⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\evSearcher\evsearcher59.exeFilesize
3.3MB
MD51bd1a16f7056dffbbf2ea31f863cd7d6
SHA11c657c42fc4e921abe638286b681c1d9bb644a32
SHA256d862dfc66348bdaf465efd59284a387e42de4a8624d1c98cba82f17ff118280d
SHA51221d3ca070cc86f04f4af2f5434ab0f23ea14328a748f9c909ac0fbdf5f3a78c705dd3bd11f829caeb00850aded3f48801d576764dc207d1c005abf015a76d382
-
C:\Program Files (x86)\evSearcher\evsearcher59.exeFilesize
3.3MB
MD51bd1a16f7056dffbbf2ea31f863cd7d6
SHA11c657c42fc4e921abe638286b681c1d9bb644a32
SHA256d862dfc66348bdaf465efd59284a387e42de4a8624d1c98cba82f17ff118280d
SHA51221d3ca070cc86f04f4af2f5434ab0f23ea14328a748f9c909ac0fbdf5f3a78c705dd3bd11f829caeb00850aded3f48801d576764dc207d1c005abf015a76d382
-
C:\Users\Admin\AppData\Local\Temp\04-bdc9a-e46-35fa0-158c1e621de3c\Lidekuwoshe.exeFilesize
315KB
MD5a1539d5a565503b26710d24a173eb641
SHA14982821c94b1c32d56d2395c4ef53a8fee852e25
SHA2567332f18f1e9b01188e8a64feeb3cfec5013256048efa38d3c7b8173e9f466748
SHA512d0bc439dcc68943fb3a7a3521e298035f66dd55ca34da86280a6f20d35007d2766ef1c892af5c0763e07dbd4032b4106d7928a9e3d9528cfd9aadab60e744878
-
C:\Users\Admin\AppData\Local\Temp\04-bdc9a-e46-35fa0-158c1e621de3c\Lidekuwoshe.exeFilesize
315KB
MD5a1539d5a565503b26710d24a173eb641
SHA14982821c94b1c32d56d2395c4ef53a8fee852e25
SHA2567332f18f1e9b01188e8a64feeb3cfec5013256048efa38d3c7b8173e9f466748
SHA512d0bc439dcc68943fb3a7a3521e298035f66dd55ca34da86280a6f20d35007d2766ef1c892af5c0763e07dbd4032b4106d7928a9e3d9528cfd9aadab60e744878
-
C:\Users\Admin\AppData\Local\Temp\04-bdc9a-e46-35fa0-158c1e621de3c\Lidekuwoshe.exe.configFilesize
1KB
MD598d2687aec923f98c37f7cda8de0eb19
SHA1f6dcfcdcfe570340ecdbbd9e2a61f3cb4f281ba7
SHA2568a94163256a722ef8cc140bcd115a5b8f8725c04fe158b129d47be81cb693465
SHA51295c7290d59749df8df495e04789c1793265e0f34e0d091df5c0d4aefe1af4c8ac1f5460f1f198fc28c4c8c900827b8f22e2851957bbaea5914ea962b3a1d0590
-
C:\Users\Admin\AppData\Local\Temp\3c1yibjn.5wr\gcleaner.exeFilesize
312KB
MD58f1ee52f451f6d1963e1ed28f34e2136
SHA1a6b38b34856cfd85fa42e7e0fb0e99d93a597899
SHA256a8454972aee1e3a8dcbd648482e1a182420dcecb39b72a3d274046909b6b09bb
SHA512dc0d850c6556ab8027a38d6ea83ed92036882ad1e372cac8dbdde852f8a90b9b9cdc9abd513e20bd4fbe4912e880e3c88845fff65355c5bea043c1712198d3a9
-
C:\Users\Admin\AppData\Local\Temp\3c1yibjn.5wr\gcleaner.exeFilesize
312KB
MD58f1ee52f451f6d1963e1ed28f34e2136
SHA1a6b38b34856cfd85fa42e7e0fb0e99d93a597899
SHA256a8454972aee1e3a8dcbd648482e1a182420dcecb39b72a3d274046909b6b09bb
SHA512dc0d850c6556ab8027a38d6ea83ed92036882ad1e372cac8dbdde852f8a90b9b9cdc9abd513e20bd4fbe4912e880e3c88845fff65355c5bea043c1712198d3a9
-
C:\Users\Admin\AppData\Local\Temp\7zS95A8.tmp\Install.exeFilesize
6.3MB
MD582de119ebb20f158aced3e6adb06f5dc
SHA1af33ba359ecd998d5d8d945d6baf7643ddd27815
SHA2560b923269305bd0d0d83768a1de0705d823716cc3c6fa7c16bb4da4a5b50b1b07
SHA5125b51f2f7a0f3a24b210289d98f1586ecfe619bc2264fe58462aa2c46f9c9116e811b1088f2fc02d3273c5ee5e97faecbeba0180daf23549bf840188cb543a2f7
-
C:\Users\Admin\AppData\Local\Temp\7zS95A8.tmp\Install.exeFilesize
6.3MB
MD582de119ebb20f158aced3e6adb06f5dc
SHA1af33ba359ecd998d5d8d945d6baf7643ddd27815
SHA2560b923269305bd0d0d83768a1de0705d823716cc3c6fa7c16bb4da4a5b50b1b07
SHA5125b51f2f7a0f3a24b210289d98f1586ecfe619bc2264fe58462aa2c46f9c9116e811b1088f2fc02d3273c5ee5e97faecbeba0180daf23549bf840188cb543a2f7
-
C:\Users\Admin\AppData\Local\Temp\7zSD8CC.tmp\Install.exeFilesize
7.0MB
MD58c94340110f911923720019e038dbc4d
SHA1534f1f1415337ac1147881432930c35a25206735
SHA256e726dff33704003648f7aa836abf4557b812dee36908ec55366d882a51ee0dad
SHA5128accf7ee26fa9ac60ac4dd89152756f420ea06eba035a9b6782c05f14366f82ca76bec84a54a853071f34b1bc36bd1c31887656a06e378a487e7fe066c476fba
-
C:\Users\Admin\AppData\Local\Temp\7zSD8CC.tmp\Install.exeFilesize
7.0MB
MD58c94340110f911923720019e038dbc4d
SHA1534f1f1415337ac1147881432930c35a25206735
SHA256e726dff33704003648f7aa836abf4557b812dee36908ec55366d882a51ee0dad
SHA5128accf7ee26fa9ac60ac4dd89152756f420ea06eba035a9b6782c05f14366f82ca76bec84a54a853071f34b1bc36bd1c31887656a06e378a487e7fe066c476fba
-
C:\Users\Admin\AppData\Local\Temp\892947654.exeFilesize
2.8MB
MD52f6e731074d5c977e3d6f5d25463269f
SHA1d1a2ef0dcb9f8a9bb41784157bf25aa874e3d23a
SHA2560d75ecc038c2ca5c1f6c6e378b51f6c7abb280d62baf5b298046f3529eb87f20
SHA512a43c39b08de0f578153f83a15374963dd0dd96e1b1aac8cf95ee3a80b7c00151ea5e2bd121d349b4025fba842a8b43fc2ee36e652f089b72bfcc6f8b402d3bf2
-
C:\Users\Admin\AppData\Local\Temp\892947654.exeFilesize
2.8MB
MD52f6e731074d5c977e3d6f5d25463269f
SHA1d1a2ef0dcb9f8a9bb41784157bf25aa874e3d23a
SHA2560d75ecc038c2ca5c1f6c6e378b51f6c7abb280d62baf5b298046f3529eb87f20
SHA512a43c39b08de0f578153f83a15374963dd0dd96e1b1aac8cf95ee3a80b7c00151ea5e2bd121d349b4025fba842a8b43fc2ee36e652f089b72bfcc6f8b402d3bf2
-
C:\Users\Admin\AppData\Local\Temp\892947654_protected.exeFilesize
5.5MB
MD581f14b336cea939b52ef0b8ebb6b8e80
SHA128755e6a8068fa7f9afd9f36c432e3d72d0378c3
SHA25624cac780158e82f1f07fd0f752d84b9e039296fbf08765230c98f89ea0cad142
SHA5120c435a3754cdcc495171842937c786ff20bbb7ba2f4bb665415a93ce1d0c596896756a289c1e62f8b4d9ce3e1d2bddb1e29c154487f5cae31e9300b72940ae2c
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\STOREM~2.EXEFilesize
103.4MB
MD5857f6b546ffc8f0278d789454b724f38
SHA17e2f66bb9570fb346b1b26323e8ef4e605bb65d8
SHA2562ed86f4474b33db91d4bbffa9e2b289ec518cc4581358ebe0849f6cfca39312d
SHA512ac1a01abdb63013275185e8926693338bd12046416c783aafc2a919beab43e4c684754621d170ec41cff89dd07154f1b60b1bcdb71e55a51bb0e781013d8998e
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\STOREM~2.EXEFilesize
101.4MB
MD5efa2a2cb2c76afd858684456684484fa
SHA1747fadaf53542a8c5e80aeddd6375571972ae5a9
SHA25672a15193ee3c3f3d68f4e9bb52e0c6befc032a55b6e34be63f171f81e5c64178
SHA5124e9e2c95ce8b143843aef9296fb0752bdb0c12f87f91a30b814bb9eed7b79038a94986f562dab6b78b1b4f94cd66c352066a441e4b958f160278e942ddf170d6
-
C:\Users\Admin\AppData\Local\Temp\QUBEvZ31.CPlFilesize
2.0MB
MD5c198a65b01cbfaefe0a9869d4ceaf2aa
SHA15e815da92ef70cce3b057b8002976c63677f05ac
SHA256650d306b0505ffb6953dfd92a9765aec5c80db3d83852b968fae47f606dba1ef
SHA5123a74c01896f20729c0ed7815dc6f871b57d7cb8ea3178fb91a3c4bf2a9fbe4a1d4b8ee4b8e1aaa1be3481726fefa266f545112cea4c76e2f4738a5ea4476fff3
-
C:\Users\Admin\AppData\Local\Temp\ad-f1937-9fc-c8aa5-a95b5b65d162b\Kenessey.txtFilesize
9B
MD597384261b8bbf966df16e5ad509922db
SHA12fc42d37fee2c81d767e09fb298b70c748940f86
SHA2569c0d294c05fc1d88d698034609bb81c0c69196327594e4c69d2915c80fd9850c
SHA512b77fe2d86fbc5bd116d6a073eb447e76a74add3fa0d0b801f97535963241be3cdce1dbcaed603b78f020d0845b2d4bfc892ceb2a7d1c8f1d98abc4812ef5af21
-
C:\Users\Admin\AppData\Local\Temp\ad-f1937-9fc-c8aa5-a95b5b65d162b\Qytizhaecaelae.exeFilesize
420KB
MD5cb90d473ea62e95a2767bbe3d91c4c64
SHA161af0628fe380db4c09a8b34ff97a030b313800a
SHA256512627bd32c8c842ea80f63d03fe491a1e8b9494b0083fb62c0d3ced93951223
SHA512e56a94fa9adb28bbfe6862419d177154a98bba4f7105df9c49eb20f19cf51e8844771d925cdbb55df75740e18b5bd204e7ba0f89d4208ca0233fffbc5372bedd
-
C:\Users\Admin\AppData\Local\Temp\ad-f1937-9fc-c8aa5-a95b5b65d162b\Qytizhaecaelae.exeFilesize
420KB
MD5cb90d473ea62e95a2767bbe3d91c4c64
SHA161af0628fe380db4c09a8b34ff97a030b313800a
SHA256512627bd32c8c842ea80f63d03fe491a1e8b9494b0083fb62c0d3ced93951223
SHA512e56a94fa9adb28bbfe6862419d177154a98bba4f7105df9c49eb20f19cf51e8844771d925cdbb55df75740e18b5bd204e7ba0f89d4208ca0233fffbc5372bedd
-
C:\Users\Admin\AppData\Local\Temp\ad-f1937-9fc-c8aa5-a95b5b65d162b\Qytizhaecaelae.exe.configFilesize
1KB
MD598d2687aec923f98c37f7cda8de0eb19
SHA1f6dcfcdcfe570340ecdbbd9e2a61f3cb4f281ba7
SHA2568a94163256a722ef8cc140bcd115a5b8f8725c04fe158b129d47be81cb693465
SHA51295c7290d59749df8df495e04789c1793265e0f34e0d091df5c0d4aefe1af4c8ac1f5460f1f198fc28c4c8c900827b8f22e2851957bbaea5914ea962b3a1d0590
-
C:\Users\Admin\AppData\Local\Temp\is-61SOD.tmp\_isetup\_iscrypt.dllFilesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
C:\Users\Admin\AppData\Local\Temp\is-8F9QA.tmp\xbxNvJv0OUfqG8wrgtFLtu1W.tmpFilesize
3.0MB
MD564f68f0b5364a0313ef5c2ede5feac47
SHA100ad3dab6e7906ba79ba23ee43809430ed7901b4
SHA25625c367da28a2e61834bbaeed1a594a0ca1e377a8c27215c9ad6ac5d97f671b8b
SHA51275586a619f9dc618652d62849c7de840faf83378adbb78572a342807b2749628fd0baaea79e16124cac5f82aa49bc9f77274af039cd7d52885cc655235658de1
-
C:\Users\Admin\AppData\Local\Temp\is-BO81O.tmp\PowerOff.exeFilesize
375KB
MD552fc737d89c67101f7b8dc6361d5212f
SHA1ad328b80bb00bb23ec33baabc27aaa18060acbb0
SHA256f25346bf7c2b71015b0f735824b733a4c043f1b3086d2a232412d069a65b777a
SHA512a4e3441bb7901f3b555e6d28faeebe089331b240331d67878cd429b4a40451e53ab2232ee9d0b7acb7cfa4a013da0df6328f84caa6e9e34ab96669a161530c13
-
C:\Users\Admin\AppData\Local\Temp\is-BO81O.tmp\PowerOff.exeFilesize
375KB
MD552fc737d89c67101f7b8dc6361d5212f
SHA1ad328b80bb00bb23ec33baabc27aaa18060acbb0
SHA256f25346bf7c2b71015b0f735824b733a4c043f1b3086d2a232412d069a65b777a
SHA512a4e3441bb7901f3b555e6d28faeebe089331b240331d67878cd429b4a40451e53ab2232ee9d0b7acb7cfa4a013da0df6328f84caa6e9e34ab96669a161530c13
-
C:\Users\Admin\AppData\Local\Temp\is-BO81O.tmp\idp.dllFilesize
216KB
MD58f995688085bced38ba7795f60a5e1d3
SHA15b1ad67a149c05c50d6e388527af5c8a0af4343a
SHA256203d7b61eac96de865ab3b586160e72c78d93ab5532b13d50ef27174126fd006
SHA512043d41947ab69fc9297dcb5ad238acc2c35250d1172869945ed1a56894c10f93855f0210cbca41ceee9efb55fd56a35a4ec03c77e252409edc64bfb5fb821c35
-
C:\Users\Admin\AppData\Local\Temp\is-JE4BA.tmp\is-VMTV1.tmpFilesize
657KB
MD57cd12c54a9751ca6eee6ab0c85fb68f5
SHA176562e9b7888b6d20d67addb5a90b68b54a51987
SHA256e82cabb027db8846c3430be760f137afa164c36f9e1b93a6e34c96de0b2c5a5f
SHA51227ba5d2f719aaac2ead6fb42f23af3aa866f75026be897cd2f561f3e383904e89e6043bd22b4ae24f69787bd258a68ff696c09c03d656cbf7c79c2a52d8d82cc
-
C:\Users\Admin\AppData\Local\Temp\is-JE4BA.tmp\is-VMTV1.tmpFilesize
657KB
MD57cd12c54a9751ca6eee6ab0c85fb68f5
SHA176562e9b7888b6d20d67addb5a90b68b54a51987
SHA256e82cabb027db8846c3430be760f137afa164c36f9e1b93a6e34c96de0b2c5a5f
SHA51227ba5d2f719aaac2ead6fb42f23af3aa866f75026be897cd2f561f3e383904e89e6043bd22b4ae24f69787bd258a68ff696c09c03d656cbf7c79c2a52d8d82cc
-
C:\Users\Admin\AppData\Local\Temp\is-PPOSS.tmp\Ql1Gx0le3xpmEVqIpYdMof5k.tmpFilesize
805KB
MD5bf8662a2311eb606e0549451323fa2ba
SHA179fbb3b94c91becb56d531806daab15cba55f31c
SHA2564748736cfa0ff8f469c483cd864166c943d30ff9c3ba0f8cdf0b6b9378a89456
SHA512e191a8a50e97800d3fb3cb449d01f1d06dda36d85845355f68d3038e30c3a2a7aa8d87e29f0f638ae85d2badd68eccc26a279f17fb91a38de2fa14a015ed3cc0
-
C:\Users\Admin\AppData\Local\Temp\is-QHA5U.tmp\PEInjector.dllFilesize
186KB
MD5a4cf124b21795dfd382c12422fd901ca
SHA17e2832f3b8b8e06ae594558d81416e96a81d3898
SHA2569e371a745ea2c92c4ba996772557f4a66545ed5186d02bb2e73e20dc79906ec7
SHA5123ee82d438e4a01d543791a6a17d78e148a68796e5f57d7354da36da0755369091089466e57ee9b786e7e0305a4321c281e03aeb24f6eb4dd07e7408eb3763cdd
-
C:\Users\Admin\AppData\Local\Temp\quBEvZ31.cplFilesize
2.0MB
MD5c198a65b01cbfaefe0a9869d4ceaf2aa
SHA15e815da92ef70cce3b057b8002976c63677f05ac
SHA256650d306b0505ffb6953dfd92a9765aec5c80db3d83852b968fae47f606dba1ef
SHA5123a74c01896f20729c0ed7815dc6f871b57d7cb8ea3178fb91a3c4bf2a9fbe4a1d4b8ee4b8e1aaa1be3481726fefa266f545112cea4c76e2f4738a5ea4476fff3
-
C:\Users\Admin\AppData\Local\Temp\quBEvZ31.cplFilesize
2.0MB
MD5c198a65b01cbfaefe0a9869d4ceaf2aa
SHA15e815da92ef70cce3b057b8002976c63677f05ac
SHA256650d306b0505ffb6953dfd92a9765aec5c80db3d83852b968fae47f606dba1ef
SHA5123a74c01896f20729c0ed7815dc6f871b57d7cb8ea3178fb91a3c4bf2a9fbe4a1d4b8ee4b8e1aaa1be3481726fefa266f545112cea4c76e2f4738a5ea4476fff3
-
C:\Users\Admin\AppData\Local\Temp\rkl34pc2.kbf\GcleanerEU.exeFilesize
312KB
MD58f1ee52f451f6d1963e1ed28f34e2136
SHA1a6b38b34856cfd85fa42e7e0fb0e99d93a597899
SHA256a8454972aee1e3a8dcbd648482e1a182420dcecb39b72a3d274046909b6b09bb
SHA512dc0d850c6556ab8027a38d6ea83ed92036882ad1e372cac8dbdde852f8a90b9b9cdc9abd513e20bd4fbe4912e880e3c88845fff65355c5bea043c1712198d3a9
-
C:\Users\Admin\AppData\Local\Temp\rkl34pc2.kbf\GcleanerEU.exeFilesize
312KB
MD58f1ee52f451f6d1963e1ed28f34e2136
SHA1a6b38b34856cfd85fa42e7e0fb0e99d93a597899
SHA256a8454972aee1e3a8dcbd648482e1a182420dcecb39b72a3d274046909b6b09bb
SHA512dc0d850c6556ab8027a38d6ea83ed92036882ad1e372cac8dbdde852f8a90b9b9cdc9abd513e20bd4fbe4912e880e3c88845fff65355c5bea043c1712198d3a9
-
C:\Users\Admin\AppData\Roaming\{d6dc608d-2a27-11ed-a0e3-806e6f6e6963}\ykVKc.exeFilesize
72KB
MD53fb36cb0b7172e5298d2992d42984d06
SHA1439827777df4a337cbb9fa4a4640d0d3fa1738b7
SHA25627ae813ceff8aa56e9fa68c8e50bb1c6c4a01636015eac4bd8bf444afb7020d6
SHA5126b39cb32d77200209a25080ac92bc71b1f468e2946b651023793f3585ee6034adc70924dbd751cf4a51b5e71377854f1ab43c2dd287d4837e7b544ff886f470c
-
C:\Users\Admin\AppData\Roaming\{d6dc608d-2a27-11ed-a0e3-806e6f6e6963}\ykVKc.exeFilesize
72KB
MD53fb36cb0b7172e5298d2992d42984d06
SHA1439827777df4a337cbb9fa4a4640d0d3fa1738b7
SHA25627ae813ceff8aa56e9fa68c8e50bb1c6c4a01636015eac4bd8bf444afb7020d6
SHA5126b39cb32d77200209a25080ac92bc71b1f468e2946b651023793f3585ee6034adc70924dbd751cf4a51b5e71377854f1ab43c2dd287d4837e7b544ff886f470c
-
C:\Users\Admin\Documents\JyT1MU1fv8rt8SmYdjsS2rSW.exeFilesize
5.5MB
MD591f6f48383c2d43120c14b74bf894575
SHA1c49da1e376ae346d420e1486b7b865ee0d6e1485
SHA2566ac2f4b8df5f40ab38af32a7538e2fb12eb243002822b1d17ffa1b7ec1010933
SHA512a93ef32d57ff0991f1a2711371db24063bcf1c5cf4ebf2c24a0ac856b08df046fb760801dce3dca3a4c4f3eaaf18d4c1f0fe2befc5d5df9d5fefadd57f1bc69f
-
C:\Users\Admin\Documents\JyT1MU1fv8rt8SmYdjsS2rSW.exeFilesize
5.5MB
MD591f6f48383c2d43120c14b74bf894575
SHA1c49da1e376ae346d420e1486b7b865ee0d6e1485
SHA2566ac2f4b8df5f40ab38af32a7538e2fb12eb243002822b1d17ffa1b7ec1010933
SHA512a93ef32d57ff0991f1a2711371db24063bcf1c5cf4ebf2c24a0ac856b08df046fb760801dce3dca3a4c4f3eaaf18d4c1f0fe2befc5d5df9d5fefadd57f1bc69f
-
C:\Users\Admin\Pictures\Minor Policy\08CMyuaqO6zQwr8rxuq9tyE_.exeFilesize
3.5MB
MD58659a680d6b2705cf899df0bd6288ae6
SHA178f2a18f624263e03e593f82faac89eb57ede380
SHA25617d633b745260b6d357ae82fd314eb13bb897fbc35750c7340d8d02e97df0f74
SHA512db642d210fef11ca73b78de8cddc82c4a7830febd4c19e4db7bb8b59bf76a5b90323dddadb2392cd456dbac42077e5a21b67fb3be4d2c1bcd01c226c8c455856
-
C:\Users\Admin\Pictures\Minor Policy\08CMyuaqO6zQwr8rxuq9tyE_.exeFilesize
3.5MB
MD58659a680d6b2705cf899df0bd6288ae6
SHA178f2a18f624263e03e593f82faac89eb57ede380
SHA25617d633b745260b6d357ae82fd314eb13bb897fbc35750c7340d8d02e97df0f74
SHA512db642d210fef11ca73b78de8cddc82c4a7830febd4c19e4db7bb8b59bf76a5b90323dddadb2392cd456dbac42077e5a21b67fb3be4d2c1bcd01c226c8c455856
-
C:\Users\Admin\Pictures\Minor Policy\2WWdG1j7ydOm4yjwp34XAxBe.exeFilesize
469KB
MD51539cd68dd1d36dd3a7aa33bfc8fe4b0
SHA1d8b14448c04ba934fa62d647e0cded3065b08c78
SHA256212033484641d51e968cecf3f8f2b7cf275f7c69e5c159093cecb73d07ddf1f3
SHA512348f78b2250d6dc43c6e702e9920f4a878cf385821d148a0fd9529177d873ff6e19645a30f32a62882834095902de9a4426f36fd6b8700c4060211b67b2be137
-
C:\Users\Admin\Pictures\Minor Policy\2WWdG1j7ydOm4yjwp34XAxBe.exeFilesize
469KB
MD51539cd68dd1d36dd3a7aa33bfc8fe4b0
SHA1d8b14448c04ba934fa62d647e0cded3065b08c78
SHA256212033484641d51e968cecf3f8f2b7cf275f7c69e5c159093cecb73d07ddf1f3
SHA512348f78b2250d6dc43c6e702e9920f4a878cf385821d148a0fd9529177d873ff6e19645a30f32a62882834095902de9a4426f36fd6b8700c4060211b67b2be137
-
C:\Users\Admin\Pictures\Minor Policy\2WWdG1j7ydOm4yjwp34XAxBe.exeFilesize
469KB
MD51539cd68dd1d36dd3a7aa33bfc8fe4b0
SHA1d8b14448c04ba934fa62d647e0cded3065b08c78
SHA256212033484641d51e968cecf3f8f2b7cf275f7c69e5c159093cecb73d07ddf1f3
SHA512348f78b2250d6dc43c6e702e9920f4a878cf385821d148a0fd9529177d873ff6e19645a30f32a62882834095902de9a4426f36fd6b8700c4060211b67b2be137
-
C:\Users\Admin\Pictures\Minor Policy\BG3qtignR5hHKQaWXp8C2eFB.exeFilesize
603KB
MD5cb90f4dd9eb3424268b20a1581668acd
SHA1136a226e0f56c7bf53822ab116ea4304b8a636e6
SHA25649d6552ae5c5027ce1e68edee2438564b50ddc384276fd97360c92503771d3ac
SHA51243ef96a52dfe7018d7fd9315c428fb1b368e92357585f57bd405260d5e5d9f498e423d0a3d5de1ef300983f3f7b42bd7a2f2217ca5d74b88c4533021086c19a4
-
C:\Users\Admin\Pictures\Minor Policy\BULnwZnH7Wx7klOoEHXFQV4l.exeFilesize
7.3MB
MD55af7ec5fe91265054817fb4e447baba1
SHA1986883b0eb4c41ec0a1e069cb0494b9abb0faf91
SHA2568cc43c2127add415d2f2ab6f53e4a14417c51a180acf9312c4ab0531aa15a592
SHA51227eb4d51d994a68bff4597cfcef8934bc495ff18d1bb368c7b05ee3b96781e6bf0e0f49b121f97c37fd5581f9cf4aa5fa0ae044805886abbbb3a477993e1dad4
-
C:\Users\Admin\Pictures\Minor Policy\BULnwZnH7Wx7klOoEHXFQV4l.exeFilesize
7.3MB
MD55af7ec5fe91265054817fb4e447baba1
SHA1986883b0eb4c41ec0a1e069cb0494b9abb0faf91
SHA2568cc43c2127add415d2f2ab6f53e4a14417c51a180acf9312c4ab0531aa15a592
SHA51227eb4d51d994a68bff4597cfcef8934bc495ff18d1bb368c7b05ee3b96781e6bf0e0f49b121f97c37fd5581f9cf4aa5fa0ae044805886abbbb3a477993e1dad4
-
C:\Users\Admin\Pictures\Minor Policy\Ql1Gx0le3xpmEVqIpYdMof5k.exeFilesize
521KB
MD55fe1f92b221d98a8504139a2792265f8
SHA15faf25f3ee80a45b85f4d1fb971ab9cfd1ff174d
SHA2562fcbef2bf5b78f4e5205397a80b7f393762d78331166930b682dde2da4a16858
SHA512b40a7cb1cfd119883e3ae5126b50a73641f184daa49eddc620728a1a2c8e4b5c2e6154bad5a0b6faf053c8049144208ffe4e209611df94e995489b9257ff362d
-
C:\Users\Admin\Pictures\Minor Policy\Ql1Gx0le3xpmEVqIpYdMof5k.exeFilesize
521KB
MD55fe1f92b221d98a8504139a2792265f8
SHA15faf25f3ee80a45b85f4d1fb971ab9cfd1ff174d
SHA2562fcbef2bf5b78f4e5205397a80b7f393762d78331166930b682dde2da4a16858
SHA512b40a7cb1cfd119883e3ae5126b50a73641f184daa49eddc620728a1a2c8e4b5c2e6154bad5a0b6faf053c8049144208ffe4e209611df94e995489b9257ff362d
-
C:\Users\Admin\Pictures\Minor Policy\TeiIbNgO505gB1DBl6OpZtex.exeFilesize
4.3MB
MD523e76bc79f77178796d7d9a6b4048991
SHA1f27fc1b0979cb8c93d2de4b258ce9a25817a4645
SHA25642c5acd0133e2653a0e4f9792906d42f16cf44c6ea920dca1edaf74618feb437
SHA51258fad6a58464ee8263e4998f8fe970d046566740ac4c775af23fe96ff811139bf7da8e1fe00d25fc02b920ff64a6fea09fca28c007b24c5827a046c196d5a6d1
-
C:\Users\Admin\Pictures\Minor Policy\TeiIbNgO505gB1DBl6OpZtex.exeFilesize
4.3MB
MD523e76bc79f77178796d7d9a6b4048991
SHA1f27fc1b0979cb8c93d2de4b258ce9a25817a4645
SHA25642c5acd0133e2653a0e4f9792906d42f16cf44c6ea920dca1edaf74618feb437
SHA51258fad6a58464ee8263e4998f8fe970d046566740ac4c775af23fe96ff811139bf7da8e1fe00d25fc02b920ff64a6fea09fca28c007b24c5827a046c196d5a6d1
-
C:\Users\Admin\Pictures\Minor Policy\emkGa9V8bEuPzpovxfpWsb3L.exeFilesize
354KB
MD5abab29d520104b7edd956939380a50a8
SHA130c35697246ac160da07cc33731682c0c531fe92
SHA2562dae85199cef5a4596e5bb6372a14c8dcd66f2fdbd7c02a1756736a660222e36
SHA51249be3a5e3fb31f9df4f07296ada4696d82b09021657b61e6aaa4aa0913b035f396c7e082298b2ec72b22a94c310d0ad195bb257599361b4c5729499b4f5a9487
-
C:\Users\Admin\Pictures\Minor Policy\emkGa9V8bEuPzpovxfpWsb3L.exeFilesize
354KB
MD5abab29d520104b7edd956939380a50a8
SHA130c35697246ac160da07cc33731682c0c531fe92
SHA2562dae85199cef5a4596e5bb6372a14c8dcd66f2fdbd7c02a1756736a660222e36
SHA51249be3a5e3fb31f9df4f07296ada4696d82b09021657b61e6aaa4aa0913b035f396c7e082298b2ec72b22a94c310d0ad195bb257599361b4c5729499b4f5a9487
-
C:\Users\Admin\Pictures\Minor Policy\fzO8vObTewkNeYH4413QBpse.exeFilesize
2.3MB
MD57949952f3f677ee2b0c983ee88129c22
SHA10c0c9678c44e69d86ab2ab4dea04e6b99c0237a9
SHA2567df0752b03c785feec29e5a4aeb6e3d492a36e0bb7577c8d18d714b7a5c18965
SHA5128f36dae477f6a1c01afdc7e0e9921120f3267393c2725827504f0156028d86820fe14f483252bb8a8d3b9116f5293623454b8e819e10e213fe55f08904adbfb1
-
C:\Users\Admin\Pictures\Minor Policy\fzO8vObTewkNeYH4413QBpse.exeFilesize
2.3MB
MD57949952f3f677ee2b0c983ee88129c22
SHA10c0c9678c44e69d86ab2ab4dea04e6b99c0237a9
SHA2567df0752b03c785feec29e5a4aeb6e3d492a36e0bb7577c8d18d714b7a5c18965
SHA5128f36dae477f6a1c01afdc7e0e9921120f3267393c2725827504f0156028d86820fe14f483252bb8a8d3b9116f5293623454b8e819e10e213fe55f08904adbfb1
-
C:\Users\Admin\Pictures\Minor Policy\hAp_JgYql9Ir69hKfIwxk8ws.exeFilesize
1.8MB
MD5137f4fefc04c8797e8f9642010d6c1c5
SHA1c1b0a21ce94c69d76a0f73033313b0a771511179
SHA25613f4d6ab9c67bfd7a6f1ae6253885cee2bc6702a1ae340668188f4042773d291
SHA512c5faa281bda59443f00321beb2a09743d72f59199a2ea6e3b990a4e04fac9abc4237de2f80cfc74e85e07f19f5aeaa1bf79cfdff8b9d5a05a465d6af023913e8
-
C:\Users\Admin\Pictures\Minor Policy\hAp_JgYql9Ir69hKfIwxk8ws.exeFilesize
1.8MB
MD5137f4fefc04c8797e8f9642010d6c1c5
SHA1c1b0a21ce94c69d76a0f73033313b0a771511179
SHA25613f4d6ab9c67bfd7a6f1ae6253885cee2bc6702a1ae340668188f4042773d291
SHA512c5faa281bda59443f00321beb2a09743d72f59199a2ea6e3b990a4e04fac9abc4237de2f80cfc74e85e07f19f5aeaa1bf79cfdff8b9d5a05a465d6af023913e8
-
C:\Users\Admin\Pictures\Minor Policy\knjeNm2plGG4CXzcXuHEzxL4.exeFilesize
244KB
MD5fa1cdba375b8d6483972b852d5c30c41
SHA158225e14a1478d5d1fd056c9c9337e3aedf25607
SHA256805962cb40d644af0724e7f43036116bea8c7c44697bd0ae3ff0094b5d36562c
SHA5129434618106ea405fcb31e1798191a04247d911cb883d9ad16f55f070e50b8d6d8d669da337bc61d0e2cb3bef177309b0c06c28b90c3b6a3869a758464313eaf8
-
C:\Users\Admin\Pictures\Minor Policy\knjeNm2plGG4CXzcXuHEzxL4.exeFilesize
244KB
MD5fa1cdba375b8d6483972b852d5c30c41
SHA158225e14a1478d5d1fd056c9c9337e3aedf25607
SHA256805962cb40d644af0724e7f43036116bea8c7c44697bd0ae3ff0094b5d36562c
SHA5129434618106ea405fcb31e1798191a04247d911cb883d9ad16f55f070e50b8d6d8d669da337bc61d0e2cb3bef177309b0c06c28b90c3b6a3869a758464313eaf8
-
C:\Users\Admin\Pictures\Minor Policy\qL52AbNy0cphJyZATa691Fv0.exeFilesize
104KB
MD585270630c529e1480e3b1df60a00e020
SHA193867a17a40b5886a11018368df44e8cebe0ff86
SHA256b369c9f34e7351fc2616f2f951ea429da6e635df522710e915c14a6b78429503
SHA512a47b86b4e059ac7be8c5d42d0a15a27a479c78c1e65181fe84bb46dd689c9307bcc7d88028fac388713802efe3502a8af3f3d321a2c776b4970537c65c647be3
-
C:\Users\Admin\Pictures\Minor Policy\qL52AbNy0cphJyZATa691Fv0.exeFilesize
104KB
MD585270630c529e1480e3b1df60a00e020
SHA193867a17a40b5886a11018368df44e8cebe0ff86
SHA256b369c9f34e7351fc2616f2f951ea429da6e635df522710e915c14a6b78429503
SHA512a47b86b4e059ac7be8c5d42d0a15a27a479c78c1e65181fe84bb46dd689c9307bcc7d88028fac388713802efe3502a8af3f3d321a2c776b4970537c65c647be3
-
C:\Users\Admin\Pictures\Minor Policy\xbxNvJv0OUfqG8wrgtFLtu1W.exeFilesize
12.1MB
MD519b20fc498d366730c470bacab083fe7
SHA19d63950c73423991e2884392bc9682d836f9e031
SHA2568a227b80714a2ee25f04541f20c7bcee3063d96541dde42e9c99523e2cd74341
SHA5120c03e865381fab1e06b2c42f70a3183bd96b06eaa6524f9d254ff708859b89c92a5f7c7186c84888bd543ad1cbf3d45ca4125acdaec059751e9ba2097f90dedb
-
C:\Users\Admin\Pictures\Minor Policy\xbxNvJv0OUfqG8wrgtFLtu1W.exeFilesize
12.1MB
MD519b20fc498d366730c470bacab083fe7
SHA19d63950c73423991e2884392bc9682d836f9e031
SHA2568a227b80714a2ee25f04541f20c7bcee3063d96541dde42e9c99523e2cd74341
SHA5120c03e865381fab1e06b2c42f70a3183bd96b06eaa6524f9d254ff708859b89c92a5f7c7186c84888bd543ad1cbf3d45ca4125acdaec059751e9ba2097f90dedb
-
C:\Windows\system32\GroupPolicy\gpt.iniFilesize
268B
MD5a62ce44a33f1c05fc2d340ea0ca118a4
SHA11f03eb4716015528f3de7f7674532c1345b2717d
SHA2569f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a
SHA5129d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732
-
memory/400-191-0x0000000000000000-mapping.dmp
-
memory/700-352-0x0000000000000000-mapping.dmp
-
memory/748-302-0x0000000000000000-mapping.dmp
-
memory/1036-358-0x0000000000000000-mapping.dmp
-
memory/1148-249-0x0000000000000000-mapping.dmp
-
memory/1148-326-0x00000000095B0000-0x0000000009772000-memory.dmpFilesize
1.8MB
-
memory/1148-327-0x0000000009CB0000-0x000000000A1DC000-memory.dmpFilesize
5.2MB
-
memory/1148-317-0x0000000007880000-0x00000000078D0000-memory.dmpFilesize
320KB
-
memory/1148-293-0x0000000005830000-0x0000000005896000-memory.dmpFilesize
408KB
-
memory/1148-262-0x00000000076A0000-0x00000000076DC000-memory.dmpFilesize
240KB
-
memory/1148-261-0x0000000005AF0000-0x0000000005B02000-memory.dmpFilesize
72KB
-
memory/1148-258-0x00000000074D0000-0x00000000075DA000-memory.dmpFilesize
1.0MB
-
memory/1148-257-0x0000000005B40000-0x0000000006158000-memory.dmpFilesize
6.1MB
-
memory/1148-250-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/1212-187-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/1212-290-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/1212-166-0x0000000000000000-mapping.dmp
-
memory/1276-285-0x0000000000000000-mapping.dmp
-
memory/1308-224-0x0000000000000000-mapping.dmp
-
memory/1340-165-0x0000000000000000-mapping.dmp
-
memory/1472-362-0x0000000000000000-mapping.dmp
-
memory/1596-340-0x00000000059A0000-0x00000000059BE000-memory.dmpFilesize
120KB
-
memory/1596-309-0x0000000000000000-mapping.dmp
-
memory/1596-316-0x00000000020E0000-0x0000000002116000-memory.dmpFilesize
216KB
-
memory/1596-319-0x0000000004DF0000-0x0000000005418000-memory.dmpFilesize
6.2MB
-
memory/1596-325-0x0000000004CF0000-0x0000000004D56000-memory.dmpFilesize
408KB
-
memory/1620-350-0x0000000000000000-mapping.dmp
-
memory/1752-300-0x0000000000000000-mapping.dmp
-
memory/2156-359-0x0000000000DC0000-0x0000000001C75000-memory.dmpFilesize
14.7MB
-
memory/2156-348-0x0000000000DC0000-0x0000000001C75000-memory.dmpFilesize
14.7MB
-
memory/2156-351-0x0000000000DC0000-0x0000000001C75000-memory.dmpFilesize
14.7MB
-
memory/2156-345-0x0000000000000000-mapping.dmp
-
memory/2156-361-0x00007FFF5A5D0000-0x00007FFF5A7C5000-memory.dmpFilesize
2.0MB
-
memory/2156-354-0x00007FFF5A5D0000-0x00007FFF5A7C5000-memory.dmpFilesize
2.0MB
-
memory/2240-304-0x0000000000000000-mapping.dmp
-
memory/2240-318-0x0000000000000000-mapping.dmp
-
memory/2276-227-0x0000000000000000-mapping.dmp
-
memory/2360-364-0x0000000000000000-mapping.dmp
-
memory/2472-239-0x0000000000400000-0x000000000154A000-memory.dmpFilesize
17.3MB
-
memory/2472-265-0x0000000010000000-0x000000001001B000-memory.dmpFilesize
108KB
-
memory/2472-232-0x0000000000400000-0x000000000154A000-memory.dmpFilesize
17.3MB
-
memory/2472-229-0x0000000000000000-mapping.dmp
-
memory/2472-311-0x0000000000400000-0x000000000154A000-memory.dmpFilesize
17.3MB
-
memory/2504-310-0x0000000000000000-mapping.dmp
-
memory/2764-198-0x0000000000000000-mapping.dmp
-
memory/2940-284-0x0000000000400000-0x0000000002C2A000-memory.dmpFilesize
40.2MB
-
memory/2940-291-0x0000000002C72000-0x0000000002C87000-memory.dmpFilesize
84KB
-
memory/2940-297-0x0000000000400000-0x0000000002C2A000-memory.dmpFilesize
40.2MB
-
memory/2940-169-0x0000000000000000-mapping.dmp
-
memory/2940-272-0x0000000002C30000-0x0000000002C39000-memory.dmpFilesize
36KB
-
memory/2960-143-0x0000000000000000-mapping.dmp
-
memory/3024-205-0x0000000000000000-mapping.dmp
-
memory/3060-161-0x0000000000000000-mapping.dmp
-
memory/3064-315-0x00000000038B0000-0x0000000003971000-memory.dmpFilesize
772KB
-
memory/3064-322-0x0000000003370000-0x000000000341D000-memory.dmpFilesize
692KB
-
memory/3064-313-0x0000000003790000-0x00000000038A9000-memory.dmpFilesize
1.1MB
-
memory/3064-305-0x0000000000000000-mapping.dmp
-
memory/3064-312-0x0000000003550000-0x0000000003669000-memory.dmpFilesize
1.1MB
-
memory/3088-146-0x0000000000000000-mapping.dmp
-
memory/3136-213-0x00000000000B0000-0x0000000000EED000-memory.dmpFilesize
14.2MB
-
memory/3136-298-0x00000000000B0000-0x0000000000EED000-memory.dmpFilesize
14.2MB
-
memory/3136-167-0x0000000000000000-mapping.dmp
-
memory/3360-308-0x0000000000000000-mapping.dmp
-
memory/3412-189-0x0000000000400000-0x00000000004CE000-memory.dmpFilesize
824KB
-
memory/3412-168-0x0000000000000000-mapping.dmp
-
memory/3412-288-0x0000000000400000-0x00000000004CE000-memory.dmpFilesize
824KB
-
memory/3416-204-0x0000000140000000-0x0000000140623000-memory.dmpFilesize
6.1MB
-
memory/3416-170-0x0000000000000000-mapping.dmp
-
memory/3656-296-0x0000000000000000-mapping.dmp
-
memory/3716-245-0x0000000010000000-0x0000000011000000-memory.dmpFilesize
16.0MB
-
memory/3716-240-0x0000000000000000-mapping.dmp
-
memory/3804-289-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/3804-164-0x0000000000000000-mapping.dmp
-
memory/3804-188-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/3820-159-0x0000000000400000-0x0000000000EB9000-memory.dmpFilesize
10.7MB
-
memory/3820-149-0x0000000000400000-0x0000000000EB9000-memory.dmpFilesize
10.7MB
-
memory/3820-173-0x0000000077000000-0x00000000771A3000-memory.dmpFilesize
1.6MB
-
memory/3820-218-0x0000000000400000-0x0000000000EB9000-memory.dmpFilesize
10.7MB
-
memory/3820-152-0x0000000000400000-0x0000000000EB9000-memory.dmpFilesize
10.7MB
-
memory/3820-145-0x0000000000400000-0x0000000000EB9000-memory.dmpFilesize
10.7MB
-
memory/3820-153-0x0000000000400000-0x0000000000EB9000-memory.dmpFilesize
10.7MB
-
memory/3820-160-0x0000000000400000-0x0000000000EB9000-memory.dmpFilesize
10.7MB
-
memory/3820-141-0x0000000000000000-mapping.dmp
-
memory/3820-154-0x0000000000400000-0x0000000000EB9000-memory.dmpFilesize
10.7MB
-
memory/3820-220-0x0000000077000000-0x00000000771A3000-memory.dmpFilesize
1.6MB
-
memory/3820-155-0x0000000000400000-0x0000000000EB9000-memory.dmpFilesize
10.7MB
-
memory/3820-151-0x0000000000400000-0x0000000000EB9000-memory.dmpFilesize
10.7MB
-
memory/3820-158-0x0000000000400000-0x0000000000EB9000-memory.dmpFilesize
10.7MB
-
memory/3820-157-0x0000000077000000-0x00000000771A3000-memory.dmpFilesize
1.6MB
-
memory/3820-156-0x0000000000400000-0x0000000000EB9000-memory.dmpFilesize
10.7MB
-
memory/3908-303-0x0000000000000000-mapping.dmp
-
memory/4020-328-0x0000000003730000-0x0000000003849000-memory.dmpFilesize
1.1MB
-
memory/4020-238-0x0000000000000000-mapping.dmp
-
memory/4020-292-0x0000000003920000-0x00000000039CD000-memory.dmpFilesize
692KB
-
memory/4020-271-0x0000000003730000-0x0000000003849000-memory.dmpFilesize
1.1MB
-
memory/4020-282-0x0000000003850000-0x0000000003911000-memory.dmpFilesize
772KB
-
memory/4020-269-0x00000000034F0000-0x0000000003609000-memory.dmpFilesize
1.1MB
-
memory/4080-208-0x0000000000000000-mapping.dmp
-
memory/4116-287-0x00007FFF3AB20000-0x00007FFF3B556000-memory.dmpFilesize
10.2MB
-
memory/4116-275-0x0000000000000000-mapping.dmp
-
memory/4160-263-0x0000000002E52000-0x0000000002E83000-memory.dmpFilesize
196KB
-
memory/4160-338-0x0000000002E52000-0x0000000002E83000-memory.dmpFilesize
196KB
-
memory/4160-162-0x0000000000000000-mapping.dmp
-
memory/4160-267-0x0000000000400000-0x0000000002C46000-memory.dmpFilesize
40.3MB
-
memory/4160-264-0x0000000002D80000-0x0000000002DBE000-memory.dmpFilesize
248KB
-
memory/4176-203-0x0000000000000000-mapping.dmp
-
memory/4412-357-0x0000000000000000-mapping.dmp
-
memory/4424-255-0x00000000008B0000-0x00000000008B8000-memory.dmpFilesize
32KB
-
memory/4424-299-0x0000000005E50000-0x0000000005E72000-memory.dmpFilesize
136KB
-
memory/4424-252-0x0000000000000000-mapping.dmp
-
memory/4488-223-0x0000000007510000-0x00000000075A2000-memory.dmpFilesize
584KB
-
memory/4488-228-0x00000000076B0000-0x0000000007726000-memory.dmpFilesize
472KB
-
memory/4488-190-0x0000000000000000-mapping.dmp
-
memory/4488-222-0x0000000007A20000-0x0000000007FC4000-memory.dmpFilesize
5.6MB
-
memory/4488-233-0x0000000007470000-0x000000000748E000-memory.dmpFilesize
120KB
-
memory/4488-206-0x00000000005A0000-0x000000000061C000-memory.dmpFilesize
496KB
-
memory/4584-283-0x00007FFF3AA90000-0x00007FFF3B551000-memory.dmpFilesize
10.8MB
-
memory/4584-247-0x00007FFF3AA90000-0x00007FFF3B551000-memory.dmpFilesize
10.8MB
-
memory/4584-237-0x0000000000CC0000-0x0000000000D26000-memory.dmpFilesize
408KB
-
memory/4584-234-0x0000000000000000-mapping.dmp
-
memory/4788-353-0x0000000000000000-mapping.dmp
-
memory/4860-356-0x0000000000000000-mapping.dmp
-
memory/4860-307-0x0000000000000000-mapping.dmp
-
memory/4920-286-0x00007FFF3AB20000-0x00007FFF3B556000-memory.dmpFilesize
10.2MB
-
memory/4920-274-0x0000000000000000-mapping.dmp
-
memory/4924-273-0x0000000000000000-mapping.dmp
-
memory/4932-256-0x0000000000000000-mapping.dmp
-
memory/5012-137-0x0000000000400000-0x0000000000CAD000-memory.dmpFilesize
8.7MB
-
memory/5012-147-0x0000000000400000-0x0000000000CAD000-memory.dmpFilesize
8.7MB
-
memory/5012-135-0x0000000000400000-0x0000000000CAD000-memory.dmpFilesize
8.7MB
-
memory/5012-138-0x0000000000400000-0x0000000000CAD000-memory.dmpFilesize
8.7MB
-
memory/5012-132-0x0000000000400000-0x0000000000CAD000-memory.dmpFilesize
8.7MB
-
memory/5012-133-0x0000000000400000-0x0000000000CAD000-memory.dmpFilesize
8.7MB
-
memory/5012-136-0x0000000000400000-0x0000000000CAD000-memory.dmpFilesize
8.7MB
-
memory/5012-148-0x0000000077000000-0x00000000771A3000-memory.dmpFilesize
1.6MB
-
memory/5012-139-0x0000000077000000-0x00000000771A3000-memory.dmpFilesize
1.6MB
-
memory/5012-140-0x0000000000400000-0x0000000000CAD000-memory.dmpFilesize
8.7MB
-
memory/5320-366-0x0000000000000000-mapping.dmp
-
memory/5424-368-0x0000000000000000-mapping.dmp
-
memory/5428-321-0x0000000000000000-mapping.dmp
-
memory/5456-320-0x0000000000000000-mapping.dmp
-
memory/5580-369-0x0000000000000000-mapping.dmp
-
memory/5580-374-0x0000000140000000-0x0000000140619000-memory.dmpFilesize
6.1MB
-
memory/5628-329-0x0000000000000000-mapping.dmp
-
memory/5640-331-0x0000000000000000-mapping.dmp
-
memory/5652-330-0x0000000000000000-mapping.dmp
-
memory/5660-334-0x0000000000000000-mapping.dmp
-
memory/5728-337-0x0000000000000000-mapping.dmp
-
memory/5824-339-0x0000000000000000-mapping.dmp
-
memory/5920-341-0x0000000000000000-mapping.dmp
-
memory/5932-365-0x00000000004C0000-0x0000000000CA8000-memory.dmpFilesize
7.9MB
-
memory/5932-347-0x00000000004C0000-0x0000000000CA8000-memory.dmpFilesize
7.9MB
-
memory/5932-342-0x0000000000000000-mapping.dmp