Malware Analysis Report

2025-08-05 14:06

Sample ID 230808-hqr42acf3y
Target Dekont.exe
SHA256 568a48bb06d720a385151fe56f192889acdc3d96802d0f6ec8645812720b0386
Tags
guloader downloader
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

568a48bb06d720a385151fe56f192889acdc3d96802d0f6ec8645812720b0386

Threat Level: Known bad

The file Dekont.exe was found to be: Known bad.

Malicious Activity Summary

guloader downloader

Guloader,Cloudeye

Checks QEMU agent file

Loads dropped DLL

Suspicious use of NtSetInformationThreadHideFromDebugger

Drops file in Windows directory

Enumerates physical storage devices

Program crash

NSIS installer

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2023-08-08 06:56

Signatures

NSIS installer

installer
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2023-08-08 06:56

Reported

2023-08-08 06:59

Platform

win10v2004-20230703-en

Max time kernel

142s

Max time network

154s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Dekont.exe"

Signatures

Guloader,Cloudeye

downloader guloader

Checks QEMU agent file

Description Indicator Process Target
File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A

Suspicious use of NtSetInformationThreadHideFromDebugger

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\Fonts\unforecast\Limebush207\piperidge\beety.boo C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
File opened for modification C:\Windows\resources\umindeligheds\firsts\appendiks\cytophilic.rob C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A

Enumerates physical storage devices

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\Dekont.exe

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4136 wrote to memory of 648 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 4136 wrote to memory of 648 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 4136 wrote to memory of 648 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 4136 wrote to memory of 4816 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 4136 wrote to memory of 4816 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 4136 wrote to memory of 4816 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 4136 wrote to memory of 2528 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 4136 wrote to memory of 2528 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 4136 wrote to memory of 2528 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 4136 wrote to memory of 4996 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 4136 wrote to memory of 4996 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 4136 wrote to memory of 4996 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 4136 wrote to memory of 4496 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 4136 wrote to memory of 4496 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 4136 wrote to memory of 4496 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 4136 wrote to memory of 4224 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 4136 wrote to memory of 4224 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 4136 wrote to memory of 4224 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 4136 wrote to memory of 4504 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 4136 wrote to memory of 4504 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 4136 wrote to memory of 4504 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 4136 wrote to memory of 1544 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 4136 wrote to memory of 1544 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 4136 wrote to memory of 1544 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 4136 wrote to memory of 1728 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 4136 wrote to memory of 1728 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 4136 wrote to memory of 1728 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 4136 wrote to memory of 3336 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 4136 wrote to memory of 3336 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 4136 wrote to memory of 3336 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 4136 wrote to memory of 1440 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 4136 wrote to memory of 1440 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 4136 wrote to memory of 1440 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 4136 wrote to memory of 3512 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 4136 wrote to memory of 3512 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 4136 wrote to memory of 3512 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 4136 wrote to memory of 3820 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 4136 wrote to memory of 3820 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 4136 wrote to memory of 3820 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 4136 wrote to memory of 2856 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 4136 wrote to memory of 2856 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 4136 wrote to memory of 2856 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 4136 wrote to memory of 1408 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 4136 wrote to memory of 1408 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 4136 wrote to memory of 1408 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 4136 wrote to memory of 1260 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 4136 wrote to memory of 1260 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 4136 wrote to memory of 1260 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 4136 wrote to memory of 800 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 4136 wrote to memory of 800 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 4136 wrote to memory of 800 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 4136 wrote to memory of 1148 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 4136 wrote to memory of 1148 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 4136 wrote to memory of 1148 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 4136 wrote to memory of 3240 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 4136 wrote to memory of 3240 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 4136 wrote to memory of 3240 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 4136 wrote to memory of 1536 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 4136 wrote to memory of 1536 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 4136 wrote to memory of 1536 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 4136 wrote to memory of 2660 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 4136 wrote to memory of 2660 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 4136 wrote to memory of 2660 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 4136 wrote to memory of 4724 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe

Processes

C:\Users\Admin\AppData\Local\Temp\Dekont.exe

"C:\Users\Admin\AppData\Local\Temp\Dekont.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "250^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "244^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "227^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "255^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "244^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "253^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "130^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "131^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "139^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "139^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "242^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "195^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "212^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "208^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "197^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "212^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "247^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "221^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "212^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "240^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "153^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "220^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "195^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "133^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "201^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "137^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "193^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "133^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "201^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "137^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "152^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "159^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "195^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "132^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "141^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "250^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "244^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "227^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "255^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "244^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "253^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "130^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "131^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "139^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "139^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "231^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "195^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "197^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "196^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "208^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "221^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "240^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "221^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "221^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "222^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "210^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "153^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "132^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "130^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "131^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "131^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "134^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "132^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "131^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "201^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "130^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "201^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "133^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "152^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "193^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "159^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "195^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "128^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "141^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "250^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "244^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "227^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "255^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "244^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "253^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "130^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "131^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "139^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "139^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "226^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "212^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "197^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "247^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "221^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "212^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "225^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "222^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "223^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "197^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "212^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "195^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "153^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "195^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "132^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "135^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "134^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "134^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "152^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "159^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "195^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "130^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "141^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "250^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "244^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "227^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "255^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "244^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "253^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "130^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "131^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "139^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "139^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "227^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "212^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "208^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "213^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "247^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "221^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "212^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "153^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "195^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "132^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "195^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "128^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "132^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "130^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "131^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "131^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "134^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "132^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "131^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "155^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "152^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "159^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "195^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "130^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "141^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "196^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "194^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "212^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "195^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "130^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "131^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "139^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "139^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "242^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "208^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "221^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "221^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "230^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "223^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "213^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "222^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "198^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "225^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "195^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "222^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "210^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "240^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "153^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "195^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "128^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "152^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "141^177"

C:\Users\Admin\AppData\Local\Temp\Dekont.exe

"C:\Users\Admin\AppData\Local\Temp\Dekont.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4136 -ip 4136

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4136 -s 2004

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 2.136.104.51.in-addr.arpa udp
US 8.8.8.8:53 8.3.197.209.in-addr.arpa udp
US 8.8.8.8:53 64.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 146.78.124.51.in-addr.arpa udp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp
US 8.8.8.8:53 240.81.21.72.in-addr.arpa udp
US 8.8.8.8:53 86.8.109.52.in-addr.arpa udp
US 8.8.8.8:53 2.173.189.20.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\System.dll

MD5 fccff8cb7a1067e23fd2e2b63971a8e1
SHA1 30e2a9e137c1223a78a0f7b0bf96a1c361976d91
SHA256 6fcea34c8666b06368379c6c402b5321202c11b00889401c743fb96c516c679e
SHA512 f4335e84e6f8d70e462a22f1c93d2998673a7616c868177cac3e8784a3be1d7d0bb96f2583fa0ed82f4f2b6b8f5d9b33521c279a42e055d80a94b4f3f1791e0c

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\System.dll

MD5 fccff8cb7a1067e23fd2e2b63971a8e1
SHA1 30e2a9e137c1223a78a0f7b0bf96a1c361976d91
SHA256 6fcea34c8666b06368379c6c402b5321202c11b00889401c743fb96c516c679e
SHA512 f4335e84e6f8d70e462a22f1c93d2998673a7616c868177cac3e8784a3be1d7d0bb96f2583fa0ed82f4f2b6b8f5d9b33521c279a42e055d80a94b4f3f1791e0c

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\System.dll

MD5 fccff8cb7a1067e23fd2e2b63971a8e1
SHA1 30e2a9e137c1223a78a0f7b0bf96a1c361976d91
SHA256 6fcea34c8666b06368379c6c402b5321202c11b00889401c743fb96c516c679e
SHA512 f4335e84e6f8d70e462a22f1c93d2998673a7616c868177cac3e8784a3be1d7d0bb96f2583fa0ed82f4f2b6b8f5d9b33521c279a42e055d80a94b4f3f1791e0c

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsj782F.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

memory/4136-796-0x0000000004A10000-0x0000000007CD3000-memory.dmp

memory/4136-797-0x0000000004A10000-0x0000000007CD3000-memory.dmp

memory/4136-798-0x0000000077A11000-0x0000000077B31000-memory.dmp

memory/4136-799-0x0000000074870000-0x0000000074876000-memory.dmp

memory/4136-800-0x0000000004A10000-0x0000000007CD3000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2023-08-08 06:56

Reported

2023-08-08 06:59

Platform

win7-20230712-en

Max time kernel

119s

Max time network

122s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Dekont.exe"

Signatures

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\Fonts\unforecast\Limebush207\piperidge\beety.boo C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A
File opened for modification C:\Windows\resources\umindeligheds\firsts\appendiks\cytophilic.rob C:\Users\Admin\AppData\Local\Temp\Dekont.exe N/A

Enumerates physical storage devices

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\Dekont.exe

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2096 wrote to memory of 524 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 2096 wrote to memory of 524 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 2096 wrote to memory of 524 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 2096 wrote to memory of 524 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 2096 wrote to memory of 2768 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 2096 wrote to memory of 2768 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 2096 wrote to memory of 2768 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 2096 wrote to memory of 2768 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 2096 wrote to memory of 2924 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 2096 wrote to memory of 2924 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 2096 wrote to memory of 2924 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 2096 wrote to memory of 2924 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 2096 wrote to memory of 2112 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 2096 wrote to memory of 2112 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 2096 wrote to memory of 2112 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 2096 wrote to memory of 2112 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 2096 wrote to memory of 1716 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 2096 wrote to memory of 1716 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 2096 wrote to memory of 1716 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 2096 wrote to memory of 1716 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 2096 wrote to memory of 2684 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 2096 wrote to memory of 2684 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 2096 wrote to memory of 2684 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 2096 wrote to memory of 2684 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 2096 wrote to memory of 2772 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 2096 wrote to memory of 2772 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 2096 wrote to memory of 2772 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 2096 wrote to memory of 2772 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 2096 wrote to memory of 2692 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 2096 wrote to memory of 2692 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 2096 wrote to memory of 2692 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 2096 wrote to memory of 2692 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 2096 wrote to memory of 2296 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 2096 wrote to memory of 2296 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 2096 wrote to memory of 2296 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 2096 wrote to memory of 2296 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 2096 wrote to memory of 676 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 2096 wrote to memory of 676 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 2096 wrote to memory of 676 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 2096 wrote to memory of 676 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 2096 wrote to memory of 1612 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 2096 wrote to memory of 1612 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 2096 wrote to memory of 1612 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 2096 wrote to memory of 1612 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 2096 wrote to memory of 1028 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 2096 wrote to memory of 1028 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 2096 wrote to memory of 1028 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 2096 wrote to memory of 1028 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 2096 wrote to memory of 1904 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 2096 wrote to memory of 1904 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 2096 wrote to memory of 1904 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 2096 wrote to memory of 1904 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 2096 wrote to memory of 2964 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 2096 wrote to memory of 2964 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 2096 wrote to memory of 2964 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 2096 wrote to memory of 2964 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 2096 wrote to memory of 1044 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 2096 wrote to memory of 1044 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 2096 wrote to memory of 1044 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 2096 wrote to memory of 1044 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 2096 wrote to memory of 2976 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 2096 wrote to memory of 2976 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 2096 wrote to memory of 2976 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe
PID 2096 wrote to memory of 2976 N/A C:\Users\Admin\AppData\Local\Temp\Dekont.exe C:\Windows\SysWOW64\cmd.exe

Processes

C:\Users\Admin\AppData\Local\Temp\Dekont.exe

"C:\Users\Admin\AppData\Local\Temp\Dekont.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "250^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "244^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "227^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "255^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "244^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "253^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "130^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "131^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "139^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "139^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "242^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "195^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "212^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "208^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "197^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "212^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "247^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "221^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "212^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "240^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "153^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "220^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "195^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "133^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "201^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "137^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "193^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "133^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "201^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "137^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "152^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "159^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "195^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "132^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "141^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "250^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "244^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "227^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "255^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "244^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "253^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "130^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "131^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "139^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "139^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "231^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "195^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "197^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "196^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "208^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "221^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "240^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "221^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "221^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "222^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "210^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "153^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "132^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "130^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "131^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "131^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "134^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "132^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "131^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "201^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "130^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "201^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "133^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "152^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "193^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "159^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "195^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "128^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "141^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "250^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "244^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "227^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "255^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "244^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "253^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "130^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "131^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "139^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "139^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "226^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "212^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "197^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "247^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "221^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "212^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "225^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "222^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "223^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "197^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "212^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "195^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "153^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "195^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "132^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "135^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "134^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "134^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "152^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "159^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "195^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "130^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "141^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "250^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "244^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "227^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "255^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "244^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "253^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "130^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "131^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "139^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "139^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "227^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "212^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "208^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "213^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "247^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "221^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "212^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "153^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "195^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "132^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "195^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "128^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "132^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "130^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "131^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "131^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "134^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "132^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "131^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "155^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "152^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "159^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "195^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "130^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "141^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "196^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "194^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "212^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "195^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "130^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "131^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "139^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "139^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "242^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "208^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "221^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "221^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "230^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "223^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "213^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "222^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "198^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "225^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "195^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "222^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "210^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "240^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "153^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "195^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "128^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "157^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "216^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "145^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "129^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "152^177"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c set /a "141^177"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2096 -s 556

Network

N/A

Files

\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\System.dll

MD5 fccff8cb7a1067e23fd2e2b63971a8e1
SHA1 30e2a9e137c1223a78a0f7b0bf96a1c361976d91
SHA256 6fcea34c8666b06368379c6c402b5321202c11b00889401c743fb96c516c679e
SHA512 f4335e84e6f8d70e462a22f1c93d2998673a7616c868177cac3e8784a3be1d7d0bb96f2583fa0ed82f4f2b6b8f5d9b33521c279a42e055d80a94b4f3f1791e0c

\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\System.dll

MD5 fccff8cb7a1067e23fd2e2b63971a8e1
SHA1 30e2a9e137c1223a78a0f7b0bf96a1c361976d91
SHA256 6fcea34c8666b06368379c6c402b5321202c11b00889401c743fb96c516c679e
SHA512 f4335e84e6f8d70e462a22f1c93d2998673a7616c868177cac3e8784a3be1d7d0bb96f2583fa0ed82f4f2b6b8f5d9b33521c279a42e055d80a94b4f3f1791e0c

C:\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\System.dll

MD5 fccff8cb7a1067e23fd2e2b63971a8e1
SHA1 30e2a9e137c1223a78a0f7b0bf96a1c361976d91
SHA256 6fcea34c8666b06368379c6c402b5321202c11b00889401c743fb96c516c679e
SHA512 f4335e84e6f8d70e462a22f1c93d2998673a7616c868177cac3e8784a3be1d7d0bb96f2583fa0ed82f4f2b6b8f5d9b33521c279a42e055d80a94b4f3f1791e0c

\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

C:\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

\Users\Admin\AppData\Local\Temp\nsy7EE2.tmp\nsExec.dll

MD5 09c2e27c626d6f33018b8a34d3d98cb6
SHA1 8d6bf50218c8f201f06ecf98ca73b74752a2e453
SHA256 114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1
SHA512 883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

memory/2096-1017-0x0000000003910000-0x0000000006BD3000-memory.dmp

memory/2096-1018-0x0000000003910000-0x0000000006BD3000-memory.dmp