Malware Analysis Report

2024-09-11 01:43

Sample ID 220811-wrtk5safam
Target 7850996135.zip
SHA256 8ec919064791aa84aad6bb1374d6c67a8f5c254820f2f9a849a78f61eb6fada2
Tags
ransomware spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

8ec919064791aa84aad6bb1374d6c67a8f5c254820f2f9a849a78f61eb6fada2

Threat Level: Known bad

The file 7850996135.zip was found to be: Known bad.

Malicious Activity Summary

ransomware spyware stealer

Reads user/profile data of web browsers

Checks computer location settings

Drops file in Windows directory

Enumerates physical storage devices

Suspicious behavior: EnumeratesProcesses

Suspicious behavior: GetForegroundWindowSpam

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

MITRE ATT&CK Matrix V6

Analysis: static1

Detonation Overview

Reported

2022-08-11 18:09

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2022-08-11 18:09

Reported

2022-08-11 18:13

Platform

win10v2004-20220721-en

Max time kernel

154s

Max time network

165s

Command Line

C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe --pass D86BDXL9N3H

Signatures

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A

Reads user/profile data of web browsers

spyware stealer

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Boot\PCAT\README.txt C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
File opened for modification C:\Windows\Boot\PCAT\fr-FR\bootmgr.exe.mui C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
File opened for modification C:\Windows\diagnostics\system\IEBrowseWeb\RS_DisableaddonLoadingTime.ps1 C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
File opened for modification C:\Windows\diagnostics\system\Power\it-IT\Power_Troubleshooter.psd1 C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
File opened for modification C:\Windows\diagnostics\system\Video\VF_viddrv_driverblocklist.ps1 C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
File created C:\Windows\assembly\NativeImages_v4.0.30319_64\Microsoft.Pd3efef62#\f5852c82815dea15df3feb0b6a3dfec0\README.txt C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
File opened for modification C:\Windows\diagnostics\system\IESecurity\de-DE\IESecurity_TroubleShooter.psd1 C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
File opened for modification C:\Windows\diagnostics\system\Video\VF_viddrv_unsigned.ps1 C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
File opened for modification C:\Windows\INF\netirda.inf C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
File opened for modification C:\Windows\Microsoft.NET\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\normnfkc.nlp C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
File opened for modification C:\Windows\Cursors\up_rm.cur C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
File created C:\Windows\Boot\Fonts\README.txt C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
File opened for modification C:\Windows\diagnostics\system\IESecurity\en-US\IESecurity_TroubleShooter.psd1 C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
File opened for modification C:\Windows\INF\cht4vx64.inf C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
File opened for modification C:\Windows\INF\c_printer.inf C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
File created C:\Windows\assembly\NativeImages_v4.0.30319_64\Microsoft.Abf69f55a#\9dc8ecabf3587fd779eed1e7c1376c22\README.txt C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
File opened for modification C:\Windows\Boot\EFI\sk-SK\bootmgfw.efi.mui C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
File created C:\Windows\Boot\PCAT\da-DK\README.txt C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
File opened for modification C:\Windows\Cursors\aero_arrow_l.cur C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
File opened for modification C:\Windows\Cursors\busy_r.cur C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
File opened for modification C:\Windows\Cursors\cross_m.cur C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
File opened for modification C:\Windows\Cursors\cross_r.cur C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
File opened for modification C:\Windows\diagnostics\system\Device\CL_DetectingDevice.ps1 C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
File opened for modification C:\Windows\Boot\EFI\da-DK\bootmgr.efi.mui C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
File opened for modification C:\Windows\INF\mdmmhzel.inf C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
File opened for modification C:\Windows\ImmersiveControlPanel\images\logo.contrast-white_scale-200.png C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
File opened for modification C:\Windows\IME\IMEKR\DICTS\imkrhjd.lex C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.rsp C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\es-ES\README.txt C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
File opened for modification C:\Windows\Globalization\Sorting\SortDefault.nls C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
File opened for modification C:\Windows\Boot\EFI\da-DK\bootmgfw.efi.mui C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
File opened for modification C:\Windows\diagnostics\system\IEBrowseWeb\es-ES\DiagPackage.dll.mui C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
File opened for modification C:\Windows\INF\uaspstor.inf C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
File opened for modification C:\Windows\INF\usbncm.inf C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\ASP.NETWebAdminFiles\AppConfig\App_LocalResources\DebugAndTrace.aspx.fr.resx C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\ASP.NETWebAdminFiles\App_LocalResources\WebAdminHelp_Provider.aspx.de.resx C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\ASP.NETWebAdminFiles\Security\Roles\App_LocalResources\manageAllRoles.aspx.it.resx C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
File created C:\Windows\apppatch\it-IT\README.txt C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\ASP.NETWebAdminFiles\Security\Wizard\App_LocalResources\wizardAuthentication.ascx.es.resx C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
File opened for modification C:\Windows\diagnostics\system\BITS\RC_BITSRegKeys.ps1 C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
File opened for modification C:\Windows\diagnostics\system\Bluetooth\DiagPackage.diagpkg C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
File opened for modification C:\Windows\diagnostics\system\Keyboard\it-IT\DiagPackage.dll.mui C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
File opened for modification C:\Windows\diagnostics\system\Power\de-DE\RS_DisableUSBSelective.psd1 C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
File created C:\Windows\IME\fr-FR\README.txt C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
File opened for modification C:\Windows\ImmersiveControlPanel\images\wide.Lock.png C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\ASP.NETWebAdminFiles\Security\Roles\App_LocalResources\README.txt C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
File opened for modification C:\Windows\diagnostics\system\Audio\CL_Utility.ps1 C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
File opened for modification C:\Windows\INF\usbstor.inf C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
File created C:\Windows\diagnostics\system\PCW\de-DE\README.txt C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
File opened for modification C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
File created C:\Windows\Boot\PCAT\lt-LT\README.txt C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
File opened for modification C:\Windows\Boot\PCAT\qps-ploc\memtest.exe.mui C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
File opened for modification C:\Windows\Cursors\busy_il.cur C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
File opened for modification C:\Windows\IME\IMEJP\help\IMJPCL.CHM C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
File created C:\Windows\INF\.NET Data Provider for SqlServer\README.txt C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
File opened for modification C:\Windows\INF\mdmcpv.inf C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
File opened for modification C:\Windows\apppatch\sysmain.sdb C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
File opened for modification C:\Windows\L2Schemas\WFD_LEGACY_profile_v1.xsd C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
File created C:\Windows\Logs\waasmedic\README.txt C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\ASP.NETWebAdminFiles\AppConfig\App_LocalResources\AppSetting.ascx.fr.resx C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\ASP.NETWebAdminFiles\AppConfig\App_LocalResources\EditAppSetting.aspx.es.resx C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\ASP.NETWebAdminFiles\App_LocalResources\WebAdminHelp.aspx.fr.resx C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\ASP.NETWebAdminFiles\Security\Roles\App_LocalResources\manageSingleRole.aspx.fr.resx C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\ASP.NETWebAdminFiles\Security\Wizard\App_LocalResources\wizardProviderInfo.ascx.es.resx C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A

Enumerates physical storage devices

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3792 wrote to memory of 3572 N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe C:\Windows\SysWOW64\cmd.exe
PID 3792 wrote to memory of 3572 N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe C:\Windows\SysWOW64\cmd.exe
PID 3792 wrote to memory of 3572 N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe C:\Windows\SysWOW64\cmd.exe
PID 3792 wrote to memory of 1724 N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe C:\Windows\SysWOW64\cmd.exe
PID 3792 wrote to memory of 1724 N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe C:\Windows\SysWOW64\cmd.exe
PID 3792 wrote to memory of 1724 N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe C:\Windows\SysWOW64\cmd.exe
PID 3792 wrote to memory of 3328 N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe C:\Windows\SysWOW64\cmd.exe
PID 3792 wrote to memory of 3328 N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe C:\Windows\SysWOW64\cmd.exe
PID 3792 wrote to memory of 3328 N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe C:\Windows\SysWOW64\cmd.exe
PID 3792 wrote to memory of 652 N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe C:\Windows\SysWOW64\cmd.exe
PID 3792 wrote to memory of 652 N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe C:\Windows\SysWOW64\cmd.exe
PID 3792 wrote to memory of 652 N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe C:\Windows\SysWOW64\cmd.exe
PID 3572 wrote to memory of 2996 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3572 wrote to memory of 2996 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3572 wrote to memory of 2996 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3792 wrote to memory of 2144 N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe C:\Windows\SysWOW64\cmd.exe
PID 3792 wrote to memory of 2144 N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe C:\Windows\SysWOW64\cmd.exe
PID 3792 wrote to memory of 2144 N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe C:\Windows\SysWOW64\cmd.exe
PID 3792 wrote to memory of 464 N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe C:\Windows\SysWOW64\cmd.exe
PID 3792 wrote to memory of 464 N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe C:\Windows\SysWOW64\cmd.exe
PID 3792 wrote to memory of 464 N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe C:\Windows\SysWOW64\cmd.exe
PID 3792 wrote to memory of 3424 N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe C:\Windows\SysWOW64\cmd.exe
PID 3792 wrote to memory of 3424 N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe C:\Windows\SysWOW64\cmd.exe
PID 3792 wrote to memory of 3424 N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe C:\Windows\SysWOW64\cmd.exe
PID 3792 wrote to memory of 1828 N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe C:\Windows\SysWOW64\cmd.exe
PID 3792 wrote to memory of 1828 N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe C:\Windows\SysWOW64\cmd.exe
PID 3792 wrote to memory of 1828 N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe C:\Windows\SysWOW64\cmd.exe
PID 3792 wrote to memory of 376 N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe C:\Windows\SysWOW64\cmd.exe
PID 3792 wrote to memory of 376 N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe C:\Windows\SysWOW64\cmd.exe
PID 3792 wrote to memory of 376 N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe C:\Windows\SysWOW64\cmd.exe
PID 3792 wrote to memory of 1200 N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe C:\Windows\SysWOW64\cmd.exe
PID 3792 wrote to memory of 1200 N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe C:\Windows\SysWOW64\cmd.exe
PID 3792 wrote to memory of 1200 N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe C:\Windows\SysWOW64\cmd.exe
PID 3792 wrote to memory of 1256 N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe C:\Windows\SysWOW64\cmd.exe
PID 3792 wrote to memory of 1256 N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe C:\Windows\SysWOW64\cmd.exe
PID 3792 wrote to memory of 1256 N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe C:\Windows\SysWOW64\cmd.exe
PID 3792 wrote to memory of 4140 N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe C:\Windows\SysWOW64\cmd.exe
PID 3792 wrote to memory of 4140 N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe C:\Windows\SysWOW64\cmd.exe
PID 3792 wrote to memory of 4140 N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe C:\Windows\SysWOW64\cmd.exe
PID 3792 wrote to memory of 4164 N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe C:\Windows\SysWOW64\cmd.exe
PID 3792 wrote to memory of 4164 N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe C:\Windows\SysWOW64\cmd.exe
PID 3792 wrote to memory of 4164 N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe C:\Windows\SysWOW64\cmd.exe
PID 3792 wrote to memory of 4212 N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe C:\Windows\SysWOW64\cmd.exe
PID 3792 wrote to memory of 4212 N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe C:\Windows\SysWOW64\cmd.exe
PID 3792 wrote to memory of 4212 N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe C:\Windows\SysWOW64\cmd.exe
PID 3792 wrote to memory of 4240 N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe C:\Windows\SysWOW64\cmd.exe
PID 3792 wrote to memory of 4240 N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe C:\Windows\SysWOW64\cmd.exe
PID 3792 wrote to memory of 4240 N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe C:\Windows\SysWOW64\cmd.exe
PID 3792 wrote to memory of 4304 N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe C:\Windows\SysWOW64\cmd.exe
PID 3792 wrote to memory of 4304 N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe C:\Windows\SysWOW64\cmd.exe
PID 3792 wrote to memory of 4304 N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe C:\Windows\SysWOW64\cmd.exe
PID 3792 wrote to memory of 4352 N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe C:\Windows\SysWOW64\cmd.exe
PID 3792 wrote to memory of 4352 N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe C:\Windows\SysWOW64\cmd.exe
PID 3792 wrote to memory of 4352 N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe C:\Windows\SysWOW64\cmd.exe
PID 3792 wrote to memory of 4412 N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe C:\Windows\SysWOW64\cmd.exe
PID 3792 wrote to memory of 4412 N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe C:\Windows\SysWOW64\cmd.exe
PID 3792 wrote to memory of 4412 N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe C:\Windows\SysWOW64\cmd.exe
PID 3792 wrote to memory of 4476 N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe C:\Windows\SysWOW64\cmd.exe
PID 3792 wrote to memory of 4476 N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe C:\Windows\SysWOW64\cmd.exe
PID 3792 wrote to memory of 4476 N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe C:\Windows\SysWOW64\cmd.exe
PID 3792 wrote to memory of 4532 N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe C:\Windows\SysWOW64\cmd.exe
PID 3792 wrote to memory of 4532 N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe C:\Windows\SysWOW64\cmd.exe
PID 3792 wrote to memory of 4532 N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe C:\Windows\SysWOW64\cmd.exe
PID 3792 wrote to memory of 4608 N/A C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe C:\Windows\SysWOW64\cmd.exe

Processes

C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe

C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe --pass D86BDXL9N3H

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c powershell -command "Get-VM | Stop-VM -Force"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" net stop MSSQLServerADHelper100

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" net stop MSSQL$ISARS

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" net stop MSSQL$MSFW

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -command "Get-VM | Stop-VM -Force"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" net stop SQLAgent$ISARS

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" net stop SQLAgent$MSFW

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" net stop SQLBrowser

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" net stop ReportServer$ISARS

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" net stop SQLWriter

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" net stop WinDefend

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" net stop mr2kserv

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" net stop MSExchangeADTopology

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" net stop MSExchangeFBA

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" net stop MSExchangeIS

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" net stop MSExchangeSA

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" net stop ShadowProtectSvc

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" net stop SPAdminV4

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" net stop SPTimerV4

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" net stop SPTraceV4

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" net stop SPUserCodeV4

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" net stop SPWriterV4

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" net stop SPSearch4

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" net stop MSSQLServerADHelper100

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" net stop IISADMIN

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" net stop firebirdguardiandefaultinstance

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" net stop ibmiasrw

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" net stop QBCFMonitorService

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" net stop QBVSS

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" net stop QBPOSDBServiceV12

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" net stop "IBM Domino Server (CProgramFilesIBMDominodata)"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" net stop "IBM Domino Diagnostics (CProgramFilesIBMDomino)"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" net stop IISADMIN

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" net stop "Simply Accounting Database Connection Manager"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" net stop QuickBooksDB1

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" net stop QuickBooksDB2

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" net stop QuickBooksDB3

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" net stop QuickBooksDB4

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" net stop QuickBooksDB5

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" net stop QuickBooksDB6

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" net stop QuickBooksDB7

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" net stop QuickBooksDB8

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" net stop QuickBooksDB9

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" net stop QuickBooksDB10

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" net stop QuickBooksDB11

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" net stop QuickBooksDB12

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" net stop QuickBooksDB13

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" net stop QuickBooksDB14

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" net stop QuickBooksDB15

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" net stop QuickBooksDB16

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" net stop QuickBooksDB17

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" net stop QuickBooksDB18

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" net stop QuickBooksDB19

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" net stop QuickBooksDB20

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" net stop QuickBooksDB21

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" net stop QuickBooksDB22

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" net stop QuickBooksDB23

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" net stop QuickBooksDB24

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" net stop QuickBooksDB25

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" taskkill /f /im mysql*

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" taskkill /f /im dsa*

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" taskkill /f /im veeam*

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" taskkill /f /im chrome*

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" taskkill /f /im iexplore*

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" taskkill /f /im firefox*

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" taskkill /f /im outlook*

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" taskkill /f /im excel*

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" taskkill /f /im outlook*

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" taskkill /f /im taskmgr*

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" taskkill /f /im tasklist*

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" taskkill /f /im Ntrtscan*

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" taskkill /f /im ds_monitor*

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" taskkill /f /im Notifier*

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" taskkill /f /im putty*

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" taskkill /f /im ssh*

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" taskkill /f /im iVPAgent*

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" taskkill /f /im TmListen*

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" taskkill /f /im CNTAoSMgr*

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" taskkill /f /im IBM*

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" taskkill /f /im black*

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" taskkill /f /im bes10*

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" taskkill /f /im copy*

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" taskkill /f /im robo*

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" taskkill /f /im sql

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" taskkill /f /im store.exe

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" taskkill /f /im sql*

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" taskkill /f /im vee*

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" taskkill /f /im wrsa.exe

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" taskkill /f /im postg*

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" taskkill /f /im sage*

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" taskkill /f /im wrsa*

Network

Country Destination Domain Proto
US 93.184.221.240:80 tcp
US 20.44.10.122:443 tcp
FR 2.18.109.224:443 tcp
US 93.184.221.240:80 tcp
US 8.8.8.8:53 151.122.125.40.in-addr.arpa udp
US 93.184.221.240:80 tcp

Files

memory/3572-130-0x0000000000000000-mapping.dmp

memory/1724-131-0x0000000000000000-mapping.dmp

memory/3328-132-0x0000000000000000-mapping.dmp

memory/2996-134-0x0000000000000000-mapping.dmp

memory/2144-135-0x0000000000000000-mapping.dmp

memory/652-133-0x0000000000000000-mapping.dmp

memory/464-136-0x0000000000000000-mapping.dmp

memory/3424-137-0x0000000000000000-mapping.dmp

memory/1828-138-0x0000000000000000-mapping.dmp

memory/376-139-0x0000000000000000-mapping.dmp

memory/1200-140-0x0000000000000000-mapping.dmp

memory/1256-141-0x0000000000000000-mapping.dmp

memory/2996-142-0x00000000045F0000-0x0000000004626000-memory.dmp

memory/4164-144-0x0000000000000000-mapping.dmp

memory/4140-143-0x0000000000000000-mapping.dmp

memory/4212-145-0x0000000000000000-mapping.dmp

memory/2996-147-0x0000000004CC0000-0x00000000052E8000-memory.dmp

memory/4240-146-0x0000000000000000-mapping.dmp

memory/4304-148-0x0000000000000000-mapping.dmp

memory/4352-149-0x0000000000000000-mapping.dmp

memory/4412-150-0x0000000000000000-mapping.dmp

memory/4476-151-0x0000000000000000-mapping.dmp

memory/4532-152-0x0000000000000000-mapping.dmp

memory/2996-153-0x0000000004C20000-0x0000000004C42000-memory.dmp

memory/2996-154-0x0000000005520000-0x0000000005586000-memory.dmp

memory/4608-156-0x0000000000000000-mapping.dmp

memory/2996-155-0x0000000005590000-0x00000000055F6000-memory.dmp

memory/4652-157-0x0000000000000000-mapping.dmp

memory/4664-158-0x0000000000000000-mapping.dmp

memory/4748-159-0x0000000000000000-mapping.dmp

memory/4840-161-0x0000000000000000-mapping.dmp

memory/4792-160-0x0000000000000000-mapping.dmp

memory/4892-162-0x0000000000000000-mapping.dmp

memory/4932-163-0x0000000000000000-mapping.dmp

memory/4996-165-0x0000000000000000-mapping.dmp

memory/4976-164-0x0000000000000000-mapping.dmp

memory/5056-166-0x0000000000000000-mapping.dmp

memory/4112-167-0x0000000000000000-mapping.dmp

memory/4616-168-0x0000000000000000-mapping.dmp

memory/4704-169-0x0000000000000000-mapping.dmp

memory/2996-170-0x0000000005BC0000-0x0000000005BDE000-memory.dmp

memory/4252-171-0x0000000000000000-mapping.dmp

memory/4580-172-0x0000000000000000-mapping.dmp

memory/5156-173-0x0000000000000000-mapping.dmp

memory/5216-175-0x0000000000000000-mapping.dmp

memory/5188-174-0x0000000000000000-mapping.dmp

memory/5320-176-0x0000000000000000-mapping.dmp

memory/5352-177-0x0000000000000000-mapping.dmp

memory/5420-178-0x0000000000000000-mapping.dmp

memory/5444-179-0x0000000000000000-mapping.dmp

memory/5536-181-0x0000000000000000-mapping.dmp

memory/5512-180-0x0000000000000000-mapping.dmp

memory/5616-182-0x0000000000000000-mapping.dmp

memory/5672-183-0x0000000000000000-mapping.dmp

memory/5732-185-0x0000000000000000-mapping.dmp

memory/5712-184-0x0000000000000000-mapping.dmp

memory/5828-187-0x0000000000000000-mapping.dmp

memory/5808-186-0x0000000000000000-mapping.dmp

memory/5868-188-0x0000000000000000-mapping.dmp

memory/5936-189-0x0000000000000000-mapping.dmp

memory/6020-191-0x0000000000000000-mapping.dmp

memory/6008-190-0x0000000000000000-mapping.dmp

memory/6100-192-0x0000000000000000-mapping.dmp

memory/2996-193-0x0000000006190000-0x00000000061C2000-memory.dmp

memory/2996-194-0x0000000070510000-0x000000007055C000-memory.dmp

memory/2996-196-0x0000000006B80000-0x0000000006B9E000-memory.dmp

memory/5236-195-0x0000000000000000-mapping.dmp

memory/5360-197-0x0000000000000000-mapping.dmp

memory/5740-198-0x0000000000000000-mapping.dmp

memory/5944-199-0x0000000000000000-mapping.dmp

memory/5484-200-0x0000000000000000-mapping.dmp

memory/2996-201-0x0000000007510000-0x0000000007B8A000-memory.dmp

memory/2996-202-0x0000000006ED0000-0x0000000006EEA000-memory.dmp

memory/6184-203-0x0000000000000000-mapping.dmp

memory/6216-204-0x0000000000000000-mapping.dmp

memory/2996-205-0x0000000006F40000-0x0000000006F4A000-memory.dmp

memory/2996-206-0x0000000007150000-0x00000000071E6000-memory.dmp

memory/2996-207-0x0000000007100000-0x000000000710E000-memory.dmp

memory/2996-208-0x0000000007210000-0x000000000722A000-memory.dmp

memory/2996-209-0x00000000071F0000-0x00000000071F8000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

MD5 8f96320ab4e0bc1369dc19e92e8a80f9
SHA1 f6b6ce97cc2d25420cedb7fd56e1997f0708784a
SHA256 8e7fbdb100e3011090351fa85b0c0a45b729e3e69cc27de6983868a9a5e80677
SHA512 1c49036de8852e3618939e722294a8353b6ab827d978740fb05954d2ca377e45ab81bcee1130373475d0ce0402c95cf53e9aaac41650b858fec73201c1abc795

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 3902e23c5e6e1dc28aa5090a1a48aac7
SHA1 4a20ad2bb624336bb144dbf2351a924122a5fdcf
SHA256 f4fc7755d3123d09d8bddb28570c163ffe1a6303a602c181ae4102583d051b43
SHA512 e0b62395cd6c7cbd59a0a0f444eb0241e4b4a2a9510170102191acbb3d8e593da76b045b8b1fc59675bd8cc4336330982082114a661e947b7a096ce817da03b3