Overview
overview
10Static
static
Setup (1).exe
windows11_x64
10Setup (10).exe
windows11_x64
10Setup (11).exe
windows11_x64
10Setup (12).exe
windows11_x64
10Setup (13).exe
windows11_x64
10Setup (14).exe
windows11_x64
10Setup (15).exe
windows11_x64
10Setup (16).exe
windows11_x64
10Setup (17).exe
windows11_x64
10Setup (18).exe
windows11_x64
10Setup (19).exe
windows11_x64
10Setup (2).exe
windows11_x64
10Setup (20).exe
windows11_x64
10Setup (21).exe
windows11_x64
10Setup (22).exe
windows11_x64
10Setup (23).exe
windows11_x64
10Setup (24).exe
windows11_x64
10Setup (25).exe
windows11_x64
10Setup (26).exe
windows11_x64
10Setup (27).exe
windows11_x64
10Setup (28).exe
windows11_x64
10Setup (29).exe
windows11_x64
10Setup (3).exe
windows11_x64
10Setup (30).exe
windows11_x64
10Setup (31).exe
windows11_x64
10Setup (4).exe
windows11_x64
10Setup (5).exe
windows11_x64
10Setup (6).exe
windows11_x64
10Setup (7).exe
windows11_x64
10Setup (8).exe
windows11_x64
10Setup (9).exe
windows11_x64
10Setup.exe
windows11_x64
10Resubmissions
15-10-2024 15:36
241015-s1zlzasdkc 1001-07-2024 18:32
240701-w6yteawhmq 1001-07-2024 14:52
240701-r82wmaxdnd 1001-07-2024 14:52
240701-r8syqa1dpp 1011-03-2024 21:22
240311-z8dsssgg58 1001-09-2021 13:18
210901-5bmxjspa5s 1001-09-2021 13:04
210901-te4btfspqa 1001-09-2021 05:12
210901-4wnkwm1p3j 1031-08-2021 21:47
210831-41rp97dma2 1031-08-2021 19:51
210831-359awwatje 10Analysis
-
max time kernel
85s -
max time network
1814s -
platform
windows11_x64 -
resource
win11 -
submitted
31-08-2021 21:47
Static task
static1
Behavioral task
behavioral1
Sample
Setup (1).exe
Resource
win11
Behavioral task
behavioral2
Sample
Setup (10).exe
Resource
win11
Behavioral task
behavioral3
Sample
Setup (11).exe
Resource
win11
Behavioral task
behavioral4
Sample
Setup (12).exe
Resource
win11
Behavioral task
behavioral5
Sample
Setup (13).exe
Resource
win11
Behavioral task
behavioral6
Sample
Setup (14).exe
Resource
win11
Behavioral task
behavioral7
Sample
Setup (15).exe
Resource
win11
Behavioral task
behavioral8
Sample
Setup (16).exe
Resource
win11
Behavioral task
behavioral9
Sample
Setup (17).exe
Resource
win11
Behavioral task
behavioral10
Sample
Setup (18).exe
Resource
win11
Behavioral task
behavioral11
Sample
Setup (19).exe
Resource
win11
Behavioral task
behavioral12
Sample
Setup (2).exe
Resource
win11
Behavioral task
behavioral13
Sample
Setup (20).exe
Resource
win11
Behavioral task
behavioral14
Sample
Setup (21).exe
Resource
win11
Behavioral task
behavioral15
Sample
Setup (22).exe
Resource
win11
Behavioral task
behavioral16
Sample
Setup (23).exe
Resource
win11
Behavioral task
behavioral17
Sample
Setup (24).exe
Resource
win11
Behavioral task
behavioral18
Sample
Setup (25).exe
Resource
win11
Behavioral task
behavioral19
Sample
Setup (26).exe
Resource
win11
Behavioral task
behavioral20
Sample
Setup (27).exe
Resource
win11
Behavioral task
behavioral21
Sample
Setup (28).exe
Resource
win11
Behavioral task
behavioral22
Sample
Setup (29).exe
Resource
win11
Behavioral task
behavioral23
Sample
Setup (3).exe
Resource
win11
Behavioral task
behavioral24
Sample
Setup (30).exe
Resource
win11
Behavioral task
behavioral25
Sample
Setup (31).exe
Resource
win11
Behavioral task
behavioral26
Sample
Setup (4).exe
Resource
win11
Behavioral task
behavioral27
Sample
Setup (5).exe
Resource
win11
Behavioral task
behavioral28
Sample
Setup (6).exe
Resource
win11
Behavioral task
behavioral29
Sample
Setup (7).exe
Resource
win11
Behavioral task
behavioral30
Sample
Setup (8).exe
Resource
win11
Behavioral task
behavioral31
Sample
Setup (9).exe
Resource
win11
Behavioral task
behavioral32
Sample
Setup.exe
Resource
win11
General
-
Target
Setup (8).exe
-
Size
631KB
-
MD5
cb927513ff8ebff4dd52a47f7e42f934
-
SHA1
0de47c02a8adc4940a6c18621b4e4a619641d029
-
SHA256
fd5c970806fba1500cbb6af5328329aeb43b8de3f02d90ec5d8cd1d57711622f
-
SHA512
988c8fd886a9155b7d190faf2ce6b34d910efcffcf1c6251f18a9d0c804a0ea26a89679273033ac98b200363c536426efd1ae9de445c34e660369abb06f0071c
Malware Config
Extracted
raccoon
10c753321b3ff323727f510579572aa4c5ea00cb
-
url4cnc
https://telete.in/bimboDinotrex
Extracted
metasploit
windows/single_exec
Extracted
smokeloader
2020
http://readinglistforaugust1.xyz/
http://readinglistforaugust2.xyz/
http://readinglistforaugust3.xyz/
http://readinglistforaugust4.xyz/
http://readinglistforaugust5.xyz/
http://readinglistforaugust6.xyz/
http://readinglistforaugust7.xyz/
http://readinglistforaugust8.xyz/
http://readinglistforaugust9.xyz/
http://readinglistforaugust10.xyz/
http://readinglistforaugust1.site/
http://readinglistforaugust2.site/
http://readinglistforaugust3.site/
http://readinglistforaugust4.site/
http://readinglistforaugust5.site/
http://readinglistforaugust6.site/
http://readinglistforaugust7.site/
http://readinglistforaugust8.site/
http://readinglistforaugust9.site/
http://readinglistforaugust10.site/
http://readinglistforaugust1.club/
http://readinglistforaugust2.club/
http://readinglistforaugust3.club/
http://readinglistforaugust4.club/
http://readinglistforaugust5.club/
http://readinglistforaugust6.club/
http://readinglistforaugust7.club/
http://readinglistforaugust8.club/
http://readinglistforaugust9.club/
http://readinglistforaugust10.club/
Extracted
redline
1
37.0.8.88:44263
Signatures
-
Glupteba Payload 1 IoCs
resource yara_rule behavioral30/memory/2556-272-0x0000000004320000-0x0000000004C46000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5428 4776 rundll32.exe 13 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 8820 4776 rUNdlL32.eXe 13 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 20 IoCs
resource yara_rule behavioral30/memory/940-359-0x0000000000000000-mapping.dmp family_redline behavioral30/memory/3392-393-0x0000000000000000-mapping.dmp family_redline behavioral30/memory/1268-487-0x0000000000000000-mapping.dmp family_redline behavioral30/memory/2392-486-0x0000000000000000-mapping.dmp family_redline behavioral30/memory/3172-504-0x0000000000000000-mapping.dmp family_redline behavioral30/memory/5768-528-0x0000000000000000-mapping.dmp family_redline behavioral30/memory/5736-526-0x0000000000000000-mapping.dmp family_redline behavioral30/memory/6064-479-0x0000000000000000-mapping.dmp family_redline behavioral30/memory/5600-455-0x0000000000000000-mapping.dmp family_redline behavioral30/memory/5480-436-0x0000000000000000-mapping.dmp family_redline behavioral30/memory/3856-352-0x0000000000000000-mapping.dmp family_redline behavioral30/memory/3868-351-0x0000000000000000-mapping.dmp family_redline behavioral30/memory/2120-320-0x0000000000400000-0x000000000044A000-memory.dmp family_redline behavioral30/memory/2120-315-0x0000000000000000-mapping.dmp family_redline behavioral30/memory/2520-543-0x0000000000000000-mapping.dmp family_redline behavioral30/memory/3204-596-0x0000000000000000-mapping.dmp family_redline behavioral30/memory/5444-575-0x0000000000000000-mapping.dmp family_redline behavioral30/memory/5716-542-0x0000000000000000-mapping.dmp family_redline behavioral30/memory/5816-614-0x0000000000000000-mapping.dmp family_redline behavioral30/memory/3640-642-0x0000000000000000-mapping.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateProcessExOtherParentProcess 4 IoCs
description pid Process procid_target PID 2756 created 3736 2756 WerFault.exe 105 PID 2172 created 4132 2172 WerFault.exe 100 PID 1668 created 2556 1668 WerFault.exe 116 PID 5380 created 3896 5380 WerFault.exe 96 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Vidar Stealer 1 IoCs
resource yara_rule behavioral30/memory/3896-354-0x0000000000890000-0x0000000000963000-memory.dmp family_vidar -
Downloads MZ/PE file
-
Executes dropped EXE 40 IoCs
pid Process 2568 Rdi0HggPiHendYM0cx7AxJ7_.exe 3476 VN0mZnuMuEqaE5GdeIlGsw14.exe 4156 59hRlOoNzo2XhPYRPovE8Hc5.exe 3736 48K8dlSq9RPeLz5uEWnqSBLv.exe 3932 RnAhACAohCwtZDJnzvbQPc9z.exe 3864 kP4x1fQurgYkXu0nQaewAK8B.exe 3896 Hrp34fwl_G5D7yEXeg42QMgc.exe 3840 HeRtEHjBo8THz9aTmFFHGqjz.exe 4788 hiC39Crn4QO9xL2AA93cEdyO.exe 4016 GLXTWxet8b6aWWxcQHVTi9FZ.exe 4200 4n3brPuozyDf3jvcSwmz4hj2.exe 4356 6hpgIT7mbpaLAxPnETiwsbow.exe 4900 OJ4mbpz33VCrnqAvrDfTp_wU.exe 4132 0TeiKITGjy0VceeLMRkUOiow.exe 516 EhDmqGGqM6dK0s2EfNyNA733.exe 580 b6S4Wt58EbplZzl9cPMCQg5A.exe 676 uimn6eBOjyFxOUoHd39w3L5c.exe 1888 f7SdDrH8TA8__1wfw62SXgEV.exe 1916 8IrBxpWjbWNxu81r0bq962iT.exe 2572 6YcRqyBblSo_8IOHnpwc3jkl.exe 2556 xsiqkuHtYTHDrh8VWaCy266g.exe 4660 Pa4lQATUky7FzGNeKnPjYZzJ.exe 1076 j4gcZWviN2HlsSgUCKkTvkF6.exe 4000 KesV5KsQ0VMxysd391GvOKNh.exe 5028 EhDmqGGqM6dK0s2EfNyNA733.exe 3924 KesV5KsQ0VMxysd391GvOKNh.tmp 880 inst001.exe 4048 cutm3.exe 404 KBAvfsr.exe 4608 md8_8eus.exe 5096 j4gcZWviN2HlsSgUCKkTvkF6.exe 968 4594341.exe 2120 VN0mZnuMuEqaE5GdeIlGsw14.exe 1200 3347163.exe 2228 8756281.exe 5292 8005807.exe 3856 RnAhACAohCwtZDJnzvbQPc9z.exe 3868 OJ4mbpz33VCrnqAvrDfTp_wU.exe 940 uimn6eBOjyFxOUoHd39w3L5c.exe 5420 1428133.exe -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6hpgIT7mbpaLAxPnETiwsbow.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6hpgIT7mbpaLAxPnETiwsbow.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion kP4x1fQurgYkXu0nQaewAK8B.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion kP4x1fQurgYkXu0nQaewAK8B.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f7SdDrH8TA8__1wfw62SXgEV.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f7SdDrH8TA8__1wfw62SXgEV.exe -
Loads dropped DLL 3 IoCs
pid Process 3924 KesV5KsQ0VMxysd391GvOKNh.tmp 3924 KesV5KsQ0VMxysd391GvOKNh.tmp 4156 59hRlOoNzo2XhPYRPovE8Hc5.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral30/files/0x000200000002b1e2-183.dat themida behavioral30/files/0x000200000002b1c3-172.dat themida behavioral30/files/0x000200000002b1d8-197.dat themida behavioral30/files/0x000200000002b1c3-250.dat themida behavioral30/files/0x000200000002b1e2-258.dat themida behavioral30/files/0x000200000002b1d8-255.dat themida behavioral30/memory/3864-309-0x00000000006C0000-0x00000000006C1000-memory.dmp themida behavioral30/memory/4356-327-0x0000000000240000-0x0000000000241000-memory.dmp themida behavioral30/memory/1888-321-0x00000000005A0000-0x00000000005A1000-memory.dmp themida -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" 3347163.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 6hpgIT7mbpaLAxPnETiwsbow.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA f7SdDrH8TA8__1wfw62SXgEV.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA kP4x1fQurgYkXu0nQaewAK8B.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 11 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1303 ipinfo.io 112 ipinfo.io 747 ipinfo.io 1166 ipinfo.io 77 ip-api.com 118 ipinfo.io 200 ipinfo.io 669 ipinfo.io 7 ipinfo.io 45 ipinfo.io 76 ipinfo.io -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 1888 f7SdDrH8TA8__1wfw62SXgEV.exe 3864 kP4x1fQurgYkXu0nQaewAK8B.exe 4356 6hpgIT7mbpaLAxPnETiwsbow.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 516 set thread context of 5028 516 EhDmqGGqM6dK0s2EfNyNA733.exe 121 PID 3476 set thread context of 2120 3476 VN0mZnuMuEqaE5GdeIlGsw14.exe 137 PID 4900 set thread context of 3868 4900 OJ4mbpz33VCrnqAvrDfTp_wU.exe 132 PID 3932 set thread context of 3856 3932 RnAhACAohCwtZDJnzvbQPc9z.exe 143 PID 676 set thread context of 940 676 uimn6eBOjyFxOUoHd39w3L5c.exe 141 PID 3476 set thread context of 3392 3476 VN0mZnuMuEqaE5GdeIlGsw14.exe 176 -
Drops file in Program Files directory 7 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Company\NewProduct\cutm3.exe 4n3brPuozyDf3jvcSwmz4hj2.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe 4n3brPuozyDf3jvcSwmz4hj2.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\Uninstall.exe 4n3brPuozyDf3jvcSwmz4hj2.exe File created C:\Program Files (x86)\Company\NewProduct\Uninstall.ini 4n3brPuozyDf3jvcSwmz4hj2.exe File created C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe 6YcRqyBblSo_8IOHnpwc3jkl.exe File opened for modification C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe 6YcRqyBblSo_8IOHnpwc3jkl.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\inst001.exe 4n3brPuozyDf3jvcSwmz4hj2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 21 IoCs
pid pid_target Process procid_target 3220 4132 WerFault.exe 100 4980 3736 WerFault.exe 105 1804 2556 WerFault.exe 116 5656 3896 WerFault.exe 96 4332 3392 WerFault.exe 6224 580 WerFault.exe 195 6760 6128 WerFault.exe 202 3988 6728 WerFault.exe 301 5720 5420 WerFault.exe 168 3948 968 WerFault.exe 147 10000 968 WerFault.exe 147 8448 5420 WerFault.exe 168 10204 6980 WerFault.exe 244 8556 10920 WerFault.exe 361 10064 8480 WerFault.exe 369 9160 10348 WerFault.exe 374 9300 7404 WerFault.exe 410 9008 10304 WerFault.exe 380 11528 11788 WerFault.exe 448 5900 404 WerFault.exe 130 9636 404 WerFault.exe 130 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI EhDmqGGqM6dK0s2EfNyNA733.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI EhDmqGGqM6dK0s2EfNyNA733.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI EhDmqGGqM6dK0s2EfNyNA733.exe -
Checks processor information in registry 2 TTPs 21 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe -
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1720 schtasks.exe 1972 schtasks.exe 12252 schtasks.exe 12244 schtasks.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 5752 timeout.exe 9468 timeout.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe -
Kills process with taskkill 2 IoCs
pid Process 4848 taskkill.exe 12444 taskkill.exe -
Modifies data under HKEY_USERS 40 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs sihclient.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Process not Found -
Script User-Agent 6 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 117 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 125 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 195 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 376 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1288 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1341 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 40 IoCs
pid Process 4952 Setup (8).exe 4952 Setup (8).exe 5028 EhDmqGGqM6dK0s2EfNyNA733.exe 5028 EhDmqGGqM6dK0s2EfNyNA733.exe 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 4980 WerFault.exe 4980 WerFault.exe 3220 WerFault.exe 3220 WerFault.exe 3096 Process not Found 3096 Process not Found 1804 WerFault.exe 1804 WerFault.exe 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found 3096 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 5028 EhDmqGGqM6dK0s2EfNyNA733.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeRestorePrivilege 4980 WerFault.exe Token: SeBackupPrivilege 4980 WerFault.exe Token: SeDebugPrivilege 4660 Pa4lQATUky7FzGNeKnPjYZzJ.exe Token: SeDebugPrivilege 4016 GLXTWxet8b6aWWxcQHVTi9FZ.exe Token: SeShutdownPrivilege 3096 Process not Found Token: SeCreatePagefilePrivilege 3096 Process not Found Token: SeShutdownPrivilege 3096 Process not Found Token: SeCreatePagefilePrivilege 3096 Process not Found Token: SeShutdownPrivilege 3096 Process not Found Token: SeCreatePagefilePrivilege 3096 Process not Found Token: SeShutdownPrivilege 3096 Process not Found Token: SeCreatePagefilePrivilege 3096 Process not Found Token: SeShutdownPrivilege 3096 Process not Found Token: SeCreatePagefilePrivilege 3096 Process not Found Token: SeShutdownPrivilege 3096 Process not Found Token: SeCreatePagefilePrivilege 3096 Process not Found Token: SeDebugPrivilege 968 4594341.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3924 KesV5KsQ0VMxysd391GvOKNh.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4952 wrote to memory of 2568 4952 Setup (8).exe 91 PID 4952 wrote to memory of 2568 4952 Setup (8).exe 91 PID 4952 wrote to memory of 3476 4952 Setup (8).exe 90 PID 4952 wrote to memory of 3476 4952 Setup (8).exe 90 PID 4952 wrote to memory of 3476 4952 Setup (8).exe 90 PID 4952 wrote to memory of 4156 4952 Setup (8).exe 89 PID 4952 wrote to memory of 4156 4952 Setup (8).exe 89 PID 4952 wrote to memory of 4156 4952 Setup (8).exe 89 PID 4952 wrote to memory of 3736 4952 Setup (8).exe 105 PID 4952 wrote to memory of 3736 4952 Setup (8).exe 105 PID 4952 wrote to memory of 3736 4952 Setup (8).exe 105 PID 4952 wrote to memory of 3932 4952 Setup (8).exe 102 PID 4952 wrote to memory of 3932 4952 Setup (8).exe 102 PID 4952 wrote to memory of 3932 4952 Setup (8).exe 102 PID 4952 wrote to memory of 3864 4952 Setup (8).exe 103 PID 4952 wrote to memory of 3864 4952 Setup (8).exe 103 PID 4952 wrote to memory of 3864 4952 Setup (8).exe 103 PID 4952 wrote to memory of 3896 4952 Setup (8).exe 96 PID 4952 wrote to memory of 3896 4952 Setup (8).exe 96 PID 4952 wrote to memory of 3896 4952 Setup (8).exe 96 PID 4952 wrote to memory of 3840 4952 Setup (8).exe 104 PID 4952 wrote to memory of 3840 4952 Setup (8).exe 104 PID 4952 wrote to memory of 3840 4952 Setup (8).exe 104 PID 4952 wrote to memory of 4788 4952 Setup (8).exe 97 PID 4952 wrote to memory of 4788 4952 Setup (8).exe 97 PID 4952 wrote to memory of 4788 4952 Setup (8).exe 97 PID 4952 wrote to memory of 4016 4952 Setup (8).exe 101 PID 4952 wrote to memory of 4016 4952 Setup (8).exe 101 PID 4952 wrote to memory of 4200 4952 Setup (8).exe 99 PID 4952 wrote to memory of 4200 4952 Setup (8).exe 99 PID 4952 wrote to memory of 4200 4952 Setup (8).exe 99 PID 4952 wrote to memory of 4356 4952 Setup (8).exe 98 PID 4952 wrote to memory of 4356 4952 Setup (8).exe 98 PID 4952 wrote to memory of 4356 4952 Setup (8).exe 98 PID 4952 wrote to memory of 4900 4952 Setup (8).exe 95 PID 4952 wrote to memory of 4900 4952 Setup (8).exe 95 PID 4952 wrote to memory of 4900 4952 Setup (8).exe 95 PID 4952 wrote to memory of 4132 4952 Setup (8).exe 100 PID 4952 wrote to memory of 4132 4952 Setup (8).exe 100 PID 4952 wrote to memory of 4132 4952 Setup (8).exe 100 PID 4952 wrote to memory of 516 4952 Setup (8).exe 94 PID 4952 wrote to memory of 516 4952 Setup (8).exe 94 PID 4952 wrote to memory of 516 4952 Setup (8).exe 94 PID 4952 wrote to memory of 580 4952 Setup (8).exe 93 PID 4952 wrote to memory of 580 4952 Setup (8).exe 93 PID 4952 wrote to memory of 580 4952 Setup (8).exe 93 PID 4952 wrote to memory of 676 4952 Setup (8).exe 92 PID 4952 wrote to memory of 676 4952 Setup (8).exe 92 PID 4952 wrote to memory of 676 4952 Setup (8).exe 92 PID 4952 wrote to memory of 1888 4952 Setup (8).exe 108 PID 4952 wrote to memory of 1888 4952 Setup (8).exe 108 PID 4952 wrote to memory of 1888 4952 Setup (8).exe 108 PID 4952 wrote to memory of 1916 4952 Setup (8).exe 107 PID 4952 wrote to memory of 1916 4952 Setup (8).exe 107 PID 4952 wrote to memory of 1916 4952 Setup (8).exe 107 PID 4952 wrote to memory of 2572 4952 Setup (8).exe 117 PID 4952 wrote to memory of 2572 4952 Setup (8).exe 117 PID 4952 wrote to memory of 2572 4952 Setup (8).exe 117 PID 4952 wrote to memory of 2556 4952 Setup (8).exe 116 PID 4952 wrote to memory of 2556 4952 Setup (8).exe 116 PID 4952 wrote to memory of 2556 4952 Setup (8).exe 116 PID 4952 wrote to memory of 4660 4952 Setup (8).exe 115 PID 4952 wrote to memory of 4660 4952 Setup (8).exe 115 PID 4952 wrote to memory of 1076 4952 Setup (8).exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup (8).exe"C:\Users\Admin\AppData\Local\Temp\Setup (8).exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Users\Admin\Documents\59hRlOoNzo2XhPYRPovE8Hc5.exe"C:\Users\Admin\Documents\59hRlOoNzo2XhPYRPovE8Hc5.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4156 -
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\Documents\59hRlOoNzo2XhPYRPovE8Hc5.exe"3⤵PID:5500
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK4⤵
- Delays execution with timeout.exe
PID:5752
-
-
-
-
C:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exe"C:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3476 -
C:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exeC:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exe3⤵
- Executes dropped EXE
PID:2120
-
-
C:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exeC:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exe3⤵PID:6064
-
-
C:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exeC:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exe3⤵PID:5716
-
-
C:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exeC:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exe3⤵PID:3392
-
-
C:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exeC:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exe3⤵PID:5348
-
-
C:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exeC:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exe3⤵PID:4524
-
-
C:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exeC:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exe3⤵PID:1276
-
-
C:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exeC:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exe3⤵PID:6712
-
-
C:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exeC:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exe3⤵PID:7104
-
-
C:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exeC:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exe3⤵PID:6832
-
-
C:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exeC:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exe3⤵PID:564
-
-
C:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exeC:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exe3⤵PID:6636
-
-
C:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exeC:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exe3⤵PID:7196
-
-
C:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exeC:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exe3⤵PID:5176
-
-
C:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exeC:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exe3⤵PID:2084
-
-
C:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exeC:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exe3⤵PID:6248
-
-
C:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exeC:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exe3⤵PID:1696
-
-
C:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exeC:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exe3⤵PID:8120
-
-
C:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exeC:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exe3⤵PID:5800
-
-
C:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exeC:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exe3⤵PID:9812
-
-
C:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exeC:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exe3⤵PID:10920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 10920 -s 284⤵
- Program crash
PID:8556
-
-
-
C:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exeC:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exe3⤵PID:10056
-
-
C:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exeC:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exe3⤵PID:3632
-
-
C:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exeC:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exe3⤵PID:1080
-
-
C:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exeC:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exe3⤵PID:7392
-
-
C:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exeC:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exe3⤵PID:10392
-
-
C:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exeC:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exe3⤵PID:10744
-
-
C:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exeC:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exe3⤵PID:6616
-
-
C:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exeC:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exe3⤵PID:9500
-
-
C:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exeC:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exe3⤵PID:12052
-
-
C:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exeC:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exe3⤵PID:12272
-
-
C:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exeC:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exe3⤵PID:10348
-
-
C:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exeC:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exe3⤵PID:9568
-
-
C:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exeC:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exe3⤵PID:7404
-
-
C:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exeC:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exe3⤵PID:13220
-
-
C:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exeC:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exe3⤵PID:11016
-
-
C:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exeC:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exe3⤵PID:9252
-
-
C:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exeC:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exe3⤵PID:8960
-
-
C:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exeC:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exe3⤵PID:13844
-
-
C:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exeC:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exe3⤵PID:13588
-
-
C:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exeC:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exe3⤵PID:13984
-
-
C:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exeC:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exe3⤵PID:11476
-
-
C:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exeC:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exe3⤵PID:15580
-
-
C:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exeC:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exe3⤵PID:12744
-
-
C:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exeC:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exe3⤵PID:15960
-
-
C:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exeC:\Users\Admin\Documents\VN0mZnuMuEqaE5GdeIlGsw14.exe3⤵PID:14632
-
-
-
C:\Users\Admin\Documents\Rdi0HggPiHendYM0cx7AxJ7_.exe"C:\Users\Admin\Documents\Rdi0HggPiHendYM0cx7AxJ7_.exe"2⤵
- Executes dropped EXE
PID:2568
-
-
C:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exe"C:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:676 -
C:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exeC:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exe3⤵
- Executes dropped EXE
PID:940
-
-
C:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exeC:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exe3⤵PID:5600
-
-
C:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exeC:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exe3⤵PID:3172
-
-
C:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exeC:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exe3⤵PID:2520
-
-
C:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exeC:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exe3⤵PID:5816
-
-
C:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exeC:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exe3⤵PID:5924
-
-
C:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exeC:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exe3⤵PID:5372
-
-
C:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exeC:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exe3⤵PID:596
-
-
C:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exeC:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exe3⤵PID:4876
-
-
C:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exeC:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exe3⤵PID:6440
-
-
C:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exeC:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exe3⤵PID:6916
-
-
C:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exeC:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exe3⤵PID:1148
-
-
C:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exeC:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exe3⤵PID:6200
-
-
C:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exeC:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exe3⤵PID:6956
-
-
C:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exeC:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exe3⤵PID:7944
-
-
C:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exeC:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exe3⤵PID:6640
-
-
C:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exeC:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exe3⤵PID:4484
-
-
C:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exeC:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exe3⤵PID:1884
-
-
C:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exeC:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exe3⤵PID:9000
-
-
C:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exeC:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exe3⤵PID:8832
-
-
C:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exeC:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exe3⤵PID:1260
-
-
C:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exeC:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exe3⤵PID:2444
-
-
C:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exeC:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exe3⤵PID:4904
-
-
C:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exeC:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exe3⤵PID:8596
-
-
C:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exeC:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exe3⤵PID:6428
-
-
C:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exeC:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exe3⤵PID:4504
-
-
C:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exeC:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exe3⤵PID:5344
-
-
C:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exeC:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exe3⤵PID:6396
-
-
C:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exeC:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exe3⤵PID:6776
-
-
C:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exeC:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exe3⤵PID:10028
-
-
C:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exeC:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exe3⤵PID:4944
-
-
C:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exeC:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exe3⤵PID:1368
-
-
C:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exeC:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exe3⤵PID:7716
-
-
C:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exeC:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exe3⤵PID:9980
-
-
C:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exeC:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exe3⤵PID:10052
-
-
C:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exeC:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exe3⤵PID:1212
-
-
C:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exeC:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exe3⤵PID:9412
-
-
C:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exeC:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exe3⤵PID:7976
-
-
C:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exeC:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exe3⤵PID:7120
-
-
C:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exeC:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exe3⤵PID:11852
-
-
C:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exeC:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exe3⤵PID:11472
-
-
C:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exeC:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exe3⤵PID:4464
-
-
C:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exeC:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exe3⤵PID:11988
-
-
C:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exeC:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exe3⤵PID:4320
-
-
C:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exeC:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exe3⤵PID:8604
-
-
C:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exeC:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exe3⤵PID:6936
-
-
C:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exeC:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exe3⤵PID:8672
-
-
C:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exeC:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exe3⤵PID:11388
-
-
C:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exeC:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exe3⤵PID:12508
-
-
C:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exeC:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exe3⤵PID:920
-
-
C:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exeC:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exe3⤵PID:436
-
-
C:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exeC:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exe3⤵PID:10828
-
-
C:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exeC:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exe3⤵PID:8328
-
-
C:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exeC:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exe3⤵PID:15816
-
-
C:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exeC:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exe3⤵PID:15476
-
-
C:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exeC:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exe3⤵PID:15888
-
-
C:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exeC:\Users\Admin\Documents\uimn6eBOjyFxOUoHd39w3L5c.exe3⤵PID:11764
-
-
-
C:\Users\Admin\Documents\b6S4Wt58EbplZzl9cPMCQg5A.exe"C:\Users\Admin\Documents\b6S4Wt58EbplZzl9cPMCQg5A.exe"2⤵
- Executes dropped EXE
PID:580 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbsCrIPt: cLOSe( CREAteobjecT ("wScRiPT.ShElL" ).RUN ( "C:\Windows\system32\cmd.exe /C tYpe ""C:\Users\Admin\Documents\b6S4Wt58EbplZzl9cPMCQg5A.exe"" > IQ0V_Fe_.eXE && StaRt IQ0v_FE_.ExE -poRsuYEMryiLi & if """"== """" for %m in ( ""C:\Users\Admin\Documents\b6S4Wt58EbplZzl9cPMCQg5A.exe"" ) do taskkill /iM ""%~NXm"" -F" ,0 , TRUE ))3⤵PID:868
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C tYpe "C:\Users\Admin\Documents\b6S4Wt58EbplZzl9cPMCQg5A.exe" > IQ0V_Fe_.eXE && StaRt IQ0v_FE_.ExE -poRsuYEMryiLi& if ""== "" for %m in ("C:\Users\Admin\Documents\b6S4Wt58EbplZzl9cPMCQg5A.exe" ) do taskkill /iM "%~NXm" -F4⤵PID:4244
-
-
-
-
C:\Users\Admin\Documents\EhDmqGGqM6dK0s2EfNyNA733.exe"C:\Users\Admin\Documents\EhDmqGGqM6dK0s2EfNyNA733.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:516 -
C:\Users\Admin\Documents\EhDmqGGqM6dK0s2EfNyNA733.exe"C:\Users\Admin\Documents\EhDmqGGqM6dK0s2EfNyNA733.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:5028
-
-
-
C:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exe"C:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4900 -
C:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exeC:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exe3⤵
- Executes dropped EXE
PID:3868
-
-
C:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exeC:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exe3⤵PID:2392
-
-
C:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exeC:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exe3⤵PID:5736
-
-
C:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exeC:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exe3⤵PID:5444
-
-
C:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exeC:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exe3⤵PID:5556
-
-
C:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exeC:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exe3⤵PID:5660
-
-
C:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exeC:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exe3⤵PID:240
-
-
C:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exeC:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exe3⤵PID:6264
-
-
C:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exeC:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exe3⤵PID:7076
-
-
C:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exeC:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exe3⤵PID:592
-
-
C:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exeC:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exe3⤵PID:6372
-
-
C:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exeC:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exe3⤵PID:3728
-
-
C:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exeC:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exe3⤵PID:5400
-
-
C:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exeC:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exe3⤵PID:7200
-
-
C:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exeC:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exe3⤵PID:3744
-
-
C:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exeC:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exe3⤵PID:6052
-
-
C:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exeC:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exe3⤵PID:2960
-
-
C:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exeC:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exe3⤵PID:7472
-
-
C:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exeC:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exe3⤵PID:7244
-
-
C:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exeC:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exe3⤵PID:8940
-
-
C:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exeC:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exe3⤵PID:7972
-
-
C:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exeC:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exe3⤵PID:6112
-
-
C:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exeC:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exe3⤵PID:1528
-
-
C:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exeC:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exe3⤵PID:6196
-
-
C:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exeC:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exe3⤵PID:2768
-
-
C:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exeC:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exe3⤵PID:9856
-
-
C:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exeC:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exe3⤵PID:7756
-
-
C:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exeC:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exe3⤵PID:10684
-
-
C:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exeC:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exe3⤵PID:8644
-
-
C:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exeC:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exe3⤵PID:8772
-
-
C:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exeC:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exe3⤵PID:8480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8480 -s 284⤵
- Program crash
PID:10064
-
-
-
C:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exeC:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exe3⤵PID:1020
-
-
C:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exeC:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exe3⤵PID:4272
-
-
C:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exeC:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exe3⤵PID:7844
-
-
C:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exeC:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exe3⤵PID:10888
-
-
C:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exeC:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exe3⤵PID:10864
-
-
C:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exeC:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exe3⤵PID:9712
-
-
C:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exeC:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exe3⤵PID:11876
-
-
C:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exeC:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exe3⤵PID:12060
-
-
C:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exeC:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exe3⤵PID:7932
-
-
C:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exeC:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exe3⤵PID:5676
-
-
C:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exeC:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exe3⤵PID:11716
-
-
C:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exeC:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exe3⤵PID:2756
-
-
C:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exeC:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exe3⤵PID:10696
-
-
C:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exeC:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exe3⤵PID:7220
-
-
C:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exeC:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exe3⤵PID:6384
-
-
C:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exeC:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exe3⤵PID:12752
-
-
C:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exeC:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exe3⤵PID:12532
-
-
C:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exeC:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exe3⤵PID:10548
-
-
C:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exeC:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exe3⤵PID:12080
-
-
C:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exeC:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exe3⤵PID:13176
-
-
C:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exeC:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exe3⤵PID:15856
-
-
C:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exeC:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exe3⤵PID:16052
-
-
C:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exeC:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exe3⤵PID:15544
-
-
C:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exeC:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exe3⤵PID:9552
-
-
C:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exeC:\Users\Admin\Documents\OJ4mbpz33VCrnqAvrDfTp_wU.exe3⤵PID:6448
-
-
-
C:\Users\Admin\Documents\Hrp34fwl_G5D7yEXeg42QMgc.exe"C:\Users\Admin\Documents\Hrp34fwl_G5D7yEXeg42QMgc.exe"2⤵
- Executes dropped EXE
PID:3896 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3896 -s 2403⤵
- Program crash
PID:5656
-
-
-
C:\Users\Admin\Documents\hiC39Crn4QO9xL2AA93cEdyO.exe"C:\Users\Admin\Documents\hiC39Crn4QO9xL2AA93cEdyO.exe"2⤵
- Executes dropped EXE
PID:4788 -
C:\Users\Admin\Documents\hiC39Crn4QO9xL2AA93cEdyO.exe"C:\Users\Admin\Documents\hiC39Crn4QO9xL2AA93cEdyO.exe"3⤵PID:7112
-
-
C:\Users\Admin\Documents\hiC39Crn4QO9xL2AA93cEdyO.exe"C:\Users\Admin\Documents\hiC39Crn4QO9xL2AA93cEdyO.exe"3⤵PID:4224
-
-
-
C:\Users\Admin\Documents\6hpgIT7mbpaLAxPnETiwsbow.exe"C:\Users\Admin\Documents\6hpgIT7mbpaLAxPnETiwsbow.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4356
-
-
C:\Users\Admin\Documents\4n3brPuozyDf3jvcSwmz4hj2.exe"C:\Users\Admin\Documents\4n3brPuozyDf3jvcSwmz4hj2.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:4200 -
C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"3⤵
- Executes dropped EXE
PID:4608
-
-
C:\Program Files (x86)\Company\NewProduct\cutm3.exe"C:\Program Files (x86)\Company\NewProduct\cutm3.exe"3⤵
- Executes dropped EXE
PID:4048
-
-
C:\Program Files (x86)\Company\NewProduct\inst001.exe"C:\Program Files (x86)\Company\NewProduct\inst001.exe"3⤵
- Executes dropped EXE
PID:880
-
-
-
C:\Users\Admin\Documents\0TeiKITGjy0VceeLMRkUOiow.exe"C:\Users\Admin\Documents\0TeiKITGjy0VceeLMRkUOiow.exe"2⤵
- Executes dropped EXE
PID:4132 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4132 -s 2763⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:3220
-
-
-
C:\Users\Admin\Documents\GLXTWxet8b6aWWxcQHVTi9FZ.exe"C:\Users\Admin\Documents\GLXTWxet8b6aWWxcQHVTi9FZ.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4016
-
-
C:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exe"C:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3932 -
C:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exeC:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exe3⤵
- Executes dropped EXE
PID:3856
-
-
C:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exeC:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exe3⤵PID:1268
-
-
C:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exeC:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exe3⤵PID:5768
-
-
C:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exeC:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exe3⤵PID:3204
-
-
C:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exeC:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exe3⤵PID:5480
-
-
C:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exeC:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exe3⤵PID:3640
-
-
C:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exeC:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exe3⤵PID:3576
-
-
C:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exeC:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exe3⤵PID:1064
-
-
C:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exeC:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exe3⤵PID:6748
-
-
C:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exeC:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exe3⤵PID:1120
-
-
C:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exeC:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exe3⤵PID:6364
-
-
C:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exeC:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exe3⤵PID:6580
-
-
C:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exeC:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exe3⤵PID:5844
-
-
C:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exeC:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exe3⤵PID:7744
-
-
C:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exeC:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exe3⤵PID:5732
-
-
C:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exeC:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exe3⤵PID:2552
-
-
C:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exeC:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exe3⤵PID:7416
-
-
C:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exeC:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exe3⤵PID:6172
-
-
C:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exeC:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exe3⤵PID:2556
-
-
C:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exeC:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exe3⤵PID:5228
-
-
C:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exeC:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exe3⤵PID:5840
-
-
C:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exeC:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exe3⤵PID:8924
-
-
C:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exeC:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exe3⤵PID:4260
-
-
C:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exeC:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exe3⤵PID:4488
-
-
C:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exeC:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exe3⤵PID:2092
-
-
C:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exeC:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exe3⤵PID:9204
-
-
C:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exeC:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exe3⤵PID:9492
-
-
C:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exeC:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exe3⤵PID:6080
-
-
C:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exeC:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exe3⤵PID:10160
-
-
C:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exeC:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exe3⤵PID:10412
-
-
C:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exeC:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exe3⤵PID:8748
-
-
C:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exeC:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exe3⤵PID:9784
-
-
C:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exeC:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exe3⤵PID:7856
-
-
C:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exeC:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exe3⤵PID:6200
-
-
C:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exeC:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exe3⤵PID:1168
-
-
C:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exeC:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exe3⤵PID:10400
-
-
C:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exeC:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exe3⤵PID:6116
-
-
C:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exeC:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exe3⤵PID:11088
-
-
C:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exeC:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exe3⤵PID:11960
-
-
C:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exeC:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exe3⤵PID:12028
-
-
C:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exeC:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exe3⤵PID:7072
-
-
C:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exeC:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exe3⤵PID:5588
-
-
C:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exeC:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exe3⤵PID:5056
-
-
C:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exeC:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exe3⤵PID:2976
-
-
C:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exeC:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exe3⤵PID:9912
-
-
C:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exeC:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exe3⤵PID:11884
-
-
C:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exeC:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exe3⤵PID:9884
-
-
C:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exeC:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exe3⤵PID:10872
-
-
C:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exeC:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exe3⤵PID:11332
-
-
C:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exeC:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exe3⤵PID:12708
-
-
C:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exeC:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exe3⤵PID:14340
-
-
C:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exeC:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exe3⤵PID:2152
-
-
C:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exeC:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exe3⤵PID:14300
-
-
C:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exeC:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exe3⤵PID:15780
-
-
C:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exeC:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exe3⤵PID:15608
-
-
C:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exeC:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exe3⤵PID:4252
-
-
C:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exeC:\Users\Admin\Documents\RnAhACAohCwtZDJnzvbQPc9z.exe3⤵PID:14884
-
-
-
C:\Users\Admin\Documents\kP4x1fQurgYkXu0nQaewAK8B.exe"C:\Users\Admin\Documents\kP4x1fQurgYkXu0nQaewAK8B.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3864
-
-
C:\Users\Admin\Documents\HeRtEHjBo8THz9aTmFFHGqjz.exe"C:\Users\Admin\Documents\HeRtEHjBo8THz9aTmFFHGqjz.exe"2⤵
- Executes dropped EXE
PID:3840 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\KBAvfsr.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\KBAvfsr.exe"3⤵
- Executes dropped EXE
PID:404 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 404 -s 2844⤵
- Program crash
PID:5900
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 404 -s 2844⤵
- Program crash
PID:9636
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\FkDS8ej.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\FkDS8ej.exe"3⤵PID:10760
-
-
-
C:\Users\Admin\Documents\48K8dlSq9RPeLz5uEWnqSBLv.exe"C:\Users\Admin\Documents\48K8dlSq9RPeLz5uEWnqSBLv.exe"2⤵
- Executes dropped EXE
PID:3736 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3736 -s 2763⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4980
-
-
-
C:\Users\Admin\Documents\8IrBxpWjbWNxu81r0bq962iT.exe"C:\Users\Admin\Documents\8IrBxpWjbWNxu81r0bq962iT.exe"2⤵
- Executes dropped EXE
PID:1916 -
C:\Users\Admin\Documents\8IrBxpWjbWNxu81r0bq962iT.exe"C:\Users\Admin\Documents\8IrBxpWjbWNxu81r0bq962iT.exe"3⤵PID:6980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6980 -s 19724⤵
- Program crash
PID:10204
-
-
-
C:\Users\Admin\Documents\8IrBxpWjbWNxu81r0bq962iT.exe"C:\Users\Admin\Documents\8IrBxpWjbWNxu81r0bq962iT.exe"3⤵PID:2900
-
-
-
C:\Users\Admin\Documents\f7SdDrH8TA8__1wfw62SXgEV.exe"C:\Users\Admin\Documents\f7SdDrH8TA8__1wfw62SXgEV.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1888
-
-
C:\Users\Admin\Documents\Pa4lQATUky7FzGNeKnPjYZzJ.exe"C:\Users\Admin\Documents\Pa4lQATUky7FzGNeKnPjYZzJ.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4660 -
C:\Users\Admin\AppData\Roaming\4594341.exe"C:\Users\Admin\AppData\Roaming\4594341.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:968 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 968 -s 23124⤵
- Program crash
PID:3948
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 968 -s 23124⤵
- Program crash
PID:10000
-
-
-
C:\Users\Admin\AppData\Roaming\1428133.exe"C:\Users\Admin\AppData\Roaming\1428133.exe"3⤵
- Executes dropped EXE
PID:5420 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5420 -s 16284⤵
- Program crash
PID:5720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5420 -s 16284⤵
- Program crash
PID:8448
-
-
-
C:\Users\Admin\AppData\Roaming\8005807.exe"C:\Users\Admin\AppData\Roaming\8005807.exe"3⤵
- Executes dropped EXE
PID:5292
-
-
C:\Users\Admin\AppData\Roaming\8756281.exe"C:\Users\Admin\AppData\Roaming\8756281.exe"3⤵
- Executes dropped EXE
PID:2228
-
-
C:\Users\Admin\AppData\Roaming\3347163.exe"C:\Users\Admin\AppData\Roaming\3347163.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1200 -
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"4⤵PID:1564
-
-
-
-
C:\Users\Admin\Documents\xsiqkuHtYTHDrh8VWaCy266g.exe"C:\Users\Admin\Documents\xsiqkuHtYTHDrh8VWaCy266g.exe"2⤵
- Executes dropped EXE
PID:2556 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2556 -s 2803⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:1804
-
-
-
C:\Users\Admin\Documents\6YcRqyBblSo_8IOHnpwc3jkl.exe"C:\Users\Admin\Documents\6YcRqyBblSo_8IOHnpwc3jkl.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2572 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:1720
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:1972
-
-
-
C:\Users\Admin\Documents\j4gcZWviN2HlsSgUCKkTvkF6.exe"C:\Users\Admin\Documents\j4gcZWviN2HlsSgUCKkTvkF6.exe"2⤵
- Executes dropped EXE
PID:1076 -
C:\Users\Admin\Documents\j4gcZWviN2HlsSgUCKkTvkF6.exe"C:\Users\Admin\Documents\j4gcZWviN2HlsSgUCKkTvkF6.exe" -u3⤵
- Executes dropped EXE
PID:5096
-
-
-
C:\Users\Admin\Documents\KesV5KsQ0VMxysd391GvOKNh.exe"C:\Users\Admin\Documents\KesV5KsQ0VMxysd391GvOKNh.exe"2⤵
- Executes dropped EXE
PID:4000 -
C:\Users\Admin\AppData\Local\Temp\is-8N4T2.tmp\KesV5KsQ0VMxysd391GvOKNh.tmp"C:\Users\Admin\AppData\Local\Temp\is-8N4T2.tmp\KesV5KsQ0VMxysd391GvOKNh.tmp" /SL5="$1025A,138429,56832,C:\Users\Admin\Documents\KesV5KsQ0VMxysd391GvOKNh.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:3924 -
C:\Users\Admin\AppData\Local\Temp\is-KS6O9.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-KS6O9.tmp\Setup.exe" /Verysilent4⤵PID:5012
-
-
-
-
C:\Windows\System32\sihclient.exeC:\Windows\System32\sihclient.exe /cv VgzX8XPGL0+A4g73U2Jx9w.0.21⤵
- Modifies data under HKEY_USERS
PID:4604
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4132 -ip 41321⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2172
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 2556 -ip 25561⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:1668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3736 -ip 37361⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2756
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵PID:4852
-
C:\Users\Admin\AppData\Local\Temp\IQ0V_Fe_.eXEIQ0v_FE_.ExE -poRsuYEMryiLi1⤵PID:3768
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbsCrIPt: cLOSe( CREAteobjecT ("wScRiPT.ShElL" ).RUN ( "C:\Windows\system32\cmd.exe /C tYpe ""C:\Users\Admin\AppData\Local\Temp\IQ0V_Fe_.eXE"" > IQ0V_Fe_.eXE && StaRt IQ0v_FE_.ExE -poRsuYEMryiLi & if ""-poRsuYEMryiLi""== """" for %m in ( ""C:\Users\Admin\AppData\Local\Temp\IQ0V_Fe_.eXE"" ) do taskkill /iM ""%~NXm"" -F" ,0 , TRUE ))2⤵PID:2912
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C tYpe "C:\Users\Admin\AppData\Local\Temp\IQ0V_Fe_.eXE" > IQ0V_Fe_.eXE && StaRt IQ0v_FE_.ExE -poRsuYEMryiLi& if "-poRsuYEMryiLi"== "" for %m in ("C:\Users\Admin\AppData\Local\Temp\IQ0V_Fe_.eXE" ) do taskkill /iM "%~NXm" -F3⤵PID:6128
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" VHTDDahA.G,XBvVyh2⤵PID:6352
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /iM "b6S4Wt58EbplZzl9cPMCQg5A.exe" -F1⤵
- Kills process with taskkill
PID:4848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3392 -s 281⤵
- Program crash
PID:4332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3392 -ip 33921⤵PID:6024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 3896 -ip 38961⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5380
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:5020
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:5428 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 580 -s 4523⤵
- Program crash
PID:6224
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 580 -ip 5801⤵PID:3628
-
C:\Users\Admin\AppData\Local\Temp\BA58.exeC:\Users\Admin\AppData\Local\Temp\BA58.exe1⤵PID:6128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6128 -s 2762⤵
- Program crash
PID:6760
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\stats.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\stats.exe" /Verysilent1⤵PID:6204
-
C:\Users\Admin\AppData\Local\Temp\is-D80PI.tmp\stats.tmp"C:\Users\Admin\AppData\Local\Temp\is-D80PI.tmp\stats.tmp" /SL5="$60250,138429,56832,C:\Program Files (x86)\SmartPDF\SmartPDF\stats.exe" /Verysilent2⤵PID:6848
-
C:\Users\Admin\AppData\Local\Temp\is-IT3RL.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-IT3RL.tmp\Setup.exe" /Verysilent3⤵PID:5656
-
C:\Users\Admin\Documents\NjBaxYgK5eIOrc9kykgJouqp.exe"C:\Users\Admin\Documents\NjBaxYgK5eIOrc9kykgJouqp.exe"4⤵PID:10356
-
-
C:\Users\Admin\Documents\kP2CyMUBJgt65s5y5U4mzGGc.exe"C:\Users\Admin\Documents\kP2CyMUBJgt65s5y5U4mzGGc.exe"4⤵PID:10348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 10348 -s 2765⤵
- Program crash
PID:9160
-
-
-
C:\Users\Admin\Documents\n9V98d7OvflyYVUNm4VP6pKq.exe"C:\Users\Admin\Documents\n9V98d7OvflyYVUNm4VP6pKq.exe"4⤵PID:10336
-
C:\Users\Admin\Documents\n9V98d7OvflyYVUNm4VP6pKq.exe"C:\Users\Admin\Documents\n9V98d7OvflyYVUNm4VP6pKq.exe"5⤵PID:8792
-
-
-
C:\Users\Admin\Documents\kRITeRtE7YrYxUI8ufKD7Jwq.exe"C:\Users\Admin\Documents\kRITeRtE7YrYxUI8ufKD7Jwq.exe"4⤵PID:10328
-
C:\Users\Admin\Documents\kRITeRtE7YrYxUI8ufKD7Jwq.exe"C:\Users\Admin\Documents\kRITeRtE7YrYxUI8ufKD7Jwq.exe" -u5⤵PID:2232
-
-
-
C:\Users\Admin\Documents\_3ZDmBHZStWMpjSXzuLnGEAr.exe"C:\Users\Admin\Documents\_3ZDmBHZStWMpjSXzuLnGEAr.exe"4⤵PID:10324
-
C:\Users\Admin\Documents\_3ZDmBHZStWMpjSXzuLnGEAr.exe"C:\Users\Admin\Documents\_3ZDmBHZStWMpjSXzuLnGEAr.exe"5⤵PID:5876
-
-
-
C:\Users\Admin\Documents\LBmLMCjEV8iztzgmgUly0LgQ.exe"C:\Users\Admin\Documents\LBmLMCjEV8iztzgmgUly0LgQ.exe"4⤵PID:2640
-
-
C:\Users\Admin\Documents\av9K6bJfo4ZLF7mVeRaj73Fc.exe"C:\Users\Admin\Documents\av9K6bJfo4ZLF7mVeRaj73Fc.exe"4⤵PID:10312
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\KBAvfsr.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\KBAvfsr.exe"5⤵PID:4992
-
-
-
C:\Users\Admin\Documents\Ln4ahps3ySsjFMi7AYex8Nl_.exe"C:\Users\Admin\Documents\Ln4ahps3ySsjFMi7AYex8Nl_.exe"4⤵PID:10304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 10304 -s 2405⤵
- Program crash
PID:9008
-
-
-
C:\Users\Admin\Documents\YHFpgYW4rDl4I81WxCxK5Sow.exe"C:\Users\Admin\Documents\YHFpgYW4rDl4I81WxCxK5Sow.exe"4⤵PID:10296
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbsCrIPt: cLOSe( CREAteobjecT ("wScRiPT.ShElL" ).RUN ( "C:\Windows\system32\cmd.exe /C tYpe ""C:\Users\Admin\Documents\YHFpgYW4rDl4I81WxCxK5Sow.exe"" > IQ0V_Fe_.eXE && StaRt IQ0v_FE_.ExE -poRsuYEMryiLi & if """"== """" for %m in ( ""C:\Users\Admin\Documents\YHFpgYW4rDl4I81WxCxK5Sow.exe"" ) do taskkill /iM ""%~NXm"" -F" ,0 , TRUE ))5⤵PID:11460
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C tYpe "C:\Users\Admin\Documents\YHFpgYW4rDl4I81WxCxK5Sow.exe" > IQ0V_Fe_.eXE && StaRt IQ0v_FE_.ExE -poRsuYEMryiLi& if ""== "" for %m in ("C:\Users\Admin\Documents\YHFpgYW4rDl4I81WxCxK5Sow.exe" ) do taskkill /iM "%~NXm" -F6⤵PID:12176
-
C:\Windows\SysWOW64\taskkill.exetaskkill /iM "YHFpgYW4rDl4I81WxCxK5Sow.exe" -F7⤵
- Kills process with taskkill
PID:12444
-
-
-
-
-
C:\Users\Admin\Documents\x1feYW62YMEjcrSdU0n1d3h4.exe"C:\Users\Admin\Documents\x1feYW62YMEjcrSdU0n1d3h4.exe"4⤵PID:10288
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\Documents\x1feYW62YMEjcrSdU0n1d3h4.exe"5⤵PID:5500
-
-
-
C:\Users\Admin\Documents\JzTIqySQkQeyAKoa586uAZqJ.exe"C:\Users\Admin\Documents\JzTIqySQkQeyAKoa586uAZqJ.exe"4⤵PID:10280
-
C:\Users\Admin\AppData\Local\Temp\is-21VTR.tmp\JzTIqySQkQeyAKoa586uAZqJ.tmp"C:\Users\Admin\AppData\Local\Temp\is-21VTR.tmp\JzTIqySQkQeyAKoa586uAZqJ.tmp" /SL5="$1047E,138429,56832,C:\Users\Admin\Documents\JzTIqySQkQeyAKoa586uAZqJ.exe"5⤵PID:10752
-
C:\Users\Admin\AppData\Local\Temp\is-TVD5N.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-TVD5N.tmp\Setup.exe" /Verysilent6⤵PID:17240
-
-
-
-
C:\Users\Admin\Documents\AWbUvPpQB5kd99Q5r8wzfZn6.exe"C:\Users\Admin\Documents\AWbUvPpQB5kd99Q5r8wzfZn6.exe"4⤵PID:10272
-
C:\Users\Admin\Documents\AWbUvPpQB5kd99Q5r8wzfZn6.exeC:\Users\Admin\Documents\AWbUvPpQB5kd99Q5r8wzfZn6.exe5⤵PID:4856
-
-
C:\Users\Admin\Documents\AWbUvPpQB5kd99Q5r8wzfZn6.exeC:\Users\Admin\Documents\AWbUvPpQB5kd99Q5r8wzfZn6.exe5⤵PID:12012
-
-
C:\Users\Admin\Documents\AWbUvPpQB5kd99Q5r8wzfZn6.exeC:\Users\Admin\Documents\AWbUvPpQB5kd99Q5r8wzfZn6.exe5⤵PID:11932
-
-
C:\Users\Admin\Documents\AWbUvPpQB5kd99Q5r8wzfZn6.exeC:\Users\Admin\Documents\AWbUvPpQB5kd99Q5r8wzfZn6.exe5⤵PID:5720
-
-
C:\Users\Admin\Documents\AWbUvPpQB5kd99Q5r8wzfZn6.exeC:\Users\Admin\Documents\AWbUvPpQB5kd99Q5r8wzfZn6.exe5⤵PID:7132
-
-
C:\Users\Admin\Documents\AWbUvPpQB5kd99Q5r8wzfZn6.exeC:\Users\Admin\Documents\AWbUvPpQB5kd99Q5r8wzfZn6.exe5⤵PID:12116
-
-
C:\Users\Admin\Documents\AWbUvPpQB5kd99Q5r8wzfZn6.exeC:\Users\Admin\Documents\AWbUvPpQB5kd99Q5r8wzfZn6.exe5⤵PID:11364
-
-
C:\Users\Admin\Documents\AWbUvPpQB5kd99Q5r8wzfZn6.exeC:\Users\Admin\Documents\AWbUvPpQB5kd99Q5r8wzfZn6.exe5⤵PID:11548
-
-
C:\Users\Admin\Documents\AWbUvPpQB5kd99Q5r8wzfZn6.exeC:\Users\Admin\Documents\AWbUvPpQB5kd99Q5r8wzfZn6.exe5⤵PID:1572
-
-
C:\Users\Admin\Documents\AWbUvPpQB5kd99Q5r8wzfZn6.exeC:\Users\Admin\Documents\AWbUvPpQB5kd99Q5r8wzfZn6.exe5⤵PID:12972
-
-
C:\Users\Admin\Documents\AWbUvPpQB5kd99Q5r8wzfZn6.exeC:\Users\Admin\Documents\AWbUvPpQB5kd99Q5r8wzfZn6.exe5⤵PID:13020
-
-
C:\Users\Admin\Documents\AWbUvPpQB5kd99Q5r8wzfZn6.exeC:\Users\Admin\Documents\AWbUvPpQB5kd99Q5r8wzfZn6.exe5⤵PID:9328
-
-
C:\Users\Admin\Documents\AWbUvPpQB5kd99Q5r8wzfZn6.exeC:\Users\Admin\Documents\AWbUvPpQB5kd99Q5r8wzfZn6.exe5⤵PID:6332
-
-
C:\Users\Admin\Documents\AWbUvPpQB5kd99Q5r8wzfZn6.exeC:\Users\Admin\Documents\AWbUvPpQB5kd99Q5r8wzfZn6.exe5⤵PID:15760
-
-
C:\Users\Admin\Documents\AWbUvPpQB5kd99Q5r8wzfZn6.exeC:\Users\Admin\Documents\AWbUvPpQB5kd99Q5r8wzfZn6.exe5⤵PID:15756
-
-
C:\Users\Admin\Documents\AWbUvPpQB5kd99Q5r8wzfZn6.exeC:\Users\Admin\Documents\AWbUvPpQB5kd99Q5r8wzfZn6.exe5⤵PID:14116
-
-
C:\Users\Admin\Documents\AWbUvPpQB5kd99Q5r8wzfZn6.exeC:\Users\Admin\Documents\AWbUvPpQB5kd99Q5r8wzfZn6.exe5⤵PID:10372
-
-
-
C:\Users\Admin\Documents\OAem3pbiXPvXUU6Zw9CKbUQs.exe"C:\Users\Admin\Documents\OAem3pbiXPvXUU6Zw9CKbUQs.exe"4⤵PID:10264
-
C:\Users\Admin\AppData\Roaming\5719396.exe"C:\Users\Admin\AppData\Roaming\5719396.exe"5⤵PID:9732
-
-
C:\Users\Admin\AppData\Roaming\6500452.exe"C:\Users\Admin\AppData\Roaming\6500452.exe"5⤵PID:8344
-
-
C:\Users\Admin\AppData\Roaming\6504563.exe"C:\Users\Admin\AppData\Roaming\6504563.exe"5⤵PID:7528
-
-
C:\Users\Admin\AppData\Roaming\1378391.exe"C:\Users\Admin\AppData\Roaming\1378391.exe"5⤵PID:15752
-
-
-
C:\Users\Admin\Documents\ZBwhXyCdIh3fVZ4NePfSWpzJ.exe"C:\Users\Admin\Documents\ZBwhXyCdIh3fVZ4NePfSWpzJ.exe"4⤵PID:10252
-
-
C:\Users\Admin\Documents\cGz7dV9tF1a5xO3I9yM9LJJh.exe"C:\Users\Admin\Documents\cGz7dV9tF1a5xO3I9yM9LJJh.exe"4⤵PID:10244
-
C:\Users\Admin\Documents\cGz7dV9tF1a5xO3I9yM9LJJh.exeC:\Users\Admin\Documents\cGz7dV9tF1a5xO3I9yM9LJJh.exe5⤵PID:12172
-
-
C:\Users\Admin\Documents\cGz7dV9tF1a5xO3I9yM9LJJh.exeC:\Users\Admin\Documents\cGz7dV9tF1a5xO3I9yM9LJJh.exe5⤵PID:7936
-
-
C:\Users\Admin\Documents\cGz7dV9tF1a5xO3I9yM9LJJh.exeC:\Users\Admin\Documents\cGz7dV9tF1a5xO3I9yM9LJJh.exe5⤵PID:4160
-
-
C:\Users\Admin\Documents\cGz7dV9tF1a5xO3I9yM9LJJh.exeC:\Users\Admin\Documents\cGz7dV9tF1a5xO3I9yM9LJJh.exe5⤵PID:8540
-
-
C:\Users\Admin\Documents\cGz7dV9tF1a5xO3I9yM9LJJh.exeC:\Users\Admin\Documents\cGz7dV9tF1a5xO3I9yM9LJJh.exe5⤵PID:12484
-
-
C:\Users\Admin\Documents\cGz7dV9tF1a5xO3I9yM9LJJh.exeC:\Users\Admin\Documents\cGz7dV9tF1a5xO3I9yM9LJJh.exe5⤵PID:12840
-
-
C:\Users\Admin\Documents\cGz7dV9tF1a5xO3I9yM9LJJh.exeC:\Users\Admin\Documents\cGz7dV9tF1a5xO3I9yM9LJJh.exe5⤵PID:2996
-
-
C:\Users\Admin\Documents\cGz7dV9tF1a5xO3I9yM9LJJh.exeC:\Users\Admin\Documents\cGz7dV9tF1a5xO3I9yM9LJJh.exe5⤵PID:9008
-
-
C:\Users\Admin\Documents\cGz7dV9tF1a5xO3I9yM9LJJh.exeC:\Users\Admin\Documents\cGz7dV9tF1a5xO3I9yM9LJJh.exe5⤵PID:13420
-
-
C:\Users\Admin\Documents\cGz7dV9tF1a5xO3I9yM9LJJh.exeC:\Users\Admin\Documents\cGz7dV9tF1a5xO3I9yM9LJJh.exe5⤵PID:11564
-
-
C:\Users\Admin\Documents\cGz7dV9tF1a5xO3I9yM9LJJh.exeC:\Users\Admin\Documents\cGz7dV9tF1a5xO3I9yM9LJJh.exe5⤵PID:1008
-
-
C:\Users\Admin\Documents\cGz7dV9tF1a5xO3I9yM9LJJh.exeC:\Users\Admin\Documents\cGz7dV9tF1a5xO3I9yM9LJJh.exe5⤵PID:14576
-
-
C:\Users\Admin\Documents\cGz7dV9tF1a5xO3I9yM9LJJh.exeC:\Users\Admin\Documents\cGz7dV9tF1a5xO3I9yM9LJJh.exe5⤵PID:8332
-
-
C:\Users\Admin\Documents\cGz7dV9tF1a5xO3I9yM9LJJh.exeC:\Users\Admin\Documents\cGz7dV9tF1a5xO3I9yM9LJJh.exe5⤵PID:15792
-
-
C:\Users\Admin\Documents\cGz7dV9tF1a5xO3I9yM9LJJh.exeC:\Users\Admin\Documents\cGz7dV9tF1a5xO3I9yM9LJJh.exe5⤵PID:16176
-
-
C:\Users\Admin\Documents\cGz7dV9tF1a5xO3I9yM9LJJh.exeC:\Users\Admin\Documents\cGz7dV9tF1a5xO3I9yM9LJJh.exe5⤵PID:5892
-
-
C:\Users\Admin\Documents\cGz7dV9tF1a5xO3I9yM9LJJh.exeC:\Users\Admin\Documents\cGz7dV9tF1a5xO3I9yM9LJJh.exe5⤵PID:17124
-
-
-
C:\Users\Admin\Documents\Zd_H3XFDD7MsSOuktZxOhXTy.exe"C:\Users\Admin\Documents\Zd_H3XFDD7MsSOuktZxOhXTy.exe"4⤵PID:2808
-
C:\Users\Admin\Documents\Zd_H3XFDD7MsSOuktZxOhXTy.exeC:\Users\Admin\Documents\Zd_H3XFDD7MsSOuktZxOhXTy.exe5⤵PID:12284
-
-
C:\Users\Admin\Documents\Zd_H3XFDD7MsSOuktZxOhXTy.exeC:\Users\Admin\Documents\Zd_H3XFDD7MsSOuktZxOhXTy.exe5⤵PID:9852
-
-
C:\Users\Admin\Documents\Zd_H3XFDD7MsSOuktZxOhXTy.exeC:\Users\Admin\Documents\Zd_H3XFDD7MsSOuktZxOhXTy.exe5⤵PID:11300
-
-
C:\Users\Admin\Documents\Zd_H3XFDD7MsSOuktZxOhXTy.exeC:\Users\Admin\Documents\Zd_H3XFDD7MsSOuktZxOhXTy.exe5⤵PID:8932
-
-
C:\Users\Admin\Documents\Zd_H3XFDD7MsSOuktZxOhXTy.exeC:\Users\Admin\Documents\Zd_H3XFDD7MsSOuktZxOhXTy.exe5⤵PID:8580
-
-
C:\Users\Admin\Documents\Zd_H3XFDD7MsSOuktZxOhXTy.exeC:\Users\Admin\Documents\Zd_H3XFDD7MsSOuktZxOhXTy.exe5⤵PID:2220
-
-
C:\Users\Admin\Documents\Zd_H3XFDD7MsSOuktZxOhXTy.exeC:\Users\Admin\Documents\Zd_H3XFDD7MsSOuktZxOhXTy.exe5⤵PID:12536
-
-
C:\Users\Admin\Documents\Zd_H3XFDD7MsSOuktZxOhXTy.exeC:\Users\Admin\Documents\Zd_H3XFDD7MsSOuktZxOhXTy.exe5⤵PID:10832
-
-
C:\Users\Admin\Documents\Zd_H3XFDD7MsSOuktZxOhXTy.exeC:\Users\Admin\Documents\Zd_H3XFDD7MsSOuktZxOhXTy.exe5⤵PID:13432
-
-
C:\Users\Admin\Documents\Zd_H3XFDD7MsSOuktZxOhXTy.exeC:\Users\Admin\Documents\Zd_H3XFDD7MsSOuktZxOhXTy.exe5⤵PID:11456
-
-
C:\Users\Admin\Documents\Zd_H3XFDD7MsSOuktZxOhXTy.exeC:\Users\Admin\Documents\Zd_H3XFDD7MsSOuktZxOhXTy.exe5⤵PID:13324
-
-
C:\Users\Admin\Documents\Zd_H3XFDD7MsSOuktZxOhXTy.exeC:\Users\Admin\Documents\Zd_H3XFDD7MsSOuktZxOhXTy.exe5⤵PID:12764
-
-
C:\Users\Admin\Documents\Zd_H3XFDD7MsSOuktZxOhXTy.exeC:\Users\Admin\Documents\Zd_H3XFDD7MsSOuktZxOhXTy.exe5⤵PID:5172
-
-
C:\Users\Admin\Documents\Zd_H3XFDD7MsSOuktZxOhXTy.exeC:\Users\Admin\Documents\Zd_H3XFDD7MsSOuktZxOhXTy.exe5⤵PID:14748
-
-
C:\Users\Admin\Documents\Zd_H3XFDD7MsSOuktZxOhXTy.exeC:\Users\Admin\Documents\Zd_H3XFDD7MsSOuktZxOhXTy.exe5⤵PID:15184
-
-
C:\Users\Admin\Documents\Zd_H3XFDD7MsSOuktZxOhXTy.exeC:\Users\Admin\Documents\Zd_H3XFDD7MsSOuktZxOhXTy.exe5⤵PID:14588
-
-
C:\Users\Admin\Documents\Zd_H3XFDD7MsSOuktZxOhXTy.exeC:\Users\Admin\Documents\Zd_H3XFDD7MsSOuktZxOhXTy.exe5⤵PID:13696
-
-
C:\Users\Admin\Documents\Zd_H3XFDD7MsSOuktZxOhXTy.exeC:\Users\Admin\Documents\Zd_H3XFDD7MsSOuktZxOhXTy.exe5⤵PID:16144
-
-
C:\Users\Admin\Documents\Zd_H3XFDD7MsSOuktZxOhXTy.exeC:\Users\Admin\Documents\Zd_H3XFDD7MsSOuktZxOhXTy.exe5⤵PID:15572
-
-
C:\Users\Admin\Documents\Zd_H3XFDD7MsSOuktZxOhXTy.exeC:\Users\Admin\Documents\Zd_H3XFDD7MsSOuktZxOhXTy.exe5⤵PID:15952
-
-
C:\Users\Admin\Documents\Zd_H3XFDD7MsSOuktZxOhXTy.exeC:\Users\Admin\Documents\Zd_H3XFDD7MsSOuktZxOhXTy.exe5⤵PID:2136
-
-
-
C:\Users\Admin\Documents\WfN_WzoXp8tTdCAB6fp9qrou.exe"C:\Users\Admin\Documents\WfN_WzoXp8tTdCAB6fp9qrou.exe"4⤵PID:9952
-
-
C:\Users\Admin\Documents\y_pY8XoSvT5ysTwooMmfglb1.exe"C:\Users\Admin\Documents\y_pY8XoSvT5ysTwooMmfglb1.exe"4⤵PID:9820
-
C:\Users\Admin\Documents\y_pY8XoSvT5ysTwooMmfglb1.exe"C:\Users\Admin\Documents\y_pY8XoSvT5ysTwooMmfglb1.exe"5⤵PID:12800
-
-
C:\Users\Admin\Documents\y_pY8XoSvT5ysTwooMmfglb1.exe"C:\Users\Admin\Documents\y_pY8XoSvT5ysTwooMmfglb1.exe"5⤵PID:5536
-
-
-
C:\Users\Admin\Documents\7DMtsUr_UDNXhxZ3hZ18UmLY.exe"C:\Users\Admin\Documents\7DMtsUr_UDNXhxZ3hZ18UmLY.exe"4⤵PID:8896
-
-
C:\Users\Admin\Documents\dT6ysGcbBtFgYulk4yM29RTq.exe"C:\Users\Admin\Documents\dT6ysGcbBtFgYulk4yM29RTq.exe"4⤵PID:10960
-
-
C:\Users\Admin\Documents\2zxjvjycP7wUPcB8l67hBZn7.exe"C:\Users\Admin\Documents\2zxjvjycP7wUPcB8l67hBZn7.exe"4⤵PID:9520
-
-
C:\Users\Admin\Documents\PTSh8jeEr1Q_qVSkgLPycrGk.exe"C:\Users\Admin\Documents\PTSh8jeEr1Q_qVSkgLPycrGk.exe"4⤵PID:7404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7404 -s 2765⤵
- Program crash
PID:9300
-
-
-
C:\Users\Admin\Documents\XG3CS28KNZjbv0QylxMxf0ll.exe"C:\Users\Admin\Documents\XG3CS28KNZjbv0QylxMxf0ll.exe"4⤵PID:6096
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST5⤵
- Creates scheduled task(s)
PID:12252
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST5⤵
- Creates scheduled task(s)
PID:12244
-
-
-
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\note866.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\note866.exe"1⤵PID:2852
-
C:\Program Files (x86)\SmartPDF\SmartPDF\LivelyScreenRecS3.0.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\LivelyScreenRecS3.0.exe"1⤵PID:132
-
C:\Program Files (x86)\SmartPDF\SmartPDF\lg.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\lg.exe"1⤵PID:4160
-
C:\Program Files (x86)\SmartPDF\SmartPDF\lg.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\lg.exe" -a2⤵PID:2012
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\PBrowFile15.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\PBrowFile15.exe"1⤵PID:4964
-
C:\Users\Admin\AppData\Roaming\4631548.exe"C:\Users\Admin\AppData\Roaming\4631548.exe"2⤵PID:1904
-
-
C:\Users\Admin\AppData\Roaming\5355895.exe"C:\Users\Admin\AppData\Roaming\5355895.exe"2⤵PID:8876
-
-
C:\Users\Admin\AppData\Roaming\1901176.exe"C:\Users\Admin\AppData\Roaming\1901176.exe"2⤵PID:4072
-
-
C:\Users\Admin\AppData\Roaming\7336083.exe"C:\Users\Admin\AppData\Roaming\7336083.exe"2⤵PID:6836
-
-
C:\Users\Admin\AppData\Roaming\6386849.exe"C:\Users\Admin\AppData\Roaming\6386849.exe"2⤵PID:8708
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\9840432e051a6fa1192594db02b80a4c1fd73456.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\9840432e051a6fa1192594db02b80a4c1fd73456.exe"1⤵PID:5668
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Program Files (x86)\SmartPDF\SmartPDF\9840432e051a6fa1192594db02b80a4c1fd73456.exe"2⤵PID:10108
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK3⤵
- Delays execution with timeout.exe
PID:9468
-
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"1⤵PID:5272
-
C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"2⤵PID:7152
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"2⤵PID:688
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"2⤵PID:7188
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"2⤵PID:4264
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"2⤵PID:8148
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"2⤵PID:860
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"2⤵PID:2780
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"2⤵PID:8088
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"2⤵PID:7148
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"2⤵PID:8560
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"2⤵PID:8552
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"2⤵PID:9016
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"2⤵PID:2012
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"2⤵PID:1124
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"2⤵PID:10644
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"2⤵PID:11172
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"2⤵PID:5224
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"2⤵PID:8820
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"2⤵PID:2476
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"2⤵PID:4532
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"2⤵PID:11216
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"2⤵PID:2964
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"2⤵PID:11788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 11788 -s 283⤵
- Program crash
PID:11528
-
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"2⤵PID:11532
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"2⤵PID:1084
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"2⤵PID:7128
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"2⤵PID:12168
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"2⤵PID:4828
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"2⤵PID:9576
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"2⤵PID:7072
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"2⤵PID:12588
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"2⤵PID:3328
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"2⤵PID:11092
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"2⤵PID:5892
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"2⤵PID:13944
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"2⤵PID:15112
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"2⤵PID:15840
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"2⤵PID:16044
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"2⤵PID:8384
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"2⤵PID:16272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1276 -ip 12761⤵PID:6932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 380 -p 6128 -ip 61281⤵PID:7152
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 6200 -ip 62001⤵PID:2464
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:7124
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:7508
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:7420
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:6568
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:8616
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:2900
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:6792
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:976
-
C:\Windows\SysWOW64\rundll32.exerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main1⤵PID:6728
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6728 -s 4562⤵
- Program crash
PID:3988
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:7644
-
C:\Users\Admin\AppData\Local\Temp\D17C.exeC:\Users\Admin\AppData\Local\Temp\D17C.exe1⤵PID:8872
-
C:\Windows\system32\rUNdlL32.eXerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main1⤵
- Process spawned unexpected child process
PID:8820
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 412 -p 968 -ip 9681⤵PID:1288
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 7644 -ip 76441⤵PID:7716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 5420 -ip 54201⤵PID:7652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 10920 -ip 109201⤵PID:5348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 8480 -ip 84801⤵PID:10504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3632 -ip 36321⤵PID:9620
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 10348 -ip 103481⤵PID:10136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 7404 -ip 74041⤵PID:6308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 9952 -ip 99521⤵PID:10784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 1212 -ip 12121⤵PID:7516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 10304 -ip 103041⤵PID:8780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 11788 -ip 117881⤵PID:2816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 404 -ip 4041⤵PID:6964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 6332 -ip 63321⤵PID:5908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 16144 -ip 161441⤵PID:15908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 8384 -ip 83841⤵PID:15140
Network
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
1Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
Disabling Security Tools
1Modify Registry
2Virtualization/Sandbox Evasion
1Web Service
1