Analysis
-
max time kernel
293s -
max time network
300s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2022, 13:49
Static task
static1
Behavioral task
behavioral1
Sample
PO-090-TCG-SG.jar
Resource
win7-20220812-en
General
-
Target
PO-090-TCG-SG.jar
-
Size
625KB
-
MD5
b326ba49794d3e9be44860de3b6e3cd3
-
SHA1
1d80eadb8228ef5a3862240bab8a780b7bbff098
-
SHA256
7cdffb3bc46c9b767d6ab1c999b94faafbab963b3c8e70fa0e94c5c4cba41e55
-
SHA512
4c5799f7839cf5805e25e6b6823dbf778c6074d427c6432593dfdcc6cd5b14453424d0fe7b7674ecd81b14daefa8b7d3651821ee92b35df9ed0aa613ec44d9cc
-
SSDEEP
12288:9SkyuK/y8DJPaOdrhyCLqZAksHMZM2H5jKTW9yhTrPC7i5vFJ:2Zy8tPhrhViesZMcjZ9yhTrPSivJ
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" regedit.exe -
Blocklisted process makes network request 28 IoCs
flow pid Process 18 4812 WScript.exe 26 4812 WScript.exe 38 4812 WScript.exe 44 4812 WScript.exe 46 4812 WScript.exe 50 4812 WScript.exe 51 4812 WScript.exe 55 4812 WScript.exe 56 4812 WScript.exe 58 4812 WScript.exe 64 4812 WScript.exe 72 4812 WScript.exe 75 4812 WScript.exe 76 4812 WScript.exe 78 4812 WScript.exe 79 4812 WScript.exe 80 4812 WScript.exe 82 4812 WScript.exe 83 4812 WScript.exe 85 4812 WScript.exe 86 4812 WScript.exe 89 4812 WScript.exe 90 4812 WScript.exe 91 4812 WScript.exe 96 4812 WScript.exe 97 4812 WScript.exe 99 4812 WScript.exe 100 4812 WScript.exe -
Disables use of System Restore points 1 TTPs
-
Sets file execution options in registry 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Bav.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CertReg.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nnf.exe\debugger = "svchost.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\psview.exe\debugger = "svchost.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wireshark.exe\debugger = "svchost.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SUPERDelete.exe\debugger = "svchost.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVKTray.exe\debugger = "svchost.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\editcap.exe\debugger = "svchost.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MWASER.EXE\debugger = "svchost.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\virusutilities.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MCS-Uninstall.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SDWelcome.exe\debugger = "svchost.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSASCui.exe\debugger = "svchost.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\NisSrv.exe\debugger = "svchost.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\V3Proxy.exe\debugger = "svchost.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\FSHDLL64.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fssm32.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\freshclamwrap.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\VIPREUI.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\quamgr.exe\debugger = "svchost.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ProcessHacker.exe\debugger = "svchost.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsgk32.exe\debugger = "svchost.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fshoster32.exe\debugger = "svchost.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Zlh.exe\debugger = "svchost.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\coreServiceShell.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AdAwareTray.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cis.exe\debugger = "svchost.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\FPWin.exe\debugger = "svchost.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVKTray.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\freshclamwrap.exe\debugger = "svchost.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PSANHost.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SBAMTray.exe\debugger = "svchost.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\schmgr.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\text2pcap.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\twsscan.exe\debugger = "svchost.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsorsp.exe\debugger = "svchost.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\FProtTray.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\K7CrvSvc.exe\debugger = "svchost.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nanosvc.exe\debugger = "svchost.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\uiWinMgr.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UserReg.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\econceal.exe\debugger = "svchost.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\NS.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\V3Main.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\op_mon.exe\debugger = "svchost.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PtSessionAgent.exe\debugger = "svchost.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\escanpro.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CisTray.exe\debugger = "svchost.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\GDKBFltExe32.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\guardxservice.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nvcod.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PtSessionAgent.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SDWelcome.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpUXSrv.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UnThreat.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AdAwareService.exe\debugger = "svchost.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\GDScan.exe\debugger = "svchost.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MCShieldDS.exe\debugger = "svchost.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\FortiFW.exe\debugger = "svchost.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\capinfos.exe\debugger = "svchost.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MWAGENT.EXE regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nanosvc.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\OPSSVC.EXE\debugger = "svchost.exe" regedit.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EotRrJluLY.js WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EotRrJluLY.js WScript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Y6O3SUOZUV = "\"C:\\Users\\Admin\\AppData\\Roaming\\EotRrJluLY.js\"" WScript.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\System32\test.txt javaw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 64 IoCs
pid Process 764 taskkill.exe 3876 taskkill.exe 768 taskkill.exe 2028 taskkill.exe 3108 taskkill.exe 4676 taskkill.exe 2224 taskkill.exe 440 taskkill.exe 3644 taskkill.exe 4412 taskkill.exe 3384 taskkill.exe 4036 taskkill.exe 4500 taskkill.exe 2216 taskkill.exe 4360 taskkill.exe 2508 taskkill.exe 1348 taskkill.exe 2876 taskkill.exe 3084 taskkill.exe 3316 taskkill.exe 3636 taskkill.exe 4832 taskkill.exe 1684 taskkill.exe 1956 taskkill.exe 1732 taskkill.exe 988 taskkill.exe 3564 taskkill.exe 3292 taskkill.exe 2476 taskkill.exe 2896 taskkill.exe 1660 taskkill.exe 652 taskkill.exe 4764 taskkill.exe 4972 taskkill.exe 640 taskkill.exe 344 taskkill.exe 1716 taskkill.exe 4324 taskkill.exe 1052 taskkill.exe 4924 taskkill.exe 2448 taskkill.exe 4348 taskkill.exe 5016 taskkill.exe 1296 taskkill.exe 2516 taskkill.exe 204 taskkill.exe 3428 taskkill.exe 4444 taskkill.exe 4520 taskkill.exe 4220 taskkill.exe 2600 taskkill.exe 2680 taskkill.exe 1680 taskkill.exe 5016 taskkill.exe 1908 taskkill.exe 920 taskkill.exe 3676 taskkill.exe 3588 taskkill.exe 380 taskkill.exe 5100 taskkill.exe 4780 taskkill.exe 776 taskkill.exe 2488 taskkill.exe 4204 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings wscript.exe -
Runs .reg file with regedit 1 IoCs
pid Process 5012 regedit.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4412 taskkill.exe Token: SeDebugPrivilege 764 taskkill.exe Token: SeDebugPrivilege 4868 taskkill.exe Token: SeDebugPrivilege 1964 taskkill.exe Token: SeDebugPrivilege 3100 taskkill.exe Token: SeDebugPrivilege 1676 taskkill.exe Token: SeDebugPrivilege 4600 taskkill.exe Token: SeDebugPrivilege 4540 taskkill.exe Token: SeDebugPrivilege 3876 taskkill.exe Token: SeDebugPrivilege 3384 taskkill.exe Token: SeDebugPrivilege 3976 taskkill.exe Token: SeDebugPrivilege 1648 taskkill.exe Token: SeDebugPrivilege 4764 taskkill.exe Token: SeDebugPrivilege 2752 taskkill.exe Token: SeDebugPrivilege 1732 taskkill.exe Token: SeDebugPrivilege 5016 taskkill.exe Token: SeDebugPrivilege 4972 taskkill.exe Token: SeDebugPrivilege 2940 taskkill.exe Token: SeDebugPrivilege 4952 taskkill.exe Token: SeDebugPrivilege 1492 taskkill.exe Token: SeDebugPrivilege 3696 taskkill.exe Token: SeDebugPrivilege 3284 taskkill.exe Token: SeDebugPrivilege 4300 taskkill.exe Token: SeDebugPrivilege 4992 taskkill.exe Token: SeDebugPrivilege 4496 taskkill.exe Token: SeDebugPrivilege 3556 taskkill.exe Token: SeDebugPrivilege 3776 taskkill.exe Token: SeDebugPrivilege 3424 taskkill.exe Token: SeDebugPrivilege 4132 taskkill.exe Token: SeDebugPrivilege 4708 taskkill.exe Token: SeDebugPrivilege 4788 taskkill.exe Token: SeDebugPrivilege 3884 taskkill.exe Token: SeDebugPrivilege 3316 taskkill.exe Token: SeDebugPrivilege 4412 taskkill.exe Token: SeDebugPrivilege 768 taskkill.exe Token: SeDebugPrivilege 4056 taskkill.exe Token: SeDebugPrivilege 4228 taskkill.exe Token: SeDebugPrivilege 820 taskkill.exe Token: SeDebugPrivilege 3520 taskkill.exe Token: SeDebugPrivilege 2028 taskkill.exe Token: SeDebugPrivilege 64 taskkill.exe Token: SeDebugPrivilege 1476 taskkill.exe Token: SeDebugPrivilege 3636 taskkill.exe Token: SeDebugPrivilege 2448 taskkill.exe Token: SeDebugPrivilege 2436 taskkill.exe Token: SeDebugPrivilege 1048 taskkill.exe Token: SeDebugPrivilege 1840 taskkill.exe Token: SeDebugPrivilege 4888 taskkill.exe Token: SeDebugPrivilege 640 taskkill.exe Token: SeDebugPrivilege 3792 taskkill.exe Token: SeDebugPrivilege 4764 taskkill.exe Token: SeDebugPrivilege 4156 taskkill.exe Token: SeDebugPrivilege 988 taskkill.exe Token: SeDebugPrivilege 344 taskkill.exe Token: SeDebugPrivilege 3108 taskkill.exe Token: SeDebugPrivilege 1716 taskkill.exe Token: SeDebugPrivilege 4228 taskkill.exe Token: SeDebugPrivilege 3564 taskkill.exe Token: SeDebugPrivilege 5072 taskkill.exe Token: SeDebugPrivilege 4348 taskkill.exe Token: SeDebugPrivilege 4592 taskkill.exe Token: SeDebugPrivilege 2516 taskkill.exe Token: SeDebugPrivilege 4676 taskkill.exe Token: SeDebugPrivilege 4324 taskkill.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2976 javaw.exe 2040 java.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3108 wrote to memory of 2796 3108 java.exe 85 PID 3108 wrote to memory of 2796 3108 java.exe 85 PID 2796 wrote to memory of 4812 2796 wscript.exe 86 PID 2796 wrote to memory of 4812 2796 wscript.exe 86 PID 2796 wrote to memory of 2976 2796 wscript.exe 87 PID 2796 wrote to memory of 2976 2796 wscript.exe 87 PID 2976 wrote to memory of 2040 2976 javaw.exe 88 PID 2976 wrote to memory of 2040 2976 javaw.exe 88 PID 2976 wrote to memory of 5064 2976 javaw.exe 91 PID 2976 wrote to memory of 5064 2976 javaw.exe 91 PID 2040 wrote to memory of 5024 2040 java.exe 92 PID 2040 wrote to memory of 5024 2040 java.exe 92 PID 5064 wrote to memory of 4544 5064 cmd.exe 95 PID 5064 wrote to memory of 4544 5064 cmd.exe 95 PID 5024 wrote to memory of 1036 5024 cmd.exe 96 PID 5024 wrote to memory of 1036 5024 cmd.exe 96 PID 2040 wrote to memory of 4288 2040 java.exe 100 PID 2040 wrote to memory of 4288 2040 java.exe 100 PID 2976 wrote to memory of 1468 2976 javaw.exe 99 PID 2976 wrote to memory of 1468 2976 javaw.exe 99 PID 1468 wrote to memory of 852 1468 cmd.exe 104 PID 1468 wrote to memory of 852 1468 cmd.exe 104 PID 4288 wrote to memory of 3796 4288 cmd.exe 103 PID 4288 wrote to memory of 3796 4288 cmd.exe 103 PID 2976 wrote to memory of 4156 2976 javaw.exe 105 PID 2976 wrote to memory of 4156 2976 javaw.exe 105 PID 2040 wrote to memory of 2524 2040 java.exe 107 PID 2040 wrote to memory of 2524 2040 java.exe 107 PID 2976 wrote to memory of 4904 2976 javaw.exe 110 PID 2976 wrote to memory of 4904 2976 javaw.exe 110 PID 2976 wrote to memory of 4412 2976 javaw.exe 113 PID 2976 wrote to memory of 4412 2976 javaw.exe 113 PID 2976 wrote to memory of 4420 2976 javaw.exe 115 PID 2976 wrote to memory of 4420 2976 javaw.exe 115 PID 4420 wrote to memory of 5012 4420 cmd.exe 117 PID 4420 wrote to memory of 5012 4420 cmd.exe 117 PID 2976 wrote to memory of 764 2976 javaw.exe 118 PID 2976 wrote to memory of 764 2976 javaw.exe 118 PID 2976 wrote to memory of 4868 2976 javaw.exe 120 PID 2976 wrote to memory of 4868 2976 javaw.exe 120 PID 2976 wrote to memory of 1964 2976 javaw.exe 123 PID 2976 wrote to memory of 1964 2976 javaw.exe 123 PID 2976 wrote to memory of 3100 2976 javaw.exe 125 PID 2976 wrote to memory of 3100 2976 javaw.exe 125 PID 2976 wrote to memory of 1676 2976 javaw.exe 128 PID 2976 wrote to memory of 1676 2976 javaw.exe 128 PID 2976 wrote to memory of 4600 2976 javaw.exe 130 PID 2976 wrote to memory of 4600 2976 javaw.exe 130 PID 2976 wrote to memory of 4540 2976 javaw.exe 132 PID 2976 wrote to memory of 4540 2976 javaw.exe 132 PID 2976 wrote to memory of 3876 2976 javaw.exe 134 PID 2976 wrote to memory of 3876 2976 javaw.exe 134 PID 2976 wrote to memory of 3384 2976 javaw.exe 137 PID 2976 wrote to memory of 3384 2976 javaw.exe 137 PID 2976 wrote to memory of 3976 2976 javaw.exe 138 PID 2976 wrote to memory of 3976 2976 javaw.exe 138 PID 2976 wrote to memory of 1648 2976 javaw.exe 140 PID 2976 wrote to memory of 1648 2976 javaw.exe 140 PID 2976 wrote to memory of 4764 2976 javaw.exe 142 PID 2976 wrote to memory of 4764 2976 javaw.exe 142 PID 2976 wrote to memory of 2752 2976 javaw.exe 144 PID 2976 wrote to memory of 2752 2976 javaw.exe 144 PID 2976 wrote to memory of 1732 2976 javaw.exe 146 PID 2976 wrote to memory of 1732 2976 javaw.exe 146
Processes
-
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\PO-090-TCG-SG.jar1⤵
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Windows\SYSTEM32\wscript.exewscript C:\Users\Admin\jjswbfmpkr.js2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\EotRrJluLY.js"3⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:4812
-
-
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\bixdsszddg.txt"3⤵
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Program Files\Java\jre1.8.0_66\bin\java.exe"C:\Program Files\Java\jre1.8.0_66\bin\java.exe" -jar C:\Users\Admin\AppData\Local\Temp\_0.19844322723278843909023851822834099.class4⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive2171829258634001436.vbs5⤵
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Windows\system32\cscript.execscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive2171829258634001436.vbs6⤵PID:1036
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /C cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive8232765323767647558.vbs5⤵
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Windows\system32\cscript.execscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive8232765323767647558.vbs6⤵PID:3796
-
-
-
C:\Windows\SYSTEM32\xcopy.exexcopy "C:\Program Files\Java\jre1.8.0_66" "C:\Users\Admin\AppData\Roaming\Oracle\" /e5⤵PID:2524
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /C cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive8310157283682935209.vbs4⤵
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\system32\cscript.execscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive8310157283682935209.vbs5⤵PID:4544
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /C cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive5446966286694821409.vbs4⤵
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\system32\cscript.execscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive5446966286694821409.vbs5⤵PID:852
-
-
-
C:\Windows\SYSTEM32\xcopy.exexcopy "C:\Program Files\Java\jre1.8.0_66" "C:\Users\Admin\AppData\Roaming\Oracle\" /e4⤵PID:4156
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe4⤵PID:4904
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM UserAccountControlSettings.exe /T /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4412
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c regedit.exe /s C:\Users\Admin\AppData\Local\Temp\tedOMLqJiY2387175954939911402.reg4⤵
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Windows\regedit.exeregedit.exe /s C:\Users\Admin\AppData\Local\Temp\tedOMLqJiY2387175954939911402.reg5⤵
- UAC bypass
- Sets file execution options in registry
- Runs .reg file with regedit
PID:5012
-
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM ProcessHacker.exe /T /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:764
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM procexp.exe /T /F4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4868
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM MSASCui.exe /T /F4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1964
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM MsMpEng.exe /T /F4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3100
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM MpUXSrv.exe /T /F4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1676
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM MpCmdRun.exe /T /F4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4600
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM NisSrv.exe /T /F4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4540
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM ConfigSecurityPolicy.exe /T /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3876
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM procexp.exe /T /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3384
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM wireshark.exe /T /F4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3976
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM tshark.exe /T /F4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1648
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM text2pcap.exe /T /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4764
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM rawshark.exe /T /F4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2752
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM mergecap.exe /T /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1732
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM editcap.exe /T /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5016
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM dumpcap.exe /T /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4972
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM capinfos.exe /T /F4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2940
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM mbam.exe /T /F4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4952
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM mbamscheduler.exe /T /F4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1492
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM mbamservice.exe /T /F4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3696
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM AdAwareService.exe /T /F4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3284
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM AdAwareTray.exe /T /F4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4300
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM WebCompanion.exe /T /F4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4992
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM AdAwareDesktop.exe /T /F4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4496
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM V3Main.exe /T /F4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3556
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM V3Svc.exe /T /F4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3776
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM V3Up.exe /T /F4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3424
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM V3SP.exe /T /F4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4132
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM V3Proxy.exe /T /F4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4708
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM V3Medic.exe /T /F4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4788
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM BgScan.exe /T /F4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3884
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM BullGuard.exe /T /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3316
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM BullGuardBhvScanner.exe /T /F4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4412
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM BullGuarScanner.exe /T /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:768
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM LittleHook.exe /T /F4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4056
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM BullGuardUpdate.exe /T /F4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4228
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM clamscan.exe /T /F4⤵
- Suspicious use of AdjustPrivilegeToken
PID:820
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM ClamTray.exe /T /F4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3520
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM ClamWin.exe /T /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2028
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM cis.exe /T /F4⤵
- Suspicious use of AdjustPrivilegeToken
PID:64
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM CisTray.exe /T /F4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1476
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM cmdagent.exe /T /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3636
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM cavwp.exe /T /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2448
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM dragon_updater.exe /T /F4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2436
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM MWAGENT.EXE /T /F4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1048
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM MWASER.EXE /T /F4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1840
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM CONSCTLX.EXE /T /F4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4888
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM avpmapp.exe /T /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:640
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM econceal.exe /T /F4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3792
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM escanmon.exe /T /F4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4764
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM escanpro.exe /T /F4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4156
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM TRAYSSER.EXE /T /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:988
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM TRAYICOS.EXE /T /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:344
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM econser.exe /T /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3108
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM VIEWTCP.EXE /T /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1716
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM FSHDLL64.exe /T /F4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4228
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM fsgk32.exe /T /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3564
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM fshoster32.exe /T /F4⤵
- Suspicious use of AdjustPrivilegeToken
PID:5072
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM FSMA32.EXE /T /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4348
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM fsorsp.exe /T /F4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4592
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM fssm32.exe /T /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2516
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM FSM32.EXE /T /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4676
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM trigger.exe /T /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4324
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM FProtTray.exe /T /F4⤵PID:2896
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM FPWin.exe /T /F4⤵PID:5092
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM FPAVServer.exe /T /F4⤵
- Kills process with taskkill
PID:4832
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM AVK.exe /T /F4⤵PID:4588
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM GdBgInx64.exe /T /F4⤵
- Kills process with taskkill
PID:1908
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM AVKProxy.exe /T /F4⤵PID:540
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM GDScan.exe /T /F4⤵PID:1732
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM AVKWCtlx64.exe /T /F4⤵
- Kills process with taskkill
PID:920
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM AVKService.exe /T /F4⤵
- Kills process with taskkill
PID:3676
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM AVKTray.exe /T /F4⤵PID:2224
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM GDKBFltExe32.exe /T /F4⤵PID:4292
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM GDSC.exe /T /F4⤵PID:756
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM virusutilities.exe /T /F4⤵PID:2228
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM guardxservice.exe /T /F4⤵PID:3300
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM guardxkickoff_x64.exe /T /F4⤵PID:4468
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM iptray.exe /T /F4⤵PID:3876
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM freshclam.exe /T /F4⤵
- Kills process with taskkill
PID:3292
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM freshclamwrap.exe /T /F4⤵PID:4184
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM K7RTScan.exe /T /F4⤵
- Kills process with taskkill
PID:4036
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM K7FWSrvc.exe /T /F4⤵PID:2928
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM K7PSSrvc.exe /T /F4⤵
- Kills process with taskkill
PID:1052
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM K7EmlPxy.EXE /T /F4⤵
- Kills process with taskkill
PID:3588
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM K7TSecurity.exe /T /F4⤵PID:2340
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM K7AVScan.exe /T /F4⤵
- Kills process with taskkill
PID:204
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM K7CrvSvc.exe /T /F4⤵
- Kills process with taskkill
PID:5016
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM K7SysMon.Exe /T /F4⤵
- Kills process with taskkill
PID:380
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM K7TSMain.exe /T /F4⤵PID:2504
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM K7TSMngr.exe /T /F4⤵PID:1932
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM nanosvc.exe /T /F4⤵
- Kills process with taskkill
PID:1684
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM nanoav.exe /T /F4⤵PID:3788
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM nnf.exe /T /F4⤵PID:1420
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM nvcsvc.exe /T /F4⤵PID:4964
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM nbrowser.exe /T /F4⤵PID:1588
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM nseupdatesvc.exe /T /F4⤵PID:1000
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM nfservice.exe /T /F4⤵PID:1964
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM nwscmon.exe /T /F4⤵
- Kills process with taskkill
PID:2476
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM njeeves2.exe /T /F4⤵PID:664
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM nvcod.exe /T /F4⤵PID:3764
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM nvoy.exe /T /F4⤵PID:2936
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM zlhh.exe /T /F4⤵PID:3140
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM Zlh.exe /T /F4⤵PID:2128
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM nprosec.exe /T /F4⤵
- Kills process with taskkill
PID:2224
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM Zanda.exe /T /F4⤵
- Kills process with taskkill
PID:2896
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM NS.exe /T /F4⤵
- Kills process with taskkill
PID:4924
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM acs.exe /T /F4⤵PID:4976
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM op_mon.exe /T /F4⤵PID:1148
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM PSANHost.exe /T /F4⤵
- Kills process with taskkill
PID:4500
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM PSUAMain.exe /T /F4⤵
- Kills process with taskkill
PID:1660
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM PSUAService.exe /T /F4⤵PID:2036
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM AgentSvc.exe /T /F4⤵PID:4764
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM BDSSVC.EXE /T /F4⤵PID:3612
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM EMLPROXY.EXE /T /F4⤵PID:4576
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM OPSSVC.EXE /T /F4⤵PID:4196
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM ONLINENT.EXE /T /F4⤵PID:4540
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM QUHLPSVC.EXE /T /F4⤵PID:1972
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM SAPISSVC.EXE /T /F4⤵PID:3280
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM SCANNER.EXE /T /F4⤵
- Kills process with taskkill
PID:3428
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM SCANWSCS.EXE /T /F4⤵PID:2932
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM scproxysrv.exe /T /F4⤵
- Kills process with taskkill
PID:5100
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM ScSecSvc.exe /T /F4⤵
- Kills process with taskkill
PID:4220
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM SUPERAntiSpyware.exe /T /F4⤵PID:4788
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM SASCore64.exe /T /F4⤵PID:4676
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM SSUpdate64.exe /T /F4⤵PID:2340
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM SUPERDelete.exe /T /F4⤵PID:2476
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM SASTask.exe /T /F4⤵PID:2900
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM K7RTScan.exe /T /F4⤵PID:2324
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM K7FWSrvc.exe /T /F4⤵PID:2772
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM K7PSSrvc.exe /T /F4⤵PID:1260
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM K7EmlPxy.EXE /T /F4⤵
- Kills process with taskkill
PID:2216
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM K7TSecurity.exe /T /F4⤵PID:3980
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM K7AVScan.exe /T /F4⤵PID:3184
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM K7CrvSvc.exe /T /F4⤵
- Kills process with taskkill
PID:1348
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM K7SysMon.Exe /T /F4⤵
- Kills process with taskkill
PID:440
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM K7TSMain.exe /T /F4⤵
- Kills process with taskkill
PID:4360
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM K7TSMngr.exe /T /F4⤵
- Kills process with taskkill
PID:4780
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM uiWinMgr.exe /T /F4⤵PID:3320
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM uiWatchDog.exe /T /F4⤵PID:2112
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM uiSeAgnt.exe /T /F4⤵
- Kills process with taskkill
PID:2600
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM PtWatchDog.exe /T /F4⤵PID:1288
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM PtSvcHost.exe /T /F4⤵PID:3644
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM PtSessionAgent.exe /T /F4⤵PID:2928
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM coreFrameworkHost.exe /T /F4⤵PID:4324
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM coreServiceShell.exe /T /F4⤵PID:3764
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM uiUpdateTray.exe /T /F4⤵PID:3788
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM VIPREUI.exe /T /F4⤵
- Kills process with taskkill
PID:4444
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM SBAMSvc.exe /T /F4⤵PID:4576
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM SBAMTray.exe /T /F4⤵PID:2564
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM SBPIMSvc.exe /T /F4⤵PID:1196
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM bavhm.exe /T /F4⤵PID:544
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM BavSvc.exe /T /F4⤵PID:4496
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM BavTray.exe /T /F4⤵PID:1716
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM Bav.exe /T /F4⤵PID:2612
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM BavWebClient.exe /T /F4⤵
- Kills process with taskkill
PID:1296
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM BavUpdater.exe /T /F4⤵
- Kills process with taskkill
PID:2876
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM MCShieldCCC.exe /T /F4⤵PID:1524
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM MCShieldRTM.exe /T /F4⤵PID:4484
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM MCShieldDS.exe /T /F4⤵PID:5012
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM MCS-Uninstall.exe /T /F4⤵PID:4376
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM SDScan.exe /T /F4⤵PID:1240
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM SDFSSvc.exe /T /F4⤵PID:4168
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM SDWelcome.exe /T /F4⤵
- Kills process with taskkill
PID:2508
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM SDTray.exe /T /F4⤵PID:2856
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM UnThreat.exe /T /F4⤵
- Kills process with taskkill
PID:652
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM utsvc.exe /T /F4⤵PID:3300
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM FortiClient.exe /T /F4⤵PID:5104
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM fcappdb.exe /T /F4⤵
- Kills process with taskkill
PID:776
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM FCDBlog.exe /T /F4⤵PID:4404
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM FCHelper64.exe /T /F4⤵
- Kills process with taskkill
PID:2680
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM fmon.exe /T /F4⤵PID:2340
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM FortiESNAC.exe /T /F4⤵PID:4300
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM FortiProxy.exe /T /F4⤵PID:2380
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM FortiSSLVPNdaemon.exe /T /F4⤵PID:440
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM FortiTray.exe /T /F4⤵
- Kills process with taskkill
PID:3644
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM FortiFW.exe /T /F4⤵
- Kills process with taskkill
PID:1680
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM FortiClient_Diagnostic_Tool.exe /T /F4⤵PID:3912
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM av_task.exe /T /F4⤵
- Kills process with taskkill
PID:2488
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM CertReg.exe /T /F4⤵PID:4180
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM FilMsg.exe /T /F4⤵
- Kills process with taskkill
PID:1956
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM FilUp.exe /T /F4⤵PID:3420
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM filwscc.exe /T /F4⤵
- Kills process with taskkill
PID:3084
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM filwscc.exe /T /F4⤵PID:3308
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM psview.exe /T /F4⤵PID:1760
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM quamgr.exe /T /F4⤵PID:484
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM quamgr.exe /T /F4⤵
- Kills process with taskkill
PID:4204
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM schmgr.exe /T /F4⤵PID:4280
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM schmgr.exe /T /F4⤵
- Kills process with taskkill
PID:4520
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM twsscan.exe /T /F4⤵PID:3588
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM twssrv.exe /T /F4⤵PID:2320
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /IM UserReg.exe /T /F4⤵PID:2792
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50B
MD55968ef5fac4270bce1811ed4faa64f57
SHA18fe278a32d2f88ea5b0bb6f2c9af1a97466749d9
SHA256bdd11b7a095460b95799fba297ed30ae174ef7fa43a29f4d0de059118a1979b7
SHA5127115108f1a6ffca6c0dd3625eaaf399c36e64bac778a9d802fc67750e7da792ad3a232a68bcf7c9ce764eea32785b1a99290fb6f4226bd6eb27c9c64d2c07317
-
Filesize
50B
MD5cb1e7aad05454468787716a16e394c8f
SHA1da3d84f9d8d5d4f2840f832c7981e04f86231656
SHA2562febfa3d2b56f1d731c0f9ce4ea3b2fe32e45344c042ca55e3dad92514cb1440
SHA512f1e37ead35a3139cb085d6105aa67ac105cac7950d8cd994ab561feeb0ef4c35caf4e4e5821b21ef4d6d0cfc2e6f5d87da65be017a98b865c35bddd7360ef79f
-
Filesize
276B
MD53bdfd33017806b85949b6faa7d4b98e4
SHA1f92844fee69ef98db6e68931adfaa9a0a0f8ce66
SHA2569da575dd2d5b7c1e9bab8b51a16cde457b3371c6dcdb0537356cf1497fa868f6
SHA512ae5e5686ae71edef53e71cd842cb6799e4383b9c238a5c361b81647efa128d2fedf3bf464997771b5b0c47a058fecae7829aeedcd098c80a11008581e5781429
-
Filesize
281B
MD5a32c109297ed1ca155598cd295c26611
SHA1dc4a1fdbaad15ddd6fe22d3907c6b03727b71510
SHA25645bfe34aa3ef932f75101246eb53d032f5e7cf6d1f5b4e495334955a255f32e7
SHA51270372552dc86fe02ece9fe3b7721463f80be07a34126b2c75b41e30078cda9e90744c7d644df623f63d4fb985482e345b3351c4d3da873162152c67fc6ecc887
-
Filesize
281B
MD5a32c109297ed1ca155598cd295c26611
SHA1dc4a1fdbaad15ddd6fe22d3907c6b03727b71510
SHA25645bfe34aa3ef932f75101246eb53d032f5e7cf6d1f5b4e495334955a255f32e7
SHA51270372552dc86fe02ece9fe3b7721463f80be07a34126b2c75b41e30078cda9e90744c7d644df623f63d4fb985482e345b3351c4d3da873162152c67fc6ecc887
-
Filesize
276B
MD53bdfd33017806b85949b6faa7d4b98e4
SHA1f92844fee69ef98db6e68931adfaa9a0a0f8ce66
SHA2569da575dd2d5b7c1e9bab8b51a16cde457b3371c6dcdb0537356cf1497fa868f6
SHA512ae5e5686ae71edef53e71cd842cb6799e4383b9c238a5c361b81647efa128d2fedf3bf464997771b5b0c47a058fecae7829aeedcd098c80a11008581e5781429
-
Filesize
241KB
MD5781fb531354d6f291f1ccab48da6d39f
SHA19ce4518ebcb5be6d1f0b5477fa00c26860fe9a68
SHA25697d585b6aff62fb4e43e7e6a5f816dcd7a14be11a88b109a9ba9e8cd4c456eb9
SHA5123e6630f5feb4a3eb1dac7e9125ce14b1a2a45d7415cf44cea42bc51b2a9aa37169ee4a4c36c888c8f2696e7d6e298e2ad7b2f4c22868aaa5948210eb7db220d8
-
Filesize
27KB
MD522c27d345f6ceff99de5fe515991c4bf
SHA19c80dd9ffc77e2666281404f6452f5bd48d2bbcb
SHA25645497c7ca76f29c6786a8835bc1925a5f6cd219403dce807fb34b98a630212b3
SHA5126875b8b8c2c29860db7feb7afa95379d4ee1b027ba7f30547bb99c30bf11ffc7d69a914ab029d23c8ce2b2a36dffde5117e76ba639a6da9b349b62538740f773
-
Filesize
6KB
MD528d9f4027a8903158b47220090b56d39
SHA1ea0eea902dd0cd61b240b08704d2af2e24629584
SHA256a07719c7e92e77e37569d08027962c848eede48b0ac520afdb248b22c3133810
SHA5124bf2a858f76981febcf743deea1513f0703fa5339030b03bb04e1c339b12e4d6e555991bc38865b878f67f696f2aaa3289730021bdf3ecde3ded48ce9ce91363
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2629973501-4017243118-3254762364-1000\83aa4cc77f591dfc2374580bbd95f6ba_e32e1c79-b88e-4709-94fb-81034ca3398e
Filesize45B
MD5c8366ae350e7019aefc9d1e6e6a498c6
SHA15731d8a3e6568a5f2dfbbc87e3db9637df280b61
SHA25611e6aca8e682c046c83b721eeb5c72c5ef03cb5936c60df6f4993511ddc61238
SHA51233c980d5a638bfc791de291ebf4b6d263b384247ab27f261a54025108f2f85374b579a026e545f81395736dd40fa4696f2163ca17640dd47f1c42bc9971b18cd
-
Filesize
479KB
MD5afbe9330392991544c3d27eada315d5c
SHA1ebd555c3cb3bcc6c3ac1177f79bde780c6178e52
SHA256d80128b9e3b1ddd76b87cc0338cec93a76763dd20003d9808457418ad66635a0
SHA512bf284394cfbac7c1d6320dbed54e51220a28c476930943f813f13fccdb689f8fb821eae32aac268baacd1dbab4d3e00f5b8dc8d19721b8266cc1173c079427b5
-
Filesize
903KB
MD550459d584e47a03736a85baf18a64793
SHA10888f95b6997e0e314df75b6b741b51bc6cf86b4
SHA256a93302f536b29049498907e1fa7bd99b0b9bf11284453ffd0ffe213a135a6b2b
SHA5123406ee86529c5fa97b725af0ab6e451e6a9ac7c483e49f428fde8eabf1f386d7720d42fe8de79f627d4bd2581302086d81c45162a40ff7135f2ecd34c77d47dd