Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
42s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/08/2024, 18:50
Static task
static1
Behavioral task
behavioral1
Sample
TextUtils.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
TextUtils.exe
Resource
win10v2004-20240802-en
General
-
Target
TextUtils.exe
-
Size
398KB
-
MD5
1c09825dd1fa0637c1d5089a65702ede
-
SHA1
a1da9a5c8d8b79689c9153adf459960fbccde80b
-
SHA256
3eadfa021e89e69ffe4dbf5c3d3eec4843ceb7ad5033498477b914ba6316657b
-
SHA512
948252d25c6a481432c52c762637c66d764f7fd90b0fa65d7c44b21af048b87950f918831b7d716fe65f6d10da42c337cb8b5860f2a223d7dc4c8f9d38d9fc00
-
SSDEEP
12288:kdJoSpPkFtttttttCttttttttttttttpst8ZcxruaZ4A3G31111111111111111/:kdlPgrua13Q11111111111111111D11x
Malware Config
Extracted
redline
UltimateCrackPack
51.83.170.23:16128
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/7260-90-0x0000000000400000-0x000000000041E000-memory.dmp family_redline -
SectopRAT payload 1 IoCs
resource yara_rule behavioral2/memory/7260-90-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation TextUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation TextUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation TextUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation TextUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation TextUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation TextUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation TextUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation TextUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation TextUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation TextUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation TextUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation TextUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation TextUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation TextUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation TextUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation TextUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation TextUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation TextUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation TextUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation TextUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation TextUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation TextUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation TextUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation TextUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation TextUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation TextUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation TextUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation TextUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation TextUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation TextUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation TextUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation TextUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation TextUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation TextUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation TextUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation TextUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation TextUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation TextUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation TextUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation TextUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation TextUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation TextUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation TextUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation TextUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation TextUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation TextUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation TextUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation TextUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation TextUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation TextUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation TextUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation TextUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation TextUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation TextUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation TextUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation TextUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation TextUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation TextUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation TextUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation TextUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation TextUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation TextUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation TextUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation TextUtils.exe -
Executes dropped EXE 64 IoCs
pid Process 5100 Ultimate-Crack-Pack.exe 4568 Ultimate-Crack-Pack.exe 3116 Ultimate-Crack-Pack.exe 2892 Ultimate-Crack-Pack.exe 1900 Ultimate-Crack-Pack.exe 1180 Ultimate-Crack-Pack.exe 548 Ultimate-Crack-Pack.exe 2672 Ultimate-Crack-Pack.exe 2288 Ultimate-Crack-Pack.exe 3688 Ultimate-Crack-Pack.exe 3704 Ultimate-Crack-Pack.exe 1380 Ultimate-Crack-Pack.exe 2596 Ultimate-Crack-Pack.exe 4884 Ultimate-Crack-Pack.exe 1020 Ultimate-Crack-Pack.exe 784 Ultimate-Crack-Pack.exe 4000 Ultimate-Crack-Pack.exe 2652 Ultimate-Crack-Pack.exe 1864 Ultimate-Crack-Pack.exe 3192 Ultimate-Crack-Pack.exe 2496 Ultimate-Crack-Pack.exe 3676 Ultimate-Crack-Pack.exe 1300 Ultimate-Crack-Pack.exe 4184 Ultimate-Crack-Pack.exe 4132 Ultimate-Crack-Pack.exe 4148 Ultimate-Crack-Pack.exe 1956 Ultimate-Crack-Pack.exe 2924 Ultimate-Crack-Pack.exe 4712 Ultimate-Crack-Pack.exe 1604 Ultimate-Crack-Pack.exe 3448 Ultimate-Crack-Pack.exe 5012 Ultimate-Crack-Pack.exe 3076 Ultimate-Crack-Pack.exe 3040 Ultimate-Crack-Pack.exe 4308 Ultimate-Crack-Pack.exe 2660 Ultimate-Crack-Pack.exe 1640 Ultimate-Crack-Pack.exe 3472 Ultimate-Crack-Pack.exe 5072 Ultimate-Crack-Pack.exe 3184 Ultimate-Crack-Pack.exe 2136 Ultimate-Crack-Pack.exe 1044 Ultimate-Crack-Pack.exe 1096 Ultimate-Crack-Pack.exe 2228 Ultimate-Crack-Pack.exe 3268 Ultimate-Crack-Pack.exe 864 Ultimate-Crack-Pack.exe 4624 Ultimate-Crack-Pack.exe 4836 Ultimate-Crack-Pack.exe 4768 Ultimate-Crack-Pack.exe 2284 Ultimate-Crack-Pack.exe 2512 Ultimate-Crack-Pack.exe 1740 Ultimate-Crack-Pack.exe 4512 Ultimate-Crack-Pack.exe 3540 Ultimate-Crack-Pack.exe 4688 Ultimate-Crack-Pack.exe 4432 Ultimate-Crack-Pack.exe 1680 Ultimate-Crack-Pack.exe 3476 Ultimate-Crack-Pack.exe 212 Ultimate-Crack-Pack.exe 772 Ultimate-Crack-Pack.exe 3960 Ultimate-Crack-Pack.exe 2832 Ultimate-Crack-Pack.exe 5172 Ultimate-Crack-Pack.exe 5248 Ultimate-Crack-Pack.exe -
pid Process 7268 powershell.exe 7876 powershell.exe 8248 powershell.exe 10700 powershell.exe 1664 powershell.exe 4188 powershell.exe 7200 powershell.exe 9004 powershell.exe 9520 powershell.exe 9864 powershell.exe 10688 powershell.exe 9820 powershell.exe 5476 powershell.exe 8832 powershell.exe 7576 powershell.exe 7228 powershell.exe 8856 powershell.exe 10088 powershell.exe 11636 powershell.exe 8580 powershell.exe 3800 powershell.exe 7412 powershell.exe 1032 powershell.exe 7756 powershell.exe 9656 powershell.exe 11176 powershell.exe 8316 powershell.exe 1676 powershell.exe 10640 powershell.exe 12596 powershell.exe 4500 powershell.exe 9108 powershell.exe 2524 powershell.exe 10664 powershell.exe 11568 powershell.exe 8568 powershell.exe 8908 powershell.exe 9040 powershell.exe 3092 powershell.exe 11528 powershell.exe 9160 powershell.exe 7548 powershell.exe 8636 powershell.exe 1048 powershell.exe 9440 powershell.exe 10612 powershell.exe 11020 powershell.exe 2148 powershell.exe 8360 powershell.exe 9300 powershell.exe 10092 powershell.exe 7240 powershell.exe 8588 powershell.exe 8576 powershell.exe 9236 powershell.exe 9064 powershell.exe 2836 powershell.exe 10792 powershell.exe 11184 powershell.exe 8256 powershell.exe 6136 powershell.exe 11672 powershell.exe 4384 powershell.exe 3176 powershell.exe -
Looks up external IP address via web service 28 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 130 ipinfo.io 54 ipinfo.io 62 ipinfo.io 119 ipinfo.io 129 ipinfo.io 50 ipinfo.io 71 ipinfo.io 42 ipinfo.io 47 ipinfo.io 49 ipinfo.io 60 ipinfo.io 31 api.ipify.org 37 ipinfo.io 39 ipinfo.io 40 ipinfo.io 68 ipinfo.io 73 ipinfo.io 117 ipinfo.io 69 ipinfo.io 132 ipinfo.io 135 ipinfo.io 30 api.ipify.org 116 ipinfo.io 122 ipinfo.io 29 api.ipify.org 128 ipinfo.io 136 ipinfo.io 131 ipinfo.io -
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 3116 set thread context of 7260 3116 Ultimate-Crack-Pack.exe 413 PID 4568 set thread context of 7336 4568 Ultimate-Crack-Pack.exe 418 PID 2892 set thread context of 7344 2892 Ultimate-Crack-Pack.exe 417 PID 5100 set thread context of 7580 5100 Ultimate-Crack-Pack.exe 426 PID 1900 set thread context of 7536 1900 Ultimate-Crack-Pack.exe 883 PID 1180 set thread context of 7852 1180 Ultimate-Crack-Pack.exe 435 PID 2288 set thread context of 7472 2288 Ultimate-Crack-Pack.exe 440 PID 548 set thread context of 7180 548 Ultimate-Crack-Pack.exe 442 PID 2672 set thread context of 7524 2672 Ultimate-Crack-Pack.exe 443 PID 3704 set thread context of 1600 3704 Ultimate-Crack-Pack.exe 448 PID 3688 set thread context of 7496 3688 Ultimate-Crack-Pack.exe 454 PID 2596 set thread context of 8324 2596 Ultimate-Crack-Pack.exe 460 PID 1380 set thread context of 8384 1380 Ultimate-Crack-Pack.exe 461 PID 1020 set thread context of 8392 1020 Ultimate-Crack-Pack.exe 462 PID 4884 set thread context of 8596 4884 Ultimate-Crack-Pack.exe 470 PID 1864 set thread context of 8644 1864 Ultimate-Crack-Pack.exe 472 PID 784 set thread context of 8716 784 Ultimate-Crack-Pack.exe 474 PID 4000 set thread context of 8724 4000 Ultimate-Crack-Pack.exe 475 PID 2496 set thread context of 8848 2496 Ultimate-Crack-Pack.exe 480 PID 2652 set thread context of 8864 2652 Ultimate-Crack-Pack.exe 482 PID 1300 set thread context of 9012 1300 Ultimate-Crack-Pack.exe 490 PID 3676 set thread context of 9048 3676 Ultimate-Crack-Pack.exe 492 PID 4184 set thread context of 9116 4184 Ultimate-Crack-Pack.exe 496 PID 4132 set thread context of 7804 4132 Ultimate-Crack-Pack.exe 501 PID 2924 set thread context of 2256 2924 Ultimate-Crack-Pack.exe 505 PID 3192 set thread context of 8788 3192 Ultimate-Crack-Pack.exe 513 PID 4148 set thread context of 8584 4148 Ultimate-Crack-Pack.exe 515 PID 1956 set thread context of 9252 1956 Ultimate-Crack-Pack.exe 521 PID 3040 set thread context of 9528 3040 Ultimate-Crack-Pack.exe 527 PID 3076 set thread context of 9604 3076 Ultimate-Crack-Pack.exe 528 PID 4308 set thread context of 9612 4308 Ultimate-Crack-Pack.exe 529 PID 2660 set thread context of 9644 2660 Ultimate-Crack-Pack.exe 533 PID 5012 set thread context of 9664 5012 Ultimate-Crack-Pack.exe 535 PID 1604 set thread context of 9680 1604 Ultimate-Crack-Pack.exe 536 PID 1640 set thread context of 9828 1640 Ultimate-Crack-Pack.exe 538 PID 1096 set thread context of 9876 1096 Ultimate-Crack-Pack.exe 540 PID 5072 set thread context of 9932 5072 Ultimate-Crack-Pack.exe 545 PID 4712 set thread context of 9940 4712 Ultimate-Crack-Pack.exe 546 PID 3448 set thread context of 10176 3448 Ultimate-Crack-Pack.exe 554 PID 3472 set thread context of 2680 3472 Ultimate-Crack-Pack.exe 559 PID 3184 set thread context of 8740 3184 Ultimate-Crack-Pack.exe 566 PID 2512 set thread context of 2592 2512 Ultimate-Crack-Pack.exe 567 PID 2284 set thread context of 9284 2284 Ultimate-Crack-Pack.exe 570 PID 1044 set thread context of 3468 1044 Ultimate-Crack-Pack.exe 572 PID 864 set thread context of 1864 864 Ultimate-Crack-Pack.exe 574 PID 2136 set thread context of 9692 2136 Ultimate-Crack-Pack.exe 578 PID 4624 set thread context of 9816 4624 Ultimate-Crack-Pack.exe 581 PID 4836 set thread context of 624 4836 Ultimate-Crack-Pack.exe 586 PID 3268 set thread context of 3044 3268 Ultimate-Crack-Pack.exe 587 PID 4768 set thread context of 9232 4768 Ultimate-Crack-Pack.exe 594 PID 3476 set thread context of 10384 3476 Ultimate-Crack-Pack.exe 595 PID 3540 set thread context of 10624 3540 Ultimate-Crack-Pack.exe 599 PID 2832 set thread context of 10648 2832 Ultimate-Crack-Pack.exe 602 PID 1740 set thread context of 10656 1740 Ultimate-Crack-Pack.exe 603 PID 2228 set thread context of 10672 2228 Ultimate-Crack-Pack.exe 605 PID 4688 set thread context of 10708 4688 Ultimate-Crack-Pack.exe 609 PID 4512 set thread context of 10716 4512 Ultimate-Crack-Pack.exe 610 PID 3960 set thread context of 10800 3960 Ultimate-Crack-Pack.exe 612 PID 772 set thread context of 11200 772 Ultimate-Crack-Pack.exe 627 PID 4432 set thread context of 11224 4432 Ultimate-Crack-Pack.exe 629 PID 5248 set thread context of 3724 5248 Ultimate-Crack-Pack.exe 635 PID 1680 set thread context of 10160 1680 Ultimate-Crack-Pack.exe 638 PID 5328 set thread context of 2952 5328 Ultimate-Crack-Pack.exe 644 PID 5172 set thread context of 10636 5172 Ultimate-Crack-Pack.exe 645 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 38 IoCs
pid pid_target Process procid_target 12472 4836 WerFault.exe 691 11476 9236 WerFault.exe 520 5704 8840 WerFault.exe 479 8620 7012 WerFault.exe 344 9204 5936 WerFault.exe 266 10508 5228 WerFault.exe 238 12104 7128 WerFault.exe 326 8816 7804 WerFault.exe 501 6952 6264 WerFault.exe 304 8280 6756 WerFault.exe 356 6812 5608 WerFault.exe 300 7036 5368 WerFault.exe 298 6996 4472 WerFault.exe 296 7412 6432 WerFault.exe 308 12948 6348 WerFault.exe 306 3972 6664 WerFault.exe 314 7536 6588 WerFault.exe 312 7964 5712 WerFault.exe 224 3976 6740 WerFault.exe 316 3896 5660 WerFault.exe 246 8168 6896 WerFault.exe 320 7100 6972 WerFault.exe 322 8604 7048 WerFault.exe 324 7592 6816 WerFault.exe 318 9264 5376 WerFault.exe 286 8692 5920 WerFault.exe 278 8060 3556 WerFault.exe 292 8456 5212 WerFault.exe 280 6780 5768 WerFault.exe 274 6000 4812 WerFault.exe 294 7956 6188 WerFault.exe 302 8148 6652 WerFault.exe 364 6340 6364 WerFault.exe 332 7460 6416 WerFault.exe 362 7936 6508 WerFault.exe 310 8160 11508 WerFault.exe 815 12624 12500 WerFault.exe 699 12520 11200 WerFault.exe 627 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ultimate-Crack-Pack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ultimate-Crack-Pack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ultimate-Crack-Pack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ultimate-Crack-Pack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ultimate-Crack-Pack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ultimate-Crack-Pack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ultimate-Crack-Pack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ultimate-Crack-Pack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ultimate-Crack-Pack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ultimate-Crack-Pack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ultimate-Crack-Pack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ultimate-Crack-Pack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ultimate-Crack-Pack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ultimate-Crack-Pack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ultimate-Crack-Pack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ultimate-Crack-Pack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ultimate-Crack-Pack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ultimate-Crack-Pack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ultimate-Crack-Pack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ultimate-Crack-Pack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ultimate-Crack-Pack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ultimate-Crack-Pack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ultimate-Crack-Pack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ultimate-Crack-Pack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ultimate-Crack-Pack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ultimate-Crack-Pack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ultimate-Crack-Pack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ultimate-Crack-Pack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ultimate-Crack-Pack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ultimate-Crack-Pack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ultimate-Crack-Pack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ultimate-Crack-Pack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ultimate-Crack-Pack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ultimate-Crack-Pack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ultimate-Crack-Pack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ultimate-Crack-Pack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ultimate-Crack-Pack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ultimate-Crack-Pack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ultimate-Crack-Pack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ultimate-Crack-Pack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ultimate-Crack-Pack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ultimate-Crack-Pack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ultimate-Crack-Pack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ultimate-Crack-Pack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ultimate-Crack-Pack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ultimate-Crack-Pack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ultimate-Crack-Pack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2672 Ultimate-Crack-Pack.exe 2672 Ultimate-Crack-Pack.exe 2672 Ultimate-Crack-Pack.exe 2672 Ultimate-Crack-Pack.exe 1380 Ultimate-Crack-Pack.exe 1380 Ultimate-Crack-Pack.exe 1380 Ultimate-Crack-Pack.exe 1380 Ultimate-Crack-Pack.exe 1020 Ultimate-Crack-Pack.exe 1020 Ultimate-Crack-Pack.exe 1020 Ultimate-Crack-Pack.exe 1020 Ultimate-Crack-Pack.exe 7200 powershell.exe 7200 powershell.exe 7548 powershell.exe 7548 powershell.exe 7268 powershell.exe 7268 powershell.exe 7240 powershell.exe 7240 powershell.exe 3192 Ultimate-Crack-Pack.exe 3192 Ultimate-Crack-Pack.exe 3192 Ultimate-Crack-Pack.exe 3192 Ultimate-Crack-Pack.exe 7876 powershell.exe 7876 powershell.exe 5072 Ultimate-Crack-Pack.exe 5072 Ultimate-Crack-Pack.exe 5072 Ultimate-Crack-Pack.exe 5072 Ultimate-Crack-Pack.exe 4712 Ultimate-Crack-Pack.exe 4712 Ultimate-Crack-Pack.exe 4712 Ultimate-Crack-Pack.exe 4712 Ultimate-Crack-Pack.exe 3448 Ultimate-Crack-Pack.exe 3448 Ultimate-Crack-Pack.exe 3448 Ultimate-Crack-Pack.exe 3448 Ultimate-Crack-Pack.exe 7576 powershell.exe 7576 powershell.exe 4768 Ultimate-Crack-Pack.exe 4768 Ultimate-Crack-Pack.exe 4768 Ultimate-Crack-Pack.exe 4768 Ultimate-Crack-Pack.exe 5172 Ultimate-Crack-Pack.exe 5172 Ultimate-Crack-Pack.exe 5172 Ultimate-Crack-Pack.exe 5172 Ultimate-Crack-Pack.exe 212 Ultimate-Crack-Pack.exe 212 Ultimate-Crack-Pack.exe 212 Ultimate-Crack-Pack.exe 212 Ultimate-Crack-Pack.exe 212 Ultimate-Crack-Pack.exe 212 Ultimate-Crack-Pack.exe 212 Ultimate-Crack-Pack.exe 212 Ultimate-Crack-Pack.exe 5636 Ultimate-Crack-Pack.exe 5636 Ultimate-Crack-Pack.exe 5636 Ultimate-Crack-Pack.exe 5636 Ultimate-Crack-Pack.exe 1032 powershell.exe 1032 powershell.exe 7412 powershell.exe 7412 powershell.exe -
Suspicious use of AdjustPrivilegeToken 34 IoCs
description pid Process Token: SeDebugPrivilege 2672 Ultimate-Crack-Pack.exe Token: SeDebugPrivilege 7260 RegAsm.exe Token: SeDebugPrivilege 1380 Ultimate-Crack-Pack.exe Token: SeDebugPrivilege 1020 Ultimate-Crack-Pack.exe Token: SeDebugPrivilege 7580 RegAsm.exe Token: SeDebugPrivilege 7200 powershell.exe Token: SeDebugPrivilege 7548 powershell.exe Token: SeDebugPrivilege 7268 powershell.exe Token: SeDebugPrivilege 7240 powershell.exe Token: SeDebugPrivilege 7576 powershell.exe Token: SeDebugPrivilege 3192 Ultimate-Crack-Pack.exe Token: SeDebugPrivilege 7344 RegAsm.exe Token: SeDebugPrivilege 7536 RegAsm.exe Token: SeDebugPrivilege 7876 powershell.exe Token: SeDebugPrivilege 1600 RegAsm.exe Token: SeDebugPrivilege 5072 Ultimate-Crack-Pack.exe Token: SeDebugPrivilege 3448 Ultimate-Crack-Pack.exe Token: SeDebugPrivilege 4712 Ultimate-Crack-Pack.exe Token: SeDebugPrivilege 7336 RegAsm.exe Token: SeDebugPrivilege 7472 RegAsm.exe Token: SeDebugPrivilege 7852 RegAsm.exe Token: SeDebugPrivilege 4768 Ultimate-Crack-Pack.exe Token: SeDebugPrivilege 7524 RegAsm.exe Token: SeDebugPrivilege 5172 Ultimate-Crack-Pack.exe Token: SeDebugPrivilege 212 Ultimate-Crack-Pack.exe Token: SeDebugPrivilege 8384 RegAsm.exe Token: SeDebugPrivilege 5636 Ultimate-Crack-Pack.exe Token: SeDebugPrivilege 7180 RegAsm.exe Token: SeDebugPrivilege 8324 RegAsm.exe Token: SeDebugPrivilege 1032 powershell.exe Token: SeDebugPrivilege 7412 powershell.exe Token: SeDebugPrivilege 7228 powershell.exe Token: SeDebugPrivilege 7496 RegAsm.exe Token: SeDebugPrivilege 8316 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1472 wrote to memory of 5100 1472 TextUtils.exe 84 PID 1472 wrote to memory of 5100 1472 TextUtils.exe 84 PID 1472 wrote to memory of 5100 1472 TextUtils.exe 84 PID 1472 wrote to memory of 4340 1472 TextUtils.exe 85 PID 1472 wrote to memory of 4340 1472 TextUtils.exe 85 PID 4340 wrote to memory of 4568 4340 TextUtils.exe 86 PID 4340 wrote to memory of 4568 4340 TextUtils.exe 86 PID 4340 wrote to memory of 4568 4340 TextUtils.exe 86 PID 4340 wrote to memory of 4748 4340 TextUtils.exe 87 PID 4340 wrote to memory of 4748 4340 TextUtils.exe 87 PID 4748 wrote to memory of 3116 4748 TextUtils.exe 88 PID 4748 wrote to memory of 3116 4748 TextUtils.exe 88 PID 4748 wrote to memory of 3116 4748 TextUtils.exe 88 PID 4748 wrote to memory of 400 4748 TextUtils.exe 89 PID 4748 wrote to memory of 400 4748 TextUtils.exe 89 PID 400 wrote to memory of 2892 400 TextUtils.exe 91 PID 400 wrote to memory of 2892 400 TextUtils.exe 91 PID 400 wrote to memory of 2892 400 TextUtils.exe 91 PID 400 wrote to memory of 5108 400 TextUtils.exe 92 PID 400 wrote to memory of 5108 400 TextUtils.exe 92 PID 5108 wrote to memory of 1900 5108 TextUtils.exe 93 PID 5108 wrote to memory of 1900 5108 TextUtils.exe 93 PID 5108 wrote to memory of 1900 5108 TextUtils.exe 93 PID 5108 wrote to memory of 4500 5108 TextUtils.exe 94 PID 5108 wrote to memory of 4500 5108 TextUtils.exe 94 PID 4500 wrote to memory of 1180 4500 TextUtils.exe 95 PID 4500 wrote to memory of 1180 4500 TextUtils.exe 95 PID 4500 wrote to memory of 1180 4500 TextUtils.exe 95 PID 4500 wrote to memory of 3564 4500 TextUtils.exe 96 PID 4500 wrote to memory of 3564 4500 TextUtils.exe 96 PID 3564 wrote to memory of 548 3564 TextUtils.exe 98 PID 3564 wrote to memory of 548 3564 TextUtils.exe 98 PID 3564 wrote to memory of 548 3564 TextUtils.exe 98 PID 3564 wrote to memory of 2464 3564 TextUtils.exe 99 PID 3564 wrote to memory of 2464 3564 TextUtils.exe 99 PID 2464 wrote to memory of 2672 2464 TextUtils.exe 100 PID 2464 wrote to memory of 2672 2464 TextUtils.exe 100 PID 2464 wrote to memory of 2672 2464 TextUtils.exe 100 PID 2464 wrote to memory of 4104 2464 TextUtils.exe 101 PID 2464 wrote to memory of 4104 2464 TextUtils.exe 101 PID 4104 wrote to memory of 2288 4104 TextUtils.exe 102 PID 4104 wrote to memory of 2288 4104 TextUtils.exe 102 PID 4104 wrote to memory of 2288 4104 TextUtils.exe 102 PID 4104 wrote to memory of 4132 4104 TextUtils.exe 134 PID 4104 wrote to memory of 4132 4104 TextUtils.exe 134 PID 4132 wrote to memory of 3688 4132 TextUtils.exe 104 PID 4132 wrote to memory of 3688 4132 TextUtils.exe 104 PID 4132 wrote to memory of 3688 4132 TextUtils.exe 104 PID 4132 wrote to memory of 4396 4132 TextUtils.exe 105 PID 4132 wrote to memory of 4396 4132 TextUtils.exe 105 PID 4396 wrote to memory of 3704 4396 TextUtils.exe 106 PID 4396 wrote to memory of 3704 4396 TextUtils.exe 106 PID 4396 wrote to memory of 3704 4396 TextUtils.exe 106 PID 4396 wrote to memory of 864 4396 TextUtils.exe 176 PID 4396 wrote to memory of 864 4396 TextUtils.exe 176 PID 864 wrote to memory of 1380 864 TextUtils.exe 108 PID 864 wrote to memory of 1380 864 TextUtils.exe 108 PID 864 wrote to memory of 1380 864 TextUtils.exe 108 PID 864 wrote to memory of 4432 864 TextUtils.exe 196 PID 864 wrote to memory of 4432 864 TextUtils.exe 196 PID 4432 wrote to memory of 2596 4432 TextUtils.exe 110 PID 4432 wrote to memory of 2596 4432 TextUtils.exe 110 PID 4432 wrote to memory of 2596 4432 TextUtils.exe 110 PID 4432 wrote to memory of 432 4432 TextUtils.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5100 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe' -Value '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration\msconfig.exe.exe"' -PropertyType 'String'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:7548
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:7580 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:7604
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4568 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe' -Value '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration\msconfig.exe.exe"' -PropertyType 'String'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:7240
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:7336
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3116 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe' -Value '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration\msconfig.exe.exe"' -PropertyType 'String'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:7200
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:7260
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2892 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe' -Value '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration\msconfig.exe.exe"' -PropertyType 'String'6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:7268
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:7344
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"5⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1900 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe' -Value '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration\msconfig.exe.exe"' -PropertyType 'String'7⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:7576
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"7⤵
- Suspicious use of AdjustPrivilegeToken
PID:7536
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"6⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1180 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe' -Value '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration\msconfig.exe.exe"' -PropertyType 'String'8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:7876
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"8⤵
- Suspicious use of AdjustPrivilegeToken
PID:7852
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"7⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:548 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe' -Value '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration\msconfig.exe.exe"' -PropertyType 'String'9⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:7228
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"9⤵
- Suspicious use of AdjustPrivilegeToken
PID:7180
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"8⤵
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2672 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"10⤵PID:7172
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"10⤵
- Suspicious use of AdjustPrivilegeToken
PID:7524
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"9⤵
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"10⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2288 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe' -Value '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration\msconfig.exe.exe"' -PropertyType 'String'11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:7412 -
C:\Windows\SysWOW64\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "0" "7412" "1920" "1876" "1924" "0" "0" "1928" "0" "0" "0" "0" "0"12⤵PID:1660
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"11⤵
- Suspicious use of AdjustPrivilegeToken
PID:7472
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"10⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3688 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe' -Value '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration\msconfig.exe.exe"' -PropertyType 'String'12⤵
- Command and Scripting Interpreter: PowerShell
PID:7756
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"12⤵
- Suspicious use of AdjustPrivilegeToken
PID:7496
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"11⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"12⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3704 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe' -Value '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration\msconfig.exe.exe"' -PropertyType 'String'13⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1032 -
C:\Windows\SysWOW64\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "0" "1032" "2360" "2120" "2364" "0" "0" "2368" "0" "0" "0" "0" "0"14⤵PID:5404
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"13⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1600
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"12⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1380 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"14⤵PID:8304
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"14⤵
- Suspicious use of AdjustPrivilegeToken
PID:8384
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"13⤵
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"14⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2596 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe' -Value '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration\msconfig.exe.exe"' -PropertyType 'String'15⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:8316
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"15⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:8324
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"14⤵
- Checks computer location settings
PID:432 -
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4884 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe' -Value '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration\msconfig.exe.exe"' -PropertyType 'String'16⤵
- Command and Scripting Interpreter: PowerShell
PID:8588
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"16⤵PID:8596
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"15⤵
- Checks computer location settings
PID:3908 -
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"16⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1020 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"17⤵PID:8296
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"17⤵PID:8392
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"16⤵
- Checks computer location settings
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:784 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe' -Value '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration\msconfig.exe.exe"' -PropertyType 'String'18⤵
- Command and Scripting Interpreter: PowerShell
PID:8568
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"18⤵PID:8716
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"17⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"18⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4000 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe' -Value '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration\msconfig.exe.exe"' -PropertyType 'String'19⤵
- Command and Scripting Interpreter: PowerShell
PID:8576
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"19⤵PID:8724
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"18⤵
- Checks computer location settings
PID:3176 -
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2652 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe' -Value '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration\msconfig.exe.exe"' -PropertyType 'String'20⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:8856
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"20⤵PID:8864
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"19⤵PID:1892
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"20⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1864 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe' -Value '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration\msconfig.exe.exe"' -PropertyType 'String'21⤵
- Command and Scripting Interpreter: PowerShell
PID:8636
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"21⤵PID:8644
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"20⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3192 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe' -Value '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration\msconfig.exe.exe"' -PropertyType 'String'22⤵
- Command and Scripting Interpreter: PowerShell
PID:8908
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"22⤵PID:8916
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"22⤵PID:8788
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV123⤵PID:8304
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"21⤵PID:3800
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"22⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2496 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe' -Value '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration\msconfig.exe.exe"' -PropertyType 'String'23⤵PID:8840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8840 -s 91624⤵
- Program crash
PID:5704
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"23⤵PID:8848
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"22⤵PID:3308
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3676 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe' -Value '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration\msconfig.exe.exe"' -PropertyType 'String'24⤵
- Command and Scripting Interpreter: PowerShell
PID:9040
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"24⤵PID:9048
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"23⤵PID:4636
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"24⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1300 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe' -Value '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration\msconfig.exe.exe"' -PropertyType 'String'25⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:9004
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"25⤵PID:9012
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"24⤵
- Checks computer location settings
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4184 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe' -Value '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration\msconfig.exe.exe"' -PropertyType 'String'26⤵
- Command and Scripting Interpreter: PowerShell
PID:9108
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"26⤵PID:9116
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"25⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"26⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4132 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe' -Value '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration\msconfig.exe.exe"' -PropertyType 'String'27⤵
- Command and Scripting Interpreter: PowerShell
PID:1048
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"27⤵PID:7804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7804 -s 25228⤵
- Program crash
PID:8816
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"26⤵PID:3368
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4148 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe' -Value '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration\msconfig.exe.exe"' -PropertyType 'String'28⤵
- Command and Scripting Interpreter: PowerShell
PID:9064
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"28⤵PID:8584
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"27⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"28⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1956 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe' -Value '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration\msconfig.exe.exe"' -PropertyType 'String'29⤵
- Command and Scripting Interpreter: PowerShell
PID:9236 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9236 -s 91230⤵
- Program crash
PID:11476
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"29⤵PID:9252
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"28⤵
- Checks computer location settings
PID:3896 -
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2924 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe' -Value '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration\msconfig.exe.exe"' -PropertyType 'String'30⤵PID:3168
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"30⤵PID:2256
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"29⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"30⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4712 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"31⤵PID:9628
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"31⤵PID:9940
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"30⤵PID:4896
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1604 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe' -Value '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration\msconfig.exe.exe"' -PropertyType 'String'32⤵
- Command and Scripting Interpreter: PowerShell
PID:9656
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"32⤵PID:9680
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"31⤵PID:3624
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"32⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3448 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"33⤵PID:9636
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"33⤵PID:10176
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"32⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5012 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"34⤵PID:9664
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"33⤵
- Checks computer location settings
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"34⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3076 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe' -Value '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration\msconfig.exe.exe"' -PropertyType 'String'35⤵
- System Location Discovery: System Language Discovery
PID:9512
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"35⤵PID:9604
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"34⤵
- Checks computer location settings
PID:4768 -
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3040 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"36⤵PID:9528
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"35⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"36⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4308 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe' -Value '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration\msconfig.exe.exe"' -PropertyType 'String'37⤵
- Command and Scripting Interpreter: PowerShell
PID:9520
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"37⤵PID:9612
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"36⤵PID:4408
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2660 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"38⤵PID:9644
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"37⤵PID:2628
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"38⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1640 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe' -Value '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration\msconfig.exe.exe"' -PropertyType 'String'39⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:9820
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"39⤵PID:9828
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"38⤵PID:864
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3472 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe' -Value '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration\msconfig.exe.exe"' -PropertyType 'String'40⤵
- Command and Scripting Interpreter: PowerShell
PID:8248
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"40⤵PID:2680
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"39⤵
- Checks computer location settings
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"40⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5072 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"41⤵PID:9620
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"41⤵PID:9932
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"40⤵PID:368
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3184 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"42⤵PID:8740
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"41⤵PID:452
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"42⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2136 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe' -Value '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration\msconfig.exe.exe"' -PropertyType 'String'43⤵
- Command and Scripting Interpreter: PowerShell
PID:2524
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"43⤵PID:9692
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"42⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1044 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe' -Value '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration\msconfig.exe.exe"' -PropertyType 'String'44⤵PID:3716
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"44⤵PID:3468
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"43⤵PID:4496
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"44⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1096 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe' -Value '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration\msconfig.exe.exe"' -PropertyType 'String'45⤵
- Command and Scripting Interpreter: PowerShell
PID:9864
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"45⤵PID:9876
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"44⤵PID:4832
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2228 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe' -Value '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration\msconfig.exe.exe"' -PropertyType 'String'46⤵
- Command and Scripting Interpreter: PowerShell
PID:10664
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"46⤵PID:10672
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"45⤵PID:632
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"46⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3268 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe' -Value '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration\msconfig.exe.exe"' -PropertyType 'String'47⤵
- Command and Scripting Interpreter: PowerShell
PID:9440
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"47⤵PID:3044
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"46⤵PID:772
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:864 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe' -Value '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration\msconfig.exe.exe"' -PropertyType 'String'48⤵
- Command and Scripting Interpreter: PowerShell
PID:2836
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"48⤵PID:1864
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"47⤵PID:4904
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"48⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4624 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe' -Value '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration\msconfig.exe.exe"' -PropertyType 'String'49⤵PID:9804
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"49⤵PID:9816
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"48⤵
- Checks computer location settings
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4836 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe' -Value '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration\msconfig.exe.exe"' -PropertyType 'String'50⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:4384
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"50⤵PID:624
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"49⤵PID:5004
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"50⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4768 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe' -Value '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration\msconfig.exe.exe"' -PropertyType 'String'51⤵
- System Location Discovery: System Language Discovery
PID:9428
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"51⤵PID:4564
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"51⤵PID:9232
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"50⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2284 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe' -Value '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration\msconfig.exe.exe"' -PropertyType 'String'52⤵
- Command and Scripting Interpreter: PowerShell
PID:3092
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"52⤵PID:9284
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"51⤵PID:4832
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"52⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2512 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe' -Value '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration\msconfig.exe.exe"' -PropertyType 'String'53⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:1676
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"53⤵PID:2592
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"52⤵PID:4432
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1740 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"54⤵PID:10656
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"53⤵
- Checks computer location settings
PID:4840 -
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"54⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4512 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe' -Value '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration\msconfig.exe.exe"' -PropertyType 'String'55⤵
- Command and Scripting Interpreter: PowerShell
PID:10700
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"55⤵PID:10716
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"54⤵
- Checks computer location settings
PID:640 -
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3540 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe' -Value '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration\msconfig.exe.exe"' -PropertyType 'String'56⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:10612
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"56⤵PID:10624
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"55⤵
- Checks computer location settings
PID:3476 -
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"56⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4688 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe' -Value '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration\msconfig.exe.exe"' -PropertyType 'String'57⤵
- Command and Scripting Interpreter: PowerShell
PID:10688
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"57⤵PID:10708
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"56⤵PID:3896
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4432 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe' -Value '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration\msconfig.exe.exe"' -PropertyType 'String'58⤵PID:11212
-
C:\Windows\SysWOW64\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "0" "11212" "1252" "1140" "1256" "0" "0" "1260" "0" "0" "0" "0" "0"59⤵PID:3976
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"58⤵PID:11224
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"57⤵PID:1104
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"58⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1680 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe' -Value '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration\msconfig.exe.exe"' -PropertyType 'String'59⤵
- Command and Scripting Interpreter: PowerShell
PID:10092
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"59⤵PID:10160
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"58⤵
- Checks computer location settings
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3476 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe' -Value '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration\msconfig.exe.exe"' -PropertyType 'String'60⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:4500
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"60⤵PID:10384
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"59⤵
- Checks computer location settings
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"60⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:212 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe' -Value '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration\msconfig.exe.exe"' -PropertyType 'String'61⤵PID:11236
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"61⤵PID:11248
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"61⤵PID:10452
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"61⤵PID:11328
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"60⤵PID:4996
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:772 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe' -Value '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration\msconfig.exe.exe"' -PropertyType 'String'62⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:11184
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"62⤵PID:11200
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 11200 -s 92063⤵
- Program crash
PID:12520
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"61⤵PID:4636
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"62⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3960 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe' -Value '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration\msconfig.exe.exe"' -PropertyType 'String'63⤵
- Command and Scripting Interpreter: PowerShell
PID:10792
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"63⤵PID:10800
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"62⤵
- Checks computer location settings
PID:3248 -
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2832 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe' -Value '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration\msconfig.exe.exe"' -PropertyType 'String'64⤵
- Command and Scripting Interpreter: PowerShell
PID:10640
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"64⤵PID:10648
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"63⤵PID:1896
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"64⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5172 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe' -Value '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration\msconfig.exe.exe"' -PropertyType 'String'65⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:11176
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"65⤵PID:11192
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"65⤵PID:10636
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"64⤵PID:5180
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5248 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe' -Value '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration\msconfig.exe.exe"' -PropertyType 'String'66⤵
- Command and Scripting Interpreter: PowerShell
PID:10088
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"66⤵PID:3724
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"65⤵
- Checks computer location settings
PID:5272 -
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"66⤵
- Suspicious use of SetThreadContext
PID:5328 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe' -Value '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration\msconfig.exe.exe"' -PropertyType 'String'67⤵
- Command and Scripting Interpreter: PowerShell
PID:1664
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"67⤵PID:2952
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"66⤵PID:5352
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"67⤵PID:5404
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe' -Value '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration\msconfig.exe.exe"' -PropertyType 'String'68⤵
- Command and Scripting Interpreter: PowerShell
PID:11528
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"68⤵PID:11536
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"67⤵
- Checks computer location settings
PID:5420 -
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"68⤵
- System Location Discovery: System Language Discovery
PID:5484 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe' -Value '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration\msconfig.exe.exe"' -PropertyType 'String'69⤵
- Command and Scripting Interpreter: PowerShell
PID:11020
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"69⤵PID:11036
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"68⤵
- Checks computer location settings
PID:5492 -
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"69⤵PID:5560
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe' -Value '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration\msconfig.exe.exe"' -PropertyType 'String'70⤵PID:10080
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"70⤵PID:10196
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"69⤵PID:5572
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"70⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5636 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe' -Value '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration\msconfig.exe.exe"' -PropertyType 'String'71⤵
- Command and Scripting Interpreter: PowerShell
PID:3176
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"71⤵PID:684
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"71⤵PID:11404
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"70⤵
- Checks computer location settings
PID:5652 -
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"71⤵PID:5712
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5712 -s 104072⤵
- Program crash
PID:7964
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"71⤵PID:5720
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"72⤵
- System Location Discovery: System Language Discovery
PID:5788 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe' -Value '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration\msconfig.exe.exe"' -PropertyType 'String'73⤵
- Command and Scripting Interpreter: PowerShell
PID:11568
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"73⤵PID:11576
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"72⤵PID:5804
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"73⤵PID:5864
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"73⤵PID:5880
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"74⤵
- System Location Discovery: System Language Discovery
PID:5940 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe' -Value '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration\msconfig.exe.exe"' -PropertyType 'String'75⤵PID:11448
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"75⤵PID:11456
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"74⤵PID:5952
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"75⤵PID:6020
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"76⤵PID:12792
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"75⤵
- Checks computer location settings
PID:6028 -
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"76⤵PID:6100
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"76⤵PID:6108
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"77⤵PID:1552
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"77⤵
- Checks computer location settings
PID:3248 -
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"78⤵PID:5228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5228 -s 104079⤵
- Program crash
PID:10508
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"78⤵PID:5220
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"79⤵PID:5316
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"79⤵
- Checks computer location settings
PID:5320 -
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"80⤵PID:5364
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"80⤵PID:5444
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"81⤵PID:5524
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"81⤵
- Checks computer location settings
PID:5496 -
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"82⤵
- System Location Discovery: System Language Discovery
PID:5660 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5660 -s 104083⤵
- Program crash
PID:3896
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"82⤵
- Checks computer location settings
PID:5572 -
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"83⤵
- System Location Discovery: System Language Discovery
PID:5744
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"83⤵
- Checks computer location settings
PID:5820 -
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"84⤵PID:5852
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"85⤵PID:12500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 12500 -s 90486⤵
- Program crash
PID:12624
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"84⤵PID:5924
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"85⤵PID:5992
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"85⤵
- Checks computer location settings
PID:5956 -
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"86⤵PID:6116
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"86⤵
- Checks computer location settings
PID:6044 -
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"87⤵PID:5160
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"87⤵PID:5188
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"88⤵PID:5272
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"89⤵PID:2820
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"89⤵PID:5940
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"88⤵PID:5292
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"89⤵PID:5384
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"89⤵
- Checks computer location settings
PID:5440 -
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"90⤵PID:5612
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"90⤵
- Checks computer location settings
PID:5624 -
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"91⤵
- System Location Discovery: System Language Discovery
PID:5776
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"91⤵PID:5572
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"92⤵
- System Location Discovery: System Language Discovery
PID:5936 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5936 -s 104093⤵
- Program crash
PID:9204
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"92⤵PID:5932
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"93⤵
- System Location Discovery: System Language Discovery
PID:6056
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"93⤵PID:5956
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"94⤵
- System Location Discovery: System Language Discovery
PID:5304
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"94⤵PID:4812
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"95⤵PID:5424
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"95⤵PID:5396
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"96⤵PID:5768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5768 -s 104097⤵
- Program crash
PID:6780
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"96⤵PID:5676
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"97⤵
- System Location Discovery: System Language Discovery
PID:5900
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"97⤵PID:6000
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"98⤵
- System Location Discovery: System Language Discovery
PID:5920 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5920 -s 104099⤵
- Program crash
PID:8692
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"98⤵
- Checks computer location settings
PID:4204 -
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"99⤵
- System Location Discovery: System Language Discovery
PID:5212 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5212 -s 1040100⤵
- Program crash
PID:8456
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"99⤵PID:5368
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"100⤵PID:5440
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"101⤵PID:12140
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"100⤵
- Checks computer location settings
PID:5396 -
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"101⤵
- System Location Discovery: System Language Discovery
PID:6096 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"102⤵PID:1160
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"102⤵PID:5800
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"101⤵
- Checks computer location settings
PID:6072 -
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"102⤵
- System Location Discovery: System Language Discovery
PID:5376 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5376 -s 1040103⤵
- Program crash
PID:9264
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"102⤵PID:5556
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"103⤵PID:5916
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"103⤵
- Checks computer location settings
PID:5164 -
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"104⤵
- System Location Discovery: System Language Discovery
PID:5392
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"104⤵PID:5836
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"105⤵PID:3556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3556 -s 1040106⤵
- Program crash
PID:8060
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"105⤵
- Checks computer location settings
PID:5368 -
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"106⤵PID:4812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4812 -s 1040107⤵
- Program crash
PID:6000
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"106⤵
- Checks computer location settings
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"107⤵PID:4472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 1040108⤵
- Program crash
PID:6996
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"107⤵PID:6072
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"108⤵PID:5368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5368 -s 1040109⤵
- Program crash
PID:7036
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"108⤵PID:1228
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"109⤵PID:5608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5608 -s 1040110⤵
- Program crash
PID:6812
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"109⤵PID:3812
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"110⤵PID:6188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6188 -s 1040111⤵
- Program crash
PID:7956
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"110⤵PID:6196
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"111⤵PID:6264
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6264 -s 1040112⤵
- Program crash
PID:6952
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"111⤵
- Checks computer location settings
PID:6276 -
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"112⤵
- System Location Discovery: System Language Discovery
PID:6348 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6348 -s 1040113⤵
- Program crash
PID:12948
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"112⤵PID:6356
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"113⤵PID:6432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6432 -s 1040114⤵
- Program crash
PID:7412
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"113⤵
- Checks computer location settings
PID:6448 -
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"114⤵PID:6508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6508 -s 1044115⤵
- Program crash
PID:7936
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"114⤵PID:6532
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"115⤵PID:6588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6588 -s 1036116⤵
- Program crash
PID:7536
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"115⤵PID:6604
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"116⤵PID:6664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6664 -s 1036117⤵
- Program crash
PID:3972
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"116⤵PID:6688
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"117⤵PID:6740
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6740 -s 1036118⤵
- Program crash
PID:3976
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"117⤵PID:6756
-
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"118⤵PID:6816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6816 -s 1036119⤵
- Program crash
PID:7592
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"118⤵
- Checks computer location settings
PID:6832 -
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"119⤵PID:6896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6896 -s 1036120⤵
- Program crash
PID:8168
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"119⤵
- Checks computer location settings
PID:6904 -
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"120⤵PID:6972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6972 -s 1036121⤵
- Program crash
PID:7100
-
-
-
C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"C:\Users\Admin\AppData\Local\Temp\TextUtils.exe"120⤵
- Checks computer location settings
PID:6996 -
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"121⤵PID:7048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7048 -s 1036122⤵
- Program crash
PID:8604
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-