Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
21-07-2023 22:21
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Loader_Nightlight.exe
Resource
win10v2004-20230703-en
windows10-2004-x64
9 signatures
150 seconds
General
-
Target
Loader_Nightlight.exe
-
Size
560KB
-
MD5
eefd263f90538d866981daf683424b86
-
SHA1
639363e932b7aaa41a3d1fcef7c27831ec7755ec
-
SHA256
8d84e7d51995e229844e3375b91e31b12c5f413e0fa8ff369cb54355fe05f6c5
-
SHA512
aa12579fb7cfa8225d4c36dd1b022edbe78cc2924de9053bfdb238a3698beb9542cefaf137806f86d46c07ae45cb203d8c18b9bf2893e1b6b57f4cd7d99e8fd2
-
SSDEEP
12288:n8sCZLdC/jGiKcT063eR7RHWm3CJF8zyw:89LdpiPiR757348zy
Score
8/10
Malware Config
Signatures
-
Stops running service(s) 3 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1352 Loader_Nightlight.exe -
Launches sc.exe 9 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4856 sc.exe 2632 sc.exe 1384 sc.exe 1284 sc.exe 832 sc.exe 4956 sc.exe 3752 sc.exe 4976 sc.exe 3572 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 36 IoCs
pid Process 1696 taskkill.exe 400 taskkill.exe 3508 taskkill.exe 2636 taskkill.exe 452 taskkill.exe 3960 taskkill.exe 2784 taskkill.exe 1184 taskkill.exe 4188 taskkill.exe 3128 taskkill.exe 4352 taskkill.exe 2984 taskkill.exe 4236 taskkill.exe 228 taskkill.exe 1956 taskkill.exe 3852 taskkill.exe 3444 taskkill.exe 1688 taskkill.exe 912 taskkill.exe 3356 taskkill.exe 3036 taskkill.exe 1696 taskkill.exe 4956 taskkill.exe 1236 taskkill.exe 3772 taskkill.exe 1856 taskkill.exe 2220 taskkill.exe 4104 taskkill.exe 4780 taskkill.exe 3272 taskkill.exe 3848 taskkill.exe 388 taskkill.exe 3096 taskkill.exe 3328 taskkill.exe 1212 taskkill.exe 1816 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings Loader_Nightlight.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1352 Loader_Nightlight.exe 1352 Loader_Nightlight.exe 1352 Loader_Nightlight.exe 1352 Loader_Nightlight.exe 1352 Loader_Nightlight.exe 1352 Loader_Nightlight.exe 1352 Loader_Nightlight.exe 1352 Loader_Nightlight.exe 1352 Loader_Nightlight.exe 1352 Loader_Nightlight.exe 1352 Loader_Nightlight.exe 1352 Loader_Nightlight.exe 1352 Loader_Nightlight.exe 1352 Loader_Nightlight.exe 1352 Loader_Nightlight.exe 1352 Loader_Nightlight.exe 1352 Loader_Nightlight.exe 1352 Loader_Nightlight.exe 1352 Loader_Nightlight.exe 1352 Loader_Nightlight.exe 1352 Loader_Nightlight.exe 1352 Loader_Nightlight.exe 1352 Loader_Nightlight.exe 1352 Loader_Nightlight.exe 1352 Loader_Nightlight.exe 1352 Loader_Nightlight.exe 1352 Loader_Nightlight.exe 1352 Loader_Nightlight.exe 1352 Loader_Nightlight.exe 1352 Loader_Nightlight.exe 1352 Loader_Nightlight.exe 1352 Loader_Nightlight.exe 1352 Loader_Nightlight.exe 1352 Loader_Nightlight.exe 1352 Loader_Nightlight.exe 1352 Loader_Nightlight.exe 1352 Loader_Nightlight.exe 1352 Loader_Nightlight.exe 1352 Loader_Nightlight.exe 1352 Loader_Nightlight.exe 1352 Loader_Nightlight.exe 1352 Loader_Nightlight.exe 1352 Loader_Nightlight.exe 1352 Loader_Nightlight.exe 1352 Loader_Nightlight.exe 1352 Loader_Nightlight.exe 1352 Loader_Nightlight.exe 1352 Loader_Nightlight.exe 1352 Loader_Nightlight.exe 1352 Loader_Nightlight.exe 1352 Loader_Nightlight.exe 1352 Loader_Nightlight.exe 1352 Loader_Nightlight.exe 1352 Loader_Nightlight.exe 1352 Loader_Nightlight.exe 1352 Loader_Nightlight.exe 1352 Loader_Nightlight.exe 1352 Loader_Nightlight.exe 1352 Loader_Nightlight.exe 1352 Loader_Nightlight.exe 1352 Loader_Nightlight.exe 1352 Loader_Nightlight.exe 1352 Loader_Nightlight.exe 1352 Loader_Nightlight.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: SeDebugPrivilege 3128 taskkill.exe Token: SeDebugPrivilege 4352 taskkill.exe Token: SeDebugPrivilege 3508 taskkill.exe Token: SeDebugPrivilege 3328 taskkill.exe Token: SeDebugPrivilege 2636 taskkill.exe Token: SeDebugPrivilege 3444 taskkill.exe Token: SeDebugPrivilege 228 taskkill.exe Token: SeDebugPrivilege 1212 taskkill.exe Token: SeDebugPrivilege 452 taskkill.exe Token: SeDebugPrivilege 3356 taskkill.exe Token: SeDebugPrivilege 2984 taskkill.exe Token: SeDebugPrivilege 1816 taskkill.exe Token: SeDebugPrivilege 2784 taskkill.exe Token: SeDebugPrivilege 1956 taskkill.exe Token: SeDebugPrivilege 1696 taskkill.exe Token: SeDebugPrivilege 3960 taskkill.exe Token: SeDebugPrivilege 4236 taskkill.exe Token: SeDebugPrivilege 3036 taskkill.exe Token: SeDebugPrivilege 4104 taskkill.exe Token: SeDebugPrivilege 1236 taskkill.exe Token: SeDebugPrivilege 4780 taskkill.exe Token: SeDebugPrivilege 4956 taskkill.exe Token: SeDebugPrivilege 1184 taskkill.exe Token: SeDebugPrivilege 3272 taskkill.exe Token: SeDebugPrivilege 912 taskkill.exe Token: SeDebugPrivilege 1688 taskkill.exe Token: SeDebugPrivilege 3852 taskkill.exe Token: SeDebugPrivilege 400 taskkill.exe Token: SeDebugPrivilege 3772 taskkill.exe Token: SeDebugPrivilege 1696 taskkill.exe Token: SeDebugPrivilege 3848 taskkill.exe Token: SeDebugPrivilege 1856 taskkill.exe Token: SeDebugPrivilege 2220 taskkill.exe Token: SeDebugPrivilege 388 taskkill.exe Token: SeDebugPrivilege 3096 taskkill.exe Token: SeDebugPrivilege 4188 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1352 wrote to memory of 1224 1352 Loader_Nightlight.exe 88 PID 1352 wrote to memory of 1224 1352 Loader_Nightlight.exe 88 PID 1224 wrote to memory of 1444 1224 cmd.exe 89 PID 1224 wrote to memory of 1444 1224 cmd.exe 89 PID 1352 wrote to memory of 2084 1352 Loader_Nightlight.exe 155 PID 1352 wrote to memory of 2084 1352 Loader_Nightlight.exe 155 PID 2084 wrote to memory of 3884 2084 cmd.exe 158 PID 2084 wrote to memory of 3884 2084 cmd.exe 158 PID 1352 wrote to memory of 3324 1352 Loader_Nightlight.exe 98 PID 1352 wrote to memory of 3324 1352 Loader_Nightlight.exe 98 PID 1352 wrote to memory of 4768 1352 Loader_Nightlight.exe 97 PID 1352 wrote to memory of 4768 1352 Loader_Nightlight.exe 97 PID 1352 wrote to memory of 2732 1352 Loader_Nightlight.exe 96 PID 1352 wrote to memory of 2732 1352 Loader_Nightlight.exe 96 PID 1352 wrote to memory of 3340 1352 Loader_Nightlight.exe 95 PID 1352 wrote to memory of 3340 1352 Loader_Nightlight.exe 95 PID 1352 wrote to memory of 3872 1352 Loader_Nightlight.exe 94 PID 1352 wrote to memory of 3872 1352 Loader_Nightlight.exe 94 PID 1352 wrote to memory of 3012 1352 Loader_Nightlight.exe 93 PID 1352 wrote to memory of 3012 1352 Loader_Nightlight.exe 93 PID 1352 wrote to memory of 1428 1352 Loader_Nightlight.exe 92 PID 1352 wrote to memory of 1428 1352 Loader_Nightlight.exe 92 PID 3340 wrote to memory of 832 3340 cmd.exe 100 PID 3340 wrote to memory of 832 3340 cmd.exe 100 PID 2732 wrote to memory of 3328 2732 cmd.exe 101 PID 2732 wrote to memory of 3328 2732 cmd.exe 101 PID 3324 wrote to memory of 3128 3324 cmd.exe 102 PID 3324 wrote to memory of 3128 3324 cmd.exe 102 PID 1428 wrote to memory of 4896 1428 cmd.exe 99 PID 1428 wrote to memory of 4896 1428 cmd.exe 99 PID 4768 wrote to memory of 3508 4768 cmd.exe 103 PID 4768 wrote to memory of 3508 4768 cmd.exe 103 PID 3872 wrote to memory of 4352 3872 cmd.exe 104 PID 3872 wrote to memory of 4352 3872 cmd.exe 104 PID 1352 wrote to memory of 3420 1352 Loader_Nightlight.exe 110 PID 1352 wrote to memory of 3420 1352 Loader_Nightlight.exe 110 PID 1352 wrote to memory of 4588 1352 Loader_Nightlight.exe 105 PID 1352 wrote to memory of 4588 1352 Loader_Nightlight.exe 105 PID 1352 wrote to memory of 224 1352 Loader_Nightlight.exe 109 PID 1352 wrote to memory of 224 1352 Loader_Nightlight.exe 109 PID 1352 wrote to memory of 3272 1352 Loader_Nightlight.exe 161 PID 1352 wrote to memory of 3272 1352 Loader_Nightlight.exe 161 PID 1352 wrote to memory of 3468 1352 Loader_Nightlight.exe 106 PID 1352 wrote to memory of 3468 1352 Loader_Nightlight.exe 106 PID 1352 wrote to memory of 2500 1352 Loader_Nightlight.exe 107 PID 1352 wrote to memory of 2500 1352 Loader_Nightlight.exe 107 PID 224 wrote to memory of 2636 224 cmd.exe 112 PID 224 wrote to memory of 2636 224 cmd.exe 112 PID 3272 wrote to memory of 4956 3272 taskkill.exe 160 PID 3272 wrote to memory of 4956 3272 taskkill.exe 160 PID 3468 wrote to memory of 228 3468 cmd.exe 114 PID 3468 wrote to memory of 228 3468 cmd.exe 114 PID 4588 wrote to memory of 3444 4588 cmd.exe 115 PID 4588 wrote to memory of 3444 4588 cmd.exe 115 PID 3420 wrote to memory of 1212 3420 cmd.exe 116 PID 3420 wrote to memory of 1212 3420 cmd.exe 116 PID 1352 wrote to memory of 5072 1352 Loader_Nightlight.exe 140 PID 1352 wrote to memory of 5072 1352 Loader_Nightlight.exe 140 PID 1352 wrote to memory of 5112 1352 Loader_Nightlight.exe 139 PID 1352 wrote to memory of 5112 1352 Loader_Nightlight.exe 139 PID 1352 wrote to memory of 316 1352 Loader_Nightlight.exe 119 PID 1352 wrote to memory of 316 1352 Loader_Nightlight.exe 119 PID 1352 wrote to memory of 1340 1352 Loader_Nightlight.exe 118 PID 1352 wrote to memory of 1340 1352 Loader_Nightlight.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\Loader_Nightlight.exe"C:\Users\Admin\AppData\Local\Temp\Loader_Nightlight.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c mode con cols=55 lines=152⤵
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\system32\mode.commode con cols=55 lines=153⤵PID:1444
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c mode con cols=55 lines=152⤵PID:2084
-
C:\Windows\system32\mode.commode con cols=55 lines=153⤵PID:3884
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4780
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\Loader_Nightlight.exe" MD52⤵
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\Loader_Nightlight.exe" MD53⤵PID:4896
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&12⤵PID:3012
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /IM HTTPDebuggerSvc.exe /F >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Windows\system32\taskkill.exetaskkill /IM HTTPDebuggerSvc.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4352
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c sc stop HTTPDebuggerPro >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro3⤵
- Launches sc.exe
PID:832
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3328
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3508
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3128
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3444
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /IM HTTPDebuggerSvc.exe /F >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Windows\system32\taskkill.exetaskkill /IM HTTPDebuggerSvc.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:228
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&12⤵PID:2500
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c sc stop HTTPDebuggerPro >nul 2>&12⤵PID:3272
-
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro3⤵
- Launches sc.exe
PID:4956
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2636
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1212
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c sc stop HTTPDebuggerPro >nul 2>&12⤵PID:1340
-
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro3⤵
- Launches sc.exe
PID:2632
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵PID:316
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1236
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /IM HTTPDebuggerSvc.exe /F >nul 2>&12⤵PID:1056
-
C:\Windows\system32\taskkill.exetaskkill /IM HTTPDebuggerSvc.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2784
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵PID:4880
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3356
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&12⤵PID:3348
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /IM HTTPDebuggerSvc.exe /F >nul 2>&12⤵PID:4376
-
C:\Windows\system32\taskkill.exetaskkill /IM HTTPDebuggerSvc.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2984
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c sc stop HTTPDebuggerPro >nul 2>&12⤵PID:4156
-
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro3⤵
- Launches sc.exe
PID:4976
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵PID:5100
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4104
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&12⤵PID:1992
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&12⤵PID:1644
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&12⤵PID:3616
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /IM HTTPDebuggerSvc.exe /F >nul 2>&12⤵PID:3852
-
C:\Windows\system32\taskkill.exetaskkill /IM HTTPDebuggerSvc.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1696
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c sc stop HTTPDebuggerPro >nul 2>&12⤵PID:3264
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&12⤵PID:3048
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4236
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&12⤵PID:804
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1956
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&12⤵PID:2340
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&12⤵PID:5112
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3960
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&12⤵PID:5072
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1816
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c sc stop HTTPDebuggerPro >nul 2>&12⤵PID:2052
-
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro3⤵
- Launches sc.exe
PID:1384
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&12⤵PID:3864
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /IM HTTPDebuggerSvc.exe /F >nul 2>&12⤵PID:3496
-
C:\Windows\system32\taskkill.exetaskkill /IM HTTPDebuggerSvc.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1184
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3272
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&12⤵PID:2788
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4956
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&12⤵PID:3884
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c mode con cols=70 lines=222⤵PID:3560
-
C:\Windows\system32\mode.commode con cols=70 lines=223⤵PID:2632
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&12⤵PID:1588
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /IM HTTPDebuggerSvc.exe /F >nul 2>&12⤵PID:3920
-
C:\Windows\system32\taskkill.exetaskkill /IM HTTPDebuggerSvc.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1688
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c sc stop HTTPDebuggerPro >nul 2>&12⤵PID:2720
-
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro3⤵
- Launches sc.exe
PID:1284
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵PID:872
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:912
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&12⤵PID:3120
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1856
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&12⤵PID:1280
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:400
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&12⤵PID:3412
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /IM HTTPDebuggerSvc.exe /F >nul 2>&12⤵PID:1356
-
C:\Windows\system32\taskkill.exetaskkill /IM HTTPDebuggerSvc.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3772
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c sc stop HTTPDebuggerPro >nul 2>&12⤵PID:4356
-
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro3⤵
- Launches sc.exe
PID:3572
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵PID:1936
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1696
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&12⤵PID:4384
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3852
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&12⤵PID:3616
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3848
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&12⤵PID:180
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2220
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&12⤵PID:3736
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3096
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&12⤵PID:3328
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /IM HTTPDebuggerSvc.exe /F >nul 2>&12⤵PID:3468
-
C:\Windows\system32\taskkill.exetaskkill /IM HTTPDebuggerSvc.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:388
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c sc stop HTTPDebuggerPro >nul 2>&12⤵PID:2072
-
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro3⤵
- Launches sc.exe
PID:3752
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵PID:1756
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4188
-
-
-
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro1⤵
- Launches sc.exe
PID:4856
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T1⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:452
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T1⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3036
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:ShellFeedsUI.AppXnj65k2d1a1rnztt2t2nng5ctmk3e76pn.mca1⤵PID:3264
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2256