Analysis

  • max time kernel
    30s
  • max time network
    32s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/06/2024, 18:10

General

  • Target

    Loader base github.exe

  • Size

    595KB

  • MD5

    65ebee6a17d7a8e7903770812f4c19d9

  • SHA1

    17cb02a2965e982f42129d6da6fff91c2b3205c4

  • SHA256

    b70abb344a32af0f7d7d47f7fcd1a993ddbe438a1058491ffaf9dd23b5541eaa

  • SHA512

    2859bad6655dcb8e4a51b053a6b1c2a5e9955d6d20721d743498a9c9116454bca25695605e493ae047cf1c35c40529e867d11dfe6826f2b789ed4cf8b57b901d

  • SSDEEP

    12288:K7Zu2O0hCNGgRFvq4Df17RhNKVUG0AK4U:SZhcNrRdVZ7RzMUcK4U

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Looks for VirtualBox Guest Additions in registry 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Kills process with taskkill 50 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 48 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Loader base github.exe
    "C:\Users\Admin\AppData\Local\Temp\Loader base github.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Looks for VirtualBox Guest Additions in registry
    • Checks BIOS information in registry
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Checks for VirtualBox DLLs, possible anti-VM trick
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4572
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c cls
      2⤵
        PID:2904
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c taskkill /f /im KsDumperClient.exe >nul 2>&1
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2248
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im KsDumperClient.exe
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2336
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c taskkill /f /im KsDumper.exe >nul 2>&1
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1856
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im KsDumper.exe
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3204
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&1
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3476
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im HTTPDebuggerUI.exe
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1732
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&1
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1592
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im HTTPDebuggerSvc.exe
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1008
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c taskkill /f /im ProcessHacker.exe >nul 2>&1
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:740
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im ProcessHacker.exe
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3244
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c taskkill /f /im idaq.exe >nul 2>&1
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3356
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im idaq.exe
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3976
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c taskkill /f /im idaq64.exe >nul 2>&1
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2332
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im idaq64.exe
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3008
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c taskkill /f /im Wireshark.exe >nul 2>&1
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3176
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im Wireshark.exe
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:404
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c taskkill /f /im Fiddler.exe >nul 2>&1
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2484
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im Fiddler.exe
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3060
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c taskkill /f /im FiddlerEverywhere.exe >nul 2>&1
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1320
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im FiddlerEverywhere.exe
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4912
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c taskkill /f /im Xenos64.exe >nul 2>&1
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3076
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im Xenos64.exe
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3196
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c taskkill /f /im Xenos.exe >nul 2>&1
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4996
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im Xenos.exe
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4484
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c taskkill /f /im Xenos32.exe >nul 2>&1
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3360
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im Xenos32.exe
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2012
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c taskkill /f /im de4dot.exe >nul 2>&1
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4064
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im de4dot.exe
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4476
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c taskkill /f /im Cheat Engine.exe >nul 2>&1
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:924
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im Cheat Engine.exe
          3⤵
          • Kills process with taskkill
          PID:4552
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c taskkill /f /im cheatengine-x86_64.exe >nul 2>&1
        2⤵
          PID:4356
          • C:\Windows\system32\taskkill.exe
            taskkill /f /im cheatengine-x86_64.exe
            3⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2844
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c taskkill /f /im cheatengine-x86_64-SSE4-AVX2.exe >nul 2>&1
          2⤵
            PID:1116
            • C:\Windows\system32\taskkill.exe
              taskkill /f /im cheatengine-x86_64-SSE4-AVX2.exe
              3⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1876
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c taskkill /f /im MugenJinFuu-x86_64-SSE4-AVX2.exe >nul 2>&1
            2⤵
              PID:5012
              • C:\Windows\system32\taskkill.exe
                taskkill /f /im MugenJinFuu-x86_64-SSE4-AVX2.exe
                3⤵
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:232
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c taskkill /f /im MugenJinFuu-i386.exe >nul 2>&1
              2⤵
                PID:4524
                • C:\Windows\system32\taskkill.exe
                  taskkill /f /im MugenJinFuu-i386.exe
                  3⤵
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:5060
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c taskkill /f /im cheatengine-x86_64.exe >nul 2>&1
                2⤵
                  PID:3508
                  • C:\Windows\system32\taskkill.exe
                    taskkill /f /im cheatengine-x86_64.exe
                    3⤵
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3712
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c taskkill /f /im cheatengine-i386.exe >nul 2>&1
                  2⤵
                    PID:4348
                    • C:\Windows\system32\taskkill.exe
                      taskkill /f /im cheatengine-i386.exe
                      3⤵
                      • Kills process with taskkill
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2212
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c taskkill /f /im HTTP Debugger Windows Service (32 bit).exe >nul 2>&1
                    2⤵
                      PID:3604
                      • C:\Windows\system32\taskkill.exe
                        taskkill /f /im HTTP Debugger Windows Service (32 bit).exe
                        3⤵
                        • Kills process with taskkill
                        PID:4980
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c taskkill /f /im KsDumper.exe >nul 2>&1
                      2⤵
                        PID:2776
                        • C:\Windows\system32\taskkill.exe
                          taskkill /f /im KsDumper.exe
                          3⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3528
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /c taskkill /f /im OllyDbg.exe >nul 2>&1
                        2⤵
                          PID:528
                          • C:\Windows\system32\taskkill.exe
                            taskkill /f /im OllyDbg.exe
                            3⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:736
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c taskkill /f /im x64dbg.exe >nul 2>&1
                          2⤵
                            PID:4496
                            • C:\Windows\system32\taskkill.exe
                              taskkill /f /im x64dbg.exe
                              3⤵
                              • Kills process with taskkill
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2352
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /c taskkill /f /im x32dbg.exe >nul 2>&1
                            2⤵
                              PID:2140
                              • C:\Windows\system32\taskkill.exe
                                taskkill /f /im x32dbg.exe
                                3⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:780
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                              2⤵
                                PID:2888
                                • C:\Windows\system32\taskkill.exe
                                  taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                                  3⤵
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3740
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&1
                                2⤵
                                  PID:4900
                                  • C:\Windows\system32\taskkill.exe
                                    taskkill /f /im HTTPDebuggerUI.exe
                                    3⤵
                                    • Kills process with taskkill
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:4688
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&1
                                  2⤵
                                    PID:1596
                                    • C:\Windows\system32\taskkill.exe
                                      taskkill /f /im HTTPDebuggerSvc.exe
                                      3⤵
                                      • Kills process with taskkill
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:4732
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /c taskkill /f /im Ida64.exe >nul 2>&1
                                    2⤵
                                      PID:3156
                                      • C:\Windows\system32\taskkill.exe
                                        taskkill /f /im Ida64.exe
                                        3⤵
                                        • Kills process with taskkill
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:5076
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /c taskkill /f /im OllyDbg.exe >nul 2>&1
                                      2⤵
                                        PID:3480
                                        • C:\Windows\system32\taskkill.exe
                                          taskkill /f /im OllyDbg.exe
                                          3⤵
                                          • Kills process with taskkill
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:548
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\system32\cmd.exe /c taskkill /f /im Dbg64.exe >nul 2>&1
                                        2⤵
                                          PID:628
                                          • C:\Windows\system32\taskkill.exe
                                            taskkill /f /im Dbg64.exe
                                            3⤵
                                            • Kills process with taskkill
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:1944
                                        • C:\Windows\system32\cmd.exe
                                          C:\Windows\system32\cmd.exe /c taskkill /f /im Dbg32.exe >nul 2>&1
                                          2⤵
                                            PID:4556
                                            • C:\Windows\system32\taskkill.exe
                                              taskkill /f /im Dbg32.exe
                                              3⤵
                                              • Kills process with taskkill
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:4076
                                          • C:\Windows\system32\cmd.exe
                                            C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&1
                                            2⤵
                                              PID:1780
                                              • C:\Windows\system32\taskkill.exe
                                                taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T
                                                3⤵
                                                • Kills process with taskkill
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:3520
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                                              2⤵
                                                PID:2336
                                                • C:\Windows\system32\taskkill.exe
                                                  taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                                                  3⤵
                                                  • Kills process with taskkill
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:2248
                                              • C:\Windows\system32\cmd.exe
                                                C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&1
                                                2⤵
                                                  PID:1856
                                                  • C:\Windows\system32\taskkill.exe
                                                    taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T
                                                    3⤵
                                                    • Kills process with taskkill
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:2524
                                              • C:\Windows\System32\rundll32.exe
                                                C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                1⤵
                                                  PID:1836
                                                • C:\Users\Admin\AppData\Local\Temp\Loader base github.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\Loader base github.exe"
                                                  1⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Looks for VirtualBox Guest Additions in registry
                                                  • Checks BIOS information in registry
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • Checks for VirtualBox DLLs, possible anti-VM trick
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:2208
                                                  • C:\Windows\system32\cmd.exe
                                                    C:\Windows\system32\cmd.exe /c cls
                                                    2⤵
                                                      PID:3648
                                                    • C:\Windows\system32\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c taskkill /f /im KsDumperClient.exe >nul 2>&1
                                                      2⤵
                                                        PID:3896
                                                        • C:\Windows\system32\taskkill.exe
                                                          taskkill /f /im KsDumperClient.exe
                                                          3⤵
                                                          • Kills process with taskkill
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:1620
                                                      • C:\Windows\system32\cmd.exe
                                                        C:\Windows\system32\cmd.exe /c taskkill /f /im KsDumper.exe >nul 2>&1
                                                        2⤵
                                                          PID:2736
                                                          • C:\Windows\system32\taskkill.exe
                                                            taskkill /f /im KsDumper.exe
                                                            3⤵
                                                            • Kills process with taskkill
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:4924
                                                        • C:\Windows\system32\cmd.exe
                                                          C:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&1
                                                          2⤵
                                                            PID:3352
                                                            • C:\Windows\system32\taskkill.exe
                                                              taskkill /f /im HTTPDebuggerUI.exe
                                                              3⤵
                                                              • Kills process with taskkill
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:1868
                                                          • C:\Windows\system32\cmd.exe
                                                            C:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&1
                                                            2⤵
                                                              PID:2892
                                                              • C:\Windows\system32\taskkill.exe
                                                                taskkill /f /im HTTPDebuggerSvc.exe
                                                                3⤵
                                                                • Kills process with taskkill
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:232
                                                            • C:\Windows\system32\cmd.exe
                                                              C:\Windows\system32\cmd.exe /c taskkill /f /im ProcessHacker.exe >nul 2>&1
                                                              2⤵
                                                                PID:1772
                                                                • C:\Windows\system32\taskkill.exe
                                                                  taskkill /f /im ProcessHacker.exe
                                                                  3⤵
                                                                  • Kills process with taskkill
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:448
                                                              • C:\Windows\system32\cmd.exe
                                                                C:\Windows\system32\cmd.exe /c taskkill /f /im idaq.exe >nul 2>&1
                                                                2⤵
                                                                  PID:440
                                                                  • C:\Windows\system32\taskkill.exe
                                                                    taskkill /f /im idaq.exe
                                                                    3⤵
                                                                    • Kills process with taskkill
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:1572
                                                                • C:\Windows\system32\cmd.exe
                                                                  C:\Windows\system32\cmd.exe /c taskkill /f /im idaq64.exe >nul 2>&1
                                                                  2⤵
                                                                    PID:4188
                                                                    • C:\Windows\system32\taskkill.exe
                                                                      taskkill /f /im idaq64.exe
                                                                      3⤵
                                                                      • Kills process with taskkill
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:1308
                                                                  • C:\Windows\system32\cmd.exe
                                                                    C:\Windows\system32\cmd.exe /c taskkill /f /im Wireshark.exe >nul 2>&1
                                                                    2⤵
                                                                      PID:2200
                                                                      • C:\Windows\system32\taskkill.exe
                                                                        taskkill /f /im Wireshark.exe
                                                                        3⤵
                                                                        • Kills process with taskkill
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        PID:4592
                                                                    • C:\Windows\system32\cmd.exe
                                                                      C:\Windows\system32\cmd.exe /c taskkill /f /im Fiddler.exe >nul 2>&1
                                                                      2⤵
                                                                        PID:5040
                                                                        • C:\Windows\system32\taskkill.exe
                                                                          taskkill /f /im Fiddler.exe
                                                                          3⤵
                                                                          • Kills process with taskkill
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:848
                                                                      • C:\Windows\system32\cmd.exe
                                                                        C:\Windows\system32\cmd.exe /c taskkill /f /im FiddlerEverywhere.exe >nul 2>&1
                                                                        2⤵
                                                                          PID:4920
                                                                          • C:\Windows\system32\taskkill.exe
                                                                            taskkill /f /im FiddlerEverywhere.exe
                                                                            3⤵
                                                                            • Kills process with taskkill
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:4660
                                                                        • C:\Windows\system32\cmd.exe
                                                                          C:\Windows\system32\cmd.exe /c taskkill /f /im Xenos64.exe >nul 2>&1
                                                                          2⤵
                                                                            PID:968
                                                                            • C:\Windows\system32\taskkill.exe
                                                                              taskkill /f /im Xenos64.exe
                                                                              3⤵
                                                                              • Kills process with taskkill
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:3084
                                                                          • C:\Windows\system32\cmd.exe
                                                                            C:\Windows\system32\cmd.exe /c taskkill /f /im Xenos.exe >nul 2>&1
                                                                            2⤵
                                                                              PID:2160
                                                                              • C:\Windows\system32\taskkill.exe
                                                                                taskkill /f /im Xenos.exe
                                                                                3⤵
                                                                                • Kills process with taskkill
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                PID:4828
                                                                            • C:\Windows\system32\cmd.exe
                                                                              C:\Windows\system32\cmd.exe /c taskkill /f /im Xenos32.exe >nul 2>&1
                                                                              2⤵
                                                                                PID:2888
                                                                                • C:\Windows\system32\taskkill.exe
                                                                                  taskkill /f /im Xenos32.exe
                                                                                  3⤵
                                                                                  • Kills process with taskkill
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  PID:3228
                                                                              • C:\Windows\system32\cmd.exe
                                                                                C:\Windows\system32\cmd.exe /c taskkill /f /im de4dot.exe >nul 2>&1
                                                                                2⤵
                                                                                  PID:4900
                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                    taskkill /f /im de4dot.exe
                                                                                    3⤵
                                                                                    • Kills process with taskkill
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:3552

                                                                              Network

                                                                              MITRE ATT&CK Enterprise v15

                                                                              Replay Monitor

                                                                              Loading Replay Monitor...

                                                                              Downloads

                                                                              • memory/4572-0-0x000001DE702D0000-0x000001DE702D1000-memory.dmp

                                                                                Filesize

                                                                                4KB

                                                                              • memory/4572-31-0x000001DE71C40000-0x000001DE71C41000-memory.dmp

                                                                                Filesize

                                                                                4KB