Malware Analysis Report

2025-08-05 14:07

Sample ID 230808-hpszyacf3s
Target Ziraat Bankasi Swift Mesaji.exe
SHA256 f42c0bd2cfefa75e0d4957d4339bff10fcb03271e3421d80a93c73a1613b1ab8
Tags
guloader downloader
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

f42c0bd2cfefa75e0d4957d4339bff10fcb03271e3421d80a93c73a1613b1ab8

Threat Level: Known bad

The file Ziraat Bankasi Swift Mesaji.exe was found to be: Known bad.

Malicious Activity Summary

guloader downloader

Guloader,Cloudeye

Loads dropped DLL

Checks QEMU agent file

Suspicious use of NtSetInformationThreadHideFromDebugger

Drops file in Windows directory

Enumerates physical storage devices

Program crash

NSIS installer

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2023-08-08 06:55

Signatures

NSIS installer

installer
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-08-08 06:55

Reported

2023-08-08 06:57

Platform

win7-20230712-en

Max time kernel

122s

Max time network

125s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe"

Signatures

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\Fonts\unforecast\Limebush207\piperidge\beety.boo C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
File opened for modification C:\Windows\resources\umindeligheds\firsts\appendiks\cytophilic.rob C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2564 wrote to memory of 2948 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2564 wrote to memory of 2948 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2564 wrote to memory of 2948 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2564 wrote to memory of 2948 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2564 wrote to memory of 2952 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2564 wrote to memory of 2952 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2564 wrote to memory of 2952 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2564 wrote to memory of 2952 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2564 wrote to memory of 2472 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2564 wrote to memory of 2472 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2564 wrote to memory of 2472 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2564 wrote to memory of 2472 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2564 wrote to memory of 2596 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2564 wrote to memory of 2596 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2564 wrote to memory of 2596 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2564 wrote to memory of 2596 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2564 wrote to memory of 2036 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2564 wrote to memory of 2036 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2564 wrote to memory of 2036 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2564 wrote to memory of 2036 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2564 wrote to memory of 2784 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2564 wrote to memory of 2784 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2564 wrote to memory of 2784 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2564 wrote to memory of 2784 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2564 wrote to memory of 2468 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2564 wrote to memory of 2468 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2564 wrote to memory of 2468 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2564 wrote to memory of 2468 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2564 wrote to memory of 700 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2564 wrote to memory of 700 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2564 wrote to memory of 700 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2564 wrote to memory of 700 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2564 wrote to memory of 548 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2564 wrote to memory of 548 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2564 wrote to memory of 548 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2564 wrote to memory of 548 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2564 wrote to memory of 1608 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2564 wrote to memory of 1608 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2564 wrote to memory of 1608 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2564 wrote to memory of 1608 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2564 wrote to memory of 2460 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2564 wrote to memory of 2460 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2564 wrote to memory of 2460 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2564 wrote to memory of 2460 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2564 wrote to memory of 1760 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2564 wrote to memory of 1760 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2564 wrote to memory of 1760 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2564 wrote to memory of 1760 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2564 wrote to memory of 3020 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2564 wrote to memory of 3020 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2564 wrote to memory of 3020 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2564 wrote to memory of 3020 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2564 wrote to memory of 1572 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2564 wrote to memory of 1572 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2564 wrote to memory of 1572 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2564 wrote to memory of 1572 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2564 wrote to memory of 2888 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2564 wrote to memory of 2888 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2564 wrote to memory of 2888 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2564 wrote to memory of 2888 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2564 wrote to memory of 2928 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2564 wrote to memory of 2928 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2564 wrote to memory of 2928 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2564 wrote to memory of 2928 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe

Processes

C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe

"C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "250^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "244^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "227^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "255^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "244^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "253^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "130^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "131^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "139^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "139^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "242^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "195^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "212^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "208^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "197^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "212^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "247^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "221^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "212^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "240^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "153^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "220^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "195^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "133^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "201^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "137^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "193^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "133^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "201^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "137^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "152^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "159^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "195^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "132^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "141^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "250^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "244^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "227^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "255^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "244^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "253^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "130^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "131^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "139^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "139^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "231^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "195^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "197^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "196^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "208^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "221^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "240^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "221^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "221^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "222^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "210^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "153^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "133^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "130^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "135^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "128^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "131^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "133^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "137^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "201^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "130^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "201^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "133^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "152^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "193^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "159^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "195^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "128^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "141^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "250^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "244^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "227^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "255^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "244^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "253^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "130^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "131^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "139^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "139^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "226^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "212^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "197^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "247^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "221^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "212^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "225^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "222^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "223^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "197^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "212^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "195^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "153^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "195^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "132^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "135^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "134^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "134^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "152^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "159^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "195^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "130^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "141^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "250^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "244^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "227^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "255^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "244^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "253^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "130^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "131^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "139^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "139^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "227^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "212^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "208^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "213^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "247^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "221^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "212^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "153^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "195^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "132^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "195^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "128^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "133^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "130^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "135^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "128^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "131^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "133^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "137^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "155^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "152^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "159^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "195^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "130^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "141^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "196^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "194^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "212^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "195^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "130^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "131^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "139^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "139^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "242^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "208^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "221^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "221^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "230^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "223^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "213^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "222^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "198^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "225^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "195^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "222^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "210^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "240^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "153^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "195^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "128^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "152^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "141^177"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2564 -s 552

Network

N/A

Files

\Users\Admin\AppData\Local\Temp\nso8114.tmp\System.dll

MD5 fccff8cb7a1067e23fd2e2b63971a8e1
SHA1 30e2a9e137c1223a78a0f7b0bf96a1c361976d91
SHA256 6fcea34c8666b06368379c6c402b5321202c11b00889401c743fb96c516c679e
SHA512 f4335e84e6f8d70e462a22f1c93d2998673a7616c868177cac3e8784a3be1d7d0bb96f2583fa0ed82f4f2b6b8f5d9b33521c279a42e055d80a94b4f3f1791e0c

\Users\Admin\AppData\Local\Temp\nso8114.tmp\System.dll

MD5 fccff8cb7a1067e23fd2e2b63971a8e1
SHA1 30e2a9e137c1223a78a0f7b0bf96a1c361976d91
SHA256 6fcea34c8666b06368379c6c402b5321202c11b00889401c743fb96c516c679e
SHA512 f4335e84e6f8d70e462a22f1c93d2998673a7616c868177cac3e8784a3be1d7d0bb96f2583fa0ed82f4f2b6b8f5d9b33521c279a42e055d80a94b4f3f1791e0c

C:\Users\Admin\AppData\Local\Temp\nso8114.tmp\System.dll

MD5 fccff8cb7a1067e23fd2e2b63971a8e1
SHA1 30e2a9e137c1223a78a0f7b0bf96a1c361976d91
SHA256 6fcea34c8666b06368379c6c402b5321202c11b00889401c743fb96c516c679e
SHA512 f4335e84e6f8d70e462a22f1c93d2998673a7616c868177cac3e8784a3be1d7d0bb96f2583fa0ed82f4f2b6b8f5d9b33521c279a42e055d80a94b4f3f1791e0c

\Users\Admin\AppData\Local\Temp\nso8114.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nso8114.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nso8114.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nso8114.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nso8114.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nso8114.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nso8114.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nso8114.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nso8114.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nso8114.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nso8114.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nso8114.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nso8114.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nso8114.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nso8114.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nso8114.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nso8114.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nso8114.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nso8114.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nso8114.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nso8114.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nso8114.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nso8114.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nso8114.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nso8114.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nso8114.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nso8114.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nso8114.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nso8114.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nso8114.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nso8114.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nso8114.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nso8114.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nso8114.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nso8114.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nso8114.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nso8114.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nso8114.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nso8114.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nso8114.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nso8114.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nso8114.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nso8114.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nso8114.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nso8114.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nso8114.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nso8114.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nso8114.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nso8114.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nso8114.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nso8114.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nso8114.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nso8114.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nso8114.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nso8114.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nso8114.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nso8114.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nso8114.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nso8114.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nso8114.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nso8114.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nso8114.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nso8114.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

memory/2564-1013-0x0000000003750000-0x0000000006061000-memory.dmp

memory/2564-1014-0x0000000003750000-0x0000000006061000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2023-08-08 06:55

Reported

2023-08-08 06:57

Platform

win10v2004-20230703-en

Max time kernel

142s

Max time network

155s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe"

Signatures

Guloader,Cloudeye

downloader guloader

Checks QEMU agent file

Description Indicator Process Target
File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A

Suspicious use of NtSetInformationThreadHideFromDebugger

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\Fonts\unforecast\Limebush207\piperidge\beety.boo C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A
File opened for modification C:\Windows\resources\umindeligheds\firsts\appendiks\cytophilic.rob C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe N/A

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2880 wrote to memory of 4976 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 4976 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 4976 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 4184 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 4184 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 4184 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 4088 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 4088 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 4088 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 2424 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 2424 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 2424 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 2464 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 2464 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 2464 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 840 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 840 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 840 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 4992 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 4992 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 4992 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 4956 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 4956 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 4956 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 4380 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 4380 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 4380 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 232 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 232 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 232 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 3372 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 3372 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 3372 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 2408 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 2408 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 2408 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 812 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 812 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 812 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 3988 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 3988 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 3988 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 2968 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 2968 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 2968 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 4412 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 4412 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 4412 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 3572 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 3572 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 3572 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 3232 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 3232 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 3232 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 8 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 8 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 8 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 3344 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 3344 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 3344 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 2852 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 2852 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 2852 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 4156 N/A C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe C:\Windows\SysWOW64\cmd.exe

Processes

C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe

"C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "250^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "244^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "227^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "255^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "244^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "253^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "130^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "131^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "139^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "139^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "242^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "195^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "212^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "208^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "197^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "212^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "247^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "221^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "212^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "240^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "153^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "220^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "195^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "133^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "201^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "137^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "193^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "133^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "201^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "137^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "152^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "159^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "195^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "132^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "141^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "250^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "244^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "227^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "255^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "244^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "253^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "130^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "131^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "139^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "139^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "231^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "195^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "197^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "196^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "208^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "221^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "240^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "221^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "221^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "222^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "210^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "153^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "133^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "130^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "135^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "128^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "131^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "133^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "137^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "201^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "130^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "201^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "133^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "152^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "193^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "159^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "195^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "128^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "141^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "250^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "244^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "227^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "255^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "244^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "253^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "130^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "131^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "139^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "139^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "226^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "212^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "197^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "247^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "221^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "212^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "225^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "222^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "223^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "197^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "212^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "195^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "153^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "195^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "132^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "135^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "134^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "134^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "152^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "159^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "195^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "130^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "141^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "250^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "244^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "227^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "255^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "244^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "253^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "130^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "131^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "139^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "139^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "227^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "212^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "208^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "213^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "247^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "221^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "212^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "153^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "195^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "132^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "195^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "128^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "133^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "130^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "135^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "128^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "131^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "133^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "137^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "155^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "152^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "159^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "195^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "130^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "141^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "196^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "194^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "212^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "195^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "130^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "131^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "139^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "139^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "242^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "208^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "221^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "221^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "230^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "223^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "213^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "222^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "198^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "225^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "195^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "222^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "210^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "240^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "153^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "195^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "128^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "152^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "141^177"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2880 -ip 2880

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2880 -s 2000

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 59.128.231.4.in-addr.arpa udp
US 8.8.8.8:53 8.3.197.209.in-addr.arpa udp
US 8.8.8.8:53 73.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp
US 8.8.8.8:53 240.81.21.72.in-addr.arpa udp
US 8.8.8.8:53 64.13.109.52.in-addr.arpa udp
US 8.8.8.8:53 9.179.89.13.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\System.dll

MD5 fccff8cb7a1067e23fd2e2b63971a8e1
SHA1 30e2a9e137c1223a78a0f7b0bf96a1c361976d91
SHA256 6fcea34c8666b06368379c6c402b5321202c11b00889401c743fb96c516c679e
SHA512 f4335e84e6f8d70e462a22f1c93d2998673a7616c868177cac3e8784a3be1d7d0bb96f2583fa0ed82f4f2b6b8f5d9b33521c279a42e055d80a94b4f3f1791e0c

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\System.dll

MD5 fccff8cb7a1067e23fd2e2b63971a8e1
SHA1 30e2a9e137c1223a78a0f7b0bf96a1c361976d91
SHA256 6fcea34c8666b06368379c6c402b5321202c11b00889401c743fb96c516c679e
SHA512 f4335e84e6f8d70e462a22f1c93d2998673a7616c868177cac3e8784a3be1d7d0bb96f2583fa0ed82f4f2b6b8f5d9b33521c279a42e055d80a94b4f3f1791e0c

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\System.dll

MD5 fccff8cb7a1067e23fd2e2b63971a8e1
SHA1 30e2a9e137c1223a78a0f7b0bf96a1c361976d91
SHA256 6fcea34c8666b06368379c6c402b5321202c11b00889401c743fb96c516c679e
SHA512 f4335e84e6f8d70e462a22f1c93d2998673a7616c868177cac3e8784a3be1d7d0bb96f2583fa0ed82f4f2b6b8f5d9b33521c279a42e055d80a94b4f3f1791e0c

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsr7E1B.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

memory/2880-796-0x0000000004A20000-0x0000000007331000-memory.dmp

memory/2880-797-0x0000000004A20000-0x0000000007331000-memory.dmp

memory/2880-798-0x0000000077CE1000-0x0000000077E01000-memory.dmp

memory/2880-799-0x0000000004A20000-0x0000000007331000-memory.dmp