Overview
overview
10Static
static
10Venom-Rat-...0.html
windows7-x64
1Venom-Rat-...0.html
windows10-2004-x64
1Venom-Rat-...0.html
windows7-x64
1Venom-Rat-...0.html
windows10-2004-x64
1Venom-Rat-...il.dll
windows7-x64
1Venom-Rat-...il.dll
windows10-2004-x64
1Venom-Rat-...at.dll
windows7-x64
1Venom-Rat-...at.dll
windows10-2004-x64
1Venom-Rat-...me.dll
windows7-x64
1Venom-Rat-...me.dll
windows10-2004-x64
1Venom-Rat-...ed.exe
windows7-x64
8Venom-Rat-...ed.exe
windows10-2004-x64
8Majid Z Hacker.exe
windows7-x64
8Majid Z Hacker.exe
windows10-2004-x64
8Majid Z Hacker.exe
windows7-x64
10Majid Z Hacker.exe
windows10-2004-x64
10Windows Program.exe
windows7-x64
7Windows Program.exe
windows10-2004-x64
7script.vbs
windows7-x64
10script.vbs
windows10-2004-x64
10windows registry.exe
windows7-x64
10windows registry.exe
windows10-2004-x64
10firewall.exe
windows7-x64
8firewall.exe
windows10-2004-x64
Venom Cracked.exe
windows7-x64
1Venom Cracked.exe
windows10-2004-x64
1Venom-Rat-...er.exe
windows7-x64
1Venom-Rat-...er.exe
windows10-2004-x64
1Venom-Rat-...ed.exe
windows7-x64
10Venom-Rat-...ed.exe
windows10-2004-x64
10Majid Z Ha...te.exe
windows7-x64
10Majid Z Ha...te.exe
windows10-2004-x64
10Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
31/05/2024, 12:30
Behavioral task
behavioral1
Sample
Venom-Rat-Cracked--main/Clients/Morpheus@DESKTOP-ALON1A1_367DDFD/Logs/10-31-2020.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Venom-Rat-Cracked--main/Clients/Morpheus@DESKTOP-ALON1A1_367DDFD/Logs/10-31-2020.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Venom-Rat-Cracked--main/Clients/Sam@DESKTOP-1HP3JNB_440CF1F/Logs/05-17-2020.html
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Venom-Rat-Cracked--main/Clients/Sam@DESKTOP-1HP3JNB_440CF1F/Logs/05-17-2020.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
Venom-Rat-Cracked--main/Mono.Cecil.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Venom-Rat-Cracked--main/Mono.Cecil.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
Venom-Rat-Cracked--main/Mono.Nat.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
Venom-Rat-Cracked--main/Mono.Nat.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
Venom-Rat-Cracked--main/VelyseTheme.dll
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
Venom-Rat-Cracked--main/VelyseTheme.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
Venom-Rat-Cracked--main/Venom Activated Cracked.exe
Resource
win7-20240215-en
Behavioral task
behavioral12
Sample
Venom-Rat-Cracked--main/Venom Activated Cracked.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
Majid Z Hacker.exe
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
Majid Z Hacker.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
Majid Z Hacker.exe
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
Majid Z Hacker.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
Windows Program.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
Windows Program.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
script.vbs
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
script.vbs
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
windows registry.exe
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
windows registry.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
firewall.exe
Resource
win7-20240419-en
Behavioral task
behavioral24
Sample
firewall.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral25
Sample
Venom Cracked.exe
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
Venom Cracked.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral27
Sample
Venom-Rat-Cracked--main/Venom Binder.exe
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
Venom-Rat-Cracked--main/Venom Binder.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
Venom-Rat-Cracked--main/Venom Software RAT Activated Cracked.exe
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
Venom-Rat-Cracked--main/Venom Software RAT Activated Cracked.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral31
Sample
Majid Z Hacker Website.exe
Resource
win7-20240508-en
Behavioral task
behavioral32
Sample
Majid Z Hacker Website.exe
Resource
win10v2004-20240508-en
General
-
Target
Venom-Rat-Cracked--main/Venom Activated Cracked.exe
-
Size
10.1MB
-
MD5
4dabfeed4b250a3248714458ae370ca8
-
SHA1
6e215b2a20039a4dbde18579a1419a4eb10946ac
-
SHA256
eb23cbc820d2b8fdc0227b2e89274edf2671163cae40e0a9bb930b91c05ac3a9
-
SHA512
7ea826cf27da942ce2e9db4a800b3c247670a8fc260af8686d14c48583f38f14b935d5af282a3774a9811f0957ca7318dc883307254554e907f7cfb5f6419a4c
-
SSDEEP
196608:m6+0f/ylacMb5mCbClb12UK4RDx5gRIAL1xXPm68DwOHRR+kc4N4FmDdgW7NaREE:m0f/KacMbR2J2UKEdiRIAL1xXPCwkEn7
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 64 IoCs
pid Process 6400 netsh.exe 2924 netsh.exe 7968 netsh.exe 9508 netsh.exe 2776 netsh.exe 2052 netsh.exe 1512 netsh.exe 1316 netsh.exe 11108 netsh.exe 4816 netsh.exe 7320 netsh.exe 10372 netsh.exe 10584 netsh.exe 7500 netsh.exe 7304 netsh.exe 4408 netsh.exe 5432 netsh.exe 3712 netsh.exe 3860 netsh.exe 1672 netsh.exe 9284 netsh.exe 9824 netsh.exe 10260 netsh.exe 304 netsh.exe 1868 netsh.exe 4156 netsh.exe 8656 netsh.exe 8456 netsh.exe 1704 netsh.exe 5600 netsh.exe 6316 netsh.exe 2980 netsh.exe 1876 netsh.exe 3076 netsh.exe 6056 netsh.exe 1312 netsh.exe 5440 netsh.exe 7016 netsh.exe 8128 netsh.exe 3792 netsh.exe 5756 netsh.exe 3520 netsh.exe 2272 netsh.exe 7332 netsh.exe 1252 netsh.exe 3920 netsh.exe 3532 netsh.exe 10448 netsh.exe 8936 netsh.exe 3584 netsh.exe 5028 netsh.exe 1360 netsh.exe 8924 netsh.exe 9388 netsh.exe 3192 netsh.exe 4968 netsh.exe 10832 netsh.exe 10580 netsh.exe 1704 netsh.exe 1252 netsh.exe 9532 netsh.exe 5244 netsh.exe 8036 netsh.exe 9640 netsh.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe firewall.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe firewall.exe -
Executes dropped EXE 64 IoCs
pid Process 1032 Venom Cracked.exe 1964 Majid Z Hacker.exe 2616 Majid Z Hacker.exe 2720 firewall.exe 2576 Majid Z Hacker.exe 2600 firewall.exe 2752 Majid Z Hacker.exe 2500 firewall.exe 2604 Majid Z Hacker.exe 2632 firewall.exe 2508 Majid Z Hacker.exe 2588 firewall.exe 2272 Majid Z Hacker.exe 1108 firewall.exe 2840 Majid Z Hacker.exe 2888 firewall.exe 2884 Majid Z Hacker.exe 2900 firewall.exe 1716 Majid Z Hacker.exe 2348 firewall.exe 1444 Majid Z Hacker.exe 2524 firewall.exe 3032 Majid Z Hacker.exe 1916 firewall.exe 2940 Majid Z Hacker.exe 1820 firewall.exe 484 Majid Z Hacker.exe 1796 firewall.exe 1976 Majid Z Hacker.exe 1784 firewall.exe 2056 firewall.exe 2012 Majid Z Hacker.exe 1596 Majid Z Hacker.exe 1592 firewall.exe 2064 firewall.exe 1968 Majid Z Hacker.exe 1932 Majid Z Hacker.exe 2660 firewall.exe 1312 Majid Z Hacker.exe 2764 firewall.exe 1436 Majid Z Hacker.exe 2728 firewall.exe 1588 Majid Z Hacker.exe 2932 firewall.exe 2412 Majid Z Hacker.exe 2680 firewall.exe 1628 Majid Z Hacker.exe 2012 firewall.exe 3200 Majid Z Hacker.exe 3208 firewall.exe 3364 Majid Z Hacker.exe 3372 firewall.exe 3468 Majid Z Hacker.exe 3492 firewall.exe 3676 Majid Z Hacker.exe 3728 firewall.exe 3844 Majid Z Hacker.exe 3900 firewall.exe 4012 Majid Z Hacker.exe 4068 firewall.exe 3152 Majid Z Hacker.exe 3228 firewall.exe 3252 Majid Z Hacker.exe 3332 firewall.exe -
Loads dropped DLL 64 IoCs
pid Process 2316 Venom Activated Cracked.exe 2316 Venom Activated Cracked.exe 1964 Majid Z Hacker.exe 1964 Majid Z Hacker.exe 2616 Majid Z Hacker.exe 2616 Majid Z Hacker.exe 2576 Majid Z Hacker.exe 2576 Majid Z Hacker.exe 2752 Majid Z Hacker.exe 2752 Majid Z Hacker.exe 2604 Majid Z Hacker.exe 2604 Majid Z Hacker.exe 2508 Majid Z Hacker.exe 2508 Majid Z Hacker.exe 2272 Majid Z Hacker.exe 2272 Majid Z Hacker.exe 2840 Majid Z Hacker.exe 2840 Majid Z Hacker.exe 2884 Majid Z Hacker.exe 2884 Majid Z Hacker.exe 1716 Majid Z Hacker.exe 1716 Majid Z Hacker.exe 1444 Majid Z Hacker.exe 1444 Majid Z Hacker.exe 3032 Majid Z Hacker.exe 3032 Majid Z Hacker.exe 2940 Majid Z Hacker.exe 1760 dw20.exe 2772 dw20.exe 2804 dw20.exe 2940 Majid Z Hacker.exe 700 dw20.exe 2556 dw20.exe 2036 dw20.exe 1296 dw20.exe 2812 dw20.exe 2196 dw20.exe 484 Majid Z Hacker.exe 484 Majid Z Hacker.exe 2252 dw20.exe 1976 Majid Z Hacker.exe 1976 Majid Z Hacker.exe 2012 Majid Z Hacker.exe 2012 Majid Z Hacker.exe 1596 Majid Z Hacker.exe 1596 Majid Z Hacker.exe 1968 Majid Z Hacker.exe 1968 Majid Z Hacker.exe 1932 Majid Z Hacker.exe 1932 Majid Z Hacker.exe 1312 Majid Z Hacker.exe 1312 Majid Z Hacker.exe 1436 Majid Z Hacker.exe 1436 Majid Z Hacker.exe 1588 Majid Z Hacker.exe 1588 Majid Z Hacker.exe 2412 Majid Z Hacker.exe 2412 Majid Z Hacker.exe 2620 dw20.exe 2116 dw20.exe 1852 dw20.exe 1436 dw20.exe 2880 dw20.exe 1628 Majid Z Hacker.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe -
Drops autorun.inf file 1 TTPs 64 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\Users\Admin\Documents\My Music\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Videos\autorun.inf firewall.exe File opened for modification C:\Users\Admin\Documents\My Music\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Music\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Videos\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Pictures\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Music\autorun.inf firewall.exe File opened for modification C:\Users\Admin\Documents\My Music\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Videos\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Pictures\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Videos\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Music\autorun.inf firewall.exe File opened for modification C:\Users\Admin\Documents\My Music\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Music\autorun.inf firewall.exe File opened for modification C:\Users\Admin\Documents\My Videos\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Pictures\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Videos\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Music\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Videos\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Videos\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Music\autorun.inf firewall.exe File opened for modification C:\Users\Admin\Documents\My Music\autorun.inf firewall.exe File opened for modification C:\Users\Admin\Documents\My Videos\autorun.inf firewall.exe File opened for modification C:\Users\Admin\Documents\My Pictures\autorun.inf firewall.exe File opened for modification C:\Users\Admin\Documents\My Music\autorun.inf firewall.exe File opened for modification C:\Users\Admin\Documents\My Videos\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Music\autorun.inf firewall.exe File opened for modification C:\Users\Admin\Documents\My Pictures\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Pictures\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Music\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Videos\autorun.inf firewall.exe File opened for modification C:\Users\Admin\Documents\My Videos\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Videos\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Videos\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Videos\autorun.inf firewall.exe File opened for modification C:\Users\Admin\Documents\My Music\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Videos\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Music\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Videos\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Music\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Videos\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Pictures\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Music\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Pictures\autorun.inf firewall.exe File opened for modification C:\Users\Admin\Documents\My Pictures\autorun.inf firewall.exe File opened for modification C:\Users\Admin\Documents\My Videos\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Pictures\autorun.inf firewall.exe File opened for modification C:\Users\Admin\Documents\My Pictures\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Music\autorun.inf firewall.exe File opened for modification C:\Users\Admin\Documents\My Pictures\autorun.inf firewall.exe File opened for modification C:\Users\Admin\Documents\My Videos\autorun.inf firewall.exe File opened for modification C:\Users\Admin\Documents\My Music\autorun.inf firewall.exe File opened for modification C:\Users\Admin\Documents\My Pictures\autorun.inf firewall.exe File opened for modification C:\Users\Admin\Documents\My Music\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Pictures\autorun.inf firewall.exe File opened for modification C:\Users\Admin\Documents\My Music\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Music\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Videos\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Music\autorun.inf firewall.exe File opened for modification C:\Users\Admin\Documents\My Music\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Videos\autorun.inf firewall.exe File opened for modification C:\Users\Admin\Documents\My Music\autorun.inf firewall.exe File opened for modification C:\Users\Admin\Documents\My Videos\autorun.inf firewall.exe File opened for modification C:\Users\Admin\Documents\My Videos\autorun.inf firewall.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral11/files/0x0036000000014502-11.dat nsis_installer_1 behavioral11/files/0x0036000000014502-11.dat nsis_installer_2 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1592 firewall.exe 1592 firewall.exe 1592 firewall.exe 1592 firewall.exe 1592 firewall.exe 1592 firewall.exe 1592 firewall.exe 1592 firewall.exe 1592 firewall.exe 1592 firewall.exe 1592 firewall.exe 1592 firewall.exe 1592 firewall.exe 1592 firewall.exe 1592 firewall.exe 1592 firewall.exe 1592 firewall.exe 1592 firewall.exe 1592 firewall.exe 1592 firewall.exe 1592 firewall.exe 1592 firewall.exe 1592 firewall.exe 1592 firewall.exe 1592 firewall.exe 1592 firewall.exe 1592 firewall.exe 1592 firewall.exe 1592 firewall.exe 1592 firewall.exe 1592 firewall.exe 1592 firewall.exe 1592 firewall.exe 1592 firewall.exe 1592 firewall.exe 1592 firewall.exe 1592 firewall.exe 1592 firewall.exe 1592 firewall.exe 1592 firewall.exe 1592 firewall.exe 1592 firewall.exe 2064 firewall.exe 2064 firewall.exe 2064 firewall.exe 2064 firewall.exe 2064 firewall.exe 2064 firewall.exe 2064 firewall.exe 2064 firewall.exe 2064 firewall.exe 2064 firewall.exe 2064 firewall.exe 2064 firewall.exe 2064 firewall.exe 2064 firewall.exe 2064 firewall.exe 2064 firewall.exe 2064 firewall.exe 2064 firewall.exe 2064 firewall.exe 2064 firewall.exe 2064 firewall.exe 2064 firewall.exe -
Suspicious behavior: GetForegroundWindowSpam 16 IoCs
pid Process 2036 dw20.exe 1296 dw20.exe 2812 dw20.exe 1760 dw20.exe 2804 dw20.exe 2772 dw20.exe 2556 dw20.exe 700 dw20.exe 2196 dw20.exe 2252 dw20.exe 2620 dw20.exe 1436 dw20.exe 2880 dw20.exe 2116 dw20.exe 1852 dw20.exe 3276 dw20.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2524 firewall.exe Token: SeDebugPrivilege 1820 firewall.exe Token: SeDebugPrivilege 1796 firewall.exe Token: SeDebugPrivilege 1784 firewall.exe Token: SeDebugPrivilege 2056 firewall.exe Token: SeDebugPrivilege 1592 firewall.exe Token: SeDebugPrivilege 2064 firewall.exe Token: SeDebugPrivilege 2660 firewall.exe Token: SeDebugPrivilege 2764 firewall.exe Token: SeDebugPrivilege 2728 firewall.exe Token: SeDebugPrivilege 2932 firewall.exe Token: SeDebugPrivilege 2680 firewall.exe Token: SeDebugPrivilege 1916 firewall.exe Token: SeDebugPrivilege 2600 firewall.exe Token: SeDebugPrivilege 2720 firewall.exe Token: SeDebugPrivilege 2900 firewall.exe Token: SeDebugPrivilege 2012 firewall.exe Token: SeDebugPrivilege 3208 firewall.exe Token: SeDebugPrivilege 3372 firewall.exe Token: SeDebugPrivilege 3492 firewall.exe Token: SeDebugPrivilege 3728 firewall.exe Token: SeDebugPrivilege 3900 firewall.exe Token: SeDebugPrivilege 4068 firewall.exe Token: SeDebugPrivilege 3228 firewall.exe Token: SeDebugPrivilege 3332 firewall.exe Token: SeDebugPrivilege 3596 firewall.exe Token: SeDebugPrivilege 3868 firewall.exe Token: SeDebugPrivilege 3592 firewall.exe Token: SeDebugPrivilege 2504 firewall.exe Token: SeDebugPrivilege 3684 firewall.exe Token: SeDebugPrivilege 3816 firewall.exe Token: SeDebugPrivilege 3460 firewall.exe Token: SeDebugPrivilege 2888 firewall.exe Token: SeDebugPrivilege 2500 firewall.exe Token: SeDebugPrivilege 2632 firewall.exe Token: SeDebugPrivilege 2588 firewall.exe Token: SeDebugPrivilege 3200 firewall.exe Token: SeDebugPrivilege 4092 firewall.exe Token: SeDebugPrivilege 3720 firewall.exe Token: SeDebugPrivilege 3132 firewall.exe Token: SeDebugPrivilege 3716 firewall.exe Token: SeDebugPrivilege 3088 firewall.exe Token: SeDebugPrivilege 892 firewall.exe Token: SeDebugPrivilege 3324 firewall.exe Token: SeDebugPrivilege 3360 firewall.exe Token: SeDebugPrivilege 4268 firewall.exe Token: SeDebugPrivilege 4436 firewall.exe Token: SeDebugPrivilege 4608 firewall.exe Token: SeDebugPrivilege 4768 firewall.exe Token: SeDebugPrivilege 4892 firewall.exe Token: SeDebugPrivilege 5060 firewall.exe Token: SeDebugPrivilege 4160 firewall.exe Token: SeDebugPrivilege 4396 firewall.exe Token: SeDebugPrivilege 4148 firewall.exe Token: SeDebugPrivilege 4836 firewall.exe Token: SeDebugPrivilege 5092 firewall.exe Token: SeDebugPrivilege 3928 firewall.exe Token: SeDebugPrivilege 4568 firewall.exe Token: SeDebugPrivilege 4476 firewall.exe Token: SeDebugPrivilege 3704 firewall.exe Token: SeDebugPrivilege 4428 firewall.exe Token: SeDebugPrivilege 4332 firewall.exe Token: SeDebugPrivilege 5080 firewall.exe Token: SeDebugPrivilege 4724 firewall.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2316 wrote to memory of 1032 2316 Venom Activated Cracked.exe 28 PID 2316 wrote to memory of 1032 2316 Venom Activated Cracked.exe 28 PID 2316 wrote to memory of 1032 2316 Venom Activated Cracked.exe 28 PID 2316 wrote to memory of 1032 2316 Venom Activated Cracked.exe 28 PID 2316 wrote to memory of 1964 2316 Venom Activated Cracked.exe 29 PID 2316 wrote to memory of 1964 2316 Venom Activated Cracked.exe 29 PID 2316 wrote to memory of 1964 2316 Venom Activated Cracked.exe 29 PID 2316 wrote to memory of 1964 2316 Venom Activated Cracked.exe 29 PID 1964 wrote to memory of 2616 1964 Majid Z Hacker.exe 30 PID 1964 wrote to memory of 2616 1964 Majid Z Hacker.exe 30 PID 1964 wrote to memory of 2616 1964 Majid Z Hacker.exe 30 PID 1964 wrote to memory of 2616 1964 Majid Z Hacker.exe 30 PID 1964 wrote to memory of 2720 1964 Majid Z Hacker.exe 31 PID 1964 wrote to memory of 2720 1964 Majid Z Hacker.exe 31 PID 1964 wrote to memory of 2720 1964 Majid Z Hacker.exe 31 PID 1964 wrote to memory of 2720 1964 Majid Z Hacker.exe 31 PID 2616 wrote to memory of 2576 2616 Majid Z Hacker.exe 32 PID 2616 wrote to memory of 2576 2616 Majid Z Hacker.exe 32 PID 2616 wrote to memory of 2576 2616 Majid Z Hacker.exe 32 PID 2616 wrote to memory of 2576 2616 Majid Z Hacker.exe 32 PID 2616 wrote to memory of 2600 2616 Majid Z Hacker.exe 33 PID 2616 wrote to memory of 2600 2616 Majid Z Hacker.exe 33 PID 2616 wrote to memory of 2600 2616 Majid Z Hacker.exe 33 PID 2616 wrote to memory of 2600 2616 Majid Z Hacker.exe 33 PID 2576 wrote to memory of 2752 2576 Majid Z Hacker.exe 34 PID 2576 wrote to memory of 2752 2576 Majid Z Hacker.exe 34 PID 2576 wrote to memory of 2752 2576 Majid Z Hacker.exe 34 PID 2576 wrote to memory of 2752 2576 Majid Z Hacker.exe 34 PID 2576 wrote to memory of 2500 2576 Majid Z Hacker.exe 35 PID 2576 wrote to memory of 2500 2576 Majid Z Hacker.exe 35 PID 2576 wrote to memory of 2500 2576 Majid Z Hacker.exe 35 PID 2576 wrote to memory of 2500 2576 Majid Z Hacker.exe 35 PID 2752 wrote to memory of 2604 2752 Majid Z Hacker.exe 36 PID 2752 wrote to memory of 2604 2752 Majid Z Hacker.exe 36 PID 2752 wrote to memory of 2604 2752 Majid Z Hacker.exe 36 PID 2752 wrote to memory of 2604 2752 Majid Z Hacker.exe 36 PID 2752 wrote to memory of 2632 2752 Majid Z Hacker.exe 37 PID 2752 wrote to memory of 2632 2752 Majid Z Hacker.exe 37 PID 2752 wrote to memory of 2632 2752 Majid Z Hacker.exe 37 PID 2752 wrote to memory of 2632 2752 Majid Z Hacker.exe 37 PID 2604 wrote to memory of 2508 2604 Majid Z Hacker.exe 38 PID 2604 wrote to memory of 2508 2604 Majid Z Hacker.exe 38 PID 2604 wrote to memory of 2508 2604 Majid Z Hacker.exe 38 PID 2604 wrote to memory of 2508 2604 Majid Z Hacker.exe 38 PID 2604 wrote to memory of 2588 2604 Majid Z Hacker.exe 39 PID 2604 wrote to memory of 2588 2604 Majid Z Hacker.exe 39 PID 2604 wrote to memory of 2588 2604 Majid Z Hacker.exe 39 PID 2604 wrote to memory of 2588 2604 Majid Z Hacker.exe 39 PID 2508 wrote to memory of 2272 2508 Majid Z Hacker.exe 88 PID 2508 wrote to memory of 2272 2508 Majid Z Hacker.exe 88 PID 2508 wrote to memory of 2272 2508 Majid Z Hacker.exe 88 PID 2508 wrote to memory of 2272 2508 Majid Z Hacker.exe 88 PID 2508 wrote to memory of 1108 2508 Majid Z Hacker.exe 41 PID 2508 wrote to memory of 1108 2508 Majid Z Hacker.exe 41 PID 2508 wrote to memory of 1108 2508 Majid Z Hacker.exe 41 PID 2508 wrote to memory of 1108 2508 Majid Z Hacker.exe 41 PID 2272 wrote to memory of 2840 2272 Majid Z Hacker.exe 42 PID 2272 wrote to memory of 2840 2272 Majid Z Hacker.exe 42 PID 2272 wrote to memory of 2840 2272 Majid Z Hacker.exe 42 PID 2272 wrote to memory of 2840 2272 Majid Z Hacker.exe 42 PID 2272 wrote to memory of 2888 2272 Majid Z Hacker.exe 43 PID 2272 wrote to memory of 2888 2272 Majid Z Hacker.exe 43 PID 2272 wrote to memory of 2888 2272 Majid Z Hacker.exe 43 PID 2272 wrote to memory of 2888 2272 Majid Z Hacker.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\Venom-Rat-Cracked--main\Venom Activated Cracked.exe"C:\Users\Admin\AppData\Local\Temp\Venom-Rat-Cracked--main\Venom Activated Cracked.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\Venom Cracked.exe"C:\Users\Admin\AppData\Local\Temp\Venom Cracked.exe"2⤵
- Executes dropped EXE
PID:1032
-
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
PID:484 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1588 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"26⤵
- Executes dropped EXE
PID:3200 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"27⤵
- Executes dropped EXE
PID:3364 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"28⤵
- Executes dropped EXE
PID:3468 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"29⤵
- Executes dropped EXE
PID:3676 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"30⤵
- Executes dropped EXE
PID:3844 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"31⤵
- Executes dropped EXE
PID:4012 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"32⤵
- Executes dropped EXE
PID:3152 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"33⤵
- Executes dropped EXE
PID:3252 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"34⤵PID:3624
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"35⤵PID:3860
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"36⤵PID:4048
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"37⤵PID:4012
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"38⤵PID:4092
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"39⤵PID:3936
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"40⤵PID:3744
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"41⤵PID:4004
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"42⤵PID:3888
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"43⤵PID:3456
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"44⤵PID:3780
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"45⤵PID:3676
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"46⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"47⤵PID:3360
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"48⤵PID:3532
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"49⤵PID:3972
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"50⤵PID:4256
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"51⤵PID:4380
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"52⤵PID:4600
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"53⤵PID:4756
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"54⤵PID:4872
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"55⤵PID:5044
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"56⤵PID:3532
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"57⤵PID:4388
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"58⤵PID:4564
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"59⤵PID:4604
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"60⤵PID:5084
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"61⤵PID:4196
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"62⤵PID:4128
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"63⤵PID:4528
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"64⤵PID:4964
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"65⤵PID:4232
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"66⤵PID:4416
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"67⤵PID:4512
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"68⤵PID:4456
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"69⤵PID:4128
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"70⤵PID:4224
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"71⤵PID:4540
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"72⤵PID:5024
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"73⤵PID:3536
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"74⤵PID:5068
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"75⤵PID:5168
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"76⤵PID:5332
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"77⤵PID:5504
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"78⤵PID:5712
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"79⤵PID:5840
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"80⤵PID:6012
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"81⤵PID:3456
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"82⤵PID:5364
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"83⤵PID:4504
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"84⤵PID:5832
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"85⤵PID:6036
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"86⤵PID:3972
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"87⤵PID:5528
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"88⤵PID:5524
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"89⤵PID:5840
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"90⤵PID:4916
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"91⤵PID:5440
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"92⤵PID:5728
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"93⤵PID:5228
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"94⤵PID:5816
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"95⤵PID:5832
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"96⤵PID:5796
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"97⤵PID:5688
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"98⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"99⤵PID:4916
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"100⤵PID:5156
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"101⤵PID:5632
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"102⤵PID:6232
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"103⤵PID:6396
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"104⤵PID:6576
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"105⤵PID:6804
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"106⤵PID:7016
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"107⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"108⤵PID:6388
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"109⤵PID:6396
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"110⤵PID:6804
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"111⤵PID:4504
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"112⤵PID:6488
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"113⤵PID:6340
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"114⤵PID:6676
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"115⤵PID:6544
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"116⤵PID:6732
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"117⤵PID:6312
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"118⤵PID:7016
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"119⤵PID:7376
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"120⤵PID:7560
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"121⤵PID:7744
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"122⤵PID:7924
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-