Overview
overview
10Static
static
10Venom-Rat-...0.html
windows7-x64
1Venom-Rat-...0.html
windows10-2004-x64
1Venom-Rat-...0.html
windows7-x64
1Venom-Rat-...0.html
windows10-2004-x64
1Venom-Rat-...il.dll
windows7-x64
1Venom-Rat-...il.dll
windows10-2004-x64
1Venom-Rat-...at.dll
windows7-x64
1Venom-Rat-...at.dll
windows10-2004-x64
1Venom-Rat-...me.dll
windows7-x64
1Venom-Rat-...me.dll
windows10-2004-x64
1Venom-Rat-...ed.exe
windows7-x64
8Venom-Rat-...ed.exe
windows10-2004-x64
8Majid Z Hacker.exe
windows7-x64
8Majid Z Hacker.exe
windows10-2004-x64
8Majid Z Hacker.exe
windows7-x64
10Majid Z Hacker.exe
windows10-2004-x64
10Windows Program.exe
windows7-x64
7Windows Program.exe
windows10-2004-x64
7script.vbs
windows7-x64
10script.vbs
windows10-2004-x64
10windows registry.exe
windows7-x64
10windows registry.exe
windows10-2004-x64
10firewall.exe
windows7-x64
8firewall.exe
windows10-2004-x64
Venom Cracked.exe
windows7-x64
1Venom Cracked.exe
windows10-2004-x64
1Venom-Rat-...er.exe
windows7-x64
1Venom-Rat-...er.exe
windows10-2004-x64
1Venom-Rat-...ed.exe
windows7-x64
10Venom-Rat-...ed.exe
windows10-2004-x64
10Majid Z Ha...te.exe
windows7-x64
10Majid Z Ha...te.exe
windows10-2004-x64
10Analysis
-
max time kernel
98s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
31/05/2024, 12:30
Behavioral task
behavioral1
Sample
Venom-Rat-Cracked--main/Clients/Morpheus@DESKTOP-ALON1A1_367DDFD/Logs/10-31-2020.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Venom-Rat-Cracked--main/Clients/Morpheus@DESKTOP-ALON1A1_367DDFD/Logs/10-31-2020.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Venom-Rat-Cracked--main/Clients/Sam@DESKTOP-1HP3JNB_440CF1F/Logs/05-17-2020.html
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Venom-Rat-Cracked--main/Clients/Sam@DESKTOP-1HP3JNB_440CF1F/Logs/05-17-2020.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
Venom-Rat-Cracked--main/Mono.Cecil.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Venom-Rat-Cracked--main/Mono.Cecil.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
Venom-Rat-Cracked--main/Mono.Nat.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
Venom-Rat-Cracked--main/Mono.Nat.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
Venom-Rat-Cracked--main/VelyseTheme.dll
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
Venom-Rat-Cracked--main/VelyseTheme.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
Venom-Rat-Cracked--main/Venom Activated Cracked.exe
Resource
win7-20240215-en
Behavioral task
behavioral12
Sample
Venom-Rat-Cracked--main/Venom Activated Cracked.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
Majid Z Hacker.exe
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
Majid Z Hacker.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
Majid Z Hacker.exe
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
Majid Z Hacker.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
Windows Program.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
Windows Program.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
script.vbs
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
script.vbs
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
windows registry.exe
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
windows registry.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
firewall.exe
Resource
win7-20240419-en
Behavioral task
behavioral24
Sample
firewall.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral25
Sample
Venom Cracked.exe
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
Venom Cracked.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral27
Sample
Venom-Rat-Cracked--main/Venom Binder.exe
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
Venom-Rat-Cracked--main/Venom Binder.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
Venom-Rat-Cracked--main/Venom Software RAT Activated Cracked.exe
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
Venom-Rat-Cracked--main/Venom Software RAT Activated Cracked.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral31
Sample
Majid Z Hacker Website.exe
Resource
win7-20240508-en
Behavioral task
behavioral32
Sample
Majid Z Hacker Website.exe
Resource
win10v2004-20240508-en
General
-
Target
Majid Z Hacker.exe
-
Size
462KB
-
MD5
a8a8d6f3b48466242959545235d1c9b6
-
SHA1
0c2d670dc3b3b07a2498756e1d46fd1fee53a621
-
SHA256
09d709640f6884d6b7e7501175cfdcc3724df07785c081c0e14b20cbcdf382ec
-
SHA512
09f08dd6026b2e24a05e20505723055deceffaba3d351dd49cdc934d038ef0796a3d8d481fe7734b3ec3ba80f4800994983441204dbc3f12baf4f637534a4796
-
SSDEEP
12288:6rs81bE0LfUk6XLbwxMY4R/3CDOpeYYhN7zjYC/M:6H5rh6XPbYuCDOpmPzjZM
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 64 IoCs
pid Process 3452 netsh.exe 9056 netsh.exe 9524 netsh.exe 7600 netsh.exe 7956 netsh.exe 696 netsh.exe 8348 netsh.exe 9896 netsh.exe 9940 netsh.exe 10572 netsh.exe 2140 netsh.exe 11620 netsh.exe 5132 netsh.exe 9976 netsh.exe 7984 netsh.exe 2312 netsh.exe 9684 netsh.exe 11636 netsh.exe 5864 netsh.exe 7124 netsh.exe 7884 netsh.exe 13048 netsh.exe 3664 netsh.exe 3944 netsh.exe 6324 netsh.exe 10728 netsh.exe 10324 netsh.exe 11268 netsh.exe 5616 netsh.exe 5964 netsh.exe 8680 netsh.exe 9036 netsh.exe 6192 netsh.exe 11532 netsh.exe 12292 netsh.exe 4676 netsh.exe 6756 netsh.exe 8576 netsh.exe 7944 netsh.exe 9828 netsh.exe 3136 netsh.exe 6180 netsh.exe 2516 netsh.exe 5900 netsh.exe 6384 netsh.exe 8136 netsh.exe 4560 netsh.exe 4280 netsh.exe 5408 netsh.exe 9828 netsh.exe 11244 netsh.exe 12304 netsh.exe 5752 netsh.exe 6176 netsh.exe 10392 netsh.exe 6556 netsh.exe 6320 netsh.exe 7236 netsh.exe 7092 netsh.exe 9768 netsh.exe 11460 netsh.exe 804 netsh.exe 5900 netsh.exe 1312 netsh.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe firewall.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe firewall.exe -
Executes dropped EXE 64 IoCs
pid Process 2884 firewall.exe 2916 firewall.exe 2672 firewall.exe 2444 firewall.exe 2604 firewall.exe 1036 firewall.exe 1828 firewall.exe 2404 firewall.exe 784 firewall.exe 1716 firewall.exe 2628 firewall.exe 1968 firewall.exe 360 firewall.exe 2188 firewall.exe 2596 firewall.exe 1308 firewall.exe 304 firewall.exe 1668 firewall.exe 592 firewall.exe 1552 firewall.exe 3296 firewall.exe 3496 firewall.exe 3636 firewall.exe 3772 firewall.exe 3992 firewall.exe 3140 firewall.exe 1776 firewall.exe 3256 firewall.exe 3868 firewall.exe 4040 firewall.exe 3132 firewall.exe 3404 firewall.exe 3104 firewall.exe 1952 firewall.exe 3356 firewall.exe 3240 firewall.exe 3560 firewall.exe 3704 firewall.exe 3972 firewall.exe 3844 firewall.exe 2016 firewall.exe 3700 firewall.exe 3920 firewall.exe 3740 firewall.exe 3544 firewall.exe 4192 firewall.exe 4360 firewall.exe 4528 firewall.exe 4696 firewall.exe 4864 firewall.exe 5028 firewall.exe 4124 firewall.exe 4400 firewall.exe 4564 firewall.exe 4712 firewall.exe 4892 firewall.exe 4784 firewall.exe 4600 firewall.exe 4648 firewall.exe 4624 firewall.exe 4488 firewall.exe 4928 firewall.exe 5024 firewall.exe 4756 firewall.exe -
Loads dropped DLL 64 IoCs
pid Process 2764 Majid Z Hacker.exe 2836 Majid Z Hacker.exe 2060 Majid Z Hacker.exe 2640 Majid Z Hacker.exe 2568 Majid Z Hacker.exe 2624 Majid Z Hacker.exe 2236 Majid Z Hacker.exe 2424 Majid Z Hacker.exe 2032 dw20.exe 772 dw20.exe 2856 dw20.exe 320 dw20.exe 2220 Majid Z Hacker.exe 680 Majid Z Hacker.exe 964 dw20.exe 1568 Majid Z Hacker.exe 2800 dw20.exe 2420 Majid Z Hacker.exe 2228 Majid Z Hacker.exe 2376 Majid Z Hacker.exe 2208 dw20.exe 2516 Majid Z Hacker.exe 2560 Majid Z Hacker.exe 2608 dw20.exe 2728 dw20.exe 1552 Majid Z Hacker.exe 2464 dw20.exe 2936 dw20.exe 2372 dw20.exe 2664 Majid Z Hacker.exe 1720 dw20.exe 1796 Majid Z Hacker.exe 1104 Majid Z Hacker.exe 804 Majid Z Hacker.exe 2248 dw20.exe 3256 Majid Z Hacker.exe 3488 Majid Z Hacker.exe 3628 Majid Z Hacker.exe 3764 Majid Z Hacker.exe 3984 Majid Z Hacker.exe 3136 Majid Z Hacker.exe 1796 Majid Z Hacker.exe 3484 Majid Z Hacker.exe 3848 Majid Z Hacker.exe 4032 Majid Z Hacker.exe 3168 Majid Z Hacker.exe 3428 Majid Z Hacker.exe 3388 Majid Z Hacker.exe 3116 Majid Z Hacker.exe 3808 Majid Z Hacker.exe 2352 Majid Z Hacker.exe 3616 Majid Z Hacker.exe 3700 Majid Z Hacker.exe 4064 Majid Z Hacker.exe 2128 Majid Z Hacker.exe 2352 Majid Z Hacker.exe 4064 Majid Z Hacker.exe 2416 Majid Z Hacker.exe 2140 Majid Z Hacker.exe 1544 Majid Z Hacker.exe 4184 Majid Z Hacker.exe 4352 Majid Z Hacker.exe 4520 Majid Z Hacker.exe 4688 Majid Z Hacker.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\34d91dfb34a7283483d0aaba9d10147d = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\svchost.exe" firewall.exe -
Drops autorun.inf file 1 TTPs 64 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created C:\Users\Admin\Documents\My Videos\autorun.inf firewall.exe File opened for modification C:\Users\Admin\Documents\My Music\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Videos\autorun.inf firewall.exe File opened for modification C:\Users\Admin\Documents\My Pictures\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Videos\autorun.inf firewall.exe File opened for modification C:\Users\Admin\Documents\My Videos\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Music\autorun.inf firewall.exe File opened for modification C:\Users\Admin\Documents\My Videos\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Music\autorun.inf firewall.exe File opened for modification C:\Users\Admin\Documents\My Videos\autorun.inf firewall.exe File opened for modification C:\Users\Admin\Documents\My Music\autorun.inf firewall.exe File opened for modification C:\Users\Admin\Documents\My Pictures\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Music\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Pictures\autorun.inf firewall.exe File opened for modification C:\Users\Admin\Documents\My Pictures\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Videos\autorun.inf firewall.exe File opened for modification C:\Users\Admin\Documents\My Pictures\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Pictures\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Pictures\autorun.inf firewall.exe File opened for modification C:\Users\Admin\Documents\My Music\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Videos\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Pictures\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Music\autorun.inf firewall.exe File opened for modification C:\Users\Admin\Documents\My Videos\autorun.inf firewall.exe File opened for modification C:\Users\Admin\Documents\My Music\autorun.inf firewall.exe File opened for modification C:\Users\Admin\Documents\My Pictures\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Music\autorun.inf firewall.exe File opened for modification C:\Users\Admin\Documents\My Pictures\autorun.inf firewall.exe File opened for modification C:\Users\Admin\Documents\My Pictures\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Music\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Videos\autorun.inf firewall.exe File opened for modification C:\Users\Admin\Documents\My Pictures\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Music\autorun.inf firewall.exe File opened for modification C:\Users\Admin\Documents\My Music\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Videos\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Videos\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Pictures\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Pictures\autorun.inf firewall.exe File opened for modification C:\Users\Admin\Documents\My Videos\autorun.inf firewall.exe File opened for modification C:\Users\Admin\Documents\My Music\autorun.inf firewall.exe File opened for modification C:\Users\Admin\Documents\My Pictures\autorun.inf firewall.exe File opened for modification C:\Users\Admin\Documents\My Videos\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Music\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Music\autorun.inf firewall.exe File opened for modification C:\Users\Admin\Documents\My Videos\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Music\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Videos\autorun.inf firewall.exe File opened for modification C:\Users\Admin\Documents\My Pictures\autorun.inf firewall.exe File opened for modification C:\Users\Admin\Documents\My Music\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Pictures\autorun.inf firewall.exe File opened for modification C:\Users\Admin\Documents\My Music\autorun.inf firewall.exe File opened for modification C:\Users\Admin\Documents\My Music\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Music\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Videos\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Videos\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Videos\autorun.inf firewall.exe File opened for modification C:\Users\Admin\Documents\My Pictures\autorun.inf firewall.exe File opened for modification C:\Users\Admin\Documents\My Music\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Pictures\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Videos\autorun.inf firewall.exe File opened for modification C:\Users\Admin\Documents\My Videos\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Pictures\autorun.inf firewall.exe File created C:\Users\Admin\Documents\My Videos\autorun.inf firewall.exe File opened for modification C:\Users\Admin\Documents\My Pictures\autorun.inf firewall.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2628 firewall.exe 2628 firewall.exe 2628 firewall.exe 2628 firewall.exe 2628 firewall.exe 2628 firewall.exe 2628 firewall.exe 2628 firewall.exe 2628 firewall.exe 2628 firewall.exe 2628 firewall.exe 2628 firewall.exe 2628 firewall.exe 2628 firewall.exe 2628 firewall.exe 2628 firewall.exe 2628 firewall.exe 2628 firewall.exe 2628 firewall.exe 2628 firewall.exe 2628 firewall.exe 2628 firewall.exe 2628 firewall.exe 2628 firewall.exe 2628 firewall.exe 2628 firewall.exe 2628 firewall.exe 2628 firewall.exe 2628 firewall.exe 2628 firewall.exe 2628 firewall.exe 2628 firewall.exe 2628 firewall.exe 2628 firewall.exe 2628 firewall.exe 2628 firewall.exe 2628 firewall.exe 2628 firewall.exe 360 firewall.exe 360 firewall.exe 1828 firewall.exe 1828 firewall.exe 360 firewall.exe 1828 firewall.exe 360 firewall.exe 1828 firewall.exe 2628 firewall.exe 2628 firewall.exe 2628 firewall.exe 2628 firewall.exe 2916 firewall.exe 2916 firewall.exe 1036 firewall.exe 2916 firewall.exe 1036 firewall.exe 1036 firewall.exe 2916 firewall.exe 1036 firewall.exe 1968 firewall.exe 1968 firewall.exe 1968 firewall.exe 2604 firewall.exe 1968 firewall.exe 2604 firewall.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2916 firewall.exe Token: SeDebugPrivilege 2604 firewall.exe Token: SeDebugPrivilege 1828 firewall.exe Token: SeDebugPrivilege 784 firewall.exe Token: SeDebugPrivilege 2628 firewall.exe Token: SeDebugPrivilege 360 firewall.exe Token: SeDebugPrivilege 2596 firewall.exe Token: SeDebugPrivilege 304 firewall.exe Token: SeDebugPrivilege 1036 firewall.exe Token: SeDebugPrivilege 1968 firewall.exe Token: SeDebugPrivilege 1716 firewall.exe Token: SeDebugPrivilege 2444 firewall.exe Token: SeDebugPrivilege 2404 firewall.exe Token: SeDebugPrivilege 2884 firewall.exe Token: SeDebugPrivilege 2672 firewall.exe Token: SeDebugPrivilege 2188 firewall.exe Token: SeDebugPrivilege 1308 firewall.exe Token: SeDebugPrivilege 1668 firewall.exe Token: SeDebugPrivilege 592 firewall.exe Token: SeDebugPrivilege 1552 firewall.exe Token: SeDebugPrivilege 3296 firewall.exe Token: SeDebugPrivilege 3496 firewall.exe Token: SeDebugPrivilege 3636 firewall.exe Token: SeDebugPrivilege 3772 firewall.exe Token: SeDebugPrivilege 3992 firewall.exe Token: SeDebugPrivilege 3140 firewall.exe Token: SeDebugPrivilege 1776 firewall.exe Token: SeDebugPrivilege 3256 firewall.exe Token: SeDebugPrivilege 3868 firewall.exe Token: SeDebugPrivilege 4040 firewall.exe Token: SeDebugPrivilege 3132 firewall.exe Token: SeDebugPrivilege 3404 firewall.exe Token: SeDebugPrivilege 3104 firewall.exe Token: SeDebugPrivilege 1952 firewall.exe Token: SeDebugPrivilege 3356 firewall.exe Token: SeDebugPrivilege 3240 firewall.exe Token: SeDebugPrivilege 3560 firewall.exe Token: SeDebugPrivilege 3704 firewall.exe Token: SeDebugPrivilege 3972 firewall.exe Token: SeDebugPrivilege 3844 firewall.exe Token: SeDebugPrivilege 2016 firewall.exe Token: SeDebugPrivilege 3700 firewall.exe Token: SeDebugPrivilege 3920 firewall.exe Token: SeDebugPrivilege 3740 firewall.exe Token: SeDebugPrivilege 3544 firewall.exe Token: SeDebugPrivilege 4192 firewall.exe Token: SeDebugPrivilege 4360 firewall.exe Token: SeDebugPrivilege 4528 firewall.exe Token: SeDebugPrivilege 4696 firewall.exe Token: SeDebugPrivilege 4864 firewall.exe Token: SeDebugPrivilege 5028 firewall.exe Token: SeDebugPrivilege 4124 firewall.exe Token: SeDebugPrivilege 4400 firewall.exe Token: SeDebugPrivilege 4564 firewall.exe Token: SeDebugPrivilege 4712 firewall.exe Token: SeDebugPrivilege 4892 firewall.exe Token: SeDebugPrivilege 4784 firewall.exe Token: SeDebugPrivilege 4600 firewall.exe Token: SeDebugPrivilege 4648 firewall.exe Token: SeDebugPrivilege 4624 firewall.exe Token: SeDebugPrivilege 4488 firewall.exe Token: SeDebugPrivilege 4928 firewall.exe Token: SeDebugPrivilege 5024 firewall.exe Token: SeDebugPrivilege 4756 firewall.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2764 wrote to memory of 2836 2764 Majid Z Hacker.exe 28 PID 2764 wrote to memory of 2836 2764 Majid Z Hacker.exe 28 PID 2764 wrote to memory of 2836 2764 Majid Z Hacker.exe 28 PID 2764 wrote to memory of 2836 2764 Majid Z Hacker.exe 28 PID 2764 wrote to memory of 2884 2764 Majid Z Hacker.exe 29 PID 2764 wrote to memory of 2884 2764 Majid Z Hacker.exe 29 PID 2764 wrote to memory of 2884 2764 Majid Z Hacker.exe 29 PID 2764 wrote to memory of 2884 2764 Majid Z Hacker.exe 29 PID 2836 wrote to memory of 2060 2836 Majid Z Hacker.exe 30 PID 2836 wrote to memory of 2060 2836 Majid Z Hacker.exe 30 PID 2836 wrote to memory of 2060 2836 Majid Z Hacker.exe 30 PID 2836 wrote to memory of 2060 2836 Majid Z Hacker.exe 30 PID 2836 wrote to memory of 2916 2836 Majid Z Hacker.exe 31 PID 2836 wrote to memory of 2916 2836 Majid Z Hacker.exe 31 PID 2836 wrote to memory of 2916 2836 Majid Z Hacker.exe 31 PID 2836 wrote to memory of 2916 2836 Majid Z Hacker.exe 31 PID 2060 wrote to memory of 2640 2060 Majid Z Hacker.exe 32 PID 2060 wrote to memory of 2640 2060 Majid Z Hacker.exe 32 PID 2060 wrote to memory of 2640 2060 Majid Z Hacker.exe 32 PID 2060 wrote to memory of 2640 2060 Majid Z Hacker.exe 32 PID 2060 wrote to memory of 2672 2060 Majid Z Hacker.exe 33 PID 2060 wrote to memory of 2672 2060 Majid Z Hacker.exe 33 PID 2060 wrote to memory of 2672 2060 Majid Z Hacker.exe 33 PID 2060 wrote to memory of 2672 2060 Majid Z Hacker.exe 33 PID 2640 wrote to memory of 2568 2640 Majid Z Hacker.exe 34 PID 2640 wrote to memory of 2568 2640 Majid Z Hacker.exe 34 PID 2640 wrote to memory of 2568 2640 Majid Z Hacker.exe 34 PID 2640 wrote to memory of 2568 2640 Majid Z Hacker.exe 34 PID 2640 wrote to memory of 2444 2640 Majid Z Hacker.exe 35 PID 2640 wrote to memory of 2444 2640 Majid Z Hacker.exe 35 PID 2640 wrote to memory of 2444 2640 Majid Z Hacker.exe 35 PID 2640 wrote to memory of 2444 2640 Majid Z Hacker.exe 35 PID 2568 wrote to memory of 2624 2568 Majid Z Hacker.exe 36 PID 2568 wrote to memory of 2624 2568 Majid Z Hacker.exe 36 PID 2568 wrote to memory of 2624 2568 Majid Z Hacker.exe 36 PID 2568 wrote to memory of 2624 2568 Majid Z Hacker.exe 36 PID 2568 wrote to memory of 2604 2568 Majid Z Hacker.exe 37 PID 2568 wrote to memory of 2604 2568 Majid Z Hacker.exe 37 PID 2568 wrote to memory of 2604 2568 Majid Z Hacker.exe 37 PID 2568 wrote to memory of 2604 2568 Majid Z Hacker.exe 37 PID 2884 wrote to memory of 2856 2884 firewall.exe 39 PID 2884 wrote to memory of 2856 2884 firewall.exe 39 PID 2884 wrote to memory of 2856 2884 firewall.exe 39 PID 2884 wrote to memory of 2856 2884 firewall.exe 39 PID 2444 wrote to memory of 2032 2444 firewall.exe 38 PID 2444 wrote to memory of 2032 2444 firewall.exe 38 PID 2444 wrote to memory of 2032 2444 firewall.exe 38 PID 2444 wrote to memory of 2032 2444 firewall.exe 38 PID 2916 wrote to memory of 2140 2916 firewall.exe 40 PID 2916 wrote to memory of 2140 2916 firewall.exe 40 PID 2916 wrote to memory of 2140 2916 firewall.exe 40 PID 2916 wrote to memory of 2140 2916 firewall.exe 40 PID 2604 wrote to memory of 2016 2604 firewall.exe 41 PID 2604 wrote to memory of 2016 2604 firewall.exe 41 PID 2604 wrote to memory of 2016 2604 firewall.exe 41 PID 2604 wrote to memory of 2016 2604 firewall.exe 41 PID 2624 wrote to memory of 2236 2624 Majid Z Hacker.exe 43 PID 2624 wrote to memory of 2236 2624 Majid Z Hacker.exe 43 PID 2624 wrote to memory of 2236 2624 Majid Z Hacker.exe 43 PID 2624 wrote to memory of 2236 2624 Majid Z Hacker.exe 43 PID 2624 wrote to memory of 1036 2624 Majid Z Hacker.exe 44 PID 2624 wrote to memory of 1036 2624 Majid Z Hacker.exe 44 PID 2624 wrote to memory of 1036 2624 Majid Z Hacker.exe 44 PID 2624 wrote to memory of 1036 2624 Majid Z Hacker.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"5⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"6⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"7⤵
- Loads dropped DLL
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"8⤵
- Loads dropped DLL
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"9⤵
- Loads dropped DLL
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"10⤵
- Loads dropped DLL
PID:680 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"11⤵
- Loads dropped DLL
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"12⤵
- Loads dropped DLL
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"13⤵
- Loads dropped DLL
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"14⤵
- Loads dropped DLL
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"15⤵
- Loads dropped DLL
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"16⤵
- Loads dropped DLL
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"17⤵
- Loads dropped DLL
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"18⤵
- Loads dropped DLL
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"19⤵
- Loads dropped DLL
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"20⤵
- Loads dropped DLL
PID:1104 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"21⤵
- Loads dropped DLL
PID:804 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"22⤵
- Loads dropped DLL
PID:3256 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"23⤵
- Loads dropped DLL
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"24⤵
- Loads dropped DLL
PID:3628 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"25⤵
- Loads dropped DLL
PID:3764 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"26⤵
- Loads dropped DLL
PID:3984 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"27⤵
- Loads dropped DLL
PID:3136 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"28⤵
- Loads dropped DLL
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"29⤵
- Loads dropped DLL
PID:3484 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"30⤵
- Loads dropped DLL
PID:3848 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"31⤵
- Loads dropped DLL
PID:4032 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"32⤵
- Loads dropped DLL
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"33⤵
- Loads dropped DLL
PID:3428 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"34⤵
- Loads dropped DLL
PID:3388 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"35⤵
- Loads dropped DLL
PID:3116 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"36⤵
- Loads dropped DLL
PID:3808 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"37⤵
- Loads dropped DLL
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"38⤵
- Loads dropped DLL
PID:3616 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"39⤵
- Loads dropped DLL
PID:3700 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"40⤵
- Loads dropped DLL
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"41⤵
- Loads dropped DLL
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"42⤵
- Loads dropped DLL
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"43⤵
- Loads dropped DLL
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"44⤵
- Loads dropped DLL
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"45⤵
- Loads dropped DLL
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"46⤵
- Loads dropped DLL
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"47⤵
- Loads dropped DLL
PID:4184 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"48⤵
- Loads dropped DLL
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"49⤵
- Loads dropped DLL
PID:4520 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"50⤵
- Loads dropped DLL
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"51⤵PID:4856
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"52⤵PID:5020
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"53⤵PID:4140
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"54⤵PID:4200
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"55⤵PID:4112
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"56⤵PID:4832
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"57⤵PID:4800
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"58⤵PID:4264
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"59⤵PID:4572
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"60⤵PID:4652
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"61⤵PID:4680
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"62⤵PID:4340
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"63⤵PID:4580
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"64⤵PID:4788
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"65⤵PID:4436
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"66⤵PID:4240
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"67⤵PID:4828
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"68⤵PID:1820
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"69⤵PID:4180
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"70⤵PID:4468
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"71⤵PID:4260
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"72⤵PID:3488
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"73⤵PID:4828
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"74⤵PID:4180
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"75⤵PID:4980
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"76⤵PID:4832
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"77⤵PID:5280
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"78⤵PID:5448
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"79⤵PID:5620
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"80⤵PID:5788
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"81⤵PID:5960
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"82⤵PID:6128
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"83⤵PID:3488
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"84⤵PID:5516
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"85⤵PID:5724
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"86⤵PID:6004
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"87⤵PID:5976
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"88⤵PID:5412
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"89⤵PID:5700
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"90⤵PID:5756
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"91⤵PID:540
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"92⤵PID:1560
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"93⤵PID:6040
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"94⤵PID:5332
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"95⤵PID:6096
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"96⤵PID:5304
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"97⤵PID:5964
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"98⤵PID:6036
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"99⤵PID:5644
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"100⤵PID:5276
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"101⤵PID:2768
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"102⤵PID:6244
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"103⤵PID:6440
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"104⤵PID:6632
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"105⤵PID:6820
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"106⤵PID:7008
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"107⤵PID:6148
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"108⤵PID:2768
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"109⤵PID:6680
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"110⤵PID:6388
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"111⤵PID:7136
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"112⤵PID:5900
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"113⤵PID:6552
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"114⤵PID:6908
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"115⤵PID:6180
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"116⤵PID:7108
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"117⤵PID:7088
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"118⤵PID:6552
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"119⤵PID:6312
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"120⤵PID:7304
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"121⤵PID:7480
-
C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"C:\Users\Admin\AppData\Local\Temp\Majid Z Hacker.exe"122⤵PID:7660
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-