Resubmissions
03-02-2025 02:50
250203-dbllgsyrer 10Analysis
-
max time kernel
36s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
03-02-2025 02:50
Static task
static1
Behavioral task
behavioral1
Sample
CrosshairX.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
CrosshairX.exe
Resource
win10v2004-20250129-en
General
-
Target
CrosshairX.exe
-
Size
158.2MB
-
MD5
eae9cd4d835c01942e77aedc76f10271
-
SHA1
4a552dfc6d4a60adc3b520907a1f5e699a9cf4be
-
SHA256
bb71d7b3e81a698c483c246742a2a32248f2c7e8c8742ee1ed906569c18f69e0
-
SHA512
ce810477c0e1b8ec3072e3158f3dd992fc83595315032c46165cae6db06e5ad4ca730fc1b1362c5b51a08ebf4c2fbc079ef6c11db3f5647341d172b9b0c157f8
-
SSDEEP
3145728:/ePJJp+vgvLA8WkUYgMvCi36WGlGa3YAX9VsspSWDXDTpMfk4:/U4gx7DhazGOXDTpM8
Malware Config
Signatures
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Exelastealer family
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 312 netsh.exe 424 netsh.exe -
Checks computer location settings 2 TTPs 30 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation CrosshairX.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation CrosshairX.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation CrosshairX.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation CrosshairX.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation CrosshairX.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation CrosshairX.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation CrosshairX.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation CrosshairX.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation CrosshairX.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation CrosshairX.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation CrosshairX.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation CrosshairX.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation CrosshairX.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation CrosshairX.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation CrosshairX.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation CrosshairX.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation CrosshairX.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation CrosshairX.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation CrosshairX.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation CrosshairX.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation CrosshairX.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation CrosshairX.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation CrosshairX.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation CrosshairX.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation CrosshairX.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation CrosshairX.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation CrosshairX.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation CrosshairX.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation CrosshairX.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation CrosshairX.exe -
Clipboard Data 1 TTPs 2 IoCs
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
pid Process 2516 cmd.exe 1912 powershell.exe -
Executes dropped EXE 60 IoCs
pid Process 1224 Update.exe 1460 Update.exe 1056 Update.exe 5104 Update.exe 3936 Update.exe 1472 Update.exe 4948 Update.exe 3044 Update.exe 4428 Update.exe 1872 Update.exe 5088 Update.exe 892 Update.exe 312 Update.exe 1728 Update.exe 3608 Update.exe 2940 Update.exe 1712 Update.exe 4808 Update.exe 4776 Update.exe 3432 Update.exe 1364 Update.exe 3544 Update.exe 1904 Update.exe 1144 Update.exe 3408 Update.exe 3336 Update.exe 652 Update.exe 2020 Update.exe 3996 Update.exe 3388 Update.exe 1652 Update.exe 1904 Update.exe 2972 Update.exe 3656 Update.exe 1380 Update.exe 3236 Update.exe 444 Update.exe 3652 Update.exe 2104 Update.exe 5032 Update.exe 3680 Update.exe 3896 Update.exe 4784 Update.exe 4952 Update.exe 1544 Update.exe 2940 Update.exe 5108 Update.exe 3724 Update.exe 4556 Update.exe 4676 Update.exe 2432 Update.exe 3276 Update.exe 3608 Update.exe 3616 Update.exe 4432 Update.exe 4860 Update.exe 3628 Update.exe 1384 Update.exe 1736 Update.exe 3272 Update.exe -
Loads dropped DLL 64 IoCs
pid Process 1460 Update.exe 1460 Update.exe 1460 Update.exe 1460 Update.exe 1460 Update.exe 1460 Update.exe 1460 Update.exe 1460 Update.exe 1460 Update.exe 1460 Update.exe 1460 Update.exe 1460 Update.exe 1460 Update.exe 1460 Update.exe 1460 Update.exe 1460 Update.exe 1460 Update.exe 1460 Update.exe 1460 Update.exe 1460 Update.exe 1460 Update.exe 1460 Update.exe 1460 Update.exe 1460 Update.exe 1460 Update.exe 1460 Update.exe 1460 Update.exe 1460 Update.exe 1460 Update.exe 1460 Update.exe 1460 Update.exe 5104 Update.exe 5104 Update.exe 5104 Update.exe 5104 Update.exe 5104 Update.exe 5104 Update.exe 5104 Update.exe 5104 Update.exe 5104 Update.exe 5104 Update.exe 5104 Update.exe 5104 Update.exe 5104 Update.exe 5104 Update.exe 5104 Update.exe 5104 Update.exe 5104 Update.exe 5104 Update.exe 5104 Update.exe 5104 Update.exe 5104 Update.exe 5104 Update.exe 5104 Update.exe 5104 Update.exe 5104 Update.exe 5104 Update.exe 5104 Update.exe 5104 Update.exe 5104 Update.exe 5104 Update.exe 1472 Update.exe 1472 Update.exe 5104 Update.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 44 discord.com 45 discord.com 46 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 36 ip-api.com -
pid Process 4816 ARP.EXE 1640 cmd.exe -
Enumerates processes with tasklist 1 TTPs 5 IoCs
pid Process 3816 tasklist.exe 464 tasklist.exe 3628 tasklist.exe 4616 tasklist.exe 740 tasklist.exe -
Hide Artifacts: Hidden Files and Directories 1 TTPs 1 IoCs
pid Process 4848 cmd.exe -
resource yara_rule behavioral2/files/0x0007000000023cad-60.dat upx behavioral2/memory/1460-64-0x00007FF878E10000-0x00007FF8793F8000-memory.dmp upx behavioral2/files/0x0007000000023ca5-71.dat upx behavioral2/files/0x0007000000023c7a-96.dat upx behavioral2/files/0x0007000000023cae-95.dat upx behavioral2/files/0x0007000000023c86-91.dat upx behavioral2/files/0x0007000000023c85-90.dat upx behavioral2/files/0x0007000000023c84-89.dat upx behavioral2/files/0x0007000000023c83-88.dat upx behavioral2/files/0x0007000000023c82-87.dat upx behavioral2/files/0x0007000000023c81-86.dat upx behavioral2/files/0x0007000000023c80-85.dat upx behavioral2/files/0x0007000000023c7f-84.dat upx behavioral2/files/0x0007000000023c7e-83.dat upx behavioral2/files/0x0007000000023c7d-82.dat upx behavioral2/files/0x0007000000023c7b-81.dat upx behavioral2/files/0x0007000000023c79-79.dat upx behavioral2/files/0x0007000000023cb0-78.dat upx behavioral2/files/0x0007000000023caf-77.dat upx behavioral2/files/0x0007000000023cab-75.dat upx behavioral2/files/0x0007000000023ca6-74.dat upx behavioral2/files/0x0007000000023ca4-73.dat upx behavioral2/files/0x0007000000023c7c-70.dat upx behavioral2/memory/1460-93-0x00007FF88CFB0000-0x00007FF88CFBF000-memory.dmp upx behavioral2/memory/1460-92-0x00007FF889630000-0x00007FF889654000-memory.dmp upx behavioral2/memory/1460-105-0x00007FF878BA0000-0x00007FF878D13000-memory.dmp upx behavioral2/memory/1460-104-0x00007FF8889E0000-0x00007FF888A03000-memory.dmp upx behavioral2/memory/1460-101-0x00007FF888B60000-0x00007FF888B8D000-memory.dmp upx behavioral2/memory/1460-99-0x00007FF88D240000-0x00007FF88D259000-memory.dmp upx behavioral2/memory/1460-98-0x00007FF88C3B0000-0x00007FF88C3BD000-memory.dmp upx behavioral2/memory/1460-97-0x00007FF88C430000-0x00007FF88C449000-memory.dmp upx behavioral2/memory/1460-111-0x00007FF8887C0000-0x00007FF8887EE000-memory.dmp upx behavioral2/memory/1460-110-0x00007FF878E10000-0x00007FF8793F8000-memory.dmp upx behavioral2/files/0x0007000000023caa-130.dat upx behavioral2/memory/1460-131-0x00007FF887EC0000-0x00007FF887EDB000-memory.dmp upx behavioral2/memory/1460-128-0x00007FF888160000-0x00007FF888174000-memory.dmp upx behavioral2/memory/1460-127-0x00007FF88D220000-0x00007FF88D235000-memory.dmp upx behavioral2/memory/1460-126-0x00007FF878AE0000-0x00007FF878B98000-memory.dmp upx behavioral2/memory/1460-125-0x00007FF878640000-0x00007FF87875C000-memory.dmp upx behavioral2/memory/1460-124-0x00007FF887EE0000-0x00007FF887F02000-memory.dmp upx behavioral2/memory/1460-123-0x00007FF888180000-0x00007FF888194000-memory.dmp upx behavioral2/memory/1460-122-0x00007FF888660000-0x00007FF888672000-memory.dmp upx behavioral2/files/0x0007000000023cb2-120.dat upx behavioral2/memory/1460-118-0x00007FF878760000-0x00007FF878AD5000-memory.dmp upx behavioral2/files/0x0007000000023ca8-115.dat upx behavioral2/files/0x0007000000023c8b-136.dat upx behavioral2/memory/1460-148-0x00007FF87F910000-0x00007FF87F92E000-memory.dmp upx behavioral2/memory/1460-147-0x00007FF88C3A0000-0x00007FF88C3AA000-memory.dmp upx behavioral2/memory/1460-151-0x00007FF877E40000-0x00007FF87863B000-memory.dmp upx behavioral2/memory/1460-150-0x00007FF878BA0000-0x00007FF878D13000-memory.dmp upx behavioral2/memory/1460-149-0x00007FF8889E0000-0x00007FF888A03000-memory.dmp upx behavioral2/memory/1460-200-0x00007FF87A130000-0x00007FF87A167000-memory.dmp upx behavioral2/memory/5104-203-0x00007FF877850000-0x00007FF877E38000-memory.dmp upx behavioral2/memory/1460-204-0x00007FF8887C0000-0x00007FF8887EE000-memory.dmp upx behavioral2/memory/5104-209-0x00007FF888F10000-0x00007FF888F1F000-memory.dmp upx behavioral2/memory/1460-212-0x00007FF887EC0000-0x00007FF887EDB000-memory.dmp upx behavioral2/memory/1460-219-0x00007FF8843B0000-0x00007FF8843E2000-memory.dmp upx behavioral2/memory/5104-220-0x00007FF8775E0000-0x00007FF877753000-memory.dmp upx behavioral2/memory/5104-218-0x00007FF877760000-0x00007FF877783000-memory.dmp upx behavioral2/memory/5104-221-0x00007FF8775B0000-0x00007FF8775DE000-memory.dmp upx behavioral2/memory/5104-223-0x00007FF8774F0000-0x00007FF8775A8000-memory.dmp upx behavioral2/memory/5104-225-0x00007FF877170000-0x00007FF8774E5000-memory.dmp upx behavioral2/memory/5104-232-0x00007FF876ED0000-0x00007FF876FEC000-memory.dmp upx behavioral2/memory/5104-233-0x00007FF876EB0000-0x00007FF876ECB000-memory.dmp upx -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3032 sc.exe -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023c74-4.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Permission Groups Discovery: Local Groups 1 TTPs
Attempt to find local system groups and permission settings.
-
System Location Discovery: System Language Discovery 1 TTPs 31 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CrosshairX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CrosshairX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CrosshairX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CrosshairX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CrosshairX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CrosshairX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CrosshairX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CrosshairX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CrosshairX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CrosshairX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CrosshairX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CrosshairX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CrosshairX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CrosshairX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CrosshairX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CrosshairX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CrosshairX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CrosshairX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CrosshairX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CrosshairX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CrosshairX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CrosshairX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CrosshairX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CrosshairX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CrosshairX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CrosshairX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CrosshairX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CrosshairX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CrosshairX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CrosshairX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CrosshairX.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 5060 cmd.exe 508 netsh.exe -
System Network Connections Discovery 1 TTPs 1 IoCs
Attempt to get a listing of network connections.
pid Process 2032 NETSTAT.EXE -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe -
Collects information from the system 1 TTPs 1 IoCs
Uses WMIC.exe to find detailed system information.
pid Process 3416 WMIC.exe -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 428 WMIC.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 2032 NETSTAT.EXE 2432 ipconfig.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 3360 systeminfo.exe -
Kills process with taskkill 1 IoCs
pid Process 3416 taskkill.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2860 WMIC.exe Token: SeSecurityPrivilege 2860 WMIC.exe Token: SeTakeOwnershipPrivilege 2860 WMIC.exe Token: SeLoadDriverPrivilege 2860 WMIC.exe Token: SeSystemProfilePrivilege 2860 WMIC.exe Token: SeSystemtimePrivilege 2860 WMIC.exe Token: SeProfSingleProcessPrivilege 2860 WMIC.exe Token: SeIncBasePriorityPrivilege 2860 WMIC.exe Token: SeCreatePagefilePrivilege 2860 WMIC.exe Token: SeBackupPrivilege 2860 WMIC.exe Token: SeRestorePrivilege 2860 WMIC.exe Token: SeShutdownPrivilege 2860 WMIC.exe Token: SeDebugPrivilege 2860 WMIC.exe Token: SeSystemEnvironmentPrivilege 2860 WMIC.exe Token: SeRemoteShutdownPrivilege 2860 WMIC.exe Token: SeUndockPrivilege 2860 WMIC.exe Token: SeManageVolumePrivilege 2860 WMIC.exe Token: 33 2860 WMIC.exe Token: 34 2860 WMIC.exe Token: 35 2860 WMIC.exe Token: 36 2860 WMIC.exe Token: SeDebugPrivilege 3816 tasklist.exe Token: SeIncreaseQuotaPrivilege 428 WMIC.exe Token: SeSecurityPrivilege 428 WMIC.exe Token: SeTakeOwnershipPrivilege 428 WMIC.exe Token: SeLoadDriverPrivilege 428 WMIC.exe Token: SeSystemProfilePrivilege 428 WMIC.exe Token: SeSystemtimePrivilege 428 WMIC.exe Token: SeProfSingleProcessPrivilege 428 WMIC.exe Token: SeIncBasePriorityPrivilege 428 WMIC.exe Token: SeCreatePagefilePrivilege 428 WMIC.exe Token: SeBackupPrivilege 428 WMIC.exe Token: SeRestorePrivilege 428 WMIC.exe Token: SeShutdownPrivilege 428 WMIC.exe Token: SeDebugPrivilege 428 WMIC.exe Token: SeSystemEnvironmentPrivilege 428 WMIC.exe Token: SeRemoteShutdownPrivilege 428 WMIC.exe Token: SeUndockPrivilege 428 WMIC.exe Token: SeManageVolumePrivilege 428 WMIC.exe Token: 33 428 WMIC.exe Token: 34 428 WMIC.exe Token: 35 428 WMIC.exe Token: 36 428 WMIC.exe Token: SeDebugPrivilege 3324 taskmgr.exe Token: SeSystemProfilePrivilege 3324 taskmgr.exe Token: SeCreateGlobalPrivilege 3324 taskmgr.exe Token: SeIncreaseQuotaPrivilege 2860 WMIC.exe Token: SeSecurityPrivilege 2860 WMIC.exe Token: SeTakeOwnershipPrivilege 2860 WMIC.exe Token: SeLoadDriverPrivilege 2860 WMIC.exe Token: SeSystemProfilePrivilege 2860 WMIC.exe Token: SeSystemtimePrivilege 2860 WMIC.exe Token: SeProfSingleProcessPrivilege 2860 WMIC.exe Token: SeIncBasePriorityPrivilege 2860 WMIC.exe Token: SeCreatePagefilePrivilege 2860 WMIC.exe Token: SeBackupPrivilege 2860 WMIC.exe Token: SeRestorePrivilege 2860 WMIC.exe Token: SeShutdownPrivilege 2860 WMIC.exe Token: SeDebugPrivilege 2860 WMIC.exe Token: SeSystemEnvironmentPrivilege 2860 WMIC.exe Token: SeRemoteShutdownPrivilege 2860 WMIC.exe Token: SeUndockPrivilege 2860 WMIC.exe Token: SeManageVolumePrivilege 2860 WMIC.exe Token: 33 2860 WMIC.exe -
Suspicious use of FindShellTrayWindow 40 IoCs
pid Process 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe -
Suspicious use of SendNotifyMessage 40 IoCs
pid Process 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe 3324 taskmgr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4944 wrote to memory of 1224 4944 CrosshairX.exe 91 PID 4944 wrote to memory of 1224 4944 CrosshairX.exe 91 PID 1224 wrote to memory of 1460 1224 Update.exe 92 PID 1224 wrote to memory of 1460 1224 Update.exe 92 PID 1460 wrote to memory of 312 1460 Update.exe 93 PID 1460 wrote to memory of 312 1460 Update.exe 93 PID 4944 wrote to memory of 3552 4944 CrosshairX.exe 95 PID 4944 wrote to memory of 3552 4944 CrosshairX.exe 95 PID 4944 wrote to memory of 3552 4944 CrosshairX.exe 95 PID 3552 wrote to memory of 1056 3552 CrosshairX.exe 96 PID 3552 wrote to memory of 1056 3552 CrosshairX.exe 96 PID 1056 wrote to memory of 5104 1056 Update.exe 145 PID 1056 wrote to memory of 5104 1056 Update.exe 145 PID 1460 wrote to memory of 4780 1460 Update.exe 98 PID 1460 wrote to memory of 4780 1460 Update.exe 98 PID 1460 wrote to memory of 1640 1460 Update.exe 99 PID 1460 wrote to memory of 1640 1460 Update.exe 99 PID 1460 wrote to memory of 4996 1460 Update.exe 100 PID 1460 wrote to memory of 4996 1460 Update.exe 100 PID 1460 wrote to memory of 2908 1460 Update.exe 101 PID 1460 wrote to memory of 2908 1460 Update.exe 101 PID 5104 wrote to memory of 3608 5104 Update.exe 149 PID 5104 wrote to memory of 3608 5104 Update.exe 149 PID 1640 wrote to memory of 2860 1640 cmd.exe 109 PID 1640 wrote to memory of 2860 1640 cmd.exe 109 PID 3552 wrote to memory of 4848 3552 CrosshairX.exe 133 PID 3552 wrote to memory of 4848 3552 CrosshairX.exe 133 PID 3552 wrote to memory of 4848 3552 CrosshairX.exe 133 PID 2908 wrote to memory of 3816 2908 cmd.exe 110 PID 2908 wrote to memory of 3816 2908 cmd.exe 110 PID 4780 wrote to memory of 428 4780 cmd.exe 142 PID 4780 wrote to memory of 428 4780 cmd.exe 142 PID 4848 wrote to memory of 3936 4848 CrosshairX.exe 114 PID 4848 wrote to memory of 3936 4848 CrosshairX.exe 114 PID 3936 wrote to memory of 1472 3936 Update.exe 115 PID 3936 wrote to memory of 1472 3936 Update.exe 115 PID 1472 wrote to memory of 2044 1472 Update.exe 116 PID 1472 wrote to memory of 2044 1472 Update.exe 116 PID 4848 wrote to memory of 1920 4848 CrosshairX.exe 118 PID 4848 wrote to memory of 1920 4848 CrosshairX.exe 118 PID 4848 wrote to memory of 1920 4848 CrosshairX.exe 118 PID 1460 wrote to memory of 3888 1460 Update.exe 119 PID 1460 wrote to memory of 3888 1460 Update.exe 119 PID 1920 wrote to memory of 4948 1920 CrosshairX.exe 121 PID 1920 wrote to memory of 4948 1920 CrosshairX.exe 121 PID 4948 wrote to memory of 3044 4948 Update.exe 268 PID 4948 wrote to memory of 3044 4948 Update.exe 268 PID 3888 wrote to memory of 428 3888 cmd.exe 142 PID 3888 wrote to memory of 428 3888 cmd.exe 142 PID 1920 wrote to memory of 3132 1920 CrosshairX.exe 124 PID 1920 wrote to memory of 3132 1920 CrosshairX.exe 124 PID 1920 wrote to memory of 3132 1920 CrosshairX.exe 124 PID 3132 wrote to memory of 4428 3132 CrosshairX.exe 125 PID 3132 wrote to memory of 4428 3132 CrosshairX.exe 125 PID 3044 wrote to memory of 1320 3044 Update.exe 262 PID 3044 wrote to memory of 1320 3044 Update.exe 262 PID 4428 wrote to memory of 1872 4428 Update.exe 329 PID 4428 wrote to memory of 1872 4428 Update.exe 329 PID 1460 wrote to memory of 4440 1460 Update.exe 285 PID 1460 wrote to memory of 4440 1460 Update.exe 285 PID 1460 wrote to memory of 2740 1460 Update.exe 130 PID 1460 wrote to memory of 2740 1460 Update.exe 130 PID 1872 wrote to memory of 2624 1872 Update.exe 131 PID 1872 wrote to memory of 2624 1872 Update.exe 131 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2280 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"4⤵PID:312
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"4⤵
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name5⤵
- Detects videocard installed
- Suspicious use of AdjustPrivilegeToken
PID:428
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic computersystem get Manufacturer"4⤵
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\System32\Wbem\WMIC.exewmic computersystem get Manufacturer5⤵
- Suspicious use of AdjustPrivilegeToken
PID:2860
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "gdb --version"4⤵PID:4996
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"4⤵
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\system32\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3816
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path Win32_ComputerSystem get Manufacturer"4⤵
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Windows\System32\Wbem\WMIC.exewmic path Win32_ComputerSystem get Manufacturer5⤵PID:428
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"4⤵PID:4440
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid5⤵PID:3896
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"4⤵PID:2740
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:4848
-
-
C:\Windows\system32\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:464
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /IM "taskmgr.exe""4⤵PID:444
-
C:\Windows\system32\taskkill.exetaskkill /F /IM "taskmgr.exe"5⤵
- Kills process with taskkill
PID:3416
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "attrib +h +s "C:\Users\Admin\AppData\Local\ExelaUpdateService\Update.exe""4⤵
- Hide Artifacts: Hidden Files and Directories
PID:4848 -
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\ExelaUpdateService\Update.exe"5⤵
- Views/modifies file attributes
PID:2280
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"4⤵PID:1384
-
C:\Windows\system32\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:3628
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "cmd.exe /c chcp"4⤵PID:3772
-
C:\Windows\system32\cmd.execmd.exe /c chcp5⤵PID:2104
-
C:\Windows\system32\chcp.comchcp6⤵PID:2556
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "cmd.exe /c chcp"4⤵PID:5036
-
C:\Windows\system32\cmd.execmd.exe /c chcp5⤵PID:2040
-
C:\Windows\system32\chcp.comchcp6⤵PID:2808
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"4⤵PID:3452
-
C:\Windows\system32\tasklist.exetasklist /FO LIST5⤵
- Enumerates processes with tasklist
PID:4616
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell.exe Get-Clipboard"4⤵
- Clipboard Data
PID:2516 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Get-Clipboard5⤵
- Clipboard Data
PID:1912
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "echo ####System Info#### & systeminfo & echo ####System Version#### & ver & echo ####Host Name#### & hostname & echo ####Environment Variable#### & set & echo ####Logical Disk#### & wmic logicaldisk get caption,description,providername & echo ####User Info#### & net user & echo ####Online User#### & query user & echo ####Local Group#### & net localgroup & echo ####Administrators Info#### & net localgroup administrators & echo ####Guest User Info#### & net user guest & echo ####Administrator User Info#### & net user administrator & echo ####Startup Info#### & wmic startup get caption,command & echo ####Tasklist#### & tasklist /svc & echo ####Ipconfig#### & ipconfig/all & echo ####Hosts#### & type C:\WINDOWS\System32\drivers\etc\hosts & echo ####Route Table#### & route print & echo ####Arp Info#### & arp -a & echo ####Netstat#### & netstat -ano & echo ####Service Info#### & sc query type= service state= all & echo ####Firewallinfo#### & netsh firewall show state & netsh firewall show config"4⤵
- Network Service Discovery
PID:1640 -
C:\Windows\system32\systeminfo.exesysteminfo5⤵
- Gathers system information
PID:3360
-
-
C:\Windows\system32\HOSTNAME.EXEhostname5⤵PID:4528
-
-
C:\Windows\System32\Wbem\WMIC.exewmic logicaldisk get caption,description,providername5⤵
- Collects information from the system
PID:3416
-
-
C:\Windows\system32\net.exenet user5⤵PID:3132
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user6⤵PID:116
-
-
-
C:\Windows\system32\query.exequery user5⤵PID:2320
-
C:\Windows\system32\quser.exe"C:\Windows\system32\quser.exe"6⤵PID:2284
-
-
-
C:\Windows\system32\net.exenet localgroup5⤵PID:2820
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup6⤵PID:4816
-
-
-
C:\Windows\system32\net.exenet localgroup administrators5⤵PID:428
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup administrators6⤵PID:3824
-
-
-
C:\Windows\system32\net.exenet user guest5⤵PID:4808
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user guest6⤵PID:1448
-
-
-
C:\Windows\system32\net.exenet user administrator5⤵PID:388
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user administrator6⤵PID:2124
-
-
-
C:\Windows\System32\Wbem\WMIC.exewmic startup get caption,command5⤵PID:2812
-
-
C:\Windows\system32\tasklist.exetasklist /svc5⤵
- Enumerates processes with tasklist
PID:740
-
-
C:\Windows\system32\ipconfig.exeipconfig /all5⤵
- Gathers network information
PID:2432
-
-
C:\Windows\system32\ROUTE.EXEroute print5⤵PID:2124
-
-
C:\Windows\system32\ARP.EXEarp -a5⤵
- Network Service Discovery
PID:4816
-
-
C:\Windows\system32\NETSTAT.EXEnetstat -ano5⤵
- System Network Connections Discovery
- Gathers network information
PID:2032
-
-
C:\Windows\system32\sc.exesc query type= service state= all5⤵
- Launches sc.exe
PID:3032
-
-
C:\Windows\system32\netsh.exenetsh firewall show state5⤵
- Modifies Windows Firewall
PID:312
-
-
C:\Windows\system32\netsh.exenetsh firewall show config5⤵
- Modifies Windows Firewall
PID:424
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "netsh wlan show profiles"4⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:5060 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:5048
-
-
C:\Windows\system32\netsh.exenetsh wlan show profiles5⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:508
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"4⤵PID:3224
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid5⤵PID:116
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"4⤵PID:1048
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid5⤵PID:1620
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"5⤵PID:3608
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"6⤵PID:2044
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"7⤵PID:1320
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"5⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"8⤵PID:2624
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"6⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:400 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"7⤵
- Executes dropped EXE
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"8⤵
- Executes dropped EXE
PID:892 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"9⤵PID:4376
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV110⤵PID:428
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"7⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"8⤵
- Executes dropped EXE
PID:312 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"9⤵
- Executes dropped EXE
PID:1728 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"10⤵PID:1840
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"8⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:5104 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"9⤵
- Executes dropped EXE
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"10⤵
- Executes dropped EXE
PID:2940 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"11⤵PID:5068
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"9⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4284 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"10⤵
- Executes dropped EXE
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"11⤵
- Executes dropped EXE
PID:4808 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"12⤵PID:1320
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"10⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"11⤵
- Executes dropped EXE
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"12⤵
- Executes dropped EXE
PID:3432 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"13⤵PID:1520
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"11⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"12⤵
- Executes dropped EXE
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"13⤵
- Executes dropped EXE
PID:3544 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"14⤵PID:5036
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"12⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"13⤵
- Executes dropped EXE
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"14⤵
- Executes dropped EXE
PID:1144 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"15⤵PID:4496
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"13⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:784 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"14⤵
- Executes dropped EXE
PID:3408 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"15⤵
- Executes dropped EXE
PID:3336 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"16⤵PID:4284
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"14⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3972 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"15⤵
- Executes dropped EXE
PID:652 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"16⤵
- Executes dropped EXE
PID:2020 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"17⤵PID:4488
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"15⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3908 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"16⤵
- Executes dropped EXE
PID:3996 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"17⤵
- Executes dropped EXE
PID:3388 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"18⤵PID:4368
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"16⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"17⤵
- Executes dropped EXE
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"18⤵
- Executes dropped EXE
PID:1904 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"19⤵PID:3408
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"17⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"18⤵
- Executes dropped EXE
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"19⤵
- Executes dropped EXE
PID:3656 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"20⤵PID:5036
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"18⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"19⤵
- Executes dropped EXE
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"20⤵
- Executes dropped EXE
PID:3236 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"21⤵PID:2856
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"19⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"20⤵
- Executes dropped EXE
PID:444 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"21⤵
- Executes dropped EXE
PID:3652 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"22⤵PID:4764
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"20⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"21⤵
- Executes dropped EXE
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"22⤵
- Executes dropped EXE
PID:5032 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"23⤵PID:2852
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"21⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"22⤵
- Executes dropped EXE
PID:3680 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"23⤵
- Executes dropped EXE
PID:3896 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"24⤵PID:2908
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"22⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"23⤵
- Executes dropped EXE
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"24⤵
- Executes dropped EXE
PID:4952 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"25⤵PID:3608
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"23⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"24⤵
- Executes dropped EXE
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"25⤵
- Executes dropped EXE
PID:2940 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"26⤵PID:2500
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"24⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:5104 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"25⤵
- Executes dropped EXE
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"26⤵
- Executes dropped EXE
PID:3724 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"27⤵PID:3276
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"25⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"26⤵
- Executes dropped EXE
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"27⤵
- Executes dropped EXE
PID:4676 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"28⤵PID:4224
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"26⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"27⤵
- Executes dropped EXE
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"28⤵
- Executes dropped EXE
PID:3276 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"29⤵PID:3640
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"27⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3896 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"28⤵
- Executes dropped EXE
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"29⤵
- Executes dropped EXE
PID:3616 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"30⤵PID:2204
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV131⤵PID:3432
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"28⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"29⤵
- Executes dropped EXE
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"30⤵
- Executes dropped EXE
PID:4860 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"31⤵PID:2416
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"29⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4756 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"30⤵
- Executes dropped EXE
PID:3628 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"31⤵
- Executes dropped EXE
PID:1384 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"32⤵PID:2024
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"30⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3652 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"31⤵
- Executes dropped EXE
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"32⤵
- Executes dropped EXE
PID:3272 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"33⤵PID:5108
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"31⤵
- System Location Discovery: System Language Discovery
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"32⤵PID:4440
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"33⤵PID:1880
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"34⤵PID:1872
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV135⤵PID:3044
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"32⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"33⤵PID:2204
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"34⤵PID:544
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"35⤵PID:4460
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"33⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"34⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"35⤵PID:3520
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"36⤵PID:3976
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"34⤵PID:1048
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"35⤵PID:4888
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"36⤵PID:3416
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"37⤵PID:2500
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"35⤵PID:5036
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"36⤵PID:4440
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"37⤵PID:2796
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"38⤵PID:3452
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"36⤵PID:4352
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"37⤵PID:740
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"38⤵PID:4008
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"39⤵PID:4776
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"37⤵PID:4808
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"38⤵PID:4296
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"39⤵PID:5036
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"40⤵PID:4360
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"38⤵PID:3640
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"39⤵PID:3780
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"40⤵PID:2856
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"41⤵PID:2744
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"39⤵PID:984
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"40⤵PID:3652
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"41⤵PID:4368
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"42⤵PID:1020
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"40⤵PID:4860
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"41⤵PID:4268
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"42⤵PID:2344
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"43⤵PID:4256
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"41⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"42⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"43⤵PID:892
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"44⤵PID:5036
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"42⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"43⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"44⤵PID:1872
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"45⤵PID:1596
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"43⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"44⤵PID:1944
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"45⤵PID:1144
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"46⤵PID:3324
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"44⤵PID:3640
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"45⤵PID:2020
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"46⤵PID:1192
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"47⤵PID:2500
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"45⤵PID:3132
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"46⤵PID:3724
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"47⤵PID:3324
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"48⤵PID:5008
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"46⤵PID:2416
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"47⤵PID:5076
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"48⤵PID:2892
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"49⤵PID:2624
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV150⤵PID:4676
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"47⤵PID:4868
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"48⤵PID:544
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"49⤵PID:4892
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"50⤵PID:3712
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"48⤵PID:4448
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"49⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"50⤵PID:4808
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"51⤵PID:3436
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"49⤵PID:2556
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"50⤵PID:4920
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"51⤵PID:3976
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"52⤵PID:1364
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV153⤵PID:3608
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"50⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"51⤵PID:2112
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"52⤵PID:1660
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"53⤵PID:4440
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV154⤵PID:1144
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"51⤵PID:3616
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"52⤵PID:3600
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"53⤵PID:3308
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"54⤵PID:2840
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"52⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"53⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"54⤵PID:3520
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"55⤵PID:2796
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"53⤵PID:312
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"54⤵PID:1876
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"55⤵PID:2856
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"56⤵PID:3896
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"54⤵PID:5036
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"55⤵PID:3236
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"56⤵PID:4528
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"57⤵PID:2332
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"55⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"56⤵PID:3020
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"57⤵PID:3616
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"58⤵PID:1192
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"56⤵PID:4368
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"57⤵PID:1112
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"58⤵PID:2756
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"59⤵PID:3600
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"57⤵PID:652
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"58⤵PID:4200
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"59⤵PID:2748
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"60⤵PID:4668
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"58⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"59⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"60⤵PID:2432
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"61⤵PID:3448
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"59⤵PID:996
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"60⤵PID:3616
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"61⤵PID:312
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"62⤵PID:2768
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"60⤵PID:740
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"61⤵PID:5036
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"62⤵PID:3636
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"63⤵PID:1020
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"61⤵PID:1776
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"62⤵PID:1876
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"63⤵PID:3444
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"64⤵PID:3652
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"62⤵PID:1464
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"63⤵PID:3896
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"64⤵PID:1712
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"65⤵PID:892
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"63⤵PID:3712
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"64⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"65⤵PID:5104
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"66⤵PID:2768
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"64⤵PID:4892
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"65⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"66⤵PID:3344
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"67⤵PID:3308
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"65⤵PID:5068
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"66⤵PID:3356
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"67⤵PID:1944
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"68⤵PID:2432
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"66⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"67⤵PID:3976
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"68⤵PID:2252
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"69⤵PID:3448
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"67⤵PID:5008
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"68⤵PID:5000
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"69⤵PID:1448
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"70⤵PID:528
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"68⤵PID:3076
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"69⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"70⤵PID:4764
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"71⤵PID:652
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"69⤵PID:312
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"70⤵PID:912
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"71⤵PID:3044
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"72⤵PID:2044
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"70⤵PID:3476
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"71⤵PID:4280
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"72⤵PID:4588
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"73⤵PID:508
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"71⤵PID:4384
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"72⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"73⤵PID:1300
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"74⤵PID:2020
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"72⤵PID:848
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"73⤵PID:4764
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"74⤵PID:1020
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"75⤵PID:652
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"73⤵PID:5052
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"74⤵PID:1736
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"75⤵PID:2264
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"76⤵PID:3272
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"74⤵PID:3308
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"75⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"76⤵PID:1672
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"77⤵PID:1712
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"75⤵PID:2204
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"76⤵PID:1320
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"77⤵PID:2848
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"78⤵PID:4860
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"76⤵PID:5068
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"77⤵PID:5020
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"78⤵PID:4668
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"79⤵PID:3500
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"77⤵PID:3912
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"78⤵PID:4952
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"79⤵PID:4276
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"80⤵PID:1840
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"78⤵PID:4232
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"79⤵PID:4280
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"80⤵PID:1700
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"81⤵PID:3388
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"79⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"80⤵PID:704
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"81⤵PID:5064
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"82⤵PID:1448
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"80⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"81⤵PID:4396
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"82⤵PID:2112
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"83⤵PID:3492
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"81⤵PID:4780
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"82⤵PID:4436
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"83⤵PID:4528
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"84⤵PID:1560
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"82⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"83⤵PID:4764
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"84⤵PID:4176
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"85⤵PID:1808
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"83⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"84⤵PID:4888
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"85⤵PID:4356
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"86⤵PID:2556
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"84⤵PID:3816
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"85⤵PID:1448
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"86⤵PID:4544
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"87⤵PID:2020
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"85⤵PID:2928
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"86⤵PID:4432
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"87⤵PID:3044
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"88⤵PID:2748
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"86⤵PID:4224
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"87⤵PID:3408
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"88⤵PID:3628
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"89⤵PID:3448
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"87⤵PID:4284
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"88⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"89⤵PID:3336
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"90⤵PID:4680
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"88⤵PID:4880
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"89⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"90⤵PID:4528
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"91⤵PID:4432
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"89⤵PID:532
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"90⤵PID:4848
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"91⤵PID:2000
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"92⤵PID:4092
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV193⤵PID:4764
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"90⤵PID:4268
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"91⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"92⤵PID:2972
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"93⤵PID:1552
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"91⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"92⤵PID:4232
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"93⤵PID:2892
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"94⤵PID:3388
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"92⤵PID:4800
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"93⤵PID:3408
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"94⤵PID:1576
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"95⤵PID:4896
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"93⤵PID:936
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"94⤵PID:312
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"95⤵PID:2308
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"96⤵PID:2884
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"94⤵PID:892
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"95⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"96⤵PID:3972
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"97⤵PID:4432
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV198⤵PID:3272
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"95⤵PID:508
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"96⤵PID:4496
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"97⤵PID:4436
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"98⤵PID:1808
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"96⤵PID:4784
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"97⤵PID:3344
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"98⤵PID:1192
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"99⤵PID:4488
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"97⤵PID:1452
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"98⤵PID:5020
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"99⤵PID:3388
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"100⤵PID:996
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"98⤵PID:3324
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"99⤵PID:4124
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"100⤵PID:4324
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"101⤵PID:4388
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"99⤵PID:1904
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"100⤵PID:2860
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"101⤵PID:3356
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"102⤵PID:2516
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"100⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"101⤵PID:3976
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"102⤵PID:4276
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"103⤵PID:2260
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"101⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"102⤵PID:1752
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"103⤵PID:1840
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"104⤵PID:3132
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"102⤵PID:1380
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"103⤵PID:4352
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"104⤵PID:3824
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"105⤵PID:4368
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"103⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"104⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"105⤵PID:3816
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"106⤵PID:4268
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"104⤵PID:4752
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"105⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"106⤵PID:2500
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"107⤵PID:4044
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1108⤵PID:2104
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"105⤵PID:4296
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"106⤵PID:1408
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"107⤵PID:1912
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"108⤵PID:4488
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"106⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"107⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"108⤵PID:512
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"109⤵PID:3444
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"107⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"108⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"109⤵PID:1516
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"110⤵PID:4800
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"108⤵PID:3984
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"109⤵PID:5008
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"110⤵PID:2992
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"111⤵PID:1048
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"109⤵PID:392
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"110⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"111⤵PID:3896
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"112⤵PID:3908
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1113⤵PID:2848
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"110⤵PID:4848
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"111⤵PID:4048
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"112⤵PID:1752
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"113⤵PID:1764
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"111⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"112⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"113⤵PID:3976
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"114⤵PID:936
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"112⤵PID:3356
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"113⤵PID:4092
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"114⤵PID:4044
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"115⤵PID:1056
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"113⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"114⤵PID:1048
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"115⤵PID:2708
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"116⤵PID:4736
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"114⤵PID:4324
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"115⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"116⤵PID:4868
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"117⤵PID:4384
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"115⤵PID:3824
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"116⤵PID:4560
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"117⤵PID:2284
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"118⤵PID:4448
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"116⤵PID:3332
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"117⤵PID:4572
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"118⤵PID:2308
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"119⤵PID:4920
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"117⤵PID:3972
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"118⤵PID:4176
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"119⤵PID:1680
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"120⤵PID:4868
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"118⤵PID:4224
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"119⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"120⤵PID:3896
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"121⤵PID:4948
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"C:\Users\Admin\AppData\Local\Temp\CrosshairX.exe"119⤵PID:3964
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"120⤵PID:392
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"121⤵PID:4544
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"122⤵PID:1448
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-