Resubmissions
01-10-2024 19:23
241001-x3tkyszekh 1001-10-2024 19:14
241001-xxtc1awdmj 1030-09-2024 22:07
240930-11v8jsxdnm 1030-09-2024 21:59
240930-1wfmas1crg 1030-09-2024 20:26
240930-y8bg1atepl 1026-09-2024 20:34
240926-zcgvkszbmg 1026-09-2024 19:28
240926-x6rkrstfrr 1026-09-2024 19:21
240926-x2mq1swhnh 1026-09-2024 19:20
240926-x19jdstdpl 1025-09-2024 21:15
240925-z4dx1a1elf 10Analysis
-
max time kernel
1200s -
max time network
1162s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-09-2024 21:15
Static task
static1
Behavioral task
behavioral1
Sample
RebelCracked.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
RebelCracked.exe
Resource
win10v2004-20240802-en
General
-
Target
RebelCracked.exe
-
Size
344KB
-
MD5
a84fd0fc75b9c761e9b7923a08da41c7
-
SHA1
2597048612041cd7a8c95002c73e9c2818bb2097
-
SHA256
9d9a79f4ae9bf7a992945f6c06c5bec642c05e4e828217c50255dabfa3677006
-
SHA512
a17f1144a0e3ce07c7ed6891987c5b969f291e9991442c33750028d35e2194794e8a649c397e8afc9f8ce19d485c453600c75cab4fcead09e38414d85819251a
-
SSDEEP
6144:lOcpeK8lucxAtLNFHUVuI/2zj1z6jZ755NofmWx4PCQL23wBw7R0ljTwrVuAdJKp:QcpSnx0LNFDQ60Ntbo5d7gBw7R7rbdJk
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral2/memory/3540-25-0x0000000000400000-0x0000000000432000-memory.dmp family_stormkitty -
Blocklisted process makes network request 6 IoCs
flow pid Process 349 3772 RuntimeBroker.exe 350 3772 RuntimeBroker.exe 351 3772 RuntimeBroker.exe 352 3772 RuntimeBroker.exe 353 3772 RuntimeBroker.exe 354 3772 RuntimeBroker.exe -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation Process not Found -
Executes dropped EXE 64 IoCs
pid Process 3344 RuntimeBroker.exe 3540 RuntimeBroker.exe 1860 RuntimeBroker.exe 3100 RuntimeBroker.exe 1080 RuntimeBroker.exe 744 RuntimeBroker.exe 3908 RuntimeBroker.exe 2196 RuntimeBroker.exe 4872 RuntimeBroker.exe 2868 RuntimeBroker.exe 4464 RuntimeBroker.exe 2536 RuntimeBroker.exe 4692 RuntimeBroker.exe 3612 RuntimeBroker.exe 4408 RuntimeBroker.exe 1436 RuntimeBroker.exe 4116 RuntimeBroker.exe 1688 RuntimeBroker.exe 5100 RuntimeBroker.exe 4756 RuntimeBroker.exe 5536 RuntimeBroker.exe 5660 RuntimeBroker.exe 5280 RuntimeBroker.exe 624 RuntimeBroker.exe 5584 RuntimeBroker.exe 5040 RuntimeBroker.exe 4572 RuntimeBroker.exe 5804 RuntimeBroker.exe 4076 RuntimeBroker.exe 5868 RuntimeBroker.exe 4804 RuntimeBroker.exe 1480 RuntimeBroker.exe 5832 RuntimeBroker.exe 5608 RuntimeBroker.exe 3812 RuntimeBroker.exe 5796 RuntimeBroker.exe 4112 RuntimeBroker.exe 1080 RuntimeBroker.exe 3100 RuntimeBroker.exe 6044 RuntimeBroker.exe 1428 RuntimeBroker.exe 4528 RuntimeBroker.exe 6596 RuntimeBroker.exe 7120 RuntimeBroker.exe 5852 RuntimeBroker.exe 6996 RuntimeBroker.exe 6716 RuntimeBroker.exe 7112 RuntimeBroker.exe 6724 RuntimeBroker.exe 2160 RuntimeBroker.exe 5824 RuntimeBroker.exe 4784 RuntimeBroker.exe 2676 RuntimeBroker.exe 5196 RuntimeBroker.exe 7080 RuntimeBroker.exe 6128 RuntimeBroker.exe 5728 RuntimeBroker.exe 6904 RuntimeBroker.exe 6248 RuntimeBroker.exe 5616 RuntimeBroker.exe 5348 RuntimeBroker.exe 6864 RuntimeBroker.exe 1692 RuntimeBroker.exe 3212 RuntimeBroker.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 64 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\c15762fec1d88668b7893daae5a1a79f\Admin@KVIWLPUJ_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\b2a4129d590c5a0f13623e3ce4b6fd11\Admin@KVIWLPUJ_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Saved Pictures\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\91c4aa4bb6b92f9696b156a183171088\Admin@KVIWLPUJ_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Camera Roll\desktop.ini Process not Found File created C:\Users\Admin\AppData\Local\fc7cdc24b837ca3d660e8a7c947b53b5\Admin@KVIWLPUJ_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\7172c801c7048ee96d98d0fcf0037428\Admin@KVIWLPUJ_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Camera Roll\desktop.ini Process not Found File created C:\Users\Admin\AppData\Local\91c4aa4bb6b92f9696b156a183171088\Admin@KVIWLPUJ_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini Process not Found File created C:\Users\Admin\AppData\Local\7172c801c7048ee96d98d0fcf0037428\Admin@KVIWLPUJ_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\7172c801c7048ee96d98d0fcf0037428\Admin@KVIWLPUJ_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Saved Pictures\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\74539204bf59aa420e781862240f3dc7\Admin@KVIWLPUJ_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini RuntimeBroker.exe File opened for modification C:\Users\Admin\AppData\Local\040b5477f88fab961bb3378764c3009c\Admin@KVIWLPUJ_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\91c4aa4bb6b92f9696b156a183171088\Admin@KVIWLPUJ_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\1a33a219d23adc17f0a4eb418b7c9575\Admin@KVIWLPUJ_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\ed7282cf3c7caab5b23a16ba43529fdc\Admin@KVIWLPUJ_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Saved Pictures\desktop.ini RuntimeBroker.exe File opened for modification C:\Users\Admin\AppData\Local\ed7282cf3c7caab5b23a16ba43529fdc\Admin@KVIWLPUJ_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\b2a4129d590c5a0f13623e3ce4b6fd11\Admin@KVIWLPUJ_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini Process not Found File created C:\Users\Admin\AppData\Local\74539204bf59aa420e781862240f3dc7\Admin@KVIWLPUJ_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini Process not Found File created C:\Users\Admin\AppData\Local\ed7282cf3c7caab5b23a16ba43529fdc\Admin@KVIWLPUJ_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Saved Pictures\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\11d9d4f3b4d40f0301d279a4756db7d8\Admin@KVIWLPUJ_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Camera Roll\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\7172c801c7048ee96d98d0fcf0037428\Admin@KVIWLPUJ_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Saved Pictures\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\b2a4129d590c5a0f13623e3ce4b6fd11\Admin@KVIWLPUJ_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\c15762fec1d88668b7893daae5a1a79f\Admin@KVIWLPUJ_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Camera Roll\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\b2a4129d590c5a0f13623e3ce4b6fd11\Admin@KVIWLPUJ_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\c15762fec1d88668b7893daae5a1a79f\Admin@KVIWLPUJ_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\7172c801c7048ee96d98d0fcf0037428\Admin@KVIWLPUJ_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\c15762fec1d88668b7893daae5a1a79f\Admin@KVIWLPUJ_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Saved Pictures\desktop.ini Process not Found File created C:\Users\Admin\AppData\Local\ed7282cf3c7caab5b23a16ba43529fdc\Admin@KVIWLPUJ_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\c15762fec1d88668b7893daae5a1a79f\Admin@KVIWLPUJ_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\1a33a219d23adc17f0a4eb418b7c9575\Admin@KVIWLPUJ_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\74539204bf59aa420e781862240f3dc7\Admin@KVIWLPUJ_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\91c4aa4bb6b92f9696b156a183171088\Admin@KVIWLPUJ_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\fc7cdc24b837ca3d660e8a7c947b53b5\Admin@KVIWLPUJ_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Saved Pictures\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\ed7282cf3c7caab5b23a16ba43529fdc\Admin@KVIWLPUJ_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Saved Pictures\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\b2a4129d590c5a0f13623e3ce4b6fd11\Admin@KVIWLPUJ_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini Process not Found File created C:\Users\Admin\AppData\Local\11d9d4f3b4d40f0301d279a4756db7d8\Admin@KVIWLPUJ_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\74539204bf59aa420e781862240f3dc7\Admin@KVIWLPUJ_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\c15762fec1d88668b7893daae5a1a79f\Admin@KVIWLPUJ_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\fc7cdc24b837ca3d660e8a7c947b53b5\Admin@KVIWLPUJ_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Camera Roll\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\11d9d4f3b4d40f0301d279a4756db7d8\Admin@KVIWLPUJ_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Camera Roll\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\91c4aa4bb6b92f9696b156a183171088\Admin@KVIWLPUJ_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Camera Roll\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\fc7cdc24b837ca3d660e8a7c947b53b5\Admin@KVIWLPUJ_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Camera Roll\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\ed7282cf3c7caab5b23a16ba43529fdc\Admin@KVIWLPUJ_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\1a33a219d23adc17f0a4eb418b7c9575\Admin@KVIWLPUJ_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\c15762fec1d88668b7893daae5a1a79f\Admin@KVIWLPUJ_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\ed7282cf3c7caab5b23a16ba43529fdc\Admin@KVIWLPUJ_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\c15762fec1d88668b7893daae5a1a79f\Admin@KVIWLPUJ_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Camera Roll\desktop.ini Process not Found File created C:\Users\Admin\AppData\Local\7172c801c7048ee96d98d0fcf0037428\Admin@KVIWLPUJ_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Camera Roll\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\b2a4129d590c5a0f13623e3ce4b6fd11\Admin@KVIWLPUJ_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\b2a4129d590c5a0f13623e3ce4b6fd11\Admin@KVIWLPUJ_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Camera Roll\desktop.ini Process not Found File created C:\Users\Admin\AppData\Local\11d9d4f3b4d40f0301d279a4756db7d8\Admin@KVIWLPUJ_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Saved Pictures\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\91c4aa4bb6b92f9696b156a183171088\Admin@KVIWLPUJ_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini Process not Found File created C:\Users\Admin\AppData\Local\91c4aa4bb6b92f9696b156a183171088\Admin@KVIWLPUJ_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Camera Roll\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\ed7282cf3c7caab5b23a16ba43529fdc\Admin@KVIWLPUJ_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\ed7282cf3c7caab5b23a16ba43529fdc\Admin@KVIWLPUJ_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\91c4aa4bb6b92f9696b156a183171088\Admin@KVIWLPUJ_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\fc7cdc24b837ca3d660e8a7c947b53b5\Admin@KVIWLPUJ_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\c15762fec1d88668b7893daae5a1a79f\Admin@KVIWLPUJ_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\91c4aa4bb6b92f9696b156a183171088\Admin@KVIWLPUJ_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\7172c801c7048ee96d98d0fcf0037428\Admin@KVIWLPUJ_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Saved Pictures\desktop.ini RuntimeBroker.exe File opened for modification C:\Users\Admin\AppData\Local\fc7cdc24b837ca3d660e8a7c947b53b5\Admin@KVIWLPUJ_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\040b5477f88fab961bb3378764c3009c\Admin@KVIWLPUJ_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\7172c801c7048ee96d98d0fcf0037428\Admin@KVIWLPUJ_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini Process not Found File opened for modification C:\Users\Admin\AppData\Local\040b5477f88fab961bb3378764c3009c\Admin@KVIWLPUJ_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini RuntimeBroker.exe File opened for modification C:\Users\Admin\AppData\Local\91c4aa4bb6b92f9696b156a183171088\Admin@KVIWLPUJ_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\7172c801c7048ee96d98d0fcf0037428\Admin@KVIWLPUJ_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Camera Roll\desktop.ini RuntimeBroker.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 64 IoCs
flow ioc 269 pastebin.com 547 pastebin.com 581 pastebin.com 612 pastebin.com 618 pastebin.com 747 pastebin.com 749 pastebin.com 776 pastebin.com 118 pastebin.com 400 pastebin.com 522 pastebin.com 557 pastebin.com 730 pastebin.com 743 pastebin.com 123 pastebin.com 342 pastebin.com 463 pastebin.com 528 pastebin.com 574 pastebin.com 746 pastebin.com 762 pastebin.com 452 pastebin.com 807 pastebin.com 854 pastebin.com 927 pastebin.com 62 pastebin.com 296 pastebin.com 309 pastebin.com 353 pastebin.com 363 pastebin.com 605 pastebin.com 750 pastebin.com 929 pastebin.com 70 pastebin.com 327 pastebin.com 430 pastebin.com 490 pastebin.com 744 pastebin.com 748 pastebin.com 365 pastebin.com 589 pastebin.com 76 pastebin.com 270 pastebin.com 288 pastebin.com 625 pastebin.com 745 pastebin.com 825 pastebin.com 197 pastebin.com 341 pastebin.com 423 pastebin.com 835 pastebin.com 843 pastebin.com 281 pastebin.com 422 pastebin.com 511 pastebin.com 563 pastebin.com 742 pastebin.com 814 pastebin.com 513 pastebin.com 766 pastebin.com 902 pastebin.com 171 pastebin.com 257 pastebin.com 457 pastebin.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 52 icanhazip.com 565 icanhazip.com -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 3344 set thread context of 3540 3344 RuntimeBroker.exe 84 PID 1860 set thread context of 3100 1860 RuntimeBroker.exe 87 PID 1080 set thread context of 744 1080 RuntimeBroker.exe 94 PID 3908 set thread context of 2196 3908 RuntimeBroker.exe 98 PID 4872 set thread context of 2868 4872 RuntimeBroker.exe 114 PID 4464 set thread context of 2536 4464 RuntimeBroker.exe 122 PID 4692 set thread context of 3612 4692 RuntimeBroker.exe 127 PID 4408 set thread context of 1436 4408 RuntimeBroker.exe 134 PID 4116 set thread context of 1688 4116 RuntimeBroker.exe 137 PID 5100 set thread context of 4756 5100 RuntimeBroker.exe 140 PID 5536 set thread context of 5660 5536 RuntimeBroker.exe 484 PID 5280 set thread context of 624 5280 RuntimeBroker.exe 162 PID 5584 set thread context of 5040 5584 RuntimeBroker.exe 2523 PID 4572 set thread context of 5804 4572 RuntimeBroker.exe 2737 PID 4076 set thread context of 5868 4076 RuntimeBroker.exe 3116 PID 4804 set thread context of 1480 4804 RuntimeBroker.exe 2900 PID 5832 set thread context of 5608 5832 RuntimeBroker.exe 2367 PID 3812 set thread context of 5796 3812 RuntimeBroker.exe 2922 PID 4112 set thread context of 1080 4112 RuntimeBroker.exe 2609 PID 3100 set thread context of 6044 3100 RuntimeBroker.exe 4385 PID 1428 set thread context of 4528 1428 RuntimeBroker.exe 5337 PID 6596 set thread context of 7120 6596 RuntimeBroker.exe 6009 PID 5852 set thread context of 6996 5852 RuntimeBroker.exe 4235 PID 6716 set thread context of 7112 6716 RuntimeBroker.exe 5877 PID 6724 set thread context of 2160 6724 RuntimeBroker.exe 6427 PID 5824 set thread context of 4784 5824 RuntimeBroker.exe 7048 PID 2676 set thread context of 5196 2676 RuntimeBroker.exe 5015 PID 7080 set thread context of 6128 7080 RuntimeBroker.exe 7056 PID 5728 set thread context of 6904 5728 RuntimeBroker.exe 7049 PID 6248 set thread context of 5616 6248 RuntimeBroker.exe 7750 PID 5348 set thread context of 6864 5348 RuntimeBroker.exe 8750 PID 1692 set thread context of 3212 1692 RuntimeBroker.exe 8340 PID 1448 set thread context of 6860 1448 RuntimeBroker.exe 8488 PID 2356 set thread context of 5036 2356 RuntimeBroker.exe 6725 PID 6600 set thread context of 6616 6600 RuntimeBroker.exe 6735 PID 4184 set thread context of 6692 4184 RuntimeBroker.exe 8266 PID 3560 set thread context of 6600 3560 RuntimeBroker.exe 10422 PID 6784 set thread context of 5076 6784 RuntimeBroker.exe 9570 PID 5164 set thread context of 6236 5164 RuntimeBroker.exe 9524 PID 3632 set thread context of 6432 3632 RuntimeBroker.exe 10877 PID 5556 set thread context of 628 5556 RuntimeBroker.exe 11290 PID 6436 set thread context of 5596 6436 RuntimeBroker.exe 11351 PID 7148 set thread context of 4852 7148 RuntimeBroker.exe 9871 PID 5664 set thread context of 6308 5664 RuntimeBroker.exe 10461 PID 2676 set thread context of 3772 2676 RuntimeBroker.exe 1286 PID 6076 set thread context of 6060 6076 RuntimeBroker.exe 12007 PID 5660 set thread context of 6740 5660 RuntimeBroker.exe 9828 PID 6204 set thread context of 1100 6204 RuntimeBroker.exe 11564 PID 6460 set thread context of 1980 6460 RuntimeBroker.exe 12448 PID 2464 set thread context of 404 2464 RuntimeBroker.exe 13983 PID 1576 set thread context of 6096 1576 RuntimeBroker.exe 10609 PID 1944 set thread context of 4472 1944 RuntimeBroker.exe 14310 PID 2436 set thread context of 2332 2436 RuntimeBroker.exe 14028 PID 6608 set thread context of 5708 6608 RuntimeBroker.exe 12050 PID 5496 set thread context of 6568 5496 RuntimeBroker.exe 11729 PID 5460 set thread context of 7016 5460 RuntimeBroker.exe 15114 PID 2356 set thread context of 6816 2356 RuntimeBroker.exe 12019 PID 2020 set thread context of 4872 2020 RuntimeBroker.exe 16473 PID 5544 set thread context of 5720 5544 RuntimeBroker.exe 11838 PID 5936 set thread context of 3952 5936 RuntimeBroker.exe 16617 PID 6312 set thread context of 6884 6312 RuntimeBroker.exe 17409 PID 6984 set thread context of 7316 6984 RuntimeBroker.exe 16934 PID 7060 set thread context of 5860 7060 RuntimeBroker.exe 17528 PID 7360 set thread context of 7432 7360 RuntimeBroker.exe 10208 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 64 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh Process not Found Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh Process not Found Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh Process not Found Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh Process not Found Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh Process not Found Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh Process not Found Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh Process not Found Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh Process not Found Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh Process not Found Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh Process not Found Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh Process not Found Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh Process not Found Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh Process not Found Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh Process not Found Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh Process not Found Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh Process not Found Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh Process not Found Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh Process not Found Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh Process not Found Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh Process not Found Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh Process not Found Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh Process not Found Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh Process not Found Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh Process not Found Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh Process not Found Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh Process not Found Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 8312 780 Process not Found 1688 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RuntimeBroker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RuntimeBroker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RuntimeBroker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RuntimeBroker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RuntimeBroker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RuntimeBroker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RuntimeBroker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RuntimeBroker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RuntimeBroker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RuntimeBroker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RuntimeBroker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RuntimeBroker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RuntimeBroker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RuntimeBroker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 64 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 5220 netsh.exe 5728 netsh.exe 6792 cmd.exe 1612 cmd.exe 5992 netsh.exe 920 netsh.exe 6716 netsh.exe 180 cmd.exe 7752 Process not Found 5340 cmd.exe 7672 netsh.exe 8572 netsh.exe 5228 netsh.exe 7668 cmd.exe 4784 Process not Found 8500 Process not Found 5732 netsh.exe 3340 cmd.exe 6864 netsh.exe 4376 Process not Found 7484 cmd.exe 8800 Process not Found 7940 netsh.exe 8848 netsh.exe 8452 netsh.exe 4892 cmd.exe 1604 cmd.exe 4780 Process not Found 6480 cmd.exe 7144 netsh.exe 7452 netsh.exe 1460 cmd.exe 9204 Process not Found 8728 netsh.exe 8876 netsh.exe 8456 netsh.exe 5340 cmd.exe 7032 netsh.exe 6076 netsh.exe 4088 cmd.exe 6632 Process not Found 8048 Process not Found 1880 Process not Found 9208 netsh.exe 7972 Process not Found 9228 Process not Found 5284 netsh.exe 2152 cmd.exe 3420 cmd.exe 7112 cmd.exe 5152 netsh.exe 1068 cmd.exe 6704 Process not Found 8112 cmd.exe 10148 Process not Found 5908 netsh.exe 2456 netsh.exe 3368 netsh.exe 3972 cmd.exe 8908 Process not Found 8848 Process not Found 7376 Process not Found 6756 cmd.exe 5536 cmd.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 Process not Found Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 Process not Found Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags Process not Found Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID Process not Found Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID Process not Found -
Checks processor information in registry 2 TTPs 64 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RuntimeBroker.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 RuntimeBroker.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Process not Found Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RuntimeBroker.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RuntimeBroker.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RuntimeBroker.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RuntimeBroker.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RuntimeBroker.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RuntimeBroker.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RuntimeBroker.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 Process not Found Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RuntimeBroker.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RuntimeBroker.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 RuntimeBroker.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 RuntimeBroker.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RuntimeBroker.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RuntimeBroker.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RuntimeBroker.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Process not Found Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Process not Found Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 RuntimeBroker.exe -
Enumerates system info in registry 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Process not Found -
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Policies Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing Process not Found Key created \REGISTRY\USER\.DEFAULT\Software Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople Process not Found -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-523280732-2327480845-3730041215-1000\{AEEDE87D-6204-4EC5-BF7C-EA086DD1D02D} msedge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3540 RuntimeBroker.exe 3540 RuntimeBroker.exe 3604 msedge.exe 3604 msedge.exe 1572 msedge.exe 1572 msedge.exe 3100 RuntimeBroker.exe 3100 RuntimeBroker.exe 3100 RuntimeBroker.exe 3540 RuntimeBroker.exe 3540 RuntimeBroker.exe 744 RuntimeBroker.exe 744 RuntimeBroker.exe 744 RuntimeBroker.exe 3540 RuntimeBroker.exe 3540 RuntimeBroker.exe 3100 RuntimeBroker.exe 3100 RuntimeBroker.exe 3540 RuntimeBroker.exe 3540 RuntimeBroker.exe 2196 RuntimeBroker.exe 2196 RuntimeBroker.exe 2196 RuntimeBroker.exe 3100 RuntimeBroker.exe 3100 RuntimeBroker.exe 3540 RuntimeBroker.exe 3540 RuntimeBroker.exe 3540 RuntimeBroker.exe 3540 RuntimeBroker.exe 3100 RuntimeBroker.exe 3100 RuntimeBroker.exe 3540 RuntimeBroker.exe 3540 RuntimeBroker.exe 3100 RuntimeBroker.exe 3100 RuntimeBroker.exe 744 RuntimeBroker.exe 744 RuntimeBroker.exe 744 RuntimeBroker.exe 744 RuntimeBroker.exe 3540 RuntimeBroker.exe 3540 RuntimeBroker.exe 744 RuntimeBroker.exe 744 RuntimeBroker.exe 3540 RuntimeBroker.exe 3540 RuntimeBroker.exe 3100 RuntimeBroker.exe 3100 RuntimeBroker.exe 3100 RuntimeBroker.exe 3100 RuntimeBroker.exe 2868 RuntimeBroker.exe 2868 RuntimeBroker.exe 2868 RuntimeBroker.exe 3100 RuntimeBroker.exe 3100 RuntimeBroker.exe 3540 RuntimeBroker.exe 3540 RuntimeBroker.exe 744 RuntimeBroker.exe 744 RuntimeBroker.exe 3100 RuntimeBroker.exe 3100 RuntimeBroker.exe 2196 RuntimeBroker.exe 2196 RuntimeBroker.exe 3540 RuntimeBroker.exe 3540 RuntimeBroker.exe -
Suspicious behavior: LoadsDriver 64 IoCs
pid Process 8988 Process not Found 10912 Process not Found 8976 Process not Found 6556 Process not Found 584 Process not Found 8044 Process not Found 3588 Process not Found 7204 Process not Found 2568 Process not Found 7164 Process not Found 7384 Process not Found 2516 Process not Found 10076 Process not Found 6476 Process not Found 552 Process not Found 4772 Process not Found 8220 Process not Found 8896 Process not Found 6332 Process not Found 9440 Process not Found 7796 Process not Found 9476 Process not Found 11160 Process not Found 8376 Process not Found 7936 Process not Found 4208 Process not Found 6076 Process not Found 6524 Process not Found 9496 Process not Found 8800 Process not Found 7856 Process not Found 6588 Process not Found 2628 Process not Found 1464 Process not Found 7944 Process not Found 8740 Process not Found 8916 Process not Found 6516 Process not Found 3340 Process not Found 7388 Process not Found 6008 Process not Found 10292 Process not Found 9972 Process not Found 9988 Process not Found 4784 Process not Found 6904 Process not Found 3616 Process not Found 2644 Process not Found 4676 Process not Found 10360 Process not Found 10932 Process not Found 8672 Process not Found 6128 Process not Found 5020 Process not Found 10068 Process not Found 5196 Process not Found 3880 Process not Found 10356 Process not Found 10372 Process not Found 10492 Process not Found 10136 Process not Found 8852 Process not Found 5144 Process not Found 336 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 18 IoCs
pid Process 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3540 RuntimeBroker.exe Token: SeDebugPrivilege 3100 RuntimeBroker.exe Token: SeDebugPrivilege 744 RuntimeBroker.exe Token: SeDebugPrivilege 2196 RuntimeBroker.exe Token: SeDebugPrivilege 2868 RuntimeBroker.exe Token: SeDebugPrivilege 2536 RuntimeBroker.exe Token: SeDebugPrivilege 3612 RuntimeBroker.exe Token: SeDebugPrivilege 1436 RuntimeBroker.exe Token: SeDebugPrivilege 1688 RuntimeBroker.exe Token: SeDebugPrivilege 4756 RuntimeBroker.exe Token: SeDebugPrivilege 5660 RuntimeBroker.exe Token: SeDebugPrivilege 624 RuntimeBroker.exe Token: SeDebugPrivilege 5040 RuntimeBroker.exe Token: SeDebugPrivilege 5804 RuntimeBroker.exe Token: SeDebugPrivilege 5868 RuntimeBroker.exe Token: SeDebugPrivilege 1480 RuntimeBroker.exe Token: SeDebugPrivilege 5608 RuntimeBroker.exe Token: SeDebugPrivilege 5796 RuntimeBroker.exe Token: SeDebugPrivilege 1080 RuntimeBroker.exe Token: SeDebugPrivilege 6044 RuntimeBroker.exe Token: SeDebugPrivilege 4528 RuntimeBroker.exe Token: SeDebugPrivilege 7120 RuntimeBroker.exe Token: SeDebugPrivilege 6996 RuntimeBroker.exe Token: SeDebugPrivilege 7112 RuntimeBroker.exe Token: SeDebugPrivilege 2160 RuntimeBroker.exe Token: SeDebugPrivilege 4784 RuntimeBroker.exe Token: SeDebugPrivilege 5196 RuntimeBroker.exe Token: SeDebugPrivilege 6128 RuntimeBroker.exe Token: SeDebugPrivilege 6904 RuntimeBroker.exe Token: SeDebugPrivilege 5616 RuntimeBroker.exe Token: 33 1964 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1964 AUDIODG.EXE Token: SeDebugPrivilege 6864 RuntimeBroker.exe Token: SeDebugPrivilege 3212 RuntimeBroker.exe Token: SeDebugPrivilege 6860 RuntimeBroker.exe Token: SeDebugPrivilege 5036 RuntimeBroker.exe Token: SeDebugPrivilege 6616 RuntimeBroker.exe Token: SeDebugPrivilege 6692 RuntimeBroker.exe Token: SeDebugPrivilege 6600 RuntimeBroker.exe Token: SeDebugPrivilege 5076 RuntimeBroker.exe Token: SeDebugPrivilege 6236 RuntimeBroker.exe Token: SeDebugPrivilege 6432 RuntimeBroker.exe Token: SeDebugPrivilege 628 RuntimeBroker.exe Token: SeDebugPrivilege 5596 RuntimeBroker.exe Token: SeDebugPrivilege 4852 RuntimeBroker.exe Token: SeDebugPrivilege 6308 RuntimeBroker.exe Token: SeDebugPrivilege 3772 RuntimeBroker.exe Token: SeDebugPrivilege 6060 RuntimeBroker.exe Token: SeDebugPrivilege 6740 RuntimeBroker.exe Token: SeDebugPrivilege 1100 RuntimeBroker.exe Token: SeDebugPrivilege 1980 RuntimeBroker.exe Token: SeDebugPrivilege 6900 RuntimeBroker.exe Token: SeDebugPrivilege 404 RuntimeBroker.exe Token: SeDebugPrivilege 6096 RuntimeBroker.exe Token: SeDebugPrivilege 4472 RuntimeBroker.exe Token: SeDebugPrivilege 2332 RuntimeBroker.exe Token: SeDebugPrivilege 5708 RuntimeBroker.exe Token: SeDebugPrivilege 6568 RuntimeBroker.exe Token: SeDebugPrivilege 7016 RuntimeBroker.exe Token: SeDebugPrivilege 6816 RuntimeBroker.exe Token: SeDebugPrivilege 4872 RuntimeBroker.exe Token: SeDebugPrivilege 5720 RuntimeBroker.exe Token: SeDebugPrivilege 3952 RuntimeBroker.exe Token: SeDebugPrivilege 6884 RuntimeBroker.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe 1572 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4252 wrote to memory of 3344 4252 RebelCracked.exe 82 PID 4252 wrote to memory of 3344 4252 RebelCracked.exe 82 PID 4252 wrote to memory of 3344 4252 RebelCracked.exe 82 PID 4252 wrote to memory of 2700 4252 RebelCracked.exe 83 PID 4252 wrote to memory of 2700 4252 RebelCracked.exe 83 PID 3344 wrote to memory of 3540 3344 RuntimeBroker.exe 84 PID 3344 wrote to memory of 3540 3344 RuntimeBroker.exe 84 PID 3344 wrote to memory of 3540 3344 RuntimeBroker.exe 84 PID 3344 wrote to memory of 3540 3344 RuntimeBroker.exe 84 PID 3344 wrote to memory of 3540 3344 RuntimeBroker.exe 84 PID 3344 wrote to memory of 3540 3344 RuntimeBroker.exe 84 PID 3344 wrote to memory of 3540 3344 RuntimeBroker.exe 84 PID 3344 wrote to memory of 3540 3344 RuntimeBroker.exe 84 PID 2700 wrote to memory of 1860 2700 RebelCracked.exe 85 PID 2700 wrote to memory of 1860 2700 RebelCracked.exe 85 PID 2700 wrote to memory of 1860 2700 RebelCracked.exe 85 PID 2700 wrote to memory of 940 2700 RebelCracked.exe 86 PID 2700 wrote to memory of 940 2700 RebelCracked.exe 86 PID 1860 wrote to memory of 3100 1860 RuntimeBroker.exe 87 PID 1860 wrote to memory of 3100 1860 RuntimeBroker.exe 87 PID 1860 wrote to memory of 3100 1860 RuntimeBroker.exe 87 PID 1860 wrote to memory of 3100 1860 RuntimeBroker.exe 87 PID 1860 wrote to memory of 3100 1860 RuntimeBroker.exe 87 PID 1860 wrote to memory of 3100 1860 RuntimeBroker.exe 87 PID 1860 wrote to memory of 3100 1860 RuntimeBroker.exe 87 PID 1860 wrote to memory of 3100 1860 RuntimeBroker.exe 87 PID 940 wrote to memory of 1080 940 RebelCracked.exe 92 PID 940 wrote to memory of 1080 940 RebelCracked.exe 92 PID 940 wrote to memory of 1080 940 RebelCracked.exe 92 PID 940 wrote to memory of 3740 940 RebelCracked.exe 93 PID 940 wrote to memory of 3740 940 RebelCracked.exe 93 PID 1080 wrote to memory of 744 1080 RuntimeBroker.exe 94 PID 1080 wrote to memory of 744 1080 RuntimeBroker.exe 94 PID 1080 wrote to memory of 744 1080 RuntimeBroker.exe 94 PID 1080 wrote to memory of 744 1080 RuntimeBroker.exe 94 PID 1080 wrote to memory of 744 1080 RuntimeBroker.exe 94 PID 1080 wrote to memory of 744 1080 RuntimeBroker.exe 94 PID 1080 wrote to memory of 744 1080 RuntimeBroker.exe 94 PID 1080 wrote to memory of 744 1080 RuntimeBroker.exe 94 PID 3740 wrote to memory of 3908 3740 RebelCracked.exe 95 PID 3740 wrote to memory of 3908 3740 RebelCracked.exe 95 PID 3740 wrote to memory of 3908 3740 RebelCracked.exe 95 PID 3740 wrote to memory of 4844 3740 RebelCracked.exe 96 PID 3740 wrote to memory of 4844 3740 RebelCracked.exe 96 PID 3908 wrote to memory of 2196 3908 RuntimeBroker.exe 98 PID 3908 wrote to memory of 2196 3908 RuntimeBroker.exe 98 PID 3908 wrote to memory of 2196 3908 RuntimeBroker.exe 98 PID 3908 wrote to memory of 2196 3908 RuntimeBroker.exe 98 PID 3908 wrote to memory of 2196 3908 RuntimeBroker.exe 98 PID 3908 wrote to memory of 2196 3908 RuntimeBroker.exe 98 PID 3908 wrote to memory of 2196 3908 RuntimeBroker.exe 98 PID 3908 wrote to memory of 2196 3908 RuntimeBroker.exe 98 PID 1572 wrote to memory of 3940 1572 msedge.exe 101 PID 1572 wrote to memory of 3940 1572 msedge.exe 101 PID 1572 wrote to memory of 5116 1572 msedge.exe 102 PID 1572 wrote to memory of 5116 1572 msedge.exe 102 PID 1572 wrote to memory of 5116 1572 msedge.exe 102 PID 1572 wrote to memory of 5116 1572 msedge.exe 102 PID 1572 wrote to memory of 5116 1572 msedge.exe 102 PID 1572 wrote to memory of 5116 1572 msedge.exe 102 PID 1572 wrote to memory of 5116 1572 msedge.exe 102 PID 1572 wrote to memory of 5116 1572 msedge.exe 102 PID 1572 wrote to memory of 5116 1572 msedge.exe 102 PID 1572 wrote to memory of 5116 1572 msedge.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"3⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3540 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All4⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:5340 -
C:\Windows\SysWOW64\chcp.comchcp 650015⤵PID:5440
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile5⤵
- Event Triggered Execution: Netsh Helper DLL
PID:5604
-
-
C:\Windows\SysWOW64\findstr.exefindstr All5⤵PID:5612
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid4⤵PID:6088
-
C:\Windows\SysWOW64\chcp.comchcp 650015⤵PID:540
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid5⤵PID:5204
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3100 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All5⤵PID:5856
-
C:\Windows\SysWOW64\chcp.comchcp 650016⤵PID:5908
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile6⤵PID:6040
-
-
C:\Windows\SysWOW64\findstr.exefindstr All6⤵PID:6072
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid5⤵PID:5156
-
C:\Windows\SysWOW64\chcp.comchcp 650016⤵PID:5528
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid6⤵PID:6112
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"5⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:744 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All6⤵PID:5948
-
C:\Windows\SysWOW64\chcp.comchcp 650017⤵PID:4804
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile7⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:5908
-
-
C:\Windows\SysWOW64\findstr.exefindstr All7⤵PID:5768
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid6⤵PID:2940
-
C:\Windows\SysWOW64\chcp.comchcp 650017⤵PID:5988
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid7⤵PID:4768
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2196 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All7⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:3340 -
C:\Windows\SysWOW64\chcp.comchcp 650018⤵PID:5468
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile8⤵PID:4076
-
-
C:\Windows\SysWOW64\findstr.exefindstr All8⤵PID:5940
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid7⤵PID:5344
-
C:\Windows\SysWOW64\chcp.comchcp 650018⤵PID:5928
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid8⤵PID:3212
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"5⤵
- Checks computer location settings
PID:4844 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4872 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"7⤵PID:3680
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"7⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2868 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All8⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:6480 -
C:\Windows\SysWOW64\chcp.comchcp 650019⤵PID:6988
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile9⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:5284
-
-
C:\Windows\SysWOW64\findstr.exefindstr All9⤵PID:5732
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid8⤵PID:6744
-
C:\Windows\SysWOW64\chcp.comchcp 650019⤵PID:7068
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid9⤵PID:2200
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"6⤵PID:3664
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4464 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"8⤵PID:4700
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"8⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:2536 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All9⤵PID:6132
-
C:\Windows\SysWOW64\chcp.comchcp 6500110⤵PID:5080
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile10⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:5228
-
-
C:\Windows\SysWOW64\findstr.exefindstr All10⤵PID:5236
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid9⤵PID:5804
-
C:\Windows\SysWOW64\chcp.comchcp 6500110⤵PID:5976
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid10⤵PID:6060
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"7⤵
- Checks computer location settings
PID:3688 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4692 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"9⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:3612 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All10⤵PID:5340
-
C:\Windows\SysWOW64\chcp.comchcp 6500111⤵PID:1692
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile11⤵PID:3724
-
-
C:\Windows\SysWOW64\findstr.exefindstr All11⤵PID:2052
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid10⤵PID:1524
-
C:\Windows\SysWOW64\chcp.comchcp 6500111⤵PID:7164
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid11⤵PID:6204
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"8⤵PID:2848
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4408 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"10⤵PID:4920
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"10⤵PID:3456
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"10⤵PID:4464
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"10⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:1436 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All11⤵PID:5400
-
C:\Windows\SysWOW64\chcp.comchcp 6500112⤵PID:5732
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile12⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:5992
-
-
C:\Windows\SysWOW64\findstr.exefindstr All12⤵PID:4940
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid11⤵
- System Location Discovery: System Language Discovery
PID:6256 -
C:\Windows\SysWOW64\chcp.comchcp 6500112⤵PID:5912
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid12⤵PID:7148
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"9⤵PID:3764
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"10⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4116 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"11⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:1688 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All12⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:6756 -
C:\Windows\SysWOW64\chcp.comchcp 6500113⤵PID:2268
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile13⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4208
-
-
C:\Windows\SysWOW64\findstr.exefindstr All13⤵PID:6320
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid12⤵PID:1980
-
C:\Windows\SysWOW64\chcp.comchcp 6500113⤵PID:2064
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid13⤵PID:6488
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"10⤵PID:3748
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5100 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"12⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4756 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All13⤵PID:6968
-
C:\Windows\SysWOW64\chcp.comchcp 6500114⤵PID:6552
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile14⤵PID:7140
-
-
C:\Windows\SysWOW64\findstr.exefindstr All14⤵PID:7156
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid13⤵PID:6200
-
C:\Windows\SysWOW64\chcp.comchcp 6500114⤵PID:3812
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid14⤵PID:6188
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"11⤵
- Checks computer location settings
PID:4580 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"12⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5536 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"13⤵PID:5628
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"13⤵PID:5652
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"13⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5660 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All14⤵PID:5796
-
C:\Windows\SysWOW64\chcp.comchcp 6500115⤵PID:5072
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile15⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
PID:5732
-
-
C:\Windows\SysWOW64\findstr.exefindstr All15⤵PID:5740
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid14⤵
- System Location Discovery: System Language Discovery
PID:1752 -
C:\Windows\SysWOW64\chcp.comchcp 6500115⤵PID:5224
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid15⤵PID:5124
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"12⤵PID:5548
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5280 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"14⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:624 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All15⤵PID:5248
-
C:\Windows\SysWOW64\chcp.comchcp 6500116⤵PID:6408
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile16⤵PID:6772
-
-
C:\Windows\SysWOW64\findstr.exefindstr All16⤵PID:5380
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid15⤵PID:6956
-
C:\Windows\SysWOW64\chcp.comchcp 6500116⤵PID:4088
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid16⤵PID:3196
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"13⤵PID:5292
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"14⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5584 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"15⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Suspicious use of AdjustPrivilegeToken
PID:5040 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All16⤵PID:3212
-
C:\Windows\SysWOW64\chcp.comchcp 6500117⤵PID:5272
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile17⤵
- System Location Discovery: System Language Discovery
PID:5544
-
-
C:\Windows\SysWOW64\findstr.exefindstr All17⤵PID:4776
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid16⤵PID:2840
-
C:\Windows\SysWOW64\chcp.comchcp 6500117⤵PID:4388
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid17⤵PID:5504
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"14⤵PID:5316
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4572 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"16⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5804 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All17⤵PID:6232
-
C:\Windows\SysWOW64\chcp.comchcp 6500118⤵PID:2980
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile18⤵
- Event Triggered Execution: Netsh Helper DLL
PID:6168
-
-
C:\Windows\SysWOW64\findstr.exefindstr All18⤵PID:6004
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid17⤵PID:6220
-
C:\Windows\SysWOW64\chcp.comchcp 6500118⤵PID:6200
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid18⤵PID:5112
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"15⤵
- Checks computer location settings
PID:5960 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"16⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4076 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"17⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5868 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All18⤵PID:5644
-
C:\Windows\SysWOW64\chcp.comchcp 6500119⤵PID:6232
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile19⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2496
-
-
C:\Windows\SysWOW64\findstr.exefindstr All19⤵PID:1440
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid18⤵PID:1944
-
C:\Windows\SysWOW64\chcp.comchcp 6500119⤵PID:6692
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid19⤵
- Event Triggered Execution: Netsh Helper DLL
PID:5512
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"16⤵PID:6056
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4804 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"18⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1480 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All19⤵PID:6772
-
C:\Windows\SysWOW64\chcp.comchcp 6500120⤵
- System Location Discovery: System Language Discovery
PID:5072
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile20⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:920
-
-
C:\Windows\SysWOW64\findstr.exefindstr All20⤵PID:2268
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid19⤵PID:5556
-
C:\Windows\SysWOW64\chcp.comchcp 6500120⤵PID:5648
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid20⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3788
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"17⤵PID:1752
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"18⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5832 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"19⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Suspicious use of AdjustPrivilegeToken
PID:5608 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All20⤵PID:5536
-
C:\Windows\SysWOW64\chcp.comchcp 6500121⤵PID:2272
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile21⤵
- Event Triggered Execution: Netsh Helper DLL
PID:5856
-
-
C:\Windows\SysWOW64\findstr.exefindstr All21⤵PID:6976
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid20⤵
- System Location Discovery: System Language Discovery
PID:3424 -
C:\Windows\SysWOW64\chcp.comchcp 6500121⤵PID:4904
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid21⤵
- Event Triggered Execution: Netsh Helper DLL
PID:7508
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"18⤵PID:1932
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3812 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"20⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5796 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All21⤵PID:8100
-
C:\Windows\SysWOW64\chcp.comchcp 6500122⤵PID:5552
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile22⤵PID:7496
-
-
C:\Windows\SysWOW64\findstr.exefindstr All22⤵PID:7692
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid21⤵PID:7008
-
C:\Windows\SysWOW64\chcp.comchcp 6500122⤵PID:3532
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid22⤵PID:4032
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"19⤵
- Checks computer location settings
PID:5808 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"20⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4112 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"21⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:1080 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All22⤵PID:5624
-
C:\Windows\SysWOW64\chcp.comchcp 6500123⤵PID:3132
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile23⤵PID:7572
-
-
C:\Windows\SysWOW64\findstr.exefindstr All23⤵PID:2732
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid22⤵PID:2612
-
C:\Windows\SysWOW64\chcp.comchcp 6500123⤵PID:6660
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid23⤵PID:916
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"20⤵PID:1888
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3100 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"22⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:6044 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All23⤵
- System Location Discovery: System Language Discovery
PID:7012 -
C:\Windows\SysWOW64\chcp.comchcp 6500124⤵PID:1472
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile24⤵
- Event Triggered Execution: Netsh Helper DLL
PID:6628
-
-
C:\Windows\SysWOW64\findstr.exefindstr All24⤵PID:4624
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid23⤵PID:6528
-
C:\Windows\SysWOW64\chcp.comchcp 6500124⤵PID:5708
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid24⤵PID:6064
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"21⤵
- Checks computer location settings
PID:5940 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"22⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1428 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"23⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4528 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All24⤵PID:5016
-
C:\Windows\SysWOW64\chcp.comchcp 6500125⤵PID:3424
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile25⤵PID:4604
-
-
C:\Windows\SysWOW64\findstr.exefindstr All25⤵
- System Location Discovery: System Language Discovery
PID:4532
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid24⤵PID:6544
-
C:\Windows\SysWOW64\chcp.comchcp 6500125⤵PID:7068
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid25⤵PID:6484
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"22⤵PID:5484
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:6596 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"24⤵PID:7100
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"24⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Suspicious use of AdjustPrivilegeToken
PID:7120 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All25⤵PID:8112
-
C:\Windows\SysWOW64\chcp.comchcp 6500126⤵PID:4752
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile26⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:7672
-
-
C:\Windows\SysWOW64\findstr.exefindstr All26⤵PID:7880
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid25⤵PID:5152
-
C:\Windows\SysWOW64\chcp.comchcp 6500126⤵PID:3448
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid26⤵PID:8132
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"23⤵
- Checks computer location settings
PID:6620 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"24⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5852 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"25⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:6996 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All26⤵PID:6260
-
C:\Windows\SysWOW64\chcp.comchcp 6500127⤵PID:7048
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile27⤵
- Event Triggered Execution: Netsh Helper DLL
PID:5820
-
-
C:\Windows\SysWOW64\findstr.exefindstr All27⤵PID:6100
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid26⤵PID:6460
-
C:\Windows\SysWOW64\chcp.comchcp 6500127⤵PID:5916
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid27⤵PID:4164
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"24⤵PID:6376
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:6716 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"26⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:7112 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All27⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:7668 -
C:\Windows\SysWOW64\chcp.comchcp 6500128⤵PID:4492
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile28⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:5220
-
-
C:\Windows\SysWOW64\findstr.exefindstr All28⤵
- System Location Discovery: System Language Discovery
PID:7436
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid27⤵PID:4752
-
C:\Windows\SysWOW64\chcp.comchcp 6500128⤵PID:7716
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid28⤵
- Event Triggered Execution: Netsh Helper DLL
PID:7148
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"25⤵
- Checks computer location settings
PID:6868 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"26⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:6724 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"27⤵PID:7132
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"27⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2160 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All28⤵PID:424
-
C:\Windows\SysWOW64\chcp.comchcp 6500129⤵PID:1552
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile29⤵PID:4936
-
-
C:\Windows\SysWOW64\findstr.exefindstr All29⤵PID:3284
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid28⤵PID:2456
-
C:\Windows\SysWOW64\chcp.comchcp 6500129⤵PID:6444
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid29⤵
- Event Triggered Execution: Netsh Helper DLL
PID:6096
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"26⤵PID:6840
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5824 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"28⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:4784 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All29⤵PID:1068
-
C:\Windows\SysWOW64\chcp.comchcp 6500130⤵PID:2980
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile30⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:7032
-
-
C:\Windows\SysWOW64\findstr.exefindstr All30⤵PID:1836
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid29⤵PID:5248
-
C:\Windows\SysWOW64\chcp.comchcp 6500130⤵
- System Location Discovery: System Language Discovery
PID:6724
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid30⤵
- Event Triggered Execution: Netsh Helper DLL
PID:7144
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"27⤵PID:5592
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"28⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2676 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"29⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Suspicious use of AdjustPrivilegeToken
PID:5196 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All30⤵PID:4528
-
C:\Windows\SysWOW64\chcp.comchcp 6500131⤵
- System Location Discovery: System Language Discovery
PID:6960
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile31⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3044
-
-
C:\Windows\SysWOW64\findstr.exefindstr All31⤵PID:764
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid30⤵PID:4620
-
C:\Windows\SysWOW64\chcp.comchcp 6500131⤵PID:5508
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid31⤵
- Event Triggered Execution: Netsh Helper DLL
PID:6608
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"28⤵PID:6244
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:7080 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"30⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:6128 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All31⤵PID:4116
-
C:\Windows\SysWOW64\chcp.comchcp 6500132⤵PID:5856
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile32⤵PID:4352
-
-
C:\Windows\SysWOW64\findstr.exefindstr All32⤵PID:7144
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid31⤵PID:5768
-
C:\Windows\SysWOW64\chcp.comchcp 6500132⤵PID:2268
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid32⤵PID:2940
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"29⤵
- Checks computer location settings
PID:6240 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"30⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5728 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"31⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:6904 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All32⤵PID:6908
-
C:\Windows\SysWOW64\chcp.comchcp 6500133⤵PID:6648
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile33⤵
- Event Triggered Execution: Netsh Helper DLL
PID:6744
-
-
C:\Windows\SysWOW64\findstr.exefindstr All33⤵PID:5704
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid32⤵PID:7388
-
C:\Windows\SysWOW64\chcp.comchcp 6500133⤵PID:2416
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid33⤵
- Event Triggered Execution: Netsh Helper DLL
PID:5812
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"30⤵PID:5456
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:6248 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"32⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:5616
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"31⤵PID:2868
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"32⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5348 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"33⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:6864 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All34⤵PID:6932
-
C:\Windows\SysWOW64\chcp.comchcp 6500135⤵PID:3740
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile35⤵PID:6412
-
-
C:\Windows\SysWOW64\findstr.exefindstr All35⤵PID:2904
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid34⤵PID:6280
-
C:\Windows\SysWOW64\chcp.comchcp 6500135⤵PID:6812
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid35⤵PID:6208
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"32⤵PID:6364
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1692 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"34⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3212 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All35⤵PID:6792
-
C:\Windows\SysWOW64\chcp.comchcp 6500136⤵PID:5524
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile36⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:6716
-
-
C:\Windows\SysWOW64\findstr.exefindstr All36⤵PID:6448
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid35⤵PID:7032
-
C:\Windows\SysWOW64\chcp.comchcp 6500136⤵
- System Location Discovery: System Language Discovery
PID:5588
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid36⤵PID:5844
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"33⤵PID:4208
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"34⤵
- Suspicious use of SetThreadContext
PID:1448 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"35⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:6860 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All36⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:5340 -
C:\Windows\SysWOW64\chcp.comchcp 6500137⤵PID:7148
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile37⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4532
-
-
C:\Windows\SysWOW64\findstr.exefindstr All37⤵PID:6244
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid36⤵PID:4284
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV137⤵PID:6812
-
-
C:\Windows\SysWOW64\chcp.comchcp 6500137⤵PID:2564
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid37⤵PID:4504
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"34⤵PID:6784
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"35⤵
- Suspicious use of SetThreadContext
PID:2356 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"36⤵
- Drops desktop.ini file(s)
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:5036 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All37⤵PID:5936
-
C:\Windows\SysWOW64\chcp.comchcp 6500138⤵PID:2980
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile38⤵PID:7472
-
-
C:\Windows\SysWOW64\findstr.exefindstr All38⤵PID:7488
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid37⤵PID:4620
-
C:\Windows\SysWOW64\chcp.comchcp 6500138⤵PID:4808
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid38⤵PID:6984
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"35⤵
- Checks computer location settings
PID:5284 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"36⤵
- Suspicious use of SetThreadContext
PID:6600 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"37⤵PID:3152
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"37⤵
- Drops desktop.ini file(s)
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:6616 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All38⤵PID:6976
-
C:\Windows\SysWOW64\chcp.comchcp 6500139⤵PID:5388
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile39⤵PID:5808
-
-
C:\Windows\SysWOW64\findstr.exefindstr All39⤵PID:7696
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid38⤵PID:6692
-
C:\Windows\SysWOW64\chcp.comchcp 6500139⤵PID:7648
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid39⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2996
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"36⤵PID:2024
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"37⤵
- Suspicious use of SetThreadContext
PID:4184 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"38⤵
- Drops desktop.ini file(s)
- Suspicious use of AdjustPrivilegeToken
PID:6692 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All39⤵PID:3596
-
C:\Windows\SysWOW64\chcp.comchcp 6500140⤵PID:5804
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile40⤵PID:5236
-
-
C:\Windows\SysWOW64\findstr.exefindstr All40⤵PID:2392
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid39⤵PID:5756
-
C:\Windows\SysWOW64\chcp.comchcp 6500140⤵PID:6312
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid40⤵PID:856
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"37⤵PID:6124
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"38⤵
- Suspicious use of SetThreadContext
PID:3560 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"39⤵
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:6600 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All40⤵PID:5380
-
C:\Windows\SysWOW64\chcp.comchcp 6500141⤵PID:6868
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile41⤵PID:5624
-
-
C:\Windows\SysWOW64\findstr.exefindstr All41⤵PID:6828
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid40⤵PID:1480
-
C:\Windows\SysWOW64\chcp.comchcp 6500141⤵PID:3952
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid41⤵PID:6120
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"38⤵PID:5340
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"39⤵
- Suspicious use of SetThreadContext
PID:6784 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"40⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:5076 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All41⤵PID:6076
-
C:\Windows\SysWOW64\chcp.comchcp 6500142⤵PID:5444
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile42⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:7452
-
-
C:\Windows\SysWOW64\findstr.exefindstr All42⤵PID:7464
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid41⤵
- System Location Discovery: System Language Discovery
PID:3368 -
C:\Windows\SysWOW64\chcp.comchcp 6500142⤵PID:2056
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid42⤵PID:7396
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"39⤵PID:1668
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"40⤵
- Suspicious use of SetThreadContext
PID:5164 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"41⤵PID:4388
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"41⤵PID:6604
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"41⤵
- Drops desktop.ini file(s)
- Suspicious use of AdjustPrivilegeToken
PID:6236 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All42⤵PID:2984
-
C:\Windows\SysWOW64\chcp.comchcp 6500143⤵PID:8516
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile43⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2872
-
-
C:\Windows\SysWOW64\findstr.exefindstr All43⤵PID:6376
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid42⤵PID:7644
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"40⤵PID:6244
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"41⤵
- Suspicious use of SetThreadContext
PID:3632 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"42⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:6432 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All43⤵PID:5016
-
C:\Windows\SysWOW64\chcp.comchcp 6500144⤵PID:6944
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile44⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:6076
-
-
C:\Windows\SysWOW64\findstr.exefindstr All44⤵
- System Location Discovery: System Language Discovery
PID:6792
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid43⤵PID:5160
-
C:\Windows\SysWOW64\chcp.comchcp 6500144⤵PID:1900
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid44⤵PID:6828
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"41⤵
- Checks computer location settings
PID:2268 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"42⤵
- Suspicious use of SetThreadContext
PID:5556 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"43⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:628 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All44⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:2152 -
C:\Windows\SysWOW64\chcp.comchcp 6500145⤵PID:3248
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile45⤵PID:3740
-
-
C:\Windows\SysWOW64\findstr.exefindstr All45⤵PID:3952
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid44⤵PID:7032
-
C:\Windows\SysWOW64\chcp.comchcp 6500145⤵PID:6028
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid45⤵PID:3688
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"42⤵
- Checks computer location settings
PID:6188 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"43⤵
- Suspicious use of SetThreadContext
PID:6436 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"44⤵PID:5204
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"44⤵
- Drops desktop.ini file(s)
- Suspicious use of AdjustPrivilegeToken
PID:5596 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All45⤵PID:4576
-
C:\Windows\SysWOW64\chcp.comchcp 6500146⤵PID:4624
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile46⤵PID:3212
-
-
C:\Windows\SysWOW64\findstr.exefindstr All46⤵PID:3648
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid45⤵PID:6924
-
C:\Windows\SysWOW64\chcp.comchcp 6500146⤵PID:3792
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid46⤵PID:6868
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"43⤵PID:5132
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"44⤵
- Suspicious use of SetThreadContext
PID:7148 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"45⤵
- Suspicious use of AdjustPrivilegeToken
PID:4852 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All46⤵PID:1288
-
C:\Windows\SysWOW64\chcp.comchcp 6500147⤵PID:3632
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile47⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:5152
-
-
C:\Windows\SysWOW64\findstr.exefindstr All47⤵PID:3792
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid46⤵PID:920
-
C:\Windows\SysWOW64\chcp.comchcp 6500147⤵PID:2528
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid47⤵PID:5936
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"44⤵PID:6852
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"45⤵
- Suspicious use of SetThreadContext
PID:5664 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"46⤵
- Drops desktop.ini file(s)
- Suspicious use of AdjustPrivilegeToken
PID:6308 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All47⤵PID:4164
-
C:\Windows\SysWOW64\chcp.comchcp 6500148⤵PID:6484
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile48⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:7144
-
-
C:\Windows\SysWOW64\findstr.exefindstr All48⤵PID:4032
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid47⤵PID:7480
-
C:\Windows\SysWOW64\chcp.comchcp 6500148⤵PID:6596
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid48⤵PID:764
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"45⤵PID:6436
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"46⤵
- Suspicious use of SetThreadContext
PID:2676 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"47⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:3772 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All48⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:5536 -
C:\Windows\SysWOW64\chcp.comchcp 6500149⤵PID:6204
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile49⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:2456
-
-
C:\Windows\SysWOW64\findstr.exefindstr All49⤵PID:3888
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid48⤵
- System Location Discovery: System Language Discovery
PID:5112 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV149⤵PID:4580
-
-
C:\Windows\SysWOW64\chcp.comchcp 6500149⤵PID:1440
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid49⤵PID:3480
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"46⤵PID:3112
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"47⤵
- Suspicious use of SetThreadContext
PID:6076 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"48⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:6060 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All49⤵PID:5108
-
C:\Windows\SysWOW64\chcp.comchcp 6500150⤵PID:7816
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile50⤵
- Event Triggered Execution: Netsh Helper DLL
PID:7368
-
-
C:\Windows\SysWOW64\findstr.exefindstr All50⤵PID:6008
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid49⤵PID:5400
-
C:\Windows\SysWOW64\chcp.comchcp 6500150⤵PID:7560
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid50⤵PID:2724
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"47⤵
- Checks computer location settings
PID:664 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"48⤵
- Suspicious use of SetThreadContext
PID:5660 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"49⤵
- Suspicious use of AdjustPrivilegeToken
PID:6740 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All50⤵PID:6976
-
C:\Windows\SysWOW64\chcp.comchcp 6500151⤵PID:8532
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile51⤵
- Event Triggered Execution: Netsh Helper DLL
PID:8816
-
-
C:\Windows\SysWOW64\findstr.exefindstr All51⤵PID:8716
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid50⤵PID:8220
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"48⤵PID:6084
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"49⤵
- Suspicious use of SetThreadContext
PID:6204 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"50⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1100 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All51⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:8112 -
C:\Windows\SysWOW64\chcp.comchcp 6500152⤵PID:8300
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile52⤵PID:8968
-
-
C:\Windows\SysWOW64\findstr.exefindstr All52⤵PID:9072
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid51⤵PID:9708
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"49⤵
- Checks computer location settings
PID:3044 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"50⤵
- Suspicious use of SetThreadContext
PID:6460 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"51⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:1980 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All52⤵PID:2392
-
C:\Windows\SysWOW64\chcp.comchcp 6500153⤵PID:5640
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile53⤵PID:6056
-
-
C:\Windows\SysWOW64\findstr.exefindstr All53⤵PID:6660
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid52⤵PID:952
-
C:\Windows\SysWOW64\chcp.comchcp 6500153⤵PID:5324
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid53⤵
- Event Triggered Execution: Netsh Helper DLL
PID:6660
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"50⤵
- Checks computer location settings
PID:5676 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"51⤵PID:2416
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"52⤵
- Suspicious use of AdjustPrivilegeToken
PID:6900
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"51⤵
- Checks computer location settings
PID:3480 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"52⤵
- Suspicious use of SetThreadContext
PID:2464 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"53⤵PID:4344
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"53⤵
- Suspicious use of AdjustPrivilegeToken
PID:404 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All54⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:180 -
C:\Windows\SysWOW64\chcp.comchcp 6500155⤵PID:6872
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile55⤵
- Event Triggered Execution: Netsh Helper DLL
PID:5040
-
-
C:\Windows\SysWOW64\findstr.exefindstr All55⤵PID:1460
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid54⤵PID:4076
-
C:\Windows\SysWOW64\chcp.comchcp 6500155⤵PID:2596
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid55⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3212
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"52⤵
- Checks computer location settings
PID:6660 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"53⤵
- Suspicious use of SetThreadContext
PID:1576 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"54⤵
- Drops desktop.ini file(s)
- Suspicious use of AdjustPrivilegeToken
PID:6096 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All55⤵
- System Location Discovery: System Language Discovery
PID:7976 -
C:\Windows\SysWOW64\chcp.comchcp 6500156⤵PID:6928
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile56⤵PID:7048
-
-
C:\Windows\SysWOW64\findstr.exefindstr All56⤵PID:5724
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid55⤵PID:8184
-
C:\Windows\SysWOW64\chcp.comchcp 6500156⤵PID:4904
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid56⤵PID:7332
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"53⤵PID:7136
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"54⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1944 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"55⤵
- Suspicious use of AdjustPrivilegeToken
PID:4472 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All56⤵PID:6120
-
C:\Windows\SysWOW64\chcp.comchcp 6500157⤵PID:5568
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile57⤵PID:6856
-
-
C:\Windows\SysWOW64\findstr.exefindstr All57⤵PID:6984
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid56⤵PID:5664
-
C:\Windows\SysWOW64\chcp.comchcp 6500157⤵PID:4960
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid57⤵PID:7404
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"54⤵
- Checks computer location settings
PID:1068 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"55⤵
- Suspicious use of SetThreadContext
PID:2436 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"56⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:2332 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All57⤵
- System Location Discovery: System Language Discovery
PID:764 -
C:\Windows\SysWOW64\chcp.comchcp 6500158⤵PID:7916
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile58⤵PID:7060
-
-
C:\Windows\SysWOW64\findstr.exefindstr All58⤵PID:7068
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid57⤵PID:7468
-
C:\Windows\SysWOW64\chcp.comchcp 6500158⤵PID:8072
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid58⤵PID:7840
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"55⤵
- Checks computer location settings
PID:3496 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"56⤵
- Suspicious use of SetThreadContext
PID:6608 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"57⤵
- Suspicious use of AdjustPrivilegeToken
PID:5708
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"56⤵PID:3840
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"57⤵
- Suspicious use of SetThreadContext
PID:5496 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"58⤵PID:6652
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"58⤵
- Suspicious use of AdjustPrivilegeToken
PID:6568 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All59⤵PID:9564
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"57⤵PID:3424
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"58⤵
- Suspicious use of SetThreadContext
PID:5460 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"59⤵PID:6204
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"59⤵PID:1440
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"59⤵PID:6760
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"59⤵
- Drops desktop.ini file(s)
- Suspicious use of AdjustPrivilegeToken
PID:7016 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All60⤵PID:6488
-
C:\Windows\SysWOW64\chcp.comchcp 6500161⤵PID:8364
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile61⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:9208
-
-
C:\Windows\SysWOW64\findstr.exefindstr All61⤵PID:552
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid60⤵PID:9888
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"58⤵PID:5720
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"59⤵
- Suspicious use of SetThreadContext
PID:2356 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"60⤵
- Drops desktop.ini file(s)
- Suspicious use of AdjustPrivilegeToken
PID:6816 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All61⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:1604 -
C:\Windows\SysWOW64\chcp.comchcp 6500162⤵PID:8276
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile62⤵PID:8908
-
-
C:\Windows\SysWOW64\findstr.exefindstr All62⤵PID:8956
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid61⤵PID:9780
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"59⤵PID:6924
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"60⤵
- Suspicious use of SetThreadContext
PID:2020 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"61⤵
- Suspicious use of AdjustPrivilegeToken
PID:4872 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All62⤵PID:6068
-
C:\Windows\SysWOW64\chcp.comchcp 6500163⤵PID:5128
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile63⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:3368
-
-
C:\Windows\SysWOW64\findstr.exefindstr All63⤵PID:4104
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid62⤵PID:7764
-
C:\Windows\SysWOW64\chcp.comchcp 6500163⤵PID:7452
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid63⤵PID:6092
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"60⤵
- Checks computer location settings
PID:4520 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"61⤵
- Suspicious use of SetThreadContext
PID:5544 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"62⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5720 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All63⤵PID:7328
-
C:\Windows\SysWOW64\chcp.comchcp 6500164⤵PID:1568
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile64⤵PID:3444
-
-
C:\Windows\SysWOW64\findstr.exefindstr All64⤵PID:6208
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid63⤵PID:5484
-
C:\Windows\SysWOW64\chcp.comchcp 6500164⤵PID:7684
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid64⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4852
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"61⤵
- Checks computer location settings
PID:1148 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"62⤵
- Suspicious use of SetThreadContext
PID:5936 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"63⤵PID:2652
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"63⤵
- Drops desktop.ini file(s)
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:3952 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All64⤵PID:1092
-
C:\Windows\SysWOW64\chcp.comchcp 6500165⤵PID:8588
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile65⤵PID:8700
-
-
C:\Windows\SysWOW64\findstr.exefindstr All65⤵PID:8892
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid64⤵PID:6768
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"62⤵PID:4596
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"63⤵
- Suspicious use of SetThreadContext
PID:6312 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"64⤵
- Suspicious use of AdjustPrivilegeToken
PID:6884 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All65⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:1068 -
C:\Windows\SysWOW64\chcp.comchcp 6500166⤵PID:7756
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile66⤵PID:6976
-
-
C:\Windows\SysWOW64\findstr.exefindstr All66⤵PID:6600
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid65⤵PID:6516
-
C:\Windows\SysWOW64\chcp.comchcp 6500166⤵PID:7880
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid66⤵PID:7332
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"63⤵PID:4576
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"64⤵
- Suspicious use of SetThreadContext
PID:6984 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"65⤵PID:7316
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All66⤵PID:4296
-
C:\Windows\SysWOW64\chcp.comchcp 6500167⤵PID:6352
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile67⤵PID:8072
-
-
C:\Windows\SysWOW64\findstr.exefindstr All67⤵PID:1080
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid66⤵PID:6084
-
C:\Windows\SysWOW64\chcp.comchcp 6500167⤵PID:4556
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid67⤵PID:5188
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"64⤵
- Checks computer location settings
PID:7228 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"65⤵
- Suspicious use of SetThreadContext
PID:7060 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"66⤵PID:5860
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"65⤵PID:5032
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"66⤵
- Suspicious use of SetThreadContext
PID:7360 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"67⤵PID:7432
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All68⤵PID:1668
-
C:\Windows\SysWOW64\chcp.comchcp 6500169⤵PID:6564
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile69⤵PID:7612
-
-
C:\Windows\SysWOW64\findstr.exefindstr All69⤵PID:5928
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid68⤵PID:4164
-
C:\Windows\SysWOW64\chcp.comchcp 6500169⤵PID:7172
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid69⤵
- Event Triggered Execution: Netsh Helper DLL
PID:6020
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"66⤵PID:7392
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"67⤵PID:5764
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"68⤵PID:5340
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"68⤵
- Drops desktop.ini file(s)
PID:432 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All69⤵PID:7280
-
C:\Windows\SysWOW64\chcp.comchcp 6500170⤵PID:8604
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile70⤵PID:8388
-
-
C:\Windows\SysWOW64\findstr.exefindstr All70⤵PID:8520
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid69⤵PID:9096
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"67⤵
- Checks computer location settings
PID:7232 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"68⤵PID:7236
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"69⤵PID:5540
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"68⤵PID:7188
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"69⤵PID:3932
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"70⤵
- Checks processor information in registry
PID:6056 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All71⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:4088 -
C:\Windows\SysWOW64\chcp.comchcp 6500172⤵PID:5536
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile72⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:5728
-
-
C:\Windows\SysWOW64\findstr.exefindstr All72⤵PID:4944
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid71⤵PID:1496
-
C:\Windows\SysWOW64\chcp.comchcp 6500172⤵PID:6800
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid72⤵PID:7460
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"69⤵
- Checks computer location settings
PID:6572 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"70⤵PID:7776
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"71⤵
- Drops desktop.ini file(s)
PID:7904 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All72⤵PID:764
-
C:\Windows\SysWOW64\chcp.comchcp 6500173⤵PID:5028
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile73⤵
- System Location Discovery: System Language Discovery
PID:8916
-
-
C:\Windows\SysWOW64\findstr.exefindstr All73⤵PID:8980
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid72⤵PID:9852
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"70⤵PID:7724
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"71⤵PID:5172
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"72⤵PID:5040
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All73⤵PID:7920
-
C:\Windows\SysWOW64\chcp.comchcp 6500174⤵PID:3292
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile74⤵PID:4492
-
-
C:\Windows\SysWOW64\findstr.exefindstr All74⤵PID:7560
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid73⤵PID:6200
-
C:\Windows\SysWOW64\chcp.comchcp 6500174⤵PID:4284
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid74⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1868
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"71⤵PID:5808
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"72⤵PID:7672
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"73⤵PID:8180
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"73⤵
- Checks processor information in registry
PID:6488 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All74⤵PID:6524
-
C:\Windows\SysWOW64\chcp.comchcp 6500175⤵PID:2456
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile75⤵
- Event Triggered Execution: Netsh Helper DLL
PID:5112
-
-
C:\Windows\SysWOW64\findstr.exefindstr All75⤵PID:7336
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid74⤵PID:1612
-
C:\Windows\SysWOW64\chcp.comchcp 6500175⤵PID:7592
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid75⤵PID:1716
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"72⤵PID:3368
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"73⤵PID:3044
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"74⤵
- Drops desktop.ini file(s)
PID:7224
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"73⤵PID:7652
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"74⤵PID:7900
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"75⤵PID:7312
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All76⤵PID:8096
-
C:\Windows\SysWOW64\chcp.comchcp 6500177⤵PID:8612
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile77⤵PID:8280
-
-
C:\Windows\SysWOW64\findstr.exefindstr All77⤵PID:8500
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid76⤵PID:9060
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"74⤵PID:5392
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"75⤵PID:3960
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"76⤵PID:3832
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"76⤵
- Drops desktop.ini file(s)
- Checks processor information in registry
PID:7544 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All77⤵PID:6208
-
C:\Windows\SysWOW64\chcp.comchcp 6500178⤵PID:4692
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile78⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:7940
-
-
C:\Windows\SysWOW64\findstr.exefindstr All78⤵PID:5172
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid77⤵PID:6896
-
C:\Windows\SysWOW64\chcp.comchcp 6500178⤵
- System Location Discovery: System Language Discovery
PID:7800
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid78⤵PID:7788
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"75⤵PID:5664
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"76⤵PID:7812
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"77⤵PID:6872
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"77⤵
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
PID:3180 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All78⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:1612 -
C:\Windows\SysWOW64\chcp.comchcp 6500179⤵PID:6288
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile79⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:8452
-
-
C:\Windows\SysWOW64\findstr.exefindstr All79⤵PID:8660
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid78⤵PID:9772
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"76⤵PID:6876
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"77⤵PID:6012
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"78⤵
- System Location Discovery: System Language Discovery
PID:4244 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All79⤵PID:5188
-
C:\Windows\SysWOW64\chcp.comchcp 6500180⤵PID:8352
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile80⤵PID:9112
-
-
C:\Windows\SysWOW64\findstr.exefindstr All80⤵PID:9164
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid79⤵PID:8888
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"77⤵PID:7688
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"78⤵PID:3444
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"79⤵
- Drops desktop.ini file(s)
PID:3548 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All80⤵PID:7700
-
C:\Windows\SysWOW64\chcp.comchcp 6500181⤵PID:8260
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile81⤵PID:8948
-
-
C:\Windows\SysWOW64\findstr.exefindstr All81⤵PID:9024
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid80⤵PID:10188
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"78⤵
- Checks computer location settings
PID:6020 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"79⤵PID:4576
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"80⤵PID:5412
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"80⤵PID:5420
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"80⤵PID:7240
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"80⤵
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
PID:5196 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All81⤵PID:7524
-
C:\Windows\SysWOW64\chcp.comchcp 6500182⤵PID:7972
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile82⤵PID:8060
-
-
C:\Windows\SysWOW64\findstr.exefindstr All82⤵PID:7892
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid81⤵PID:7200
-
C:\Windows\SysWOW64\chcp.comchcp 6500182⤵PID:1336
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid82⤵PID:3620
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"79⤵PID:6908
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"80⤵PID:7436
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"81⤵PID:8028
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"81⤵
- Drops desktop.ini file(s)
PID:7992 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All82⤵PID:6664
-
C:\Windows\SysWOW64\chcp.comchcp 6500183⤵PID:6396
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile83⤵PID:7620
-
-
C:\Windows\SysWOW64\findstr.exefindstr All83⤵PID:8176
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid82⤵PID:7256
-
C:\Windows\SysWOW64\chcp.comchcp 6500183⤵PID:5300
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid83⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4880
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"80⤵
- Checks computer location settings
PID:7172 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"81⤵PID:4852
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"82⤵
- Drops desktop.ini file(s)
PID:6296 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All83⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:6792 -
C:\Windows\SysWOW64\chcp.comchcp 6500184⤵
- System Location Discovery: System Language Discovery
PID:6060
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile84⤵PID:3908
-
-
C:\Windows\SysWOW64\findstr.exefindstr All84⤵PID:5236
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid83⤵PID:2424
-
C:\Windows\SysWOW64\chcp.comchcp 6500184⤵PID:6316
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid84⤵PID:5972
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"81⤵
- Checks computer location settings
PID:8040 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"82⤵PID:7504
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"83⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:5712 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All84⤵PID:8140
-
C:\Windows\SysWOW64\chcp.comchcp 6500185⤵PID:7892
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile85⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3444
-
-
C:\Windows\SysWOW64\findstr.exefindstr All85⤵PID:8176
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid84⤵PID:6852
-
C:\Windows\SysWOW64\chcp.comchcp 6500185⤵PID:3724
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid85⤵PID:5828
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"82⤵
- Checks computer location settings
PID:6456 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"83⤵
- System Location Discovery: System Language Discovery
PID:3168 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"84⤵PID:7872
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"83⤵PID:8128
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"84⤵PID:6628
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"85⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:1568 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All86⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:4892 -
C:\Windows\SysWOW64\chcp.comchcp 6500187⤵PID:8488
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile87⤵
- Event Triggered Execution: Netsh Helper DLL
PID:9192
-
-
C:\Windows\SysWOW64\findstr.exefindstr All87⤵PID:3584
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid86⤵PID:8984
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"84⤵
- Checks computer location settings
PID:2628 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"85⤵PID:5324
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"86⤵
- Checks processor information in registry
PID:916 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All87⤵PID:4852
-
C:\Windows\SysWOW64\chcp.comchcp 6500188⤵PID:8428
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile88⤵PID:6716
-
-
C:\Windows\SysWOW64\findstr.exefindstr All88⤵PID:8384
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid87⤵PID:2396
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"85⤵PID:6316
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"86⤵PID:4396
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"87⤵PID:2188
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"87⤵PID:6504
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"87⤵PID:7360
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"87⤵PID:1780
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All88⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:7484 -
C:\Windows\SysWOW64\chcp.comchcp 6500189⤵PID:8312
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile89⤵PID:7452
-
-
C:\Windows\SysWOW64\findstr.exefindstr All89⤵PID:9044
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid88⤵PID:9860
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"86⤵
- Checks computer location settings
PID:856 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"87⤵PID:5840
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"88⤵
- Checks processor information in registry
PID:4512 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All89⤵PID:8060
-
C:\Windows\SysWOW64\chcp.comchcp 6500190⤵PID:8524
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile90⤵PID:8432
-
-
C:\Windows\SysWOW64\findstr.exefindstr All90⤵PID:8788
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid89⤵PID:10196
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"87⤵
- Checks computer location settings
PID:5220 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"88⤵PID:8044
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"89⤵
- Drops desktop.ini file(s)
PID:7812 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All90⤵PID:4692
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV191⤵PID:3748
-
-
C:\Windows\SysWOW64\chcp.comchcp 6500191⤵PID:6068
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile91⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:8456
-
-
C:\Windows\SysWOW64\findstr.exefindstr All91⤵PID:8632
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid90⤵PID:9796
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"88⤵
- Checks computer location settings
PID:2596 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"89⤵PID:2876
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"90⤵
- Drops desktop.ini file(s)
PID:7684 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All91⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:1460 -
C:\Windows\SysWOW64\chcp.comchcp 6500192⤵PID:5240
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile92⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:6864
-
-
C:\Windows\SysWOW64\findstr.exefindstr All92⤵PID:1136
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid91⤵PID:5112
-
C:\Windows\SysWOW64\chcp.comchcp 6500192⤵PID:5508
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid92⤵PID:3288
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"89⤵PID:6572
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"90⤵PID:7848
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"91⤵PID:6592
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"91⤵
- Drops desktop.ini file(s)
PID:6628
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"90⤵PID:6300
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"91⤵PID:4748
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"92⤵
- Drops desktop.ini file(s)
- Checks processor information in registry
PID:5432
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"91⤵
- Checks computer location settings
PID:3288 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"92⤵PID:7696
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"93⤵PID:6588
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All94⤵PID:9828
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"92⤵PID:8124
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"93⤵PID:7348
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"94⤵
- Checks processor information in registry
PID:7668
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"93⤵PID:6848
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"94⤵PID:7560
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"95⤵PID:4500
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"95⤵
- Drops desktop.ini file(s)
PID:6800 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All96⤵PID:5572
-
C:\Windows\SysWOW64\chcp.comchcp 6500197⤵PID:8072
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile97⤵PID:8704
-
-
C:\Windows\SysWOW64\findstr.exefindstr All97⤵PID:8760
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid96⤵PID:8288
-
C:\Windows\SysWOW64\chcp.comchcp 6500197⤵PID:10064
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"94⤵
- Checks computer location settings
PID:4076 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"95⤵PID:1480
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"96⤵PID:364
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"95⤵
- Checks computer location settings
PID:3688 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"96⤵PID:2724
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"97⤵
- Drops desktop.ini file(s)
PID:1068 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All98⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:3972 -
C:\Windows\SysWOW64\chcp.comchcp 6500199⤵PID:8556
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile99⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3908
-
-
C:\Windows\SysWOW64\findstr.exefindstr All99⤵PID:8504
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid98⤵PID:9992
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"96⤵
- Checks computer location settings
PID:6896 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"97⤵PID:5400
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"98⤵PID:7024
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"98⤵
- Drops desktop.ini file(s)
PID:8184 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All99⤵PID:6320
-
C:\Windows\SysWOW64\chcp.comchcp 65001100⤵PID:8268
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile100⤵PID:9016
-
-
C:\Windows\SysWOW64\findstr.exefindstr All100⤵PID:9064
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid99⤵PID:10112
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"97⤵PID:8060
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"98⤵PID:3292
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"99⤵PID:4584
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"99⤵PID:2472
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"98⤵PID:7260
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"99⤵PID:7512
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"100⤵PID:1228
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All101⤵PID:4560
-
C:\Windows\SysWOW64\chcp.comchcp 65001102⤵PID:8672
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile102⤵
- Event Triggered Execution: Netsh Helper DLL
PID:8092
-
-
C:\Windows\SysWOW64\findstr.exefindstr All102⤵PID:8768
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid101⤵PID:5308
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"99⤵
- Checks computer location settings
PID:6992 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"100⤵PID:6200
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"101⤵
- Checks processor information in registry
PID:8064 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All102⤵PID:5932
-
C:\Windows\SysWOW64\chcp.comchcp 65001103⤵PID:8648
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile103⤵PID:9000
-
-
C:\Windows\SysWOW64\findstr.exefindstr All103⤵PID:8628
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"100⤵PID:7040
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"101⤵PID:5876
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"102⤵PID:4916
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"101⤵PID:7792
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"102⤵PID:3792
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"103⤵
- Checks processor information in registry
PID:7108 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All104⤵PID:372
-
C:\Windows\SysWOW64\chcp.comchcp 65001105⤵PID:1660
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile105⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:8848
-
-
C:\Windows\SysWOW64\findstr.exefindstr All105⤵PID:8880
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid104⤵PID:9652
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"102⤵
- Checks computer location settings
PID:2516 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"103⤵PID:2612
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"104⤵PID:6152
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All105⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:7112 -
C:\Windows\SysWOW64\chcp.comchcp 65001106⤵PID:8692
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile106⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:8728
-
-
C:\Windows\SysWOW64\findstr.exefindstr All106⤵PID:8712
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"103⤵PID:7160
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"104⤵PID:5588
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"105⤵PID:5256
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"105⤵PID:5152
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All106⤵PID:7512
-
C:\Windows\SysWOW64\chcp.comchcp 65001107⤵PID:8792
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile107⤵PID:8932
-
-
C:\Windows\SysWOW64\findstr.exefindstr All107⤵PID:8992
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid106⤵PID:3772
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"104⤵PID:5360
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"105⤵PID:2456
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"106⤵PID:4112
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"106⤵
- Drops desktop.ini file(s)
PID:3932
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"105⤵PID:8140
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"106⤵PID:7276
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"107⤵PID:7064
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"107⤵PID:6660
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"107⤵PID:5940
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"107⤵PID:3776
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All108⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:3420 -
C:\Windows\SysWOW64\chcp.comchcp 65001109⤵PID:8576
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile109⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:8572
-
-
C:\Windows\SysWOW64\findstr.exefindstr All109⤵PID:9184
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"106⤵PID:7996
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"107⤵PID:5072
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"108⤵
- Drops desktop.ini file(s)
- Checks processor information in registry
PID:4724
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"107⤵PID:7724
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"108⤵PID:5828
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"109⤵
- Drops desktop.ini file(s)
PID:3292 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All110⤵PID:7252
-
C:\Windows\SysWOW64\chcp.comchcp 65001111⤵PID:2980
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile111⤵PID:5188
-
-
C:\Windows\SysWOW64\findstr.exefindstr All111⤵PID:6012
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid110⤵PID:1660
-
C:\Windows\SysWOW64\chcp.comchcp 65001111⤵PID:7364
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid111⤵PID:7988
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"108⤵PID:6020
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"109⤵PID:6820
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"110⤵
- Drops desktop.ini file(s)
PID:7288
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"109⤵
- Checks computer location settings
PID:7200 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"110⤵PID:4220
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"111⤵PID:6184
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"110⤵PID:6896
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"111⤵PID:7384
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"112⤵PID:4320
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"112⤵
- Checks processor information in registry
PID:5556 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All113⤵
- System Location Discovery: System Language Discovery
PID:1800 -
C:\Windows\SysWOW64\chcp.comchcp 65001114⤵PID:8200
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile114⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:8876
-
-
C:\Windows\SysWOW64\findstr.exefindstr All114⤵PID:9060
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid113⤵PID:10020
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"111⤵
- Checks computer location settings
PID:5536 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"112⤵PID:712
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"113⤵PID:1904
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"113⤵
- Checks processor information in registry
PID:1680
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"112⤵
- Checks computer location settings
PID:8124 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"113⤵PID:5624
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"114⤵
- Checks processor information in registry
PID:7012
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"113⤵
- Checks computer location settings
PID:6940 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"114⤵PID:6696
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"115⤵PID:6420
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"115⤵PID:5280
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"115⤵PID:3532
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"115⤵
- Drops desktop.ini file(s)
PID:6756
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"114⤵PID:3956
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"115⤵PID:712
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"116⤵PID:3564
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"116⤵
- Drops desktop.ini file(s)
- Checks processor information in registry
PID:5928
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"115⤵PID:5768
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"116⤵PID:7416
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"117⤵
- Checks processor information in registry
PID:1148
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"116⤵
- Checks computer location settings
PID:7676 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"117⤵PID:3100
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"118⤵
- Drops desktop.ini file(s)
- Checks processor information in registry
PID:7888
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"117⤵PID:6564
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"118⤵PID:7232
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"119⤵PID:4072
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"118⤵PID:3184
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"119⤵PID:7248
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"120⤵
- Drops desktop.ini file(s)
- Checks processor information in registry
PID:7028
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"119⤵
- Checks computer location settings
PID:5392 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"120⤵PID:3028
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"121⤵
- Drops desktop.ini file(s)
PID:8436
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"120⤵
- Checks computer location settings
PID:8212 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"121⤵PID:8304
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"122⤵
- Checks processor information in registry
PID:9432
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-