Resubmissions
03/09/2021, 12:16
210903-pfn3ysdac4 1003/09/2021, 04:55
210903-fj6mqsfbfk 1002/09/2021, 19:23
210902-x37sksbef5 1002/09/2021, 15:02
210902-senycadeck 1002/09/2021, 11:29
210902-4b2x2c3ahj 1002/09/2021, 05:46
210902-lng5vcn31n 1002/09/2021, 04:57
210902-gp7zs88ann 1001/09/2021, 17:32
210901-sgcvvtysvs 1031/08/2021, 12:57
210831-1v8aywj16x 1031/08/2021, 07:34
210831-n7h9w45r3x 10Analysis
-
max time kernel
1799s -
max time network
1808s -
platform
windows11_x64 -
resource
win11 -
submitted
31/08/2021, 12:57
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win11
Behavioral task
behavioral3
Sample
Setup.exe
Resource
win10v20210408
General
-
Target
Setup.exe
-
Size
631KB
-
MD5
cb927513ff8ebff4dd52a47f7e42f934
-
SHA1
0de47c02a8adc4940a6c18621b4e4a619641d029
-
SHA256
fd5c970806fba1500cbb6af5328329aeb43b8de3f02d90ec5d8cd1d57711622f
-
SHA512
988c8fd886a9155b7d190faf2ce6b34d910efcffcf1c6251f18a9d0c804a0ea26a89679273033ac98b200363c536426efd1ae9de445c34e660369abb06f0071c
Malware Config
Extracted
C:\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT
buran
Extracted
redline
mybirja
45.14.49.232:63850
Extracted
metasploit
windows/single_exec
Extracted
redline
1
37.0.8.88:44263
Extracted
smokeloader
2020
http://readinglistforaugust1.xyz/
http://readinglistforaugust2.xyz/
http://readinglistforaugust3.xyz/
http://readinglistforaugust4.xyz/
http://readinglistforaugust5.xyz/
http://readinglistforaugust6.xyz/
http://readinglistforaugust7.xyz/
http://readinglistforaugust8.xyz/
http://readinglistforaugust9.xyz/
http://readinglistforaugust10.xyz/
http://readinglistforaugust1.site/
http://readinglistforaugust2.site/
http://readinglistforaugust3.site/
http://readinglistforaugust4.site/
http://readinglistforaugust5.site/
http://readinglistforaugust6.site/
http://readinglistforaugust7.site/
http://readinglistforaugust8.site/
http://readinglistforaugust9.site/
http://readinglistforaugust10.site/
http://readinglistforaugust1.club/
http://readinglistforaugust2.club/
http://readinglistforaugust3.club/
http://readinglistforaugust4.club/
http://readinglistforaugust5.club/
http://readinglistforaugust6.club/
http://readinglistforaugust7.club/
http://readinglistforaugust8.club/
http://readinglistforaugust9.club/
http://readinglistforaugust10.club/
Signatures
-
Buran
Ransomware-as-a-service based on the VegaLocker family first identified in 2019.
-
Glupteba Payload 1 IoCs
resource yara_rule behavioral2/memory/4848-257-0x00000000042F0000-0x0000000004C16000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5580 4788 rundll32.exe 24 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 26 IoCs
resource yara_rule behavioral2/files/0x000200000002b1b7-236.dat family_redline behavioral2/files/0x000200000002b1b7-173.dat family_redline behavioral2/memory/852-290-0x0000000000000000-mapping.dmp family_redline behavioral2/memory/852-292-0x0000000000400000-0x000000000044A000-memory.dmp family_redline behavioral2/memory/2800-351-0x0000000000000000-mapping.dmp family_redline behavioral2/memory/4512-360-0x0000000000000000-mapping.dmp family_redline behavioral2/memory/3956-375-0x0000000000000000-mapping.dmp family_redline behavioral2/memory/4636-427-0x0000000000000000-mapping.dmp family_redline behavioral2/memory/4708-423-0x0000000000000000-mapping.dmp family_redline behavioral2/memory/2340-433-0x0000000000000000-mapping.dmp family_redline behavioral2/memory/4952-476-0x0000000000000000-mapping.dmp family_redline behavioral2/memory/4684-495-0x0000000000000000-mapping.dmp family_redline behavioral2/memory/4904-520-0x0000000000000000-mapping.dmp family_redline behavioral2/memory/1236-522-0x0000000000000000-mapping.dmp family_redline behavioral2/memory/5308-540-0x0000000000000000-mapping.dmp family_redline behavioral2/memory/5680-578-0x0000000000000000-mapping.dmp family_redline behavioral2/memory/5692-583-0x0000000000000000-mapping.dmp family_redline behavioral2/memory/5920-586-0x0000000000000000-mapping.dmp family_redline behavioral2/memory/5692-606-0x0000000005430000-0x0000000005A48000-memory.dmp family_redline behavioral2/memory/5368-618-0x0000000000000000-mapping.dmp family_redline behavioral2/memory/1092-624-0x0000000000000000-mapping.dmp family_redline behavioral2/memory/1704-627-0x0000000000000000-mapping.dmp family_redline behavioral2/memory/5368-651-0x0000000005650000-0x0000000005C68000-memory.dmp family_redline behavioral2/memory/6016-662-0x0000000000000000-mapping.dmp family_redline behavioral2/memory/5328-838-0x0000000005040000-0x0000000005658000-memory.dmp family_redline behavioral2/memory/3708-875-0x00000000053A0000-0x00000000059B8000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateProcessExOtherParentProcess 64 IoCs
description pid Process procid_target PID 1960 created 1080 1960 WerFault.exe 111 PID 4436 created 4848 4436 WerFault.exe 96 PID 1064 created 4164 1064 WerFault.exe 103 PID 1236 created 4692 1236 SBzLZWGed3KVWdHchi3P4A9A.exe 94 PID 1064 created 656 1064 WerFault.exe 102 PID 5824 created 5640 5824 WerFault.exe 174 PID 5252 created 5680 5252 Process not Found 176 PID 2328 created 6016 2328 explorer.exe 187 PID 5456 created 1364 5456 WerFault.exe 143 PID 5944 created 1048 5944 WerFault.exe 263 PID 3508 created 3068 3508 SBzLZWGed3KVWdHchi3P4A9A.exe 207 PID 4224 created 3564 4224 SBzLZWGed3KVWdHchi3P4A9A.exe 227 PID 2356 created 1504 2356 WerFault.exe 278 PID 4220 created 6120 4220 WerFault.exe 261 PID 1592 created 7136 1592 WerFault.exe 315 PID 5220 created 5188 5220 WerFault.exe 324 PID 3244 created 6156 3244 WerFault.exe 362 PID 6320 created 6572 6320 WerFault.exe 364 PID 5772 created 6516 5772 WerFault.exe 413 PID 6296 created 8528 6296 WerFault.exe 448 PID 2980 created 6116 2980 WerFault.exe 480 PID 5708 created 10052 5708 WerFault.exe 487 PID 9676 created 2504 9676 WerFault.exe 539 PID 8388 created 10108 8388 WerFault.exe 547 PID 3344 created 9488 3344 WerFault.exe 562 PID 5196 created 8524 5196 WerFault.exe 587 PID 7212 created 7340 7212 WerFault.exe 601 PID 8340 created 4716 8340 WerFault.exe 612 PID 7384 created 7616 7384 WerFault.exe 641 PID 5852 created 4664 5852 WerFault.exe 672 PID 8100 created 10008 8100 WerFault.exe 673 PID 452 created 9768 452 WerFault.exe 733 PID 8368 created 7224 8368 WerFault.exe 739 PID 9576 created 7156 9576 WerFault.exe 847 PID 3460 created 8548 3460 WerFault.exe 856 PID 2984 created 6744 2984 WerFault.exe 866 PID 15584 created 5856 15584 WerFault.exe 979 PID 15696 created 11424 15696 WerFault.exe 981 PID 15856 created 15636 15856 WerFault.exe 985 PID 13556 created 5556 13556 WerFault.exe 1062 PID 11984 created 15072 11984 WerFault.exe 1125 PID 14144 created 12056 14144 WerFault.exe 1139 PID 12916 created 9560 12916 Process not Found 1206 PID 8560 created 13620 8560 Process not Found 1226 PID 10360 created 14160 10360 Process not Found 1246 PID 5972 created 12820 5972 Process not Found 1250 PID 14016 created 12108 14016 Process not Found 1286 PID 4760 created 11764 4760 Process not Found 1292 PID 13464 created 11692 13464 Process not Found 1324 PID 9320 created 15104 9320 Process not Found 1331 PID 12612 created 15472 12612 Process not Found 1352 PID 13180 created 15816 13180 Process not Found 1391 PID 15576 created 9616 15576 Process not Found 1469 PID 10008 created 7004 10008 Process not Found 1489 PID 8384 created 13252 8384 Process not Found 1506 PID 14916 created 1292 14916 Process not Found 1545 PID 16536 created 17384 16536 Process not Found 1551 PID 16852 created 16560 16852 Process not Found 1555 PID 16820 created 17356 16820 Process not Found 1567 PID 4972 created 16536 4972 Process not Found 1577 PID 15032 created 5092 15032 Process not Found 1585 PID 17532 created 17060 17532 Process not Found 1613 PID 18164 created 17828 18164 Process not Found 1635 PID 8604 created 18256 8604 Process not Found 1642 -
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Vidar Stealer 3 IoCs
resource yara_rule behavioral2/memory/656-337-0x00000000007A0000-0x0000000000873000-memory.dmp family_vidar behavioral2/memory/2800-398-0x0000000005050000-0x0000000005668000-memory.dmp family_vidar behavioral2/memory/6120-841-0x0000000000400000-0x00000000004D7000-memory.dmp family_vidar -
Blocklisted process makes network request 2 IoCs
flow pid Process 97 1724 mshta.exe 110 1724 mshta.exe -
Downloads MZ/PE file
-
Executes dropped EXE 64 IoCs
pid Process 3856 AKAaEBEXeHWvBCq4njjkRihn.exe 3876 s5TzTzCDRxUS_LNHDU2dAW1p.exe 3928 AalTGrsjFu7Ccb8Rl8dDfvfV.exe 4220 tzEVLrrdEVWd48ASAEtRiWq7.exe 4692 sadlXnc3wPoZxcS8ICQF5ppQ.exe 4184 KPOYBsEiW7toZFo6D52uV4cj.exe 3924 Xt8S76sZ9LABcGd96pMW6zN2.exe 4848 qqeppCYqAudj7rRwp42uK0XT.exe 500 DnlDS6edm9sMCffGWowrrr_K.exe 3144 S9pRj2JglOfvtXhrTk6AWMJB.exe 5112 Ja4_w8NcMFoPBzvBbTh4pLQJ.exe 4440 w4p1P4V7v4dSZrVJlcZeBtZH.exe 4784 XeAC_eAUSdkfGpqWBMt8ES_x.exe 656 spcDzX2zscw8JZ7smMja1YyZ.exe 4164 qtmnLSnH0R35ztegLWE7zTyA.exe 1004 DVhblIkJk4JgmozIaZVm92xW.exe 3600 7BOu9TIJMQySbeGQcDPiRFXQ.exe 1016 FIs4n_aUrxrpNs3zuKkcgZaF.exe 776 SBzLZWGed3KVWdHchi3P4A9A.exe 1080 ZKPkqWiz9htr4lPBDLqPZ8yM.exe 1188 QmqAxXQJaTvjeUocFNRhqtTH.exe 900 vZuGD8zXLLqteNZ3ygWWvyHy.exe 1724 mmhu7lViAMJDGo1Q3snJhdBM.exe 652 inst001.exe 1096 cutm3.exe 1200 md8_8eus.exe 852 s5TzTzCDRxUS_LNHDU2dAW1p.exe 2160 XeAC_eAUSdkfGpqWBMt8ES_x.exe 2768 ryuk.exe 2968 QmqAxXQJaTvjeUocFNRhqtTH.exe 1364 6224862.exe 4196 4890110.exe 3016 1016681.exe 2800 s5TzTzCDRxUS_LNHDU2dAW1p.exe 4512 SBzLZWGed3KVWdHchi3P4A9A.exe 4940 1714949.exe 3956 Xt8S76sZ9LABcGd96pMW6zN2.exe 1048 SBzLZWGed3KVWdHchi3P4A9A.exe 2868 IQ0V_Fe_.eXE 4708 SBzLZWGed3KVWdHchi3P4A9A.exe 4636 s5TzTzCDRxUS_LNHDU2dAW1p.exe 2340 Xt8S76sZ9LABcGd96pMW6zN2.exe 4632 WinHoster.exe 4952 SBzLZWGed3KVWdHchi3P4A9A.exe 3460 s5TzTzCDRxUS_LNHDU2dAW1p.exe 4684 Xt8S76sZ9LABcGd96pMW6zN2.exe 4904 s5TzTzCDRxUS_LNHDU2dAW1p.exe 1236 SBzLZWGed3KVWdHchi3P4A9A.exe 5308 Xt8S76sZ9LABcGd96pMW6zN2.exe 5680 s5TzTzCDRxUS_LNHDU2dAW1p.exe 5692 SBzLZWGed3KVWdHchi3P4A9A.exe 5920 Xt8S76sZ9LABcGd96pMW6zN2.exe 5368 SBzLZWGed3KVWdHchi3P4A9A.exe 1092 Xt8S76sZ9LABcGd96pMW6zN2.exe 1704 s5TzTzCDRxUS_LNHDU2dAW1p.exe 1384 s5TzTzCDRxUS_LNHDU2dAW1p.exe 6016 SBzLZWGed3KVWdHchi3P4A9A.exe 2092 Xt8S76sZ9LABcGd96pMW6zN2.exe 5740 SBzLZWGed3KVWdHchi3P4A9A.exe 1544 s5TzTzCDRxUS_LNHDU2dAW1p.exe 5900 Xt8S76sZ9LABcGd96pMW6zN2.exe 5504 SBzLZWGed3KVWdHchi3P4A9A.exe 5908 5CD6.exe 5216 Xt8S76sZ9LABcGd96pMW6zN2.exe -
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion DnlDS6edm9sMCffGWowrrr_K.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion DnlDS6edm9sMCffGWowrrr_K.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7BOu9TIJMQySbeGQcDPiRFXQ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7BOu9TIJMQySbeGQcDPiRFXQ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion KPOYBsEiW7toZFo6D52uV4cj.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion KPOYBsEiW7toZFo6D52uV4cj.exe -
Loads dropped DLL 3 IoCs
pid Process 5640 rundll32.exe 5664 rundll32.exe 5664 rundll32.exe -
Obfuscated with Agile.Net obfuscator 2 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral2/files/0x000200000002b1b4-185.dat agile_net behavioral2/files/0x000200000002b1b4-183.dat agile_net -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x000200000002b1bb-250.dat themida behavioral2/files/0x000200000002b1b9-249.dat themida behavioral2/files/0x000200000002b1be-239.dat themida behavioral2/files/0x000200000002b1b9-195.dat themida behavioral2/files/0x000200000002b1bb-176.dat themida behavioral2/files/0x000200000002b1be-180.dat themida behavioral2/memory/500-298-0x0000000000600000-0x0000000000601000-memory.dmp themida behavioral2/memory/3600-301-0x0000000000760000-0x0000000000761000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run BE23.exe Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\smss.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\smss.exe\" -start" BE23.exe Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" 4890110.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DnlDS6edm9sMCffGWowrrr_K.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA KPOYBsEiW7toZFo6D52uV4cj.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 7BOu9TIJMQySbeGQcDPiRFXQ.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: BE23.exe File opened (read-only) \??\X: SBzLZWGed3KVWdHchi3P4A9A.exe File opened (read-only) \??\Y: BE23.exe File opened (read-only) \??\U: BE23.exe File opened (read-only) \??\M: BE23.exe File opened (read-only) \??\F: SBzLZWGed3KVWdHchi3P4A9A.exe File opened (read-only) \??\T: BE23.exe File opened (read-only) \??\P: SBzLZWGed3KVWdHchi3P4A9A.exe File opened (read-only) \??\I: SBzLZWGed3KVWdHchi3P4A9A.exe File opened (read-only) \??\H: BE23.exe File opened (read-only) \??\V: BE23.exe File opened (read-only) \??\Q: BE23.exe File opened (read-only) \??\N: BE23.exe File opened (read-only) \??\G: BE23.exe File opened (read-only) \??\A: BE23.exe File opened (read-only) \??\Y: SBzLZWGed3KVWdHchi3P4A9A.exe File opened (read-only) \??\Q: SBzLZWGed3KVWdHchi3P4A9A.exe File opened (read-only) \??\M: SBzLZWGed3KVWdHchi3P4A9A.exe File opened (read-only) \??\W: BE23.exe File opened (read-only) \??\P: BE23.exe File opened (read-only) \??\K: BE23.exe File opened (read-only) \??\H: SBzLZWGed3KVWdHchi3P4A9A.exe File opened (read-only) \??\Z: SBzLZWGed3KVWdHchi3P4A9A.exe File opened (read-only) \??\V: SBzLZWGed3KVWdHchi3P4A9A.exe File opened (read-only) \??\U: SBzLZWGed3KVWdHchi3P4A9A.exe File opened (read-only) \??\R: SBzLZWGed3KVWdHchi3P4A9A.exe File opened (read-only) \??\K: SBzLZWGed3KVWdHchi3P4A9A.exe File opened (read-only) \??\X: BE23.exe File opened (read-only) \??\S: BE23.exe File opened (read-only) \??\E: BE23.exe File opened (read-only) \??\J: SBzLZWGed3KVWdHchi3P4A9A.exe File opened (read-only) \??\A: SBzLZWGed3KVWdHchi3P4A9A.exe File opened (read-only) \??\O: SBzLZWGed3KVWdHchi3P4A9A.exe File opened (read-only) \??\Z: BE23.exe File opened (read-only) \??\J: BE23.exe File opened (read-only) \??\I: BE23.exe File opened (read-only) \??\S: SBzLZWGed3KVWdHchi3P4A9A.exe File opened (read-only) \??\G: SBzLZWGed3KVWdHchi3P4A9A.exe File opened (read-only) \??\B: SBzLZWGed3KVWdHchi3P4A9A.exe File opened (read-only) \??\O: BE23.exe File opened (read-only) \??\W: SBzLZWGed3KVWdHchi3P4A9A.exe File opened (read-only) \??\T: SBzLZWGed3KVWdHchi3P4A9A.exe File opened (read-only) \??\N: SBzLZWGed3KVWdHchi3P4A9A.exe File opened (read-only) \??\L: SBzLZWGed3KVWdHchi3P4A9A.exe File opened (read-only) \??\E: SBzLZWGed3KVWdHchi3P4A9A.exe File opened (read-only) \??\R: BE23.exe File opened (read-only) \??\L: BE23.exe File opened (read-only) \??\B: BE23.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 5 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 ipinfo.io 5 geoiptool.com 33 ipinfo.io 54 ip-api.com 93 ipinfo.io -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 3600 7BOu9TIJMQySbeGQcDPiRFXQ.exe 500 DnlDS6edm9sMCffGWowrrr_K.exe 4184 KPOYBsEiW7toZFo6D52uV4cj.exe 17656 Process not Found -
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 3876 set thread context of 852 3876 s5TzTzCDRxUS_LNHDU2dAW1p.exe 121 PID 4784 set thread context of 2160 4784 s5TzTzCDRxUS_LNHDU2dAW1p.exe 141 PID 3876 set thread context of 2800 3876 s5TzTzCDRxUS_LNHDU2dAW1p.exe 137 PID 776 set thread context of 4512 776 SBzLZWGed3KVWdHchi3P4A9A.exe 140 PID 3924 set thread context of 3956 3924 Xt8S76sZ9LABcGd96pMW6zN2.exe 136 PID 776 set thread context of 4708 776 SBzLZWGed3KVWdHchi3P4A9A.exe 155 PID 3876 set thread context of 4636 3876 s5TzTzCDRxUS_LNHDU2dAW1p.exe 158 PID 3924 set thread context of 2340 3924 Xt8S76sZ9LABcGd96pMW6zN2.exe 156 PID 776 set thread context of 4952 776 SBzLZWGed3KVWdHchi3P4A9A.exe 160 PID 3924 set thread context of 4684 3924 Xt8S76sZ9LABcGd96pMW6zN2.exe 164 PID 3876 set thread context of 4904 3876 s5TzTzCDRxUS_LNHDU2dAW1p.exe 169 PID 776 set thread context of 1236 776 SBzLZWGed3KVWdHchi3P4A9A.exe 168 PID 3924 set thread context of 5308 3924 Xt8S76sZ9LABcGd96pMW6zN2.exe 172 PID 3876 set thread context of 5680 3876 s5TzTzCDRxUS_LNHDU2dAW1p.exe 176 PID 776 set thread context of 5692 776 SBzLZWGed3KVWdHchi3P4A9A.exe 177 PID 3924 set thread context of 5920 3924 Xt8S76sZ9LABcGd96pMW6zN2.exe 178 PID 776 set thread context of 5368 776 SBzLZWGed3KVWdHchi3P4A9A.exe 183 PID 3924 set thread context of 1092 3924 Xt8S76sZ9LABcGd96pMW6zN2.exe 184 PID 3876 set thread context of 1704 3876 s5TzTzCDRxUS_LNHDU2dAW1p.exe 181 PID 3876 set thread context of 1384 3876 s5TzTzCDRxUS_LNHDU2dAW1p.exe 189 PID 776 set thread context of 6016 776 SBzLZWGed3KVWdHchi3P4A9A.exe 187 PID 3924 set thread context of 2092 3924 Xt8S76sZ9LABcGd96pMW6zN2.exe 188 PID 776 set thread context of 5740 776 SBzLZWGed3KVWdHchi3P4A9A.exe 193 PID 3876 set thread context of 1544 3876 s5TzTzCDRxUS_LNHDU2dAW1p.exe 191 PID 3924 set thread context of 5900 3924 Xt8S76sZ9LABcGd96pMW6zN2.exe 192 PID 776 set thread context of 5504 776 SBzLZWGed3KVWdHchi3P4A9A.exe 196 PID 3876 set thread context of 5580 3876 s5TzTzCDRxUS_LNHDU2dAW1p.exe 197 PID 776 set thread context of 1396 776 SBzLZWGed3KVWdHchi3P4A9A.exe 202 PID 3924 set thread context of 5328 3924 Xt8S76sZ9LABcGd96pMW6zN2.exe 205 PID 5112 set thread context of 5472 5112 Ja4_w8NcMFoPBzvBbTh4pLQJ.exe 209 PID 3876 set thread context of 5784 3876 s5TzTzCDRxUS_LNHDU2dAW1p.exe 206 PID 1016 set thread context of 6120 1016 s5TzTzCDRxUS_LNHDU2dAW1p.exe 261 PID 776 set thread context of 2256 776 SBzLZWGed3KVWdHchi3P4A9A.exe 208 PID 3924 set thread context of 3708 3924 Xt8S76sZ9LABcGd96pMW6zN2.exe 212 PID 3876 set thread context of 4784 3876 s5TzTzCDRxUS_LNHDU2dAW1p.exe 213 PID 776 set thread context of 6072 776 SBzLZWGed3KVWdHchi3P4A9A.exe 215 PID 3924 set thread context of 1352 3924 Xt8S76sZ9LABcGd96pMW6zN2.exe 216 PID 3876 set thread context of 6052 3876 s5TzTzCDRxUS_LNHDU2dAW1p.exe 217 PID 776 set thread context of 6020 776 SBzLZWGed3KVWdHchi3P4A9A.exe 220 PID 3924 set thread context of 6024 3924 Xt8S76sZ9LABcGd96pMW6zN2.exe 221 PID 3876 set thread context of 3096 3876 s5TzTzCDRxUS_LNHDU2dAW1p.exe 222 PID 776 set thread context of 4364 776 SBzLZWGed3KVWdHchi3P4A9A.exe 224 PID 3924 set thread context of 400 3924 Xt8S76sZ9LABcGd96pMW6zN2.exe 223 PID 3876 set thread context of 5260 3876 s5TzTzCDRxUS_LNHDU2dAW1p.exe 225 PID 3924 set thread context of 3564 3924 Xt8S76sZ9LABcGd96pMW6zN2.exe 227 PID 3876 set thread context of 2652 3876 s5TzTzCDRxUS_LNHDU2dAW1p.exe 228 PID 3924 set thread context of 1416 3924 Xt8S76sZ9LABcGd96pMW6zN2.exe 238 PID 3876 set thread context of 1212 3876 s5TzTzCDRxUS_LNHDU2dAW1p.exe 248 PID 776 set thread context of 5736 776 SBzLZWGed3KVWdHchi3P4A9A.exe 251 PID 3924 set thread context of 4068 3924 Xt8S76sZ9LABcGd96pMW6zN2.exe 252 PID 3876 set thread context of 1596 3876 s5TzTzCDRxUS_LNHDU2dAW1p.exe 255 PID 776 set thread context of 4224 776 SBzLZWGed3KVWdHchi3P4A9A.exe 257 PID 3924 set thread context of 1000 3924 Xt8S76sZ9LABcGd96pMW6zN2.exe 258 PID 3876 set thread context of 6120 3876 s5TzTzCDRxUS_LNHDU2dAW1p.exe 261 PID 776 set thread context of 1048 776 SBzLZWGed3KVWdHchi3P4A9A.exe 263 PID 3876 set thread context of 3700 3876 s5TzTzCDRxUS_LNHDU2dAW1p.exe 265 PID 3924 set thread context of 3028 3924 Xt8S76sZ9LABcGd96pMW6zN2.exe 269 PID 3876 set thread context of 6456 3876 s5TzTzCDRxUS_LNHDU2dAW1p.exe 302 PID 776 set thread context of 6620 776 SBzLZWGed3KVWdHchi3P4A9A.exe 305 PID 3924 set thread context of 6652 3924 Xt8S76sZ9LABcGd96pMW6zN2.exe 306 PID 3924 set thread context of 6904 3924 Xt8S76sZ9LABcGd96pMW6zN2.exe 309 PID 3876 set thread context of 7104 3876 s5TzTzCDRxUS_LNHDU2dAW1p.exe 313 PID 776 set thread context of 7128 776 SBzLZWGed3KVWdHchi3P4A9A.exe 314 PID 3924 set thread context of 7136 3924 Xt8S76sZ9LABcGd96pMW6zN2.exe 315 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019VL_MAK_AE-ul-phn.xrm-ms.payfast290.194-74C-B8E BE23.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlusDemoR_BypassTrial180-ppd.xrm-ms.payfast290.194-74C-B8E BE23.exe File opened for modification C:\Program Files\WindowsApps\MicrosoftWindows.Client.WebExperience_321.14700.0.9_x64__cw5n1h2txyewy\Dashboard\WebContent\node_modules\react\jsx-runtime.js BE23.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.21061.10121.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-36_contrast-black.png BE23.exe File opened for modification C:\Program Files\WindowsApps\MicrosoftWindows.Client.WebExperience_321.14700.0.9_x64__cw5n1h2txyewy\Dashboard\WebContent\node_modules\@fluentui\react\lib-commonjs\components\DocumentCard\DocumentCard.base.js BE23.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.13426.20920.0_x64__8wekyb3d8bbwe\images\contrast-black\RunningLate.scale-64.png BE23.exe File created C:\Program Files\WindowsApps\MicrosoftWindows.Client.WebExperience_321.14700.0.9_x64__cw5n1h2txyewy\Dashboard\WebContent\node_modules\@fluentui\react\lib-amd\components\ComboBox\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT BE23.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Standard2019MSDNR_Retail-ul-phn.xrm-ms.payfast290.194-74C-B8E BE23.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Paint_10.2104.17.0_x64__8wekyb3d8bbwe\Assets\contrast-black\PaintAppList.targetsize-64.png BE23.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.UI.Xaml.2.4_2.42007.9001.0_x64__8wekyb3d8bbwe\AppxSignature.p7x BE23.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2020.20120.4004.0_x64__8wekyb3d8bbwe\Data\StreamingAssets\10310_bats_icon.bytes BE23.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_1.0.38.0_x64__8wekyb3d8bbwe\Assets\AlarmsAppList.targetsize-96.png BE23.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.13426.20920.0_x64__8wekyb3d8bbwe\images\contrast-white\HxCalendarAppList.targetsize-32.png BE23.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.2103.1172.0_x64__8wekyb3d8bbwe\Assets\contrast-white\FeedbackHubAppList.targetsize-32_altform-unplated.png BE23.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp4-ul-phn.xrm-ms.payfast290.194-74C-B8E BE23.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\NewComment.White.png BE23.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.GamingApp_2105.900.24.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\Xbox_UnplatedLargeTile.scale-125.png BE23.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.Windows.Photos_21.21030.25003.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\PhotosWideTile.contrast-white_scale-125.png BE23.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.41203.0_x64__8wekyb3d8bbwe\AppxSignature.p7x BE23.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2020.20120.4004.0_x64__8wekyb3d8bbwe\Data\StreamingAssets\10172_smoke BE23.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.13426.20920.0_x64__8wekyb3d8bbwe\images\HxMailAppList.scale-400.png BE23.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.13426.20920.0_x64__8wekyb3d8bbwe\images\TXP_3color_Invoice_378.png BE23.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\WordVL_KMS_Client-ppd.xrm-ms BE23.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.BingWeather_1.0.6.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\AppTiles\WeatherSmallTile.scale-125.png BE23.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.Windows.Photos_21.21030.25003.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\PhotosMedTile.scale-125.png BE23.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.13426.20920.0_x64__8wekyb3d8bbwe\images\HxA-Exchange.scale-200.png BE23.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGamingOverlay_5.721.6282.0_x64__8wekyb3d8bbwe\Assets\WhatsNew.gif BE23.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_1.21052.124.0_x64__8wekyb3d8bbwe\Assets\Settings\Settings.targetsize-64.png BE23.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.21061.10121.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-60_contrast-black.png BE23.exe File opened for modification C:\Program Files\WindowsApps\MicrosoftWindows.Client.WebExperience_321.14700.0.9_x64__cw5n1h2txyewy\Dashboard\WebContent\node_modules\@fluentui\react\lib-amd\compat\index.js BE23.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogoSmall.contrast-black_scale-140.png.payfast290.194-74C-B8E BE23.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\PowerPntLogo.contrast-white_scale-80.png.payfast290.194-74C-B8E BE23.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL048.XML.payfast290.194-74C-B8E BE23.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2020.20120.4004.0_x64__8wekyb3d8bbwe\AppCS\Assets\StoryBuilder\CreatingMovieAnimation\INTRO_300px\INTRO_300px.105.png BE23.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_1.21052.124.0_x64__8wekyb3d8bbwe\Assets\FRE\Error_Connection_Dark.svg BE23.exe File opened for modification C:\Program Files\WindowsApps\MicrosoftWindows.Client.WebExperience_321.14700.0.9_x64__cw5n1h2txyewy\Dashboard\WebContent\node_modules\@fluentui\theme\node_modules\@uifabric\utilities\lib-commonjs\object.js BE23.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeStudentVNextR_Trial-ppd.xrm-ms.payfast290.194-74C-B8E BE23.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000018\cardview\lib\native-common\assets\[email protected] BE23.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.40831.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-32_altform-unplated_contrast-black.png BE23.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.41182.0_x64__8wekyb3d8bbwe\Assets\contrast-white\WideTile.scale-200_contrast-white.png BE23.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsNotepad_10.2103.6.0_x64__8wekyb3d8bbwe\Assets\contrast-white\NotepadAppList.targetsize-20.png BE23.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_1.21052.124.0_x64__8wekyb3d8bbwe\Assets\AppTiles\LargeTile.scale-400.png BE23.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusE5R_SubTrial-pl.xrm-ms BE23.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.GetHelp_10.2105.41472.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\contrast-black\GetHelpMedTile.scale-100_contrast-black.png BE23.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.9.6151.0_x64__8wekyb3d8bbwe\Win10\MicrosoftSolitaireAppList.targetsize-64_altform-unplated.png BE23.exe File created C:\Program Files\WindowsApps\Microsoft.VCLibs.140.00_14.0.30035.0_x64__8wekyb3d8bbwe\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT BE23.exe File created C:\Program Files\WindowsApps\Microsoft.YourPhone_1.21052.124.0_x64__8wekyb3d8bbwe\Assets\Settings\theme-dark\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT BE23.exe File opened for modification C:\Program Files\WindowsApps\MicrosoftWindows.Client.WebExperience_321.14700.0.9_x64__cw5n1h2txyewy\Dashboard\WebContent\node_modules\@fluentui\react\lib\components\DocumentCard\DocumentCardPreview.base.js BE23.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp4-ul-phn.xrm-ms BE23.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\ClientVolumeLicense_eula.txt.payfast290.194-74C-B8E BE23.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.GamingApp_2105.900.24.0_x64__8wekyb3d8bbwe\Assets\Xbox_StoreLogo.scale-200_contrast-black.png BE23.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Paint_10.2104.17.0_x64__8wekyb3d8bbwe\Assets\contrast-white\PaintLargeTile.scale-125.png BE23.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.41203.0_x64__8wekyb3d8bbwe\Assets\AppList.targetsize-72.png BE23.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2020.20120.4004.0_x64__8wekyb3d8bbwe\Data\StreamingAssets\10247_ray_of_light.json BE23.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2021.105.10.0_x64__8wekyb3d8bbwe\Assets\contrast-black\CameraAppList.targetsize-64.png BE23.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.21061.10121.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-60_altform-lightunplated_contrast-black.png BE23.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\OneNoteR_Trial-ul-oob.xrm-ms.payfast290.194-74C-B8E BE23.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PersonalPipcR_OEM_Perp-ppd.xrm-ms.payfast290.194-74C-B8E BE23.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\Cartridges\orcl7.xsl BE23.exe File opened for modification C:\Program Files\WindowsApps\MicrosoftWindows.Client.WebExperience_321.14700.0.9_x64__cw5n1h2txyewy\Dashboard\WebContent\node_modules\@fluentui\react\lib-commonjs\Popup.js BE23.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.Todos_0.33.33351.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\Square310x310Logo.scale-125.png BE23.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_1.21052.124.0_x64__8wekyb3d8bbwe\Assets\Messaging\Message.targetsize-16.png BE23.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.YourPhone_0.19051.7.0_neutral_split.scale-125_8wekyb3d8bbwe\AppxSignature.p7x BE23.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_1.0.28.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\MapsAppList.targetsize-256_altform-lightunplated_contrast-white.png BE23.exe -
Drops file in Windows directory 10 IoCs
description ioc Process File created C:\Windows\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT BE23.exe File opened for modification C:\Windows\Panther\UnattendGC\setupact.log Process not Found File opened for modification C:\Windows\Panther\UnattendGC\setupact.log Process not Found File opened for modification C:\Windows\Panther\UnattendGC\diagerr.xml Process not Found File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp WerFault.exe File opened for modification C:\Windows\Panther\UnattendGC\diagerr.xml Process not Found File opened for modification C:\Windows\Panther\UnattendGC\diagwrn.xml Process not Found File opened for modification C:\Windows\Panther\UnattendGC\setuperr.log Process not Found File opened for modification C:\Windows\Panther\UnattendGC\diagwrn.xml Process not Found File opened for modification C:\Windows\Panther\UnattendGC\setuperr.log Process not Found -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 64 IoCs
pid pid_target Process procid_target 4276 1080 WerFault.exe 111 476 4848 WerFault.exe 96 4632 4692 WerFault.exe 94 1400 4164 WerFault.exe 103 1208 656 WerFault.exe 102 5964 5640 WerFault.exe 174 5496 5680 WerFault.exe 176 1408 6016 WerFault.exe 187 5356 1364 WerFault.exe 143 5244 1048 WerFault.exe 157 1408 3068 WerFault.exe 207 4064 3564 WerFault.exe 227 1036 1504 WerFault.exe 243 5712 6120 WerFault.exe 261 1408 7136 WerFault.exe 315 6160 5188 WerFault.exe 324 664 6156 WerFault.exe 362 972 6572 WerFault.exe 364 1592 6516 WerFault.exe 413 6532 8528 WerFault.exe 448 8424 6116 WerFault.exe 480 6852 10052 WerFault.exe 487 2776 2504 WerFault.exe 539 5984 10108 WerFault.exe 547 9344 9488 WerFault.exe 562 7236 8524 WerFault.exe 587 1880 7340 WerFault.exe 601 5228 4716 WerFault.exe 612 6332 7616 WerFault.exe 641 7724 4664 WerFault.exe 672 8776 10008 WerFault.exe 673 6084 9768 WerFault.exe 733 9344 7224 WerFault.exe 739 1700 7156 WerFault.exe 847 7412 8548 WerFault.exe 856 5576 6744 WerFault.exe 866 15648 5856 WerFault.exe 979 15712 11424 WerFault.exe 981 15884 15636 WerFault.exe 985 13676 5556 WerFault.exe 1062 4276 15072 WerFault.exe 1125 14820 12056 WerFault.exe 1139 11540 9560 Process not Found 1206 10548 13620 Process not Found 1226 14856 14160 Process not Found 1246 15024 12820 Process not Found 1250 16060 12108 Process not Found 1286 9204 11764 Process not Found 1292 15060 11692 Process not Found 1324 6940 15104 Process not Found 1331 12412 15472 Process not Found 1352 13048 15816 Process not Found 1391 12040 9616 Process not Found 1469 12300 7004 Process not Found 1489 13184 13252 Process not Found 1506 17356 1292 Process not Found 1545 16576 17384 Process not Found 1551 16916 16560 Process not Found 1555 14564 17356 Process not Found 1567 10380 16536 Process not Found 1577 10668 5092 Process not Found 1585 17564 17060 Process not Found 1613 15968 17828 Process not Found 1635 17440 18256 Process not Found 1642 -
Checks SCSI registry key(s) 3 TTPs 7 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI XeAC_eAUSdkfGpqWBMt8ES_x.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI XeAC_eAUSdkfGpqWBMt8ES_x.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000 Process not Found Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000\HardwareID Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000 Process not Found Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000\HardwareID Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI XeAC_eAUSdkfGpqWBMt8ES_x.exe -
Checks processor information in registry 2 TTPs 64 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 Xt8S76sZ9LABcGd96pMW6zN2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Xt8S76sZ9LABcGd96pMW6zN2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Process not Found Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Process not Found Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision SBzLZWGed3KVWdHchi3P4A9A.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2628 schtasks.exe 2092 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2980 timeout.exe -
Enumerates system info in registry 2 TTPs 64 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Process not Found Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Process not Found Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS s5TzTzCDRxUS_LNHDU2dAW1p.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Process not Found Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Process not Found Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WinHoster.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Process not Found Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU s5TzTzCDRxUS_LNHDU2dAW1p.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Process not Found Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Xt8S76sZ9LABcGd96pMW6zN2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Process not Found Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Process not Found Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Process not Found Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Process not Found Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Process not Found Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Process not Found Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Process not Found Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Process not Found -
Kills process with taskkill 2 IoCs
pid Process 1556 taskkill.exe 1736 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" Process not Found Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Internet Explorer\Main Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Internet Explorer\Main\DisableFirstRunCustomize = "1" Process not Found -
Modifies data under HKEY_USERS 49 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust sihclient.exe Key created \REGISTRY\USER\S-1-5-19\Software\Classes\Local Settings\MuiCache\7\52C64B7E svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs sihclient.exe Key created \REGISTRY\USER\S-1-5-19\Software\Classes\Local Settings\MuiCache svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\ProviderPasswordCharacterGroups = "2" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates sihclient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\ProviderPasswordLength = "8" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates sihclient.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\ProviderPasswordLength = "8" Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs sihclient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\ProviderPasswordCharacterGroups = "2" Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs sihclient.exe -
Modifies registry class 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5b934b42-522b-4c34-bbfe-37a3ef7b9c90}\Instance\ Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{f8278c54-a712-415b-b593-b77a2be0dda9}\Instance\ Process not Found Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B4BFCC3A-DB2C-424C-B029-7FE99A87C641}\Instance\ Process not Found Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\windows.immersivecontrolpanel_cw5n1h2txyewy\SplashScreen Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\windows.immersivecontrolpanel_cw5n1h2txyewy\ApplicationFrame\windows.immersivecontrolpanel_cw5n1h2txyewy!mic = f401000040010000 Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\windows.immersivecontrolpanel_cw5n1h2txyewy\ApplicationFrame\windows.immersivecontrolpanel_cw5n1h2txyewy!mic = 2c0000000000000001000000ffffffffffffffffffffffffffffffff280000002000000058030000a1020000 Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3796 Setup.exe 3796 Setup.exe 4276 WerFault.exe 4276 WerFault.exe 476 WerFault.exe 476 WerFault.exe 2160 XeAC_eAUSdkfGpqWBMt8ES_x.exe 2160 XeAC_eAUSdkfGpqWBMt8ES_x.exe 1400 WerFault.exe 1400 WerFault.exe 4632 WinHoster.exe 4632 WinHoster.exe 1208 WerFault.exe 1208 WerFault.exe 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3100 Process not Found -
Suspicious behavior: MapViewOfSection 19 IoCs
pid Process 2160 XeAC_eAUSdkfGpqWBMt8ES_x.exe 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4440 w4p1P4V7v4dSZrVJlcZeBtZH.exe Token: SeDebugPrivilege 1004 DVhblIkJk4JgmozIaZVm92xW.exe Token: SeDebugPrivilege 1724 mshta.exe Token: SeRestorePrivilege 4276 WerFault.exe Token: SeBackupPrivilege 4276 WerFault.exe Token: SeBackupPrivilege 4276 WerFault.exe Token: SeDebugPrivilege 1364 6224862.exe Token: SeDebugPrivilege 1048 SBzLZWGed3KVWdHchi3P4A9A.exe Token: SeDebugPrivilege 1556 svchost.exe Token: SeDebugPrivilege 4220 WerFault.exe Token: SeShutdownPrivilege 3100 Process not Found Token: SeCreatePagefilePrivilege 3100 Process not Found Token: SeShutdownPrivilege 3100 Process not Found Token: SeCreatePagefilePrivilege 3100 Process not Found Token: SeShutdownPrivilege 3100 Process not Found Token: SeCreatePagefilePrivilege 3100 Process not Found Token: SeShutdownPrivilege 3100 Process not Found Token: SeCreatePagefilePrivilege 3100 Process not Found Token: SeShutdownPrivilege 3100 Process not Found Token: SeCreatePagefilePrivilege 3100 Process not Found Token: SeShutdownPrivilege 3100 Process not Found Token: SeCreatePagefilePrivilege 3100 Process not Found Token: SeShutdownPrivilege 3100 Process not Found Token: SeCreatePagefilePrivilege 3100 Process not Found Token: SeDebugPrivilege 500 DnlDS6edm9sMCffGWowrrr_K.exe Token: SeShutdownPrivilege 3100 Process not Found Token: SeCreatePagefilePrivilege 3100 Process not Found Token: SeShutdownPrivilege 3100 Process not Found Token: SeCreatePagefilePrivilege 3100 Process not Found Token: SeShutdownPrivilege 3100 Process not Found Token: SeCreatePagefilePrivilege 3100 Process not Found Token: SeShutdownPrivilege 3100 Process not Found Token: SeCreatePagefilePrivilege 3100 Process not Found Token: SeShutdownPrivilege 3100 Process not Found Token: SeCreatePagefilePrivilege 3100 Process not Found Token: SeShutdownPrivilege 3100 Process not Found Token: SeCreatePagefilePrivilege 3100 Process not Found Token: SeShutdownPrivilege 3100 Process not Found Token: SeCreatePagefilePrivilege 3100 Process not Found Token: SeShutdownPrivilege 3100 Process not Found Token: SeCreatePagefilePrivilege 3100 Process not Found Token: SeShutdownPrivilege 3100 Process not Found Token: SeCreatePagefilePrivilege 3100 Process not Found Token: SeDebugPrivilege 4184 KPOYBsEiW7toZFo6D52uV4cj.exe Token: SeShutdownPrivilege 3100 Process not Found Token: SeCreatePagefilePrivilege 3100 Process not Found Token: SeDebugPrivilege 4940 1714949.exe Token: SeDebugPrivilege 3016 1016681.exe Token: SeShutdownPrivilege 3100 Process not Found Token: SeCreatePagefilePrivilege 3100 Process not Found Token: SeShutdownPrivilege 3100 Process not Found Token: SeCreatePagefilePrivilege 3100 Process not Found Token: SeShutdownPrivilege 3100 Process not Found Token: SeCreatePagefilePrivilege 3100 Process not Found Token: SeShutdownPrivilege 3100 Process not Found Token: SeCreatePagefilePrivilege 3100 Process not Found Token: SeShutdownPrivilege 3100 Process not Found Token: SeCreatePagefilePrivilege 3100 Process not Found Token: SeShutdownPrivilege 3100 Process not Found Token: SeCreatePagefilePrivilege 3100 Process not Found Token: SeShutdownPrivilege 3100 Process not Found Token: SeCreatePagefilePrivilege 3100 Process not Found Token: SeShutdownPrivilege 3100 Process not Found Token: SeCreatePagefilePrivilege 3100 Process not Found -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found -
Suspicious use of SendNotifyMessage 63 IoCs
pid Process 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found 3100 Process not Found -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5908 5CD6.exe 11072 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3100 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3796 wrote to memory of 3856 3796 Setup.exe 89 PID 3796 wrote to memory of 3856 3796 Setup.exe 89 PID 3796 wrote to memory of 3876 3796 Setup.exe 90 PID 3796 wrote to memory of 3876 3796 Setup.exe 90 PID 3796 wrote to memory of 3876 3796 Setup.exe 90 PID 3796 wrote to memory of 3928 3796 Setup.exe 91 PID 3796 wrote to memory of 3928 3796 Setup.exe 91 PID 3796 wrote to memory of 3928 3796 Setup.exe 91 PID 3796 wrote to memory of 4220 3796 Setup.exe 93 PID 3796 wrote to memory of 4220 3796 Setup.exe 93 PID 3796 wrote to memory of 4220 3796 Setup.exe 93 PID 3796 wrote to memory of 4184 3796 Setup.exe 92 PID 3796 wrote to memory of 4184 3796 Setup.exe 92 PID 3796 wrote to memory of 4184 3796 Setup.exe 92 PID 3796 wrote to memory of 4692 3796 Setup.exe 94 PID 3796 wrote to memory of 4692 3796 Setup.exe 94 PID 3796 wrote to memory of 4692 3796 Setup.exe 94 PID 3796 wrote to memory of 3924 3796 Setup.exe 95 PID 3796 wrote to memory of 3924 3796 Setup.exe 95 PID 3796 wrote to memory of 3924 3796 Setup.exe 95 PID 3796 wrote to memory of 4848 3796 Setup.exe 96 PID 3796 wrote to memory of 4848 3796 Setup.exe 96 PID 3796 wrote to memory of 4848 3796 Setup.exe 96 PID 3796 wrote to memory of 500 3796 Setup.exe 101 PID 3796 wrote to memory of 500 3796 Setup.exe 101 PID 3796 wrote to memory of 500 3796 Setup.exe 101 PID 3796 wrote to memory of 3144 3796 Setup.exe 97 PID 3796 wrote to memory of 3144 3796 Setup.exe 97 PID 3796 wrote to memory of 3144 3796 Setup.exe 97 PID 3796 wrote to memory of 4440 3796 Setup.exe 100 PID 3796 wrote to memory of 4440 3796 Setup.exe 100 PID 3796 wrote to memory of 5112 3796 Setup.exe 98 PID 3796 wrote to memory of 5112 3796 Setup.exe 98 PID 3796 wrote to memory of 5112 3796 Setup.exe 98 PID 3796 wrote to memory of 4784 3796 Setup.exe 99 PID 3796 wrote to memory of 4784 3796 Setup.exe 99 PID 3796 wrote to memory of 4784 3796 Setup.exe 99 PID 3796 wrote to memory of 4164 3796 Setup.exe 103 PID 3796 wrote to memory of 4164 3796 Setup.exe 103 PID 3796 wrote to memory of 4164 3796 Setup.exe 103 PID 3796 wrote to memory of 656 3796 Setup.exe 102 PID 3796 wrote to memory of 656 3796 Setup.exe 102 PID 3796 wrote to memory of 656 3796 Setup.exe 102 PID 3796 wrote to memory of 1004 3796 Setup.exe 104 PID 3796 wrote to memory of 1004 3796 Setup.exe 104 PID 3796 wrote to memory of 3600 3796 Setup.exe 114 PID 3796 wrote to memory of 3600 3796 Setup.exe 114 PID 3796 wrote to memory of 3600 3796 Setup.exe 114 PID 3796 wrote to memory of 1016 3796 Setup.exe 113 PID 3796 wrote to memory of 1016 3796 Setup.exe 113 PID 3796 wrote to memory of 1016 3796 Setup.exe 113 PID 3796 wrote to memory of 776 3796 Setup.exe 112 PID 3796 wrote to memory of 776 3796 Setup.exe 112 PID 3796 wrote to memory of 776 3796 Setup.exe 112 PID 3796 wrote to memory of 1080 3796 Setup.exe 111 PID 3796 wrote to memory of 1080 3796 Setup.exe 111 PID 3796 wrote to memory of 1080 3796 Setup.exe 111 PID 3796 wrote to memory of 1188 3796 Setup.exe 110 PID 3796 wrote to memory of 1188 3796 Setup.exe 110 PID 3796 wrote to memory of 1188 3796 Setup.exe 110 PID 3796 wrote to memory of 900 3796 Setup.exe 127 PID 3796 wrote to memory of 900 3796 Setup.exe 127 PID 3796 wrote to memory of 900 3796 Setup.exe 127 PID 3796 wrote to memory of 1724 3796 Setup.exe 125
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Users\Admin\Documents\AKAaEBEXeHWvBCq4njjkRihn.exe"C:\Users\Admin\Documents\AKAaEBEXeHWvBCq4njjkRihn.exe"2⤵
- Executes dropped EXE
PID:3856
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe"C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3876 -
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵
- Executes dropped EXE
PID:852
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵
- Executes dropped EXE
PID:2800
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵
- Executes dropped EXE
PID:4636
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵
- Executes dropped EXE
PID:3460
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵
- Executes dropped EXE
PID:4904
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵
- Executes dropped EXE
PID:5680 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5680 -s 284⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:5496
-
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵
- Executes dropped EXE
PID:1704
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵
- Executes dropped EXE
PID:1384
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵
- Executes dropped EXE
PID:1544
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:5580
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:5784
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵
- Suspicious use of SetThreadContext
PID:4784
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:6052
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:3096
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:5260
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:2652
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵
- Suspicious use of SetThreadContext
PID:1016
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:1212
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:1596
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:6120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6120 -s 284⤵
- Program crash
PID:5712
-
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:3700
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:6456
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:6756
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:6988
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:7104
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:7164
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:2700
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:5188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5188 -s 284⤵
- Program crash
- Checks processor information in registry
PID:6160
-
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:1680
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵
- Enumerates system info in registry
PID:5712
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:6968
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:6848
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:6360
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:6228
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:6080
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:2944
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:3928
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:3572
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:6156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6156 -s 284⤵
- Program crash
- Checks processor information in registry
PID:664
-
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:5952
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:4452
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:5116
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:3388
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:7008
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:5792
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:444
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:5348
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:668
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:4116
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:4132
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:3388
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:5964
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:6832
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:6516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6516 -s 284⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:1592
-
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:5904
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:2008
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:7676
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:7508
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:7200
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:8348
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:8888
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:8580
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:6960
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:8608
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:8528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8528 -s 284⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:6532
-
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:4124
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:9664
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:6196
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:9816
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:3520
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:5204
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:9948
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:6864
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:6116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6116 -s 284⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:8424
-
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:7428
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:5956
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:7260
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:9092
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:8416
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:8104
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:8336
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:8244
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:8588
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:8464
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:7844
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:9076
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:9824
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:7944
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:9992
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:9632
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:7748
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:7024
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:8904
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:8076
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:9656
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:9672
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:8404
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:10028
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:3420
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:5840
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:1776
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:9104
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:2920
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:4440
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:8916
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:576
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:9348
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:7916
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:8620
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:6232
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:6036
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:9840
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:2276
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:6060
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:3524
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:9836
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:4232
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:8676
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:9512
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:8936
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:6984
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:5084
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:6996
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:900
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:10188
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:5976
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:9436
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:8304
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:4964
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:7300
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:4892
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:4664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4664 -s 284⤵
- Program crash
- Checks processor information in registry
PID:7724
-
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:7344
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:6368
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:1824
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:9856
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:3704
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:7804
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:9924
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:7432
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:5220
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:8388
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:6620
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:9464
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:8204
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:8512
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:4472
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:2964
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:9624
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:9864
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:9768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9768 -s 324⤵
- Program crash
PID:6084
-
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:9048
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:8780
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:3172
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:10436
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:10688
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:10968
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:11240
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:7208
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:10564
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:6492
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:11112
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:8700
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:10296
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:8756
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:10632
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:10480
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:10872
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:11016
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:1464
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:10416
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:9976
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:8452
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:7068
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:11168
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:9592
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:10184
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:7264
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:8124
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:4832
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:7716
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:9208
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:9084
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:7912
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:5460
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:8516
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:6956
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:9304
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:8616
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:10772
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:3200
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:3288
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:8944
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:420
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:4532
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:5660
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:4704
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:9732
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:4304
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:4820
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:10584
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:8340
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:9676
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:10412
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:3388
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:8476
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:2480
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:12192
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:11528
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:12420
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:13068
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:12708
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:11892
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:13716
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:11760
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:14228
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:13332
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:11184
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:14624
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:15040
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:13004
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:14992
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:11492
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:7388
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:11280
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:14600
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:7936
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:15204
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:13128
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:15636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 15636 -s 284⤵
- Program crash
- Enumerates system info in registry
PID:15884
-
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:15864
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:16364
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:15468
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:15660
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:16192
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:15476
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:16088
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:6896
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:10912
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:9580
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:13740
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:13012
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:16332
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:16328
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:5040
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:6520
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:15404
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:12352
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:13224
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:12728
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:4976
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:1832
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:14088
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:5556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5556 -s 284⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:13676
-
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:7840
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:5768
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:8988
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:16020
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:12376
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:9444
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:3120
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:14192
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:9648
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:12816
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:15812
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:9876
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:12332
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:14068
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:13324
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:10444
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:4464
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:11564
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:14864
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:14240
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:14204
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:16196
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:5164
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:14836
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:10376
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:9188
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:3824
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:13864
-
-
C:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exeC:\Users\Admin\Documents\s5TzTzCDRxUS_LNHDU2dAW1p.exe3⤵PID:13876
-
-
-
C:\Users\Admin\Documents\AalTGrsjFu7Ccb8Rl8dDfvfV.exe"C:\Users\Admin\Documents\AalTGrsjFu7Ccb8Rl8dDfvfV.exe"2⤵
- Executes dropped EXE
PID:3928 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:2092
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:2628
-
-
-
C:\Users\Admin\Documents\KPOYBsEiW7toZFo6D52uV4cj.exe"C:\Users\Admin\Documents\KPOYBsEiW7toZFo6D52uV4cj.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:4184
-
-
C:\Users\Admin\Documents\tzEVLrrdEVWd48ASAEtRiWq7.exe"C:\Users\Admin\Documents\tzEVLrrdEVWd48ASAEtRiWq7.exe"2⤵
- Executes dropped EXE
PID:4220
-
-
C:\Users\Admin\Documents\sadlXnc3wPoZxcS8ICQF5ppQ.exe"C:\Users\Admin\Documents\sadlXnc3wPoZxcS8ICQF5ppQ.exe"2⤵
- Executes dropped EXE
PID:4692 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4692 -s 2723⤵
- Program crash
PID:4632
-
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe"C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3924 -
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵
- Executes dropped EXE
PID:3956
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵
- Executes dropped EXE
PID:2340
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵
- Executes dropped EXE
PID:4684
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵
- Executes dropped EXE
PID:5308
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵
- Executes dropped EXE
PID:5920
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵
- Executes dropped EXE
PID:1092
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵
- Executes dropped EXE
PID:2092
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵
- Executes dropped EXE
PID:5900
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵
- Executes dropped EXE
PID:5216
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:5328
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:3708
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:1352
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:6024
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:400
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:3564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3564 -s 284⤵
- Program crash
- Enumerates system info in registry
PID:4064
-
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:3268
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:1416
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:4068
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:1000
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:3628
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:3028
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:6652
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:6904
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:7028
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:7136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7136 -s 284⤵
- Program crash
- Enumerates system info in registry
PID:1408
-
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:3400
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:6112
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:6564
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:6688
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:5824
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:6556
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:1464
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:5680
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:3340
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:6216
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:2608
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:7076
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:6096
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:6572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6572 -s 284⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:972
-
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:6304
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:6748
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:5772
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:1420
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:3268
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:5148
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:7088
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:6320
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:6152
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:5664
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:5192
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:4160
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:1180
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:4484
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:6076
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:4640
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:7476
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:8040
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:7920
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:1300
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:8764
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:8456
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:9024
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:3984
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:4476
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:5472
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:9272
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:9828
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:9324
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:9684
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:9376
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:10132
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:3056
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:9440
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:7256
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:4644
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:7196
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:4556
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:7992
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:5196
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:7980
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:1428
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:3896
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:8096
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:6080
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:5844
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:8172
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:9492
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:9248
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:9412
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:5512
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:6736
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:2504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2504 -s 284⤵
- Program crash
- Enumerates system info in registry
PID:2776
-
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:10212
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:10108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 10108 -s 284⤵
- Program crash
- Checks processor information in registry
PID:5984
-
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:7452
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:7728
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:9180
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:2620
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:9100
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:6424
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:7564
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:1036
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:1124
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:2764
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:3232
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:8524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8524 -s 284⤵
- Program crash
PID:7236
-
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:3156
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:9160
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:9500
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:7340
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7340 -s 284⤵
- Program crash
- Enumerates system info in registry
PID:1880
-
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:4512
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:8116
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:4716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4716 -s 284⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:5228
-
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:1996
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:7956
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:3904
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:9016
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:6352
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:7800
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:9484
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:3900
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:7616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7616 -s 284⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:6332
-
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:8816
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:6708
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:8228
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:8180
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:7332
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:7776
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:2576
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:8028
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:8668
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:10008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 10008 -s 284⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:8776
-
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:7192
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:8884
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:9228
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:9384
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:8836
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:8048
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:8860
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:8256
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:7724
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:6316
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:5216
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:5400
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:7360
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:1484
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:8156
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:8500
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:5948
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:1696
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:7572
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:7224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7224 -s 284⤵
- Program crash
PID:9344
-
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:5520
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:10324
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:10520
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:10764
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:11092
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:5404
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:10352
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:7868
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:10880
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:11168
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:6308
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:10060
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:7668
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:8644
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:10112
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:6624
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:6764
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:11004
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:5516
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:3192
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:9868
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:2184
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:4932
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:8460
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:10416
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:6560
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:10432
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:2952
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:10800
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:3544
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:3448
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:9620
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:6312
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:6012
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:7156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7156 -s 284⤵
- Program crash
- Checks processor information in registry
PID:1700
-
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:4548
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:3936
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:10652
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:10508
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:6744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6744 -s 284⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:5576
-
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:8516
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:10308
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:2336
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:10180
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:4808
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:7752
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:8368
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:10392
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:9736
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:10428
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:5172
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:2772
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:1656
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:5748
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:11444
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:12252
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:8060
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:12564
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:13092
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:12876
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:8488
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:13628
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:14152
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:14056
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:1812
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:13492
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:14456
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:14800
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:15300
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:1232
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:15212
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:15008
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:13072
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:15188
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:9936
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:2884
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:5856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5856 -s 284⤵
- Program crash
PID:15648
-
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:13164
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:15756
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:16012
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:14972
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:15744
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:15712
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:7288
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:8272
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:5152
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:16056
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:14252
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:14900
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:12240
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:1724
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:11272
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:11500
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:14596
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:11704
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:13604
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:15720
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:10996
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:3884
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:15776
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:9084
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:12888
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:10404
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:10732
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:14748
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:6292
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:11552
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:9000
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:16308
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:12396
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:1192
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:10648
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:5280
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:2624
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:11804
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:8540
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:11668
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:14020
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:12188
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:8772
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:5576
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:14856
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:14552
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:14420
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:8760
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:10192
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:5684
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:14704
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:14096
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:10840
-
-
C:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exeC:\Users\Admin\Documents\Xt8S76sZ9LABcGd96pMW6zN2.exe3⤵PID:11736
-
-
-
C:\Users\Admin\Documents\qqeppCYqAudj7rRwp42uK0XT.exe"C:\Users\Admin\Documents\qqeppCYqAudj7rRwp42uK0XT.exe"2⤵
- Executes dropped EXE
PID:4848 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4848 -s 2723⤵
- Program crash
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:476
-
-
-
C:\Users\Admin\Documents\S9pRj2JglOfvtXhrTk6AWMJB.exe"C:\Users\Admin\Documents\S9pRj2JglOfvtXhrTk6AWMJB.exe"2⤵
- Executes dropped EXE
PID:3144 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbsCrIPt: cLOSe( CREAteobjecT ("wScRiPT.ShElL" ).RUN ( "C:\Windows\system32\cmd.exe /C tYpe ""C:\Users\Admin\Documents\S9pRj2JglOfvtXhrTk6AWMJB.exe"" > IQ0V_Fe_.eXE && StaRt IQ0v_FE_.ExE -poRsuYEMryiLi & if """"== """" for %m in ( ""C:\Users\Admin\Documents\S9pRj2JglOfvtXhrTk6AWMJB.exe"" ) do taskkill /iM ""%~NXm"" -F" ,0 , TRUE ))3⤵PID:4256
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C tYpe "C:\Users\Admin\Documents\S9pRj2JglOfvtXhrTk6AWMJB.exe" > IQ0V_Fe_.eXE && StaRt IQ0v_FE_.ExE -poRsuYEMryiLi& if ""== "" for %m in ("C:\Users\Admin\Documents\S9pRj2JglOfvtXhrTk6AWMJB.exe" ) do taskkill /iM "%~NXm" -F4⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\IQ0V_Fe_.eXEIQ0v_FE_.ExE -poRsuYEMryiLi5⤵
- Executes dropped EXE
PID:2868 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbsCrIPt: cLOSe( CREAteobjecT ("wScRiPT.ShElL" ).RUN ( "C:\Windows\system32\cmd.exe /C tYpe ""C:\Users\Admin\AppData\Local\Temp\IQ0V_Fe_.eXE"" > IQ0V_Fe_.eXE && StaRt IQ0v_FE_.ExE -poRsuYEMryiLi & if ""-poRsuYEMryiLi""== """" for %m in ( ""C:\Users\Admin\AppData\Local\Temp\IQ0V_Fe_.eXE"" ) do taskkill /iM ""%~NXm"" -F" ,0 , TRUE ))6⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:1724 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C tYpe "C:\Users\Admin\AppData\Local\Temp\IQ0V_Fe_.eXE" > IQ0V_Fe_.eXE && StaRt IQ0v_FE_.ExE -poRsuYEMryiLi& if "-poRsuYEMryiLi"== "" for %m in ("C:\Users\Admin\AppData\Local\Temp\IQ0V_Fe_.eXE" ) do taskkill /iM "%~NXm" -F7⤵PID:2356
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" VHTDDahA.G,XBvVyh6⤵
- Loads dropped DLL
PID:5664
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /iM "S9pRj2JglOfvtXhrTk6AWMJB.exe" -F5⤵
- Kills process with taskkill
PID:1556
-
-
-
-
-
C:\Users\Admin\Documents\Ja4_w8NcMFoPBzvBbTh4pLQJ.exe"C:\Users\Admin\Documents\Ja4_w8NcMFoPBzvBbTh4pLQJ.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5112 -
C:\Users\Admin\Documents\Ja4_w8NcMFoPBzvBbTh4pLQJ.exe"C:\Users\Admin\Documents\Ja4_w8NcMFoPBzvBbTh4pLQJ.exe"3⤵PID:5472
-
-
-
C:\Users\Admin\Documents\XeAC_eAUSdkfGpqWBMt8ES_x.exe"C:\Users\Admin\Documents\XeAC_eAUSdkfGpqWBMt8ES_x.exe"2⤵
- Executes dropped EXE
PID:4784 -
C:\Users\Admin\Documents\XeAC_eAUSdkfGpqWBMt8ES_x.exe"C:\Users\Admin\Documents\XeAC_eAUSdkfGpqWBMt8ES_x.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2160
-
-
-
C:\Users\Admin\Documents\w4p1P4V7v4dSZrVJlcZeBtZH.exe"C:\Users\Admin\Documents\w4p1P4V7v4dSZrVJlcZeBtZH.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\ryuk.exe"C:\Users\Admin\AppData\Local\Temp\ryuk.exe"3⤵
- Executes dropped EXE
PID:2768
-
-
-
C:\Users\Admin\Documents\DnlDS6edm9sMCffGWowrrr_K.exe"C:\Users\Admin\Documents\DnlDS6edm9sMCffGWowrrr_K.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:500
-
-
C:\Users\Admin\Documents\spcDzX2zscw8JZ7smMja1YyZ.exe"C:\Users\Admin\Documents\spcDzX2zscw8JZ7smMja1YyZ.exe"2⤵
- Executes dropped EXE
PID:656 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 656 -s 2403⤵
- Program crash
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1208
-
-
-
C:\Users\Admin\Documents\qtmnLSnH0R35ztegLWE7zTyA.exe"C:\Users\Admin\Documents\qtmnLSnH0R35ztegLWE7zTyA.exe"2⤵
- Executes dropped EXE
PID:4164 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4164 -s 2363⤵
- Program crash
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:1400
-
-
-
C:\Users\Admin\Documents\DVhblIkJk4JgmozIaZVm92xW.exe"C:\Users\Admin\Documents\DVhblIkJk4JgmozIaZVm92xW.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1004
-
-
C:\Users\Admin\Documents\QmqAxXQJaTvjeUocFNRhqtTH.exe"C:\Users\Admin\Documents\QmqAxXQJaTvjeUocFNRhqtTH.exe"2⤵
- Executes dropped EXE
PID:1188 -
C:\Users\Admin\Documents\QmqAxXQJaTvjeUocFNRhqtTH.exe"C:\Users\Admin\Documents\QmqAxXQJaTvjeUocFNRhqtTH.exe" -u3⤵
- Executes dropped EXE
PID:2968
-
-
-
C:\Users\Admin\Documents\ZKPkqWiz9htr4lPBDLqPZ8yM.exe"C:\Users\Admin\Documents\ZKPkqWiz9htr4lPBDLqPZ8yM.exe"2⤵
- Executes dropped EXE
PID:1080 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1080 -s 2763⤵
- Drops file in Windows directory
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4276
-
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe"C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:776 -
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵
- Executes dropped EXE
PID:4512
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵
- Executes dropped EXE
PID:4708
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵
- Executes dropped EXE
PID:4952
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Executes dropped EXE
PID:1236
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵
- Executes dropped EXE
PID:5692
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵
- Executes dropped EXE
PID:5368
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵
- Executes dropped EXE
PID:6016 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6016 -s 284⤵
- Program crash
PID:1408
-
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵
- Executes dropped EXE
PID:5740
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵
- Executes dropped EXE
PID:5504
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:1396
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:2256
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:6072
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:6020
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:4364
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:5080
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:2156
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:3952
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:5736
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4224
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1048
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:3356
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:6620
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:6848
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:7004
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:7128
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:3508
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:6464
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵
- Enumerates connected drives
PID:3896
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:2204
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:5448
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:6588
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:7052
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:824
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:1972
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:6316
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:6696
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:5712
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:2268
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:6152
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:6252
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:3940
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:5448
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:4588
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:5800
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:6776
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:6664
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:5744
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:3824
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:6328
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:3508
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:6856
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:5196
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:5880
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:3864
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:548
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:7392
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:8004
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:7728
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:8124
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:8544
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:9144
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:8904
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:8036
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:1600
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:5560
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:9300
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:9864
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:9340
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:9964
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:9560
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:9920
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:5936
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:7724
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:6608
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:10052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 10052 -s 284⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:6852
-
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:7224
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:7988
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:3012
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:9484
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:4836
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:9112
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:6972
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:4352
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:5884
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:1592
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:6956
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:7380
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:2148
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:7396
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:3824
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:8088
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:824
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:8380
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:9972
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:8048
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:7844
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:7436
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:9488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9488 -s 284⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:9344
-
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:9072
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:9796
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:9304
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:9060
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:2688
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:10160
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:9568
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:7432
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:10236
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:9260
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:8140
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:5216
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:9084
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:4532
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:10128
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:2016
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:7732
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:3496
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:6380
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:3680
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:5356
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:6716
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:6428
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:1592
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:9972
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:8340
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:8700
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:10180
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:4580
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:9508
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:9240
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:4352
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:5112
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:5412
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:6776
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:576
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:9760
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:10232
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:6972
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:8896
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:6808
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:5284
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:3808
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:8760
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:8720
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:6996
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:6808
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:8284
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:6380
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:3224
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:7512
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:7684
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:9900
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:3704
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:1172
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:10404
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:10616
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:10836
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:11172
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:7180
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:9344
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:10644
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:3204
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:11200
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:908
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:7576
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:1192
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:5528
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:3440
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:11028
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:1924
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:2908
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:8136
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:9044
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:10988
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:11116
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:1916
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:8196
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:10816
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:1240
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:4972
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:10596
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:4196
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:11124
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:4852
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:6716
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:2036
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:10236
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:5356
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:9956
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:8548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8548 -s 284⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:7412
-
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:4028
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:6220
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:8444
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:7212
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:5756
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:2676
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:9424
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:8592
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:4524
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:4376
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:7880
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:7236
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:5768
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:8956
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:8820
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:10856
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:4872
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:11648
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:3192
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:11824
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:12604
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:13152
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:12292
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:13020
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:13756
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:13576
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:7352
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:3308
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:6696
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:14652
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:15244
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:8244
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:15144
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:12008
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:2352
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:14604
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:14500
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:11856
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:8508
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:11424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 11424 -s 284⤵
- Program crash
PID:15712
-
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:15688
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:15912
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:11992
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:15784
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:16252
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:3724
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:15944
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:12696
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:6664
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵
- Checks processor information in registry
PID:15648
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:16168
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:8184
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:14588
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:15216
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:15576
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:16236
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:15152
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:8292
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:10952
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:11744
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:12640
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:4024
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:14896
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:15480
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:12464
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:11392
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:8592
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:7540
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:4152
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:10532
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:10504
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:11116
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:9108
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:5384
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:13192
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:13400
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:13380
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:12216
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:13232
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:12824
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:14012
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:9504
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:13732
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:2968
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:15072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 15072 -s 284⤵
- Program crash
- Checks processor information in registry
PID:4276
-
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:12484
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:13860
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:8064
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:12056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 12056 -s 284⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:14820
-
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:8092
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:15780
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:15924
-
-
C:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exeC:\Users\Admin\Documents\SBzLZWGed3KVWdHchi3P4A9A.exe3⤵PID:15012
-
-
-
C:\Users\Admin\Documents\FIs4n_aUrxrpNs3zuKkcgZaF.exe"C:\Users\Admin\Documents\FIs4n_aUrxrpNs3zuKkcgZaF.exe"2⤵
- Executes dropped EXE
PID:1016 -
C:\Users\Admin\Documents\FIs4n_aUrxrpNs3zuKkcgZaF.exe"C:\Users\Admin\Documents\FIs4n_aUrxrpNs3zuKkcgZaF.exe"3⤵PID:6120
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im FIs4n_aUrxrpNs3zuKkcgZaF.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Documents\FIs4n_aUrxrpNs3zuKkcgZaF.exe" & del C:\ProgramData\*.dll & exit4⤵PID:1076
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im FIs4n_aUrxrpNs3zuKkcgZaF.exe /f5⤵
- Kills process with taskkill
PID:1736
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 65⤵
- Delays execution with timeout.exe
PID:2980
-
-
-
-
-
C:\Users\Admin\Documents\7BOu9TIJMQySbeGQcDPiRFXQ.exe"C:\Users\Admin\Documents\7BOu9TIJMQySbeGQcDPiRFXQ.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3600
-
-
C:\Users\Admin\Documents\mmhu7lViAMJDGo1Q3snJhdBM.exe"C:\Users\Admin\Documents\mmhu7lViAMJDGo1Q3snJhdBM.exe"2⤵
- Executes dropped EXE
PID:1724 -
C:\Users\Admin\AppData\Roaming\6224862.exe"C:\Users\Admin\AppData\Roaming\6224862.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1364 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1364 -s 20844⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:5356
-
-
-
C:\Users\Admin\AppData\Roaming\4890110.exe"C:\Users\Admin\AppData\Roaming\4890110.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4196 -
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"4⤵
- Executes dropped EXE
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:4632
-
-
-
C:\Users\Admin\AppData\Roaming\1016681.exe"C:\Users\Admin\AppData\Roaming\1016681.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3016
-
-
C:\Users\Admin\AppData\Roaming\1714949.exe"C:\Users\Admin\AppData\Roaming\1714949.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4940
-
-
C:\Users\Admin\AppData\Roaming\5536172.exe"C:\Users\Admin\AppData\Roaming\5536172.exe"3⤵PID:1048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1048 -s 24564⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:5244
-
-
-
-
C:\Users\Admin\Documents\vZuGD8zXLLqteNZ3ygWWvyHy.exe"C:\Users\Admin\Documents\vZuGD8zXLLqteNZ3ygWWvyHy.exe"2⤵
- Executes dropped EXE
PID:900
-
-
C:\Windows\System32\sihclient.exeC:\Windows\System32\sihclient.exe /cv R3q930x020WnyfI9gsy3Ow.0.21⤵
- Modifies data under HKEY_USERS
PID:4524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1080 -ip 10801⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:1960
-
C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"1⤵
- Executes dropped EXE
PID:1200
-
C:\Program Files (x86)\Company\NewProduct\cutm3.exe"C:\Program Files (x86)\Company\NewProduct\cutm3.exe"1⤵
- Executes dropped EXE
PID:1096
-
C:\Program Files (x86)\Company\NewProduct\inst001.exe"C:\Program Files (x86)\Company\NewProduct\inst001.exe"1⤵
- Executes dropped EXE
PID:652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4848 -ip 48481⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4164 -ip 41641⤵PID:1064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 4692 -ip 46921⤵PID:1236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 656 -ip 6561⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:1064
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵
- Modifies data under HKEY_USERS
PID:3808
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:5156
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Loads dropped DLL
PID:5640 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5640 -s 4522⤵
- Program crash
PID:5964
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:5580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 5640 -ip 56401⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 5680 -ip 56801⤵PID:5252
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 6016 -ip 60161⤵PID:2328
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 528 -p 1364 -ip 13641⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 1048 -ip 10481⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5944
-
C:\Users\Admin\AppData\Local\Temp\5CD6.exeC:\Users\Admin\AppData\Local\Temp\5CD6.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5908
-
C:\Users\Admin\AppData\Local\Temp\5FC5.exeC:\Users\Admin\AppData\Local\Temp\5FC5.exe1⤵PID:3068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3068 -s 2282⤵
- Program crash
PID:1408
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s PcaSvc1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3068 -ip 30681⤵PID:3508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 3564 -ip 35641⤵PID:4224
-
C:\Users\Admin\AppData\Local\Temp\BE23.exeC:\Users\Admin\AppData\Local\Temp\BE23.exe1⤵
- Adds Run key to start application
- Enumerates connected drives
PID:5192 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\smss.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\smss.exe" -start2⤵PID:3896
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\~temp001.bat3⤵PID:4368
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete4⤵PID:6304
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C vssadmin delete shadows /all /quiet3⤵PID:5804
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\smss.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\smss.exe" -agent 03⤵PID:5436
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wbadmin delete catalog -quiet3⤵PID:5792
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures3⤵PID:2188
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} recoveryenabled no3⤵PID:6080
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wmic shadowcopy delete3⤵PID:2564
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete4⤵PID:6264
-
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵PID:5376
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C vssadmin delete shadows /all /quiet2⤵PID:5464
-
-
C:\Users\Admin\AppData\Local\Temp\BE23.exe"C:\Users\Admin\AppData\Local\Temp\BE23.exe" -agent 02⤵
- Drops file in Program Files directory
- Drops file in Windows directory
PID:3056
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\~temp001.bat2⤵PID:1812
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete3⤵PID:6252
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wbadmin delete catalog -quiet2⤵PID:5816
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures2⤵PID:1436
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} recoveryenabled no2⤵PID:4548
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wmic shadowcopy delete2⤵PID:4628
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete3⤵PID:6240
-
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1504 -s 8722⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:1036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 1504 -ip 15041⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2356
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1596
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:6044
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:2924
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1912
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2328
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:5176
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:3060
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 6120 -ip 61201⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of AdjustPrivilegeToken
PID:4220
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:1504
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:6488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 7136 -ip 71361⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:1592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 5188 -ip 51881⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 6156 -ip 61561⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:3244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 6572 -ip 65721⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 6516 -ip 65161⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5772
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 8528 -ip 85281⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6296
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT1⤵PID:10228
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵
- Modifies data under HKEY_USERS
PID:240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 6116 -ip 61161⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 10052 -ip 100521⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 2504 -ip 25041⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:9676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 10108 -ip 101081⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:8388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 9488 -ip 94881⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:3344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 8524 -ip 85241⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5196
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 7340 -ip 73401⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:7212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 4716 -ip 47161⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:8340
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 7616 -ip 76161⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:7384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 4664 -ip 46641⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 10008 -ip 100081⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:8100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 9768 -ip 97681⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 7224 -ip 72241⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:8368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 7156 -ip 71561⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:9576
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 8548 -ip 85481⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:3460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 6744 -ip 67441⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 5856 -ip 58561⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:15584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 11424 -ip 114241⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:15696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 15636 -ip 156361⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:15856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 5556 -ip 55561⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:13556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 15072 -ip 150721⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:11984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 12056 -ip 120561⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:14144
Network
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
1Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
Disabling Security Tools
1File Deletion
1Modify Registry
3Virtualization/Sandbox Evasion
1Web Service
1