Resubmissions
03/09/2021, 12:16
210903-pfn3ysdac4 1003/09/2021, 04:55
210903-fj6mqsfbfk 1002/09/2021, 19:23
210902-x37sksbef5 1002/09/2021, 15:02
210902-senycadeck 1002/09/2021, 11:29
210902-4b2x2c3ahj 1002/09/2021, 05:46
210902-lng5vcn31n 1002/09/2021, 04:57
210902-gp7zs88ann 1001/09/2021, 17:32
210901-sgcvvtysvs 1031/08/2021, 12:57
210831-1v8aywj16x 1031/08/2021, 07:34
210831-n7h9w45r3x 10Analysis
-
max time kernel
618s -
max time network
626s -
platform
windows10_x64 -
resource
win10-de -
submitted
02/09/2021, 05:46
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-jp
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win7-fr
Behavioral task
behavioral3
Sample
Setup.exe
Resource
win7-en
Behavioral task
behavioral4
Sample
Setup.exe
Resource
win7-de
Behavioral task
behavioral5
Sample
Setup.exe
Resource
win11
Behavioral task
behavioral6
Sample
Setup.exe
Resource
win10-en
Behavioral task
behavioral7
Sample
Setup.exe
Resource
win10-jp
Behavioral task
behavioral8
Sample
Setup.exe
Resource
win10-fr
Behavioral task
behavioral9
Sample
Setup.exe
Resource
win10-en
Behavioral task
behavioral10
Sample
Setup.exe
Resource
win10-de
General
-
Target
Setup.exe
-
Size
631KB
-
MD5
cb927513ff8ebff4dd52a47f7e42f934
-
SHA1
0de47c02a8adc4940a6c18621b4e4a619641d029
-
SHA256
fd5c970806fba1500cbb6af5328329aeb43b8de3f02d90ec5d8cd1d57711622f
-
SHA512
988c8fd886a9155b7d190faf2ce6b34d910efcffcf1c6251f18a9d0c804a0ea26a89679273033ac98b200363c536426efd1ae9de445c34e660369abb06f0071c
Malware Config
Extracted
redline
1
37.0.8.88:44263
Extracted
redline
spnewportspectr
135.148.139.222:1594
Extracted
redline
193.56.146.60:16367
Extracted
raccoon
d02c5d65069fc7ce1993e7c52edf0c9c4c195c81
-
url4cnc
https://telete.in/open3entershift
Extracted
metasploit
windows/single_exec
Signatures
-
Glupteba Payload 2 IoCs
resource yara_rule behavioral10/memory/2208-283-0x0000000004680000-0x0000000004FA6000-memory.dmp family_glupteba behavioral10/memory/2208-302-0x0000000000400000-0x000000000259B000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6208 4312 rundll32.exe 192 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1380 4312 rUNdlL32.eXe 192 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 22 IoCs
resource yara_rule behavioral10/memory/5092-241-0x000000000041C5BE-mapping.dmp family_redline behavioral10/memory/5092-239-0x0000000000400000-0x000000000044A000-memory.dmp family_redline behavioral10/memory/4164-263-0x000000000041C5EE-mapping.dmp family_redline behavioral10/memory/4164-259-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral10/memory/5092-258-0x0000000005180000-0x0000000005786000-memory.dmp family_redline behavioral10/memory/4128-279-0x00000000023A0000-0x00000000023BD000-memory.dmp family_redline behavioral10/memory/4128-287-0x0000000003F10000-0x0000000003F2C000-memory.dmp family_redline behavioral10/memory/2400-331-0x000000000041C5BE-mapping.dmp family_redline behavioral10/memory/2400-341-0x00000000050B0000-0x00000000056B6000-memory.dmp family_redline behavioral10/memory/5652-364-0x000000000041C5BE-mapping.dmp family_redline behavioral10/memory/5804-390-0x000000000041C5EE-mapping.dmp family_redline behavioral10/memory/6020-403-0x000000000041C5BE-mapping.dmp family_redline behavioral10/memory/5400-426-0x000000000041C5EE-mapping.dmp family_redline behavioral10/memory/4860-436-0x000000000041C5BE-mapping.dmp family_redline behavioral10/memory/4896-458-0x000000000041C5EE-mapping.dmp family_redline behavioral10/memory/4920-461-0x000000000041C5BE-mapping.dmp family_redline behavioral10/memory/1516-479-0x000000000041C5EE-mapping.dmp family_redline behavioral10/memory/5200-489-0x000000000041C5BE-mapping.dmp family_redline behavioral10/memory/4376-513-0x000000000041C5BE-mapping.dmp family_redline behavioral10/memory/1580-547-0x000000000041C5EE-mapping.dmp family_redline behavioral10/memory/5976-558-0x000000000041C5BE-mapping.dmp family_redline behavioral10/memory/6232-572-0x000000000041C5EE-mapping.dmp family_redline -
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
-
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
-
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Vidar Stealer 2 IoCs
resource yara_rule behavioral10/memory/1764-240-0x0000000002D30000-0x0000000002E03000-memory.dmp family_vidar behavioral10/memory/1764-264-0x0000000000400000-0x0000000002BB2000-memory.dmp family_vidar -
Downloads MZ/PE file
-
Executes dropped EXE 25 IoCs
pid Process 372 Z93VzqaNWtjd5VRixOVgMODo.exe 2624 mhWe_FDhSpNOUE8tGRp7tzbG.exe 808 3XigsTU6eAHS_B0eWt2m9GcW.exe 1256 eVtDy2kmSwURtva2vBMA9qU6.exe 2540 zsI5t_eJTJVnSpRUvfyY0ZV0.exe 1020 2dRkySXfpzhrHfXqbMfr2Dh6.exe 4136 3CzjcI0lz_q8pGaAxMLxiexU.exe 1796 iZXDunGUmJUrMAjkcm1HiYnD.exe 4112 B6yowxV8LsKL_sh6fD4dEqTq.exe 1764 pn1CRHJihlF7AUiO8r9WkjsW.exe 4144 Juy1Klom0iHRt0cpliJhPTvO.exe 2208 zUJh9p7ry0bJHslkedqN_gmr.exe 4212 4bNPM6sKOX2oYBMUz4QrBqSP.exe 4200 ybDkP2sQ6_pLyun1GoApuo9P.exe 4104 Uw2nsLbf3aKDMOvE9SBpKWI8.exe 4128 rwtUE2DGUjdKpne200zgB3n4.exe 4120 09WJtjb0y0ANJSkCvy24hF8U.exe 2120 cFn2qvDmPErwLIIqQl73UGcj.exe 1472 9mqE7ddKs1O09wKSholqPSoG.exe 4080 hCYV1iHrYQwv8E3zOWNX11r3.exe 4652 4bNPM6sKOX2oYBMUz4QrBqSP.tmp 5068 Z93VzqaNWtjd5VRixOVgMODo.exe 5092 mhWe_FDhSpNOUE8tGRp7tzbG.exe 4164 Z93VzqaNWtjd5VRixOVgMODo.exe 4320 WerFault.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Uw2nsLbf3aKDMOvE9SBpKWI8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Uw2nsLbf3aKDMOvE9SBpKWI8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2dRkySXfpzhrHfXqbMfr2Dh6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2dRkySXfpzhrHfXqbMfr2Dh6.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000\Control Panel\International\Geo\Nation Setup.exe -
Loads dropped DLL 2 IoCs
pid Process 4652 4bNPM6sKOX2oYBMUz4QrBqSP.tmp 4652 4bNPM6sKOX2oYBMUz4QrBqSP.tmp -
resource yara_rule behavioral10/files/0x000400000001ab60-182.dat themida behavioral10/files/0x000400000001ab72-181.dat themida behavioral10/files/0x000400000001ab72-156.dat themida behavioral10/files/0x000400000001ab60-144.dat themida behavioral10/memory/1020-206-0x0000000000970000-0x0000000000971000-memory.dmp themida behavioral10/memory/4104-205-0x0000000000CC0000-0x0000000000CC1000-memory.dmp themida -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2dRkySXfpzhrHfXqbMfr2Dh6.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Uw2nsLbf3aKDMOvE9SBpKWI8.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 16 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 35 ipinfo.io 118 ipinfo.io 180 freegeoip.app 182 freegeoip.app 218 ipinfo.io 219 ipinfo.io 1324 ipinfo.io 36 ipinfo.io 116 ipinfo.io 120 ipinfo.io 396 ipinfo.io 1325 ipinfo.io 109 ip-api.com 183 freegeoip.app 188 freegeoip.app 389 ipinfo.io -
Drops file in System32 directory 8 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Office\16.0\officec2rclient.exe_Rules.xml OfficeC2RClient.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Office\OTele\officec2rclient.exe.db OfficeC2RClient.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Office\OTele\officec2rclient.exe.db-journal OfficeC2RClient.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Office\OTele\officec2rclient.exe.db-wal OfficeC2RClient.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Office\OTele\officec2rclient.exe.db-shm OfficeC2RClient.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat OfficeC2RClient.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat OfficeC2RClient.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Office\16.0\officec2rclient.exe_Rules.xml OfficeC2RClient.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4104 Uw2nsLbf3aKDMOvE9SBpKWI8.exe 1020 2dRkySXfpzhrHfXqbMfr2Dh6.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2624 set thread context of 5092 2624 mhWe_FDhSpNOUE8tGRp7tzbG.exe 109 PID 372 set thread context of 4164 372 Z93VzqaNWtjd5VRixOVgMODo.exe 111 -
Drops file in Program Files directory 5 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Company\NewProduct\inst001.exe 3XigsTU6eAHS_B0eWt2m9GcW.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\cutm3.exe 3XigsTU6eAHS_B0eWt2m9GcW.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe 3XigsTU6eAHS_B0eWt2m9GcW.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\Uninstall.exe 3XigsTU6eAHS_B0eWt2m9GcW.exe File created C:\Program Files (x86)\Company\NewProduct\Uninstall.ini 3XigsTU6eAHS_B0eWt2m9GcW.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 40 IoCs
pid pid_target Process procid_target 5036 4200 WerFault.exe 84 2776 4080 WerFault.exe 80 4508 4144 WerFault.exe 85 4360 2208 WerFault.exe 91 4244 4200 WerFault.exe 84 3152 4080 WerFault.exe 80 4952 4144 WerFault.exe 85 1004 2208 WerFault.exe 91 1244 4200 WerFault.exe 84 4276 2208 WerFault.exe 91 4444 4200 WerFault.exe 84 2860 4080 WerFault.exe 80 4304 2208 WerFault.exe 91 1520 4144 WerFault.exe 85 5192 4080 WerFault.exe 80 5324 4144 WerFault.exe 85 5436 2208 WerFault.exe 91 5480 4080 WerFault.exe 80 5540 4200 WerFault.exe 84 5684 2208 WerFault.exe 91 5828 4144 WerFault.exe 85 5844 4144 WerFault.exe 85 5860 4144 WerFault.exe 85 5996 4200 WerFault.exe 84 6140 5652 WerFault.exe 143 5192 4080 WerFault.exe 80 6092 6020 WerFault.exe 163 5544 4200 WerFault.exe 84 736 4200 WerFault.exe 84 4116 4080 WerFault.exe 80 5940 4920 WerFault.exe 180 5584 3512 WerFault.exe 131 4320 4080 WerFault.exe 80 5432 4080 WerFault.exe 80 3860 4200 WerFault.exe 84 6256 4080 WerFault.exe 80 6400 4200 WerFault.exe 84 6540 4080 WerFault.exe 80 6784 4080 WerFault.exe 80 6916 4080 WerFault.exe 80 -
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5900 schtasks.exe 5952 schtasks.exe 5236 schtasks.exe 11912 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1396 timeout.exe -
Kills process with taskkill 5 IoCs
pid Process 6244 taskkill.exe 6860 taskkill.exe 5912 taskkill.exe 7748 taskkill.exe 7760 taskkill.exe -
Modifies data under HKEY_USERS 59 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\ConfigContextData OfficeC2RClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesLastModified\officec2rclient.exe_queried = "1630561900" OfficeC2RClient.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officec2rclient.exe\RulesEndpoint = "https://nexusrules.officeapps.live.com/nexus/rules?Application=officec2rclient.exe&Version=16.0.12527.20470&ClientId={7B695CFF-1492-4164-B513-7AE896D88A38}&OSEnvironment=10&MsoAppId=37&AudienceName=Audience_Liblet_Not_Initialized&AudienceGroup=Other&AppVersion=16.0.12527.20470&" OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\ExternalFeatureOverrides\officeclicktorun OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\TrustCenter\Experimentation OfficeC2RClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" OfficeC2RClient.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\Common\ClientTelemetry\RulesLastAudienceReported\officec2rclient.exe = "Audience_Liblet_Not_Initialized" OfficeC2RClient.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officec2rclient.exe\ULSMonitor\ULSTagIds0 = "5804129,7202269,17110992,39965824,7153487,17110988,17962391,17962392,3702920,3462423,3700754,3965062,4297094,7153421,18716193,7153435,7202265,20502174,6308191,18407617" OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry OfficeC2RClient.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officec2rclient.exe\ULSMonitor\ULSCategoriesSeverities = "1329 50,1329 10,941 10,1329 15,941 15,1329 100,941 6,1329 6" OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\FirstSession\officeclicktorun OfficeC2RClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages\en-US = "2" OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officec2rclient.exe\ULSMonitor OfficeC2RClient.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officec2rclient.exe\ULSMonitor\ULSTagIds0 = "5804129,7202269,17110992,39965824,7153487,17110988,17962391,17962392,3702920,3462423,3700754,3965062,4297094,7153421,18716193,7153435,7202265,20502174,6308191,18407617" OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentEcs\Overrides OfficeC2RClient.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesLastModified\officec2rclient.exe = "Thu, 02 Sep 2021 05:48:10 GMT" OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun OfficeC2RClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" OfficeC2RClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0 OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\FirstSession\officeclicktorun OfficeC2RClient.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officec2rclient.exe OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentEcs\officeclicktorun\Overrides OfficeC2RClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\Identity\Version = "1" OfficeC2RClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry OfficeC2RClient.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officec2rclient.exe\ULSMonitor\ULSCategoriesSeverities = "1329 50,1329 10,941 10,1329 15,941 15,1329 100,941 6,1329 6" OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentEcs\officeclicktorun\Overrides OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata OfficeC2RClient.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officec2rclient.exe\ULSMonitor OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officec2rclient.exe\ULSMonitor OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\ExternalFeatureOverrides\officeclicktorun OfficeC2RClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" OfficeC2RClient.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentEcs\all\Overrides OfficeC2RClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages\en-US = "2" OfficeC2RClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages\en-US = "1" OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ OfficeC2RClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officec2rclient.exe OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0 OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officec2rclient.exe OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentEcs\Overrides OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\ConfigContextData OfficeC2RClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentEcs\all\Overrides OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\TrustCenter\Experimentation OfficeC2RClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache OfficeC2RClient.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 OfficeC2RClient.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officec2rclient.exe OfficeC2RClient.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 Setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 Setup.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 10956 PING.EXE -
Script User-Agent 3 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 119 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 124 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 394 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 516 OneDriveStandaloneUpdater.exe 516 OneDriveStandaloneUpdater.exe 516 OneDriveStandaloneUpdater.exe 516 OneDriveStandaloneUpdater.exe 508 Setup.exe 508 Setup.exe 5036 WerFault.exe 5036 WerFault.exe 5036 WerFault.exe 5036 WerFault.exe 5036 WerFault.exe 5036 WerFault.exe 5036 WerFault.exe 5036 WerFault.exe 5036 WerFault.exe 5036 WerFault.exe 5036 WerFault.exe 5036 WerFault.exe 5036 WerFault.exe 5036 WerFault.exe 5036 WerFault.exe 5036 WerFault.exe 5036 WerFault.exe 5036 WerFault.exe 5036 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1472 9mqE7ddKs1O09wKSholqPSoG.exe Token: SeRestorePrivilege 5036 WerFault.exe Token: SeBackupPrivilege 5036 WerFault.exe Token: SeDebugPrivilege 5036 WerFault.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4652 4bNPM6sKOX2oYBMUz4QrBqSP.tmp -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 572 OfficeC2RClient.exe 212 OfficeC2RClient.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 508 wrote to memory of 1472 508 Setup.exe 82 PID 508 wrote to memory of 1472 508 Setup.exe 82 PID 508 wrote to memory of 1472 508 Setup.exe 82 PID 508 wrote to memory of 2120 508 Setup.exe 81 PID 508 wrote to memory of 2120 508 Setup.exe 81 PID 508 wrote to memory of 4080 508 Setup.exe 80 PID 508 wrote to memory of 4080 508 Setup.exe 80 PID 508 wrote to memory of 4080 508 Setup.exe 80 PID 508 wrote to memory of 808 508 Setup.exe 99 PID 508 wrote to memory of 808 508 Setup.exe 99 PID 508 wrote to memory of 808 508 Setup.exe 99 PID 508 wrote to memory of 2624 508 Setup.exe 96 PID 508 wrote to memory of 2624 508 Setup.exe 96 PID 508 wrote to memory of 2624 508 Setup.exe 96 PID 508 wrote to memory of 372 508 Setup.exe 93 PID 508 wrote to memory of 372 508 Setup.exe 93 PID 508 wrote to memory of 372 508 Setup.exe 93 PID 508 wrote to memory of 1256 508 Setup.exe 97 PID 508 wrote to memory of 1256 508 Setup.exe 97 PID 508 wrote to memory of 1256 508 Setup.exe 97 PID 508 wrote to memory of 2540 508 Setup.exe 98 PID 508 wrote to memory of 2540 508 Setup.exe 98 PID 508 wrote to memory of 2540 508 Setup.exe 98 PID 508 wrote to memory of 1020 508 Setup.exe 92 PID 508 wrote to memory of 1020 508 Setup.exe 92 PID 508 wrote to memory of 1020 508 Setup.exe 92 PID 508 wrote to memory of 4144 508 Setup.exe 85 PID 508 wrote to memory of 4144 508 Setup.exe 85 PID 508 wrote to memory of 4144 508 Setup.exe 85 PID 508 wrote to memory of 1796 508 Setup.exe 94 PID 508 wrote to memory of 1796 508 Setup.exe 94 PID 508 wrote to memory of 1796 508 Setup.exe 94 PID 508 wrote to memory of 1764 508 Setup.exe 95 PID 508 wrote to memory of 1764 508 Setup.exe 95 PID 508 wrote to memory of 1764 508 Setup.exe 95 PID 508 wrote to memory of 4136 508 Setup.exe 86 PID 508 wrote to memory of 4136 508 Setup.exe 86 PID 508 wrote to memory of 4136 508 Setup.exe 86 PID 508 wrote to memory of 4112 508 Setup.exe 89 PID 508 wrote to memory of 4112 508 Setup.exe 89 PID 508 wrote to memory of 4120 508 Setup.exe 88 PID 508 wrote to memory of 4120 508 Setup.exe 88 PID 508 wrote to memory of 4120 508 Setup.exe 88 PID 508 wrote to memory of 4104 508 Setup.exe 90 PID 508 wrote to memory of 4104 508 Setup.exe 90 PID 508 wrote to memory of 4104 508 Setup.exe 90 PID 508 wrote to memory of 2208 508 Setup.exe 91 PID 508 wrote to memory of 2208 508 Setup.exe 91 PID 508 wrote to memory of 2208 508 Setup.exe 91 PID 508 wrote to memory of 4128 508 Setup.exe 87 PID 508 wrote to memory of 4128 508 Setup.exe 87 PID 508 wrote to memory of 4128 508 Setup.exe 87 PID 508 wrote to memory of 4200 508 Setup.exe 84 PID 508 wrote to memory of 4200 508 Setup.exe 84 PID 508 wrote to memory of 4200 508 Setup.exe 84 PID 508 wrote to memory of 4212 508 Setup.exe 83 PID 508 wrote to memory of 4212 508 Setup.exe 83 PID 508 wrote to memory of 4212 508 Setup.exe 83 PID 516 wrote to memory of 4224 516 OneDriveStandaloneUpdater.exe 100 PID 516 wrote to memory of 4224 516 OneDriveStandaloneUpdater.exe 100 PID 516 wrote to memory of 4224 516 OneDriveStandaloneUpdater.exe 100 PID 4212 wrote to memory of 4652 4212 4bNPM6sKOX2oYBMUz4QrBqSP.exe 106 PID 4212 wrote to memory of 4652 4212 4bNPM6sKOX2oYBMUz4QrBqSP.exe 106 PID 4212 wrote to memory of 4652 4212 4bNPM6sKOX2oYBMUz4QrBqSP.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Checks computer location settings
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:508 -
C:\Users\Admin\Documents\hCYV1iHrYQwv8E3zOWNX11r3.exe"C:\Users\Admin\Documents\hCYV1iHrYQwv8E3zOWNX11r3.exe"2⤵
- Executes dropped EXE
PID:4080 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 7363⤵
- Program crash
PID:2776
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 7483⤵
- Program crash
PID:3152
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 7963⤵
- Program crash
PID:2860
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 8163⤵
- Program crash
PID:5192
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 11883⤵
- Program crash
PID:5480
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 12243⤵
- Program crash
PID:5192
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 12443⤵
- Program crash
PID:4116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 13123⤵
- Executes dropped EXE
- Program crash
PID:4320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 12763⤵
- Program crash
PID:5432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 13843⤵
- Program crash
PID:6256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 12363⤵
- Program crash
PID:6540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 14283⤵
- Program crash
PID:6784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 14883⤵
- Program crash
PID:6916
-
-
-
C:\Users\Admin\Documents\cFn2qvDmPErwLIIqQl73UGcj.exe"C:\Users\Admin\Documents\cFn2qvDmPErwLIIqQl73UGcj.exe"2⤵
- Executes dropped EXE
PID:2120
-
-
C:\Users\Admin\Documents\9mqE7ddKs1O09wKSholqPSoG.exe"C:\Users\Admin\Documents\9mqE7ddKs1O09wKSholqPSoG.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1472 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"3⤵PID:5752
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"4⤵PID:4896
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"3⤵PID:352
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=93.0.4577.63 --initial-client-data=0xc8,0xcc,0xd0,0xa4,0xd4,0x7ff9c20aa380,0x7ff9c20aa390,0x7ff9c20aa3a04⤵PID:3988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1628,8923328689901226590,3348843770325589711,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1660 /prefetch:24⤵PID:8052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1628,8923328689901226590,3348843770325589711,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2104 /prefetch:84⤵PID:8112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1628,8923328689901226590,3348843770325589711,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1712 /prefetch:84⤵PID:8104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1628,8923328689901226590,3348843770325589711,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2672 /prefetch:14⤵PID:7772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1628,8923328689901226590,3348843770325589711,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2680 /prefetch:14⤵PID:7868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --field-trial-handle=1628,8923328689901226590,3348843770325589711,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3460 /prefetch:14⤵PID:5880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --field-trial-handle=1628,8923328689901226590,3348843770325589711,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3544 /prefetch:14⤵PID:2580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --field-trial-handle=1628,8923328689901226590,3348843770325589711,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3668 /prefetch:14⤵PID:7516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --field-trial-handle=1628,8923328689901226590,3348843770325589711,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3824 /prefetch:14⤵PID:6556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --field-trial-handle=1628,8923328689901226590,3348843770325589711,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1756 /prefetch:84⤵PID:7308
-
-
C:\Program Files\Google\Chrome\Application\93.0.4577.63\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\93.0.4577.63\Installer\chrmstp.exe" --configure-user-settings --verbose-logging --system-level --channel=stable --force-configure-user-settings4⤵PID:7428
-
C:\Program Files\Google\Chrome\Application\93.0.4577.63\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\93.0.4577.63\Installer\chrmstp.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=93.0.4577.63 --initial-client-data=0x240,0x244,0x248,0x21c,0x24c,0x7ff75c8f6ee0,0x7ff75c8f6ef0,0x7ff75c8f6f005⤵PID:8332
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1628,8923328689901226590,3348843770325589711,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5056 /prefetch:84⤵PID:6508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1628,8923328689901226590,3348843770325589711,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3668 /prefetch:84⤵PID:4904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1628,8923328689901226590,3348843770325589711,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAQAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=988 /prefetch:24⤵PID:7616
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C taskkill /F /PID 1472 && choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\Documents\9mqE7ddKs1O09wKSholqPSoG.exe"3⤵PID:7436
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /PID 14724⤵
- Kills process with taskkill
PID:7760
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C taskkill /F /PID 1472 && choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\Documents\9mqE7ddKs1O09wKSholqPSoG.exe"3⤵PID:7428
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /PID 14724⤵
- Kills process with taskkill
PID:7748
-
-
-
-
C:\Users\Admin\Documents\4bNPM6sKOX2oYBMUz4QrBqSP.exe"C:\Users\Admin\Documents\4bNPM6sKOX2oYBMUz4QrBqSP.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Users\Admin\AppData\Local\Temp\is-ED6L4.tmp\4bNPM6sKOX2oYBMUz4QrBqSP.tmp"C:\Users\Admin\AppData\Local\Temp\is-ED6L4.tmp\4bNPM6sKOX2oYBMUz4QrBqSP.tmp" /SL5="$501EC,138429,56832,C:\Users\Admin\Documents\4bNPM6sKOX2oYBMUz4QrBqSP.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:4652 -
C:\Users\Admin\AppData\Local\Temp\is-QG8OP.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-QG8OP.tmp\Setup.exe" /Verysilent4⤵PID:5076
-
C:\Program Files (x86)\SmartPDF\SmartPDF\lg.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\lg.exe"5⤵PID:8508
-
C:\Program Files (x86)\SmartPDF\SmartPDF\lg.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\lg.exe" -a6⤵PID:8936
-
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\stats.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\stats.exe" /Verysilent5⤵PID:8544
-
C:\Users\Admin\AppData\Local\Temp\is-A1LN6.tmp\stats.tmp"C:\Users\Admin\AppData\Local\Temp\is-A1LN6.tmp\stats.tmp" /SL5="$2031E,138429,56832,C:\Program Files (x86)\SmartPDF\SmartPDF\stats.exe" /Verysilent6⤵PID:8764
-
C:\Users\Admin\AppData\Local\Temp\is-AQQFH.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-AQQFH.tmp\Setup.exe" /Verysilent7⤵PID:4572
-
C:\Users\Admin\Documents\Gy8rweKeO4G4iJlEyKLF5tAG.exe"C:\Users\Admin\Documents\Gy8rweKeO4G4iJlEyKLF5tAG.exe"8⤵PID:13872
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C taskkill /F /PID 13872 && choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\Documents\Gy8rweKeO4G4iJlEyKLF5tAG.exe"9⤵PID:14892
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C taskkill /F /PID 13872 && choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\Documents\Gy8rweKeO4G4iJlEyKLF5tAG.exe"9⤵PID:14884
-
-
-
C:\Users\Admin\Documents\fRJz5pa2RmfeRXxW536sqA3J.exe"C:\Users\Admin\Documents\fRJz5pa2RmfeRXxW536sqA3J.exe"8⤵PID:14036
-
-
C:\Users\Admin\Documents\Psio7dxMSRnm3OkUTWMtt4EW.exe"C:\Users\Admin\Documents\Psio7dxMSRnm3OkUTWMtt4EW.exe"8⤵PID:13876
-
-
C:\Users\Admin\Documents\OJk20sdvwixHdXZD1GgM6gJL.exe"C:\Users\Admin\Documents\OJk20sdvwixHdXZD1GgM6gJL.exe"8⤵PID:12184
-
-
C:\Users\Admin\Documents\7f7q18Os2M3t0ILLgaO3wrDh.exe"C:\Users\Admin\Documents\7f7q18Os2M3t0ILLgaO3wrDh.exe"8⤵PID:13724
-
-
C:\Users\Admin\Documents\_nQ1RxGfTsNBjuAnQrFOc88Y.exe"C:\Users\Admin\Documents\_nQ1RxGfTsNBjuAnQrFOc88Y.exe"8⤵PID:14216
-
-
C:\Users\Admin\Documents\VZC2YxK6u4mGNZcgNP2JIL5o.exe"C:\Users\Admin\Documents\VZC2YxK6u4mGNZcgNP2JIL5o.exe"8⤵PID:2368
-
-
C:\Users\Admin\Documents\Rqd9dGRf8kVw0fiCsZXqrK1Z.exe"C:\Users\Admin\Documents\Rqd9dGRf8kVw0fiCsZXqrK1Z.exe"8⤵PID:15048
-
-
-
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\SmartPDF.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\SmartPDF.exe"5⤵PID:8592
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Users\Admin\services32.exe"' & exit6⤵PID:8752
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Users\Admin\services32.exe"'7⤵
- Creates scheduled task(s)
PID:5236
-
-
-
C:\Users\Admin\services32.exe"C:\Users\Admin\services32.exe"6⤵PID:10096
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Users\Admin\services32.exe"' & exit7⤵PID:11496
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Users\Admin\services32.exe"'8⤵
- Creates scheduled task(s)
PID:11912
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost32.exe"7⤵PID:8460
-
-
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\note866.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\note866.exe"5⤵PID:8536
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\LivelyScreenRecS3.0.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\LivelyScreenRecS3.0.exe"5⤵PID:8524
-
C:\Users\Admin\AppData\Local\Temp\tmp47BE_tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp47BE_tmp.exe"6⤵PID:9584
-
C:\Windows\SysWOW64\dllhost.exedllhost.exe7⤵PID:9604
-
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Pei.xll7⤵PID:9044
-
C:\Windows\SysWOW64\cmd.execmd8⤵PID:6476
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^HlGEvpOWJOEhLjtMCMDsxiaRDGubGurupaMHjGXUgfrcGybsXUFbdIsmSOwQrdfCLnrzmbAVPJrtrXlnpOAMBGPBqjObFuRXZBJowtRmxKIHEjcVEDHgPDwyIBahIedISyy$" Passa.xll9⤵PID:10372
-
-
C:\Windows\SysWOW64\PING.EXEping localhost9⤵
- Runs ping.exe
PID:10956
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comTra.exe.com o9⤵PID:10908
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.com o10⤵PID:8824
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.com o11⤵PID:10380
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.com o12⤵PID:9956
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.com o13⤵PID:11172
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.com o14⤵PID:9888
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.com o15⤵PID:9572
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.com o16⤵PID:2164
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.com o17⤵PID:9488
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.com o18⤵PID:10496
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.com o19⤵PID:11300
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.com o20⤵PID:11616
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.com o21⤵PID:12028
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.com o22⤵PID:11468
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.com o23⤵PID:12064
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.com o24⤵PID:11844
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.com o25⤵PID:5696
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.com o26⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.com o27⤵PID:12412
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.com o28⤵PID:12740
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.com o29⤵PID:13036
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.com o30⤵PID:13264
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.com o31⤵PID:12580
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.com o32⤵PID:12996
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.com o33⤵PID:12700
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.com o34⤵PID:12168
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.com o35⤵PID:12968
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.com o36⤵PID:13668
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.com o37⤵PID:13796
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tra.exe.com o38⤵PID:14152
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\PBrowFile15.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\PBrowFile15.exe"5⤵PID:8500
-
C:\Users\Admin\AppData\Roaming\2989900.exe"C:\Users\Admin\AppData\Roaming\2989900.exe"6⤵PID:5224
-
-
C:\Users\Admin\AppData\Roaming\7580128.exe"C:\Users\Admin\AppData\Roaming\7580128.exe"6⤵PID:6092
-
-
C:\Users\Admin\AppData\Roaming\2842862.exe"C:\Users\Admin\AppData\Roaming\2842862.exe"6⤵PID:6380
-
-
C:\Users\Admin\AppData\Roaming\2206378.exe"C:\Users\Admin\AppData\Roaming\2206378.exe"6⤵PID:7744
-
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\9840432e051a6fa1192594db02b80a4c1fd73456.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\9840432e051a6fa1192594db02b80a4c1fd73456.exe"5⤵PID:8492
-
-
-
-
-
C:\Users\Admin\Documents\ybDkP2sQ6_pLyun1GoApuo9P.exe"C:\Users\Admin\Documents\ybDkP2sQ6_pLyun1GoApuo9P.exe"2⤵
- Executes dropped EXE
PID:4200 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 6643⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 6763⤵
- Program crash
PID:4244
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 6363⤵
- Program crash
PID:1244
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 6843⤵
- Program crash
PID:4444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 11243⤵
- Program crash
PID:5540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 11043⤵
- Program crash
PID:5996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 11563⤵
- Program crash
PID:5544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 11683⤵
- Program crash
PID:736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 12683⤵
- Program crash
PID:3860
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 12043⤵
- Program crash
PID:6400
-
-
-
C:\Users\Admin\Documents\Juy1Klom0iHRt0cpliJhPTvO.exe"C:\Users\Admin\Documents\Juy1Klom0iHRt0cpliJhPTvO.exe"2⤵
- Executes dropped EXE
PID:4144 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4144 -s 6563⤵
- Program crash
PID:4508
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4144 -s 6683⤵
- Program crash
PID:4952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4144 -s 7163⤵
- Program crash
PID:1520
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4144 -s 6963⤵
- Program crash
PID:5324
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4144 -s 11203⤵
- Program crash
PID:5828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4144 -s 11603⤵
- Program crash
PID:5844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4144 -s 11403⤵
- Program crash
PID:5860
-
-
-
C:\Users\Admin\Documents\3CzjcI0lz_q8pGaAxMLxiexU.exe"C:\Users\Admin\Documents\3CzjcI0lz_q8pGaAxMLxiexU.exe"2⤵
- Executes dropped EXE
PID:4136 -
C:\Users\Admin\Documents\3CzjcI0lz_q8pGaAxMLxiexU.exe"C:\Users\Admin\Documents\3CzjcI0lz_q8pGaAxMLxiexU.exe" -u3⤵PID:4684
-
-
-
C:\Users\Admin\Documents\rwtUE2DGUjdKpne200zgB3n4.exe"C:\Users\Admin\Documents\rwtUE2DGUjdKpne200zgB3n4.exe"2⤵
- Executes dropped EXE
PID:4128
-
-
C:\Users\Admin\Documents\09WJtjb0y0ANJSkCvy24hF8U.exe"C:\Users\Admin\Documents\09WJtjb0y0ANJSkCvy24hF8U.exe"2⤵
- Executes dropped EXE
PID:4120 -
C:\Users\Admin\Documents\J77cmUgJX0OQi4nZtiqUPG2L.exe"C:\Users\Admin\Documents\J77cmUgJX0OQi4nZtiqUPG2L.exe"3⤵PID:5336
-
C:\Users\Admin\Documents\S0ZeflJw9QGVH3JMalTExtbh.exe"C:\Users\Admin\Documents\S0ZeflJw9QGVH3JMalTExtbh.exe"4⤵PID:6164
-
-
C:\Users\Admin\Documents\Q4Bmrp4t55pJu2jOk89erJj3.exe"C:\Users\Admin\Documents\Q4Bmrp4t55pJu2jOk89erJj3.exe"4⤵PID:5668
-
C:\Users\Admin\AppData\Roaming\6081357.exe"C:\Users\Admin\AppData\Roaming\6081357.exe"5⤵PID:5416
-
-
C:\Users\Admin\AppData\Roaming\5444873.exe"C:\Users\Admin\AppData\Roaming\5444873.exe"5⤵PID:2192
-
-
C:\Users\Admin\AppData\Roaming\6561851.exe"C:\Users\Admin\AppData\Roaming\6561851.exe"5⤵PID:6468
-
-
C:\Users\Admin\AppData\Roaming\5139526.exe"C:\Users\Admin\AppData\Roaming\5139526.exe"5⤵PID:5620
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:5900
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:5952
-
-
-
C:\Users\Admin\Documents\B6yowxV8LsKL_sh6fD4dEqTq.exe"C:\Users\Admin\Documents\B6yowxV8LsKL_sh6fD4dEqTq.exe"2⤵
- Executes dropped EXE
PID:4112 -
C:\Users\Admin\AppData\Roaming\6764338.exe"C:\Users\Admin\AppData\Roaming\6764338.exe"3⤵PID:5456
-
-
C:\Users\Admin\AppData\Roaming\8719363.exe"C:\Users\Admin\AppData\Roaming\8719363.exe"3⤵PID:5136
-
-
C:\Users\Admin\AppData\Roaming\7550179.exe"C:\Users\Admin\AppData\Roaming\7550179.exe"3⤵PID:6112
-
-
C:\Users\Admin\AppData\Roaming\5631149.exe"C:\Users\Admin\AppData\Roaming\5631149.exe"3⤵PID:4436
-
-
-
C:\Users\Admin\Documents\Uw2nsLbf3aKDMOvE9SBpKWI8.exe"C:\Users\Admin\Documents\Uw2nsLbf3aKDMOvE9SBpKWI8.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4104
-
-
C:\Users\Admin\Documents\zUJh9p7ry0bJHslkedqN_gmr.exe"C:\Users\Admin\Documents\zUJh9p7ry0bJHslkedqN_gmr.exe"2⤵
- Executes dropped EXE
PID:2208 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 3843⤵
- Program crash
PID:4360
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 4323⤵
- Program crash
PID:1004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 4683⤵
- Program crash
PID:4276
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 6203⤵
- Program crash
PID:4304
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 6563⤵
- Program crash
PID:5436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 6923⤵
- Program crash
PID:5684
-
-
-
C:\Users\Admin\Documents\2dRkySXfpzhrHfXqbMfr2Dh6.exe"C:\Users\Admin\Documents\2dRkySXfpzhrHfXqbMfr2Dh6.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1020
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe"C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:372 -
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
- Executes dropped EXE
PID:5068
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵
- Executes dropped EXE
PID:4164
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:1004
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:5572
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:5804
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:5400
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:4896
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:1516
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:5828
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:1580
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:6232
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:6484
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:6812
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:4332
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:6900
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:4924
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:188
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:644
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:1572
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:7112
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:4276
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:6568
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:4976
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:7604
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:8124
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:8100
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:6652
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:8304
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:8856
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:8296
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:6268
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:9036
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:5360
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:6692
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:4932
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:7508
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:6564
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:5112
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:6556
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:8448
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:8952
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:7648
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:5408
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:7068
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:9352
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:9608
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:9840
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:10072
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:7584
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:8920
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:9704
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:9408
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:1788
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:8208
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:8220
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:7560
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:10164
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:6784
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:9636
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:9988
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:1788
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:5572
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:4952
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:9412
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:6720
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:10088
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:344
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:2328
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:8172
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:1972
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:9664
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:7916
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:10580
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:10916
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:11144
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:4796
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:9720
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:2532
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:3624
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:11200
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:9464
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:11012
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:9708
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:6124
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:11008
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:7536
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:11040
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:10412
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:11472
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:11736
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:11936
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:12284
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:11516
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:10692
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:11616
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:11852
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:11140
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:7976
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:11292
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:11656
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:10776
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:11172
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:12524
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:12756
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:13128
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:12472
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:12796
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:12836
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:11368
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:12732
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:13124
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:12496
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:12452
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:13468
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:13692
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:13908
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:14208
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:13616
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:13888
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:14144
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:13232
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:14184
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:13464
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:14256
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:13820
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:10332
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:11356
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:14340
-
-
C:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exeC:\Users\Admin\Documents\Z93VzqaNWtjd5VRixOVgMODo.exe3⤵PID:14664
-
-
-
C:\Users\Admin\Documents\iZXDunGUmJUrMAjkcm1HiYnD.exe"C:\Users\Admin\Documents\iZXDunGUmJUrMAjkcm1HiYnD.exe"2⤵
- Executes dropped EXE
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Bf4YOJOO.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Bf4YOJOO.exe"3⤵PID:3512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3512 -s 2484⤵
- Program crash
PID:5584
-
-
-
-
C:\Users\Admin\Documents\pn1CRHJihlF7AUiO8r9WkjsW.exe"C:\Users\Admin\Documents\pn1CRHJihlF7AUiO8r9WkjsW.exe"2⤵
- Executes dropped EXE
PID:1764 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im pn1CRHJihlF7AUiO8r9WkjsW.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Documents\pn1CRHJihlF7AUiO8r9WkjsW.exe" & del C:\ProgramData\*.dll & exit3⤵PID:6648
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im pn1CRHJihlF7AUiO8r9WkjsW.exe /f4⤵
- Kills process with taskkill
PID:6860
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 64⤵
- Delays execution with timeout.exe
PID:1396
-
-
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe"C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2624 -
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵
- Executes dropped EXE
PID:5092
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:2400
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:5652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5652 -s 244⤵
- Program crash
PID:6140
-
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:6020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6020 -s 244⤵
- Program crash
PID:6092
-
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:4860
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:4920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4920 -s 244⤵
- Program crash
PID:5940
-
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:5200
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:4376
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:5976
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:6328
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:6632
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:6952
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:6120
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:6284
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:5488
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:6080
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:6616
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:6276
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:5520
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:1764
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:3288
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:7240
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:7844
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:7836
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:7732
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:8196
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:8664
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:9180
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:9144
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:7780
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:8372
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:8964
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:6340
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:9188
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:7648
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:8620
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:7500
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:4092
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:8188
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:8956
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:740
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:9276
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:9520
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:9776
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:10008
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:2016
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:8604
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:9616
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:9856
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:10104
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:4944
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:8368
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:8652
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:10124
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:8332
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:9908
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:2028
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:5800
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:6936
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:8600
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:9544
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:5708
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:7908
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:1360
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:9740
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:9456
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:8860
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:9936
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:10780
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:11036
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:11256
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:7164
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:10772
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:10848
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:11088
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:7064
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:10696
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:11244
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:2640
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:10696
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:11052
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:1264
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:2024
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:11400
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:11656
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:11860
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:12192
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:11420
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:11760
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:11964
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:11592
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:10944
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:11896
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:12164
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:10768
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:11268
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:9768
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:12604
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:12912
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:13244
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:12664
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:12412
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:6188
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:12476
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:12644
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:12876
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:12752
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:3756
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:13596
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:13856
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:14124
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:13528
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:13868
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:14000
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:13632
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:14292
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:13104
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:13716
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:13752
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:12036
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:13536
-
-
C:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exeC:\Users\Admin\Documents\mhWe_FDhSpNOUE8tGRp7tzbG.exe3⤵PID:14608
-
-
-
C:\Users\Admin\Documents\eVtDy2kmSwURtva2vBMA9qU6.exe"C:\Users\Admin\Documents\eVtDy2kmSwURtva2vBMA9qU6.exe"2⤵
- Executes dropped EXE
PID:1256 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\0356011180.exe"3⤵PID:3868
-
C:\Users\Admin\AppData\Local\Temp\0356011180.exe"C:\Users\Admin\AppData\Local\Temp\0356011180.exe"4⤵PID:5568
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "eVtDy2kmSwURtva2vBMA9qU6.exe" /f & erase "C:\Users\Admin\Documents\eVtDy2kmSwURtva2vBMA9qU6.exe" & exit3⤵PID:4656
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "eVtDy2kmSwURtva2vBMA9qU6.exe" /f4⤵
- Kills process with taskkill
PID:5912
-
-
-
-
C:\Users\Admin\Documents\zsI5t_eJTJVnSpRUvfyY0ZV0.exe"C:\Users\Admin\Documents\zsI5t_eJTJVnSpRUvfyY0ZV0.exe"2⤵
- Executes dropped EXE
PID:2540 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBScRipT: CLOSe ( CreATEoBjECT ("wscrIpt.SheLL" ). RUn ( "C:\Windows\system32\cmd.exe /c TYpE ""C:\Users\Admin\Documents\zsI5t_eJTJVnSpRUvfyY0ZV0.exe"" > KRkNvH~YgUUt9O.exE && STarT KRKNvH~yGuUT9O.eXE -pA1IQsAATOS0kxrmeOcrgfdjncUG & iF """" == """" for %N In ( ""C:\Users\Admin\Documents\zsI5t_eJTJVnSpRUvfyY0ZV0.exe"" ) do taskkill -F /Im ""%~nXN"" " , 0, True ) )3⤵PID:4572
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c TYpE "C:\Users\Admin\Documents\zsI5t_eJTJVnSpRUvfyY0ZV0.exe" > KRkNvH~YgUUt9O.exE && STarT KRKNvH~yGuUT9O.eXE -pA1IQsAATOS0kxrmeOcrgfdjncUG & iF "" == "" for %N In ("C:\Users\Admin\Documents\zsI5t_eJTJVnSpRUvfyY0ZV0.exe" ) do taskkill -F /Im "%~nXN"4⤵PID:4124
-
C:\Users\Admin\AppData\Local\Temp\KRkNvH~YgUUt9O.exEKRKNvH~yGuUT9O.eXE -pA1IQsAATOS0kxrmeOcrgfdjncUG5⤵PID:2184
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBScRipT: CLOSe ( CreATEoBjECT ("wscrIpt.SheLL" ). RUn ( "C:\Windows\system32\cmd.exe /c TYpE ""C:\Users\Admin\AppData\Local\Temp\KRkNvH~YgUUt9O.exE"" > KRkNvH~YgUUt9O.exE && STarT KRKNvH~yGuUT9O.eXE -pA1IQsAATOS0kxrmeOcrgfdjncUG & iF ""-pA1IQsAATOS0kxrmeOcrgfdjncUG "" == """" for %N In ( ""C:\Users\Admin\AppData\Local\Temp\KRkNvH~YgUUt9O.exE"" ) do taskkill -F /Im ""%~nXN"" " , 0, True ) )6⤵PID:5948
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c TYpE "C:\Users\Admin\AppData\Local\Temp\KRkNvH~YgUUt9O.exE" > KRkNvH~YgUUt9O.exE && STarT KRKNvH~yGuUT9O.eXE -pA1IQsAATOS0kxrmeOcrgfdjncUG & iF "-pA1IQsAATOS0kxrmeOcrgfdjncUG " == "" for %N In ("C:\Users\Admin\AppData\Local\Temp\KRkNvH~YgUUt9O.exE" ) do taskkill -F /Im "%~nXN"7⤵PID:5904
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" .\p_ZPP.J p6⤵PID:5652
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -F /Im "zsI5t_eJTJVnSpRUvfyY0ZV0.exe"5⤵
- Kills process with taskkill
PID:6244
-
-
-
-
-
C:\Users\Admin\Documents\3XigsTU6eAHS_B0eWt2m9GcW.exe"C:\Users\Admin\Documents\3XigsTU6eAHS_B0eWt2m9GcW.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:808 -
C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"3⤵PID:3152
-
-
C:\Program Files (x86)\Company\NewProduct\cutm3.exe"C:\Program Files (x86)\Company\NewProduct\cutm3.exe"3⤵PID:1244
-
-
C:\Program Files (x86)\Company\NewProduct\inst001.exe"C:\Program Files (x86)\Company\NewProduct\inst001.exe"3⤵PID:4244
-
-
-
C:\Users\Admin\Documents\hZuy_WzZLLKl_8QrkmtWfhHi.exe"C:\Users\Admin\Documents\hZuy_WzZLLKl_8QrkmtWfhHi.exe"2⤵PID:4320
-
C:\Users\Admin\AppData\Roaming\2280841.exe"C:\Users\Admin\AppData\Roaming\2280841.exe"3⤵PID:4748
-
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"4⤵PID:6668
-
-
-
C:\Users\Admin\AppData\Roaming\8073300.exe"C:\Users\Admin\AppData\Roaming\8073300.exe"3⤵PID:5364
-
-
C:\Users\Admin\AppData\Roaming\7550179.exe"C:\Users\Admin\AppData\Roaming\7550179.exe"3⤵PID:6100
-
-
C:\Users\Admin\AppData\Roaming\4069671.exe"C:\Users\Admin\AppData\Roaming\4069671.exe"3⤵PID:5480
-
-
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\OneDriveStandaloneUpdater.exeC:\Users\Admin\AppData\Local\Microsoft\OneDrive\OneDriveStandaloneUpdater.exe1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\StandaloneUpdater\OneDriveSetup.exe"C:\Users\Admin\AppData\Local\Microsoft\OneDrive\StandaloneUpdater\OneDriveSetup.exe" /update2⤵PID:4224
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\StandaloneUpdater\OneDriveSetup.exeC:\Users\Admin\AppData\Local\Microsoft\OneDrive\StandaloneUpdater\OneDriveSetup.exe /update /peruser /childprocess3⤵PID:14296
-
-
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeC2RClient.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeC2RClient.exe" /WatchService1⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:572
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeC2RClient.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeC2RClient.exe" /frequentupdate SCHEDULEDTASK displaylevel=False1⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:212
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:6208 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:6228
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:6596
-
C:\Windows\system32\rUNdlL32.eXerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main1⤵
- Process spawned unexpected child process
PID:1380 -
C:\Windows\SysWOW64\rundll32.exerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main2⤵PID:2640
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s seclogon1⤵PID:12380