Resubmissions
01-10-2024 19:23
241001-x3tkyszekh 1001-10-2024 19:14
241001-xxtc1awdmj 1030-09-2024 22:07
240930-11v8jsxdnm 1030-09-2024 21:59
240930-1wfmas1crg 1030-09-2024 20:26
240930-y8bg1atepl 1026-09-2024 20:34
240926-zcgvkszbmg 1026-09-2024 19:28
240926-x6rkrstfrr 1026-09-2024 19:21
240926-x2mq1swhnh 1026-09-2024 19:20
240926-x19jdstdpl 1025-09-2024 21:15
240925-z4dx1a1elf 10Analysis
-
max time kernel
174s -
max time network
1386s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2024 19:23
Static task
static1
Behavioral task
behavioral1
Sample
RebelCracked.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
RebelCracked.exe
Resource
win10v2004-20240910-en
General
-
Target
RebelCracked.exe
-
Size
344KB
-
MD5
a84fd0fc75b9c761e9b7923a08da41c7
-
SHA1
2597048612041cd7a8c95002c73e9c2818bb2097
-
SHA256
9d9a79f4ae9bf7a992945f6c06c5bec642c05e4e828217c50255dabfa3677006
-
SHA512
a17f1144a0e3ce07c7ed6891987c5b969f291e9991442c33750028d35e2194794e8a649c397e8afc9f8ce19d485c453600c75cab4fcead09e38414d85819251a
-
SSDEEP
6144:lOcpeK8lucxAtLNFHUVuI/2zj1z6jZ755NofmWx4PCQL23wBw7R0ljTwrVuAdJKp:QcpSnx0LNFDQ60Ntbo5d7gBw7R7rbdJk
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral2/memory/32-25-0x0000000000400000-0x0000000000432000-memory.dmp family_stormkitty -
Blocklisted process makes network request 18 IoCs
flow pid Process 81 4812 RuntimeBroker.exe 82 4812 RuntimeBroker.exe 83 4812 RuntimeBroker.exe 84 4812 RuntimeBroker.exe 85 3120 RuntimeBroker.exe 86 4812 RuntimeBroker.exe 87 3120 RuntimeBroker.exe 88 4812 RuntimeBroker.exe 89 3120 RuntimeBroker.exe 90 3120 RuntimeBroker.exe 91 3120 RuntimeBroker.exe 92 3120 RuntimeBroker.exe 167 5568 RuntimeBroker.exe 169 5568 RuntimeBroker.exe 170 5568 RuntimeBroker.exe 174 5568 RuntimeBroker.exe 181 5568 RuntimeBroker.exe 184 5568 RuntimeBroker.exe -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RebelCracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RebelCracked.exe -
Executes dropped EXE 64 IoCs
pid Process 548 RuntimeBroker.exe 32 RuntimeBroker.exe 5048 RuntimeBroker.exe 4888 RuntimeBroker.exe 4276 RuntimeBroker.exe 3224 RuntimeBroker.exe 3468 RuntimeBroker.exe 4648 RuntimeBroker.exe 4308 RuntimeBroker.exe 1264 RuntimeBroker.exe 1180 RuntimeBroker.exe 3120 RuntimeBroker.exe 2316 RuntimeBroker.exe 4012 RuntimeBroker.exe 3304 RuntimeBroker.exe 4812 RuntimeBroker.exe 1388 RuntimeBroker.exe 4332 RuntimeBroker.exe 2216 RuntimeBroker.exe 2744 RuntimeBroker.exe 4964 RuntimeBroker.exe 2504 RuntimeBroker.exe 4508 RuntimeBroker.exe 2304 RuntimeBroker.exe 2024 RuntimeBroker.exe 2928 RuntimeBroker.exe 4352 RuntimeBroker.exe 3288 RuntimeBroker.exe 3756 RuntimeBroker.exe 2044 RuntimeBroker.exe 4948 RuntimeBroker.exe 1896 RuntimeBroker.exe 2024 RuntimeBroker.exe 4556 RuntimeBroker.exe 3216 RuntimeBroker.exe 5008 RuntimeBroker.exe 2936 RuntimeBroker.exe 4948 RuntimeBroker.exe 3620 RuntimeBroker.exe 3756 RuntimeBroker.exe 1104 RuntimeBroker.exe 1348 RuntimeBroker.exe 1092 RuntimeBroker.exe 3168 RuntimeBroker.exe 4868 RuntimeBroker.exe 4400 RuntimeBroker.exe 1260 RuntimeBroker.exe 4956 RuntimeBroker.exe 1912 RuntimeBroker.exe 1232 RuntimeBroker.exe 5176 RuntimeBroker.exe 5672 RuntimeBroker.exe 5260 RuntimeBroker.exe 2292 RuntimeBroker.exe 6116 RuntimeBroker.exe 5232 RuntimeBroker.exe 5176 RuntimeBroker.exe 2676 RuntimeBroker.exe 5916 RuntimeBroker.exe 5568 RuntimeBroker.exe 2592 RuntimeBroker.exe 3620 RuntimeBroker.exe 4016 RuntimeBroker.exe 6228 RuntimeBroker.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 64 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\b5a7e8efa0d7e9e5f0e885758badb00e\Admin@WLWOBVQV_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\b5a7e8efa0d7e9e5f0e885758badb00e\Admin@WLWOBVQV_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\ec025c2ab0533d25cf7bd78c58061070\Admin@WLWOBVQV_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\419b8aaa7cba6e4dff05a70cc7016228\Admin@WLWOBVQV_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\54af8aa9286eab1ac406bb1322b37d00\Admin@WLWOBVQV_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Saved Pictures\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\419b8aaa7cba6e4dff05a70cc7016228\Admin@WLWOBVQV_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Camera Roll\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\2d6c356d977278447729b5b1420edf99\Admin@WLWOBVQV_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\0b3abc7ee26025431112385cdb7daa68\Admin@WLWOBVQV_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini RuntimeBroker.exe File opened for modification C:\Users\Admin\AppData\Local\2d6c356d977278447729b5b1420edf99\Admin@WLWOBVQV_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\0b3abc7ee26025431112385cdb7daa68\Admin@WLWOBVQV_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\b5a7e8efa0d7e9e5f0e885758badb00e\Admin@WLWOBVQV_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\0f9df786692a67ed658c193a7ae69544\Admin@WLWOBVQV_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\2d6c356d977278447729b5b1420edf99\Admin@WLWOBVQV_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\b5a7e8efa0d7e9e5f0e885758badb00e\Admin@WLWOBVQV_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\b5a7e8efa0d7e9e5f0e885758badb00e\Admin@WLWOBVQV_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\51c533bf59b511f2f6e36fb839dd6db9\Admin@WLWOBVQV_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Camera Roll\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\51c533bf59b511f2f6e36fb839dd6db9\Admin@WLWOBVQV_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\0f9df786692a67ed658c193a7ae69544\Admin@WLWOBVQV_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\419b8aaa7cba6e4dff05a70cc7016228\Admin@WLWOBVQV_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\4c72cbc49fc893b68d51772d0468ae43\Admin@WLWOBVQV_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\b3739a9836fd4b31afd459a7980e2aac\Admin@WLWOBVQV_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\2d6c356d977278447729b5b1420edf99\Admin@WLWOBVQV_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Saved Pictures\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\2d6c356d977278447729b5b1420edf99\Admin@WLWOBVQV_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\4c72cbc49fc893b68d51772d0468ae43\Admin@WLWOBVQV_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\b3739a9836fd4b31afd459a7980e2aac\Admin@WLWOBVQV_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Camera Roll\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\2d6c356d977278447729b5b1420edf99\Admin@WLWOBVQV_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Saved Pictures\desktop.ini RuntimeBroker.exe File opened for modification C:\Users\Admin\AppData\Local\51c533bf59b511f2f6e36fb839dd6db9\Admin@WLWOBVQV_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\2d6c356d977278447729b5b1420edf99\Admin@WLWOBVQV_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\ec025c2ab0533d25cf7bd78c58061070\Admin@WLWOBVQV_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini RuntimeBroker.exe File opened for modification C:\Users\Admin\AppData\Local\b3739a9836fd4b31afd459a7980e2aac\Admin@WLWOBVQV_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini RuntimeBroker.exe File opened for modification C:\Users\Admin\AppData\Local\0b3abc7ee26025431112385cdb7daa68\Admin@WLWOBVQV_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\b3739a9836fd4b31afd459a7980e2aac\Admin@WLWOBVQV_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\419b8aaa7cba6e4dff05a70cc7016228\Admin@WLWOBVQV_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Saved Pictures\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\b5a7e8efa0d7e9e5f0e885758badb00e\Admin@WLWOBVQV_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\4c72cbc49fc893b68d51772d0468ae43\Admin@WLWOBVQV_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini RuntimeBroker.exe File opened for modification C:\Users\Admin\AppData\Local\b5a7e8efa0d7e9e5f0e885758badb00e\Admin@WLWOBVQV_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\2d6c356d977278447729b5b1420edf99\Admin@WLWOBVQV_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Saved Pictures\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\0b3abc7ee26025431112385cdb7daa68\Admin@WLWOBVQV_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\0f9df786692a67ed658c193a7ae69544\Admin@WLWOBVQV_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\b3739a9836fd4b31afd459a7980e2aac\Admin@WLWOBVQV_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Camera Roll\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\0b3abc7ee26025431112385cdb7daa68\Admin@WLWOBVQV_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\b5a7e8efa0d7e9e5f0e885758badb00e\Admin@WLWOBVQV_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Saved Pictures\desktop.ini RuntimeBroker.exe File opened for modification C:\Users\Admin\AppData\Local\0f9df786692a67ed658c193a7ae69544\Admin@WLWOBVQV_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\51c533bf59b511f2f6e36fb839dd6db9\Admin@WLWOBVQV_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Saved Pictures\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\b3739a9836fd4b31afd459a7980e2aac\Admin@WLWOBVQV_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini RuntimeBroker.exe File opened for modification C:\Users\Admin\AppData\Local\b5a7e8efa0d7e9e5f0e885758badb00e\Admin@WLWOBVQV_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\54af8aa9286eab1ac406bb1322b37d00\Admin@WLWOBVQV_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\b3739a9836fd4b31afd459a7980e2aac\Admin@WLWOBVQV_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\2d6c356d977278447729b5b1420edf99\Admin@WLWOBVQV_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini RuntimeBroker.exe File opened for modification C:\Users\Admin\AppData\Local\ec025c2ab0533d25cf7bd78c58061070\Admin@WLWOBVQV_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\419b8aaa7cba6e4dff05a70cc7016228\Admin@WLWOBVQV_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\b5a7e8efa0d7e9e5f0e885758badb00e\Admin@WLWOBVQV_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\0b3abc7ee26025431112385cdb7daa68\Admin@WLWOBVQV_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini RuntimeBroker.exe File opened for modification C:\Users\Admin\AppData\Local\b5a7e8efa0d7e9e5f0e885758badb00e\Admin@WLWOBVQV_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\b3739a9836fd4b31afd459a7980e2aac\Admin@WLWOBVQV_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\2d6c356d977278447729b5b1420edf99\Admin@WLWOBVQV_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\4c72cbc49fc893b68d51772d0468ae43\Admin@WLWOBVQV_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\419b8aaa7cba6e4dff05a70cc7016228\Admin@WLWOBVQV_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\419b8aaa7cba6e4dff05a70cc7016228\Admin@WLWOBVQV_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Saved Pictures\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\54af8aa9286eab1ac406bb1322b37d00\Admin@WLWOBVQV_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\b5a7e8efa0d7e9e5f0e885758badb00e\Admin@WLWOBVQV_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\2d6c356d977278447729b5b1420edf99\Admin@WLWOBVQV_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\0f9df786692a67ed658c193a7ae69544\Admin@WLWOBVQV_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini RuntimeBroker.exe File created C:\Users\Admin\AppData\Local\b5a7e8efa0d7e9e5f0e885758badb00e\Admin@WLWOBVQV_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini RuntimeBroker.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 64 IoCs
flow ioc 670 pastebin.com 110 pastebin.com 480 pastebin.com 564 pastebin.com 578 pastebin.com 545 pastebin.com 576 pastebin.com 770 pastebin.com 113 pastebin.com 350 pastebin.com 470 pastebin.com 482 pastebin.com 605 pastebin.com 606 pastebin.com 782 pastebin.com 67 pastebin.com 179 pastebin.com 393 pastebin.com 567 pastebin.com 79 pastebin.com 148 pastebin.com 771 pastebin.com 801 pastebin.com 264 pastebin.com 454 pastebin.com 492 pastebin.com 577 pastebin.com 337 pastebin.com 383 pastebin.com 455 pastebin.com 772 pastebin.com 657 pastebin.com 182 pastebin.com 206 pastebin.com 380 pastebin.com 534 pastebin.com 349 pastebin.com 394 pastebin.com 680 pastebin.com 799 pastebin.com 91 pastebin.com 526 pastebin.com 638 pastebin.com 768 pastebin.com 646 pastebin.com 767 pastebin.com 779 pastebin.com 99 pastebin.com 338 pastebin.com 372 pastebin.com 500 pastebin.com 157 pastebin.com 513 pastebin.com 528 pastebin.com 547 pastebin.com 615 pastebin.com 57 pastebin.com 73 pastebin.com 86 pastebin.com 181 pastebin.com 622 pastebin.com 684 pastebin.com 769 pastebin.com 187 pastebin.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 30 icanhazip.com 590 icanhazip.com -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 548 set thread context of 32 548 RuntimeBroker.exe 93 PID 5048 set thread context of 4888 5048 RuntimeBroker.exe 96 PID 4276 set thread context of 3224 4276 RuntimeBroker.exe 102 PID 3468 set thread context of 4648 3468 RuntimeBroker.exe 106 PID 4308 set thread context of 1264 4308 RuntimeBroker.exe 111 PID 1180 set thread context of 3120 1180 RuntimeBroker.exe 116 PID 2316 set thread context of 4012 2316 RuntimeBroker.exe 119 PID 3304 set thread context of 4812 3304 RuntimeBroker.exe 122 PID 1388 set thread context of 4332 1388 RuntimeBroker.exe 131 PID 2216 set thread context of 2744 2216 RuntimeBroker.exe 141 PID 4964 set thread context of 2504 4964 RuntimeBroker.exe 153 PID 4508 set thread context of 2304 4508 RuntimeBroker.exe 523 PID 2024 set thread context of 2928 2024 RuntimeBroker.exe 169 PID 4352 set thread context of 3288 4352 RuntimeBroker.exe 182 PID 3756 set thread context of 2044 3756 RuntimeBroker.exe 618 PID 4948 set thread context of 1896 4948 RuntimeBroker.exe 199 PID 2024 set thread context of 4556 2024 RuntimeBroker.exe 202 PID 3216 set thread context of 5008 3216 RuntimeBroker.exe 210 PID 2936 set thread context of 4948 2936 RuntimeBroker.exe 1220 PID 3620 set thread context of 3756 3620 RuntimeBroker.exe 234 PID 1104 set thread context of 1348 1104 RuntimeBroker.exe 247 PID 1092 set thread context of 3168 1092 RuntimeBroker.exe 261 PID 4868 set thread context of 4400 4868 RuntimeBroker.exe 452 PID 1260 set thread context of 4956 1260 RuntimeBroker.exe 418 PID 1912 set thread context of 1232 1912 RuntimeBroker.exe 275 PID 5176 set thread context of 5672 5176 RuntimeBroker.exe 287 PID 5260 set thread context of 2292 5260 RuntimeBroker.exe 1137 PID 6116 set thread context of 5232 6116 RuntimeBroker.exe 298 PID 5176 set thread context of 2676 5176 RuntimeBroker.exe 301 PID 5916 set thread context of 5568 5916 RuntimeBroker.exe 1447 PID 2592 set thread context of 3620 2592 RuntimeBroker.exe 321 PID 4016 set thread context of 6228 4016 RuntimeBroker.exe 333 PID 7076 set thread context of 5124 7076 RuntimeBroker.exe 345 PID 6356 set thread context of 6732 6356 RuntimeBroker.exe 363 PID 6352 set thread context of 6704 6352 RuntimeBroker.exe 376 PID 7044 set thread context of 5280 7044 RuntimeBroker.exe 393 PID 6464 set thread context of 6496 6464 RuntimeBroker.exe 403 PID 6104 set thread context of 6948 6104 RuntimeBroker.exe 406 PID 2484 set thread context of 2220 2484 RuntimeBroker.exe 414 PID 5816 set thread context of 7096 5816 RuntimeBroker.exe 430 PID 4016 set thread context of 7024 4016 RuntimeBroker.exe 435 PID 6952 set thread context of 116 6952 RuntimeBroker.exe 445 PID 2608 set thread context of 6196 2608 RuntimeBroker.exe 480 PID 4408 set thread context of 6944 4408 RuntimeBroker.exe 1029 PID 2104 set thread context of 5820 2104 RuntimeBroker.exe 511 PID 4276 set thread context of 6012 4276 RuntimeBroker.exe 1088 PID 6188 set thread context of 6212 6188 RuntimeBroker.exe 544 PID 644 set thread context of 5424 644 RuntimeBroker.exe 556 PID 4976 set thread context of 6396 4976 RuntimeBroker.exe 561 PID 2992 set thread context of 5884 2992 RuntimeBroker.exe 1056 PID 868 set thread context of 2628 868 RuntimeBroker.exe 580 PID 6516 set thread context of 1536 6516 RuntimeBroker.exe 1468 PID 2664 set thread context of 4932 2664 RuntimeBroker.exe 610 PID 1788 set thread context of 7056 1788 RuntimeBroker.exe 1403 PID 1980 set thread context of 5720 1980 RuntimeBroker.exe 978 PID 1512 set thread context of 3524 1512 RuntimeBroker.exe 1444 PID 400 set thread context of 688 400 RuntimeBroker.exe 657 PID 7484 set thread context of 7596 7484 RuntimeBroker.exe 663 PID 7396 set thread context of 7568 7396 RuntimeBroker.exe 677 PID 7304 set thread context of 7580 7304 RuntimeBroker.exe 686 PID 7576 set thread context of 7772 7576 RuntimeBroker.exe 698 PID 7908 set thread context of 7484 7908 RuntimeBroker.exe 707 PID 8008 set thread context of 8144 8008 RuntimeBroker.exe 1184 PID 7716 set thread context of 7956 7716 RuntimeBroker.exe 743 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 64 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
Program crash 1 IoCs
pid pid_target Process 8692 9796 Process not Found -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RuntimeBroker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RuntimeBroker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RuntimeBroker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RuntimeBroker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RuntimeBroker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RuntimeBroker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RuntimeBroker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RuntimeBroker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RuntimeBroker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RuntimeBroker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RuntimeBroker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RuntimeBroker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RuntimeBroker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RuntimeBroker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RuntimeBroker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 64 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 6128 cmd.exe 9432 Process not Found 7800 cmd.exe 6108 cmd.exe 3120 netsh.exe 9116 Process not Found 2992 cmd.exe 6612 netsh.exe 8508 Process not Found 5048 cmd.exe 7308 cmd.exe 7912 Process not Found 9096 Process not Found 2040 netsh.exe 632 netsh.exe 8036 cmd.exe 6628 cmd.exe 5376 netsh.exe 6920 netsh.exe 9332 Process not Found 2104 Process not Found 7084 cmd.exe 8504 Process not Found 4108 cmd.exe 6460 cmd.exe 7308 cmd.exe 556 netsh.exe 7688 Process not Found 4308 cmd.exe 5600 netsh.exe 9516 Process not Found 2484 cmd.exe 5236 cmd.exe 9736 Process not Found 6348 cmd.exe 7368 netsh.exe 4344 Process not Found 3840 Process not Found 7032 cmd.exe 3848 netsh.exe 3924 cmd.exe 7932 cmd.exe 5816 netsh.exe 4608 cmd.exe 1372 netsh.exe 6500 Process not Found 6124 Process not Found 9160 Process not Found 6708 cmd.exe 6944 netsh.exe 8628 Process not Found 3248 cmd.exe 4684 netsh.exe 6380 netsh.exe 6784 netsh.exe 5948 cmd.exe 2556 netsh.exe 7896 netsh.exe 4868 Process not Found 8532 Process not Found 4944 Process not Found 6772 netsh.exe 6904 cmd.exe 5568 Process not Found -
Checks processor information in registry 2 TTPs 64 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RuntimeBroker.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RuntimeBroker.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RuntimeBroker.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 RuntimeBroker.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 RuntimeBroker.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RuntimeBroker.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RuntimeBroker.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 RuntimeBroker.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RuntimeBroker.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RuntimeBroker.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 RuntimeBroker.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RuntimeBroker.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 RuntimeBroker.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 RuntimeBroker.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RuntimeBroker.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 RuntimeBroker.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RuntimeBroker.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RuntimeBroker.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RuntimeBroker.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 RuntimeBroker.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RuntimeBroker.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RuntimeBroker.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 RuntimeBroker.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RuntimeBroker.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 RuntimeBroker.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 RuntimeBroker.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 RuntimeBroker.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RuntimeBroker.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RuntimeBroker.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RuntimeBroker.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RuntimeBroker.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RuntimeBroker.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 32 RuntimeBroker.exe 32 RuntimeBroker.exe 4888 RuntimeBroker.exe 4888 RuntimeBroker.exe 4888 RuntimeBroker.exe 32 RuntimeBroker.exe 32 RuntimeBroker.exe 4888 RuntimeBroker.exe 4888 RuntimeBroker.exe 4888 RuntimeBroker.exe 4888 RuntimeBroker.exe 3224 RuntimeBroker.exe 3224 RuntimeBroker.exe 3224 RuntimeBroker.exe 32 RuntimeBroker.exe 32 RuntimeBroker.exe 4888 RuntimeBroker.exe 4888 RuntimeBroker.exe 32 RuntimeBroker.exe 32 RuntimeBroker.exe 32 RuntimeBroker.exe 32 RuntimeBroker.exe 32 RuntimeBroker.exe 32 RuntimeBroker.exe 4888 RuntimeBroker.exe 4888 RuntimeBroker.exe 32 RuntimeBroker.exe 32 RuntimeBroker.exe 4648 RuntimeBroker.exe 4648 RuntimeBroker.exe 4648 RuntimeBroker.exe 3224 RuntimeBroker.exe 3224 RuntimeBroker.exe 4888 RuntimeBroker.exe 4888 RuntimeBroker.exe 4888 RuntimeBroker.exe 4888 RuntimeBroker.exe 32 RuntimeBroker.exe 32 RuntimeBroker.exe 3224 RuntimeBroker.exe 3224 RuntimeBroker.exe 32 RuntimeBroker.exe 32 RuntimeBroker.exe 4888 RuntimeBroker.exe 4888 RuntimeBroker.exe 32 RuntimeBroker.exe 32 RuntimeBroker.exe 4888 RuntimeBroker.exe 4888 RuntimeBroker.exe 32 RuntimeBroker.exe 32 RuntimeBroker.exe 4888 RuntimeBroker.exe 4888 RuntimeBroker.exe 1264 RuntimeBroker.exe 1264 RuntimeBroker.exe 1264 RuntimeBroker.exe 4888 RuntimeBroker.exe 4888 RuntimeBroker.exe 3224 RuntimeBroker.exe 3224 RuntimeBroker.exe 32 RuntimeBroker.exe 32 RuntimeBroker.exe 3224 RuntimeBroker.exe 3224 RuntimeBroker.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 15 IoCs
pid Process 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 32 RuntimeBroker.exe Token: SeDebugPrivilege 4888 RuntimeBroker.exe Token: SeDebugPrivilege 3224 RuntimeBroker.exe Token: SeDebugPrivilege 4648 RuntimeBroker.exe Token: SeDebugPrivilege 1264 RuntimeBroker.exe Token: SeDebugPrivilege 3120 RuntimeBroker.exe Token: SeDebugPrivilege 4012 RuntimeBroker.exe Token: SeDebugPrivilege 4812 RuntimeBroker.exe Token: SeDebugPrivilege 4332 RuntimeBroker.exe Token: SeDebugPrivilege 2744 RuntimeBroker.exe Token: SeDebugPrivilege 2504 RuntimeBroker.exe Token: SeDebugPrivilege 2304 RuntimeBroker.exe Token: SeDebugPrivilege 2928 RuntimeBroker.exe Token: SeDebugPrivilege 3288 RuntimeBroker.exe Token: SeDebugPrivilege 2044 RuntimeBroker.exe Token: SeDebugPrivilege 1896 RuntimeBroker.exe Token: SeDebugPrivilege 4556 RuntimeBroker.exe Token: SeDebugPrivilege 5008 RuntimeBroker.exe Token: SeDebugPrivilege 4948 RuntimeBroker.exe Token: SeDebugPrivilege 3756 RuntimeBroker.exe Token: SeDebugPrivilege 1348 RuntimeBroker.exe Token: SeDebugPrivilege 3168 RuntimeBroker.exe Token: SeDebugPrivilege 4400 RuntimeBroker.exe Token: SeDebugPrivilege 4956 RuntimeBroker.exe Token: SeDebugPrivilege 1232 RuntimeBroker.exe Token: SeDebugPrivilege 5672 RuntimeBroker.exe Token: SeDebugPrivilege 2292 RuntimeBroker.exe Token: SeDebugPrivilege 5232 RuntimeBroker.exe Token: SeDebugPrivilege 2676 RuntimeBroker.exe Token: SeDebugPrivilege 5568 RuntimeBroker.exe Token: SeDebugPrivilege 3620 RuntimeBroker.exe Token: SeDebugPrivilege 6228 RuntimeBroker.exe Token: SeDebugPrivilege 5124 RuntimeBroker.exe Token: SeDebugPrivilege 6732 RuntimeBroker.exe Token: SeDebugPrivilege 6704 RuntimeBroker.exe Token: SeDebugPrivilege 5280 RuntimeBroker.exe Token: SeDebugPrivilege 6496 RuntimeBroker.exe Token: SeDebugPrivilege 6948 RuntimeBroker.exe Token: SeDebugPrivilege 2220 RuntimeBroker.exe Token: SeDebugPrivilege 7096 RuntimeBroker.exe Token: SeDebugPrivilege 7024 RuntimeBroker.exe Token: SeDebugPrivilege 116 RuntimeBroker.exe Token: SeDebugPrivilege 6196 RuntimeBroker.exe Token: SeDebugPrivilege 6944 RuntimeBroker.exe Token: SeDebugPrivilege 5820 RuntimeBroker.exe Token: SeDebugPrivilege 6012 RuntimeBroker.exe Token: SeDebugPrivilege 6212 RuntimeBroker.exe Token: SeDebugPrivilege 5424 RuntimeBroker.exe Token: SeDebugPrivilege 6396 RuntimeBroker.exe Token: SeDebugPrivilege 5884 RuntimeBroker.exe Token: SeDebugPrivilege 2628 RuntimeBroker.exe Token: SeDebugPrivilege 1536 RuntimeBroker.exe Token: SeDebugPrivilege 4932 RuntimeBroker.exe Token: SeDebugPrivilege 7056 RuntimeBroker.exe Token: SeDebugPrivilege 5720 RuntimeBroker.exe Token: SeDebugPrivilege 3524 RuntimeBroker.exe Token: SeDebugPrivilege 688 RuntimeBroker.exe Token: SeDebugPrivilege 7596 RuntimeBroker.exe Token: SeDebugPrivilege 7568 RuntimeBroker.exe Token: SeDebugPrivilege 7580 RuntimeBroker.exe Token: SeDebugPrivilege 7772 RuntimeBroker.exe Token: SeDebugPrivilege 7484 RuntimeBroker.exe Token: SeDebugPrivilege 8144 RuntimeBroker.exe Token: SeDebugPrivilege 7956 RuntimeBroker.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1876 wrote to memory of 548 1876 RebelCracked.exe 88 PID 1876 wrote to memory of 548 1876 RebelCracked.exe 88 PID 1876 wrote to memory of 548 1876 RebelCracked.exe 88 PID 1876 wrote to memory of 4660 1876 RebelCracked.exe 89 PID 1876 wrote to memory of 4660 1876 RebelCracked.exe 89 PID 548 wrote to memory of 220 548 RuntimeBroker.exe 92 PID 548 wrote to memory of 220 548 RuntimeBroker.exe 92 PID 548 wrote to memory of 220 548 RuntimeBroker.exe 92 PID 548 wrote to memory of 32 548 RuntimeBroker.exe 93 PID 548 wrote to memory of 32 548 RuntimeBroker.exe 93 PID 548 wrote to memory of 32 548 RuntimeBroker.exe 93 PID 548 wrote to memory of 32 548 RuntimeBroker.exe 93 PID 548 wrote to memory of 32 548 RuntimeBroker.exe 93 PID 548 wrote to memory of 32 548 RuntimeBroker.exe 93 PID 548 wrote to memory of 32 548 RuntimeBroker.exe 93 PID 548 wrote to memory of 32 548 RuntimeBroker.exe 93 PID 4660 wrote to memory of 5048 4660 RebelCracked.exe 94 PID 4660 wrote to memory of 5048 4660 RebelCracked.exe 94 PID 4660 wrote to memory of 5048 4660 RebelCracked.exe 94 PID 4660 wrote to memory of 2156 4660 RebelCracked.exe 95 PID 4660 wrote to memory of 2156 4660 RebelCracked.exe 95 PID 5048 wrote to memory of 4888 5048 RuntimeBroker.exe 96 PID 5048 wrote to memory of 4888 5048 RuntimeBroker.exe 96 PID 5048 wrote to memory of 4888 5048 RuntimeBroker.exe 96 PID 5048 wrote to memory of 4888 5048 RuntimeBroker.exe 96 PID 5048 wrote to memory of 4888 5048 RuntimeBroker.exe 96 PID 5048 wrote to memory of 4888 5048 RuntimeBroker.exe 96 PID 5048 wrote to memory of 4888 5048 RuntimeBroker.exe 96 PID 5048 wrote to memory of 4888 5048 RuntimeBroker.exe 96 PID 2156 wrote to memory of 4276 2156 RebelCracked.exe 99 PID 2156 wrote to memory of 4276 2156 RebelCracked.exe 99 PID 2156 wrote to memory of 4276 2156 RebelCracked.exe 99 PID 2156 wrote to memory of 4628 2156 RebelCracked.exe 100 PID 2156 wrote to memory of 4628 2156 RebelCracked.exe 100 PID 4276 wrote to memory of 4288 4276 RuntimeBroker.exe 101 PID 4276 wrote to memory of 4288 4276 RuntimeBroker.exe 101 PID 4276 wrote to memory of 4288 4276 RuntimeBroker.exe 101 PID 4276 wrote to memory of 3224 4276 RuntimeBroker.exe 102 PID 4276 wrote to memory of 3224 4276 RuntimeBroker.exe 102 PID 4276 wrote to memory of 3224 4276 RuntimeBroker.exe 102 PID 4276 wrote to memory of 3224 4276 RuntimeBroker.exe 102 PID 4276 wrote to memory of 3224 4276 RuntimeBroker.exe 102 PID 4276 wrote to memory of 3224 4276 RuntimeBroker.exe 102 PID 4276 wrote to memory of 3224 4276 RuntimeBroker.exe 102 PID 4276 wrote to memory of 3224 4276 RuntimeBroker.exe 102 PID 4628 wrote to memory of 3468 4628 RebelCracked.exe 104 PID 4628 wrote to memory of 3468 4628 RebelCracked.exe 104 PID 4628 wrote to memory of 3468 4628 RebelCracked.exe 104 PID 4628 wrote to memory of 3244 4628 RebelCracked.exe 105 PID 4628 wrote to memory of 3244 4628 RebelCracked.exe 105 PID 3468 wrote to memory of 4648 3468 RuntimeBroker.exe 106 PID 3468 wrote to memory of 4648 3468 RuntimeBroker.exe 106 PID 3468 wrote to memory of 4648 3468 RuntimeBroker.exe 106 PID 3468 wrote to memory of 4648 3468 RuntimeBroker.exe 106 PID 3468 wrote to memory of 4648 3468 RuntimeBroker.exe 106 PID 3468 wrote to memory of 4648 3468 RuntimeBroker.exe 106 PID 3468 wrote to memory of 4648 3468 RuntimeBroker.exe 106 PID 3468 wrote to memory of 4648 3468 RuntimeBroker.exe 106 PID 3244 wrote to memory of 4308 3244 RebelCracked.exe 109 PID 3244 wrote to memory of 4308 3244 RebelCracked.exe 109 PID 3244 wrote to memory of 4308 3244 RebelCracked.exe 109 PID 3244 wrote to memory of 3424 3244 RebelCracked.exe 110 PID 3244 wrote to memory of 3424 3244 RebelCracked.exe 110 PID 4308 wrote to memory of 1264 4308 RuntimeBroker.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"3⤵PID:220
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"3⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:32 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All4⤵PID:5104
-
C:\Windows\SysWOW64\chcp.comchcp 650015⤵PID:3756
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile5⤵PID:4544
-
-
C:\Windows\SysWOW64\findstr.exefindstr All5⤵PID:868
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid4⤵PID:4016
-
C:\Windows\SysWOW64\chcp.comchcp 650015⤵PID:5080
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid5⤵
- Event Triggered Execution: Netsh Helper DLL
PID:648
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"4⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4888 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All5⤵
- System Location Discovery: System Language Discovery
PID:3896 -
C:\Windows\SysWOW64\chcp.comchcp 650016⤵PID:1456
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile6⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:5080
-
-
C:\Windows\SysWOW64\findstr.exefindstr All6⤵
- System Location Discovery: System Language Discovery
PID:1064
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid5⤵PID:2320
-
C:\Windows\SysWOW64\chcp.comchcp 650016⤵PID:1784
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid6⤵PID:5116
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"5⤵PID:4288
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"5⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3224 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All6⤵PID:1232
-
C:\Windows\SysWOW64\chcp.comchcp 650017⤵
- System Location Discovery: System Language Discovery
PID:648
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile7⤵PID:4632
-
-
C:\Windows\SysWOW64\findstr.exefindstr All7⤵PID:4752
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid6⤵PID:2660
-
C:\Windows\SysWOW64\chcp.comchcp 650017⤵PID:2936
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid7⤵PID:2516
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"4⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"6⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4648 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All7⤵PID:1588
-
C:\Windows\SysWOW64\chcp.comchcp 650018⤵
- System Location Discovery: System Language Discovery
PID:3056
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile8⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4928
-
-
C:\Windows\SysWOW64\findstr.exefindstr All8⤵PID:2408
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid7⤵
- System Location Discovery: System Language Discovery
PID:2160 -
C:\Windows\SysWOW64\chcp.comchcp 650018⤵
- System Location Discovery: System Language Discovery
PID:1896
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid8⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1592
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"5⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"7⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1264 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All8⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
PID:3248 -
C:\Windows\SysWOW64\chcp.comchcp 650019⤵PID:2972
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile9⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1504
-
-
C:\Windows\SysWOW64\findstr.exefindstr All9⤵PID:3784
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid8⤵PID:636
-
C:\Windows\SysWOW64\chcp.comchcp 650019⤵PID:4428
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid9⤵PID:2660
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"6⤵
- Checks computer location settings
PID:3424 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1180 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"8⤵PID:2488
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"8⤵PID:4880
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"8⤵
- Blocklisted process makes network request
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:3120 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All9⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:4308 -
C:\Windows\SysWOW64\chcp.comchcp 6500110⤵PID:1912
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile10⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4400
-
-
C:\Windows\SysWOW64\findstr.exefindstr All10⤵
- System Location Discovery: System Language Discovery
PID:1260
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid9⤵PID:4072
-
C:\Windows\SysWOW64\chcp.comchcp 6500110⤵PID:4868
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid10⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2220
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"7⤵
- Checks computer location settings
PID:4868 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2316 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"9⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:4012 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All10⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:4108 -
C:\Windows\SysWOW64\chcp.comchcp 6500111⤵PID:2080
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile11⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4416
-
-
C:\Windows\SysWOW64\findstr.exefindstr All11⤵PID:3928
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid10⤵PID:456
-
C:\Windows\SysWOW64\chcp.comchcp 6500111⤵PID:4396
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid11⤵PID:1356
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"8⤵PID:1364
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3304 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"10⤵
- Blocklisted process makes network request
- Executes dropped EXE
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:4812 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All11⤵PID:3296
-
C:\Windows\SysWOW64\chcp.comchcp 6500112⤵PID:2160
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile12⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4308
-
-
C:\Windows\SysWOW64\findstr.exefindstr All12⤵PID:4400
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid11⤵PID:3184
-
C:\Windows\SysWOW64\chcp.comchcp 6500112⤵PID:3620
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid12⤵PID:3296
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"9⤵
- Checks computer location settings
PID:2436 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"10⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1388 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"11⤵PID:3948
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"11⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:4332 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All12⤵
- System Location Discovery: System Language Discovery
PID:3576 -
C:\Windows\SysWOW64\chcp.comchcp 6500113⤵PID:3420
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile13⤵PID:2160
-
-
C:\Windows\SysWOW64\findstr.exefindstr All13⤵PID:2484
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid12⤵PID:3704
-
C:\Windows\SysWOW64\chcp.comchcp 6500113⤵PID:1104
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid13⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3044
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"10⤵
- Checks computer location settings
PID:4348 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2216 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"12⤵PID:4036
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"12⤵PID:4512
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"12⤵PID:2420
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"12⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:2744 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All13⤵PID:4008
-
C:\Windows\SysWOW64\chcp.comchcp 6500114⤵PID:4868
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile14⤵PID:2516
-
-
C:\Windows\SysWOW64\findstr.exefindstr All14⤵PID:4200
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid13⤵PID:4064
-
C:\Windows\SysWOW64\chcp.comchcp 6500114⤵PID:2556
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid14⤵PID:4376
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"11⤵
- Checks computer location settings
PID:3668 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"12⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4964 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"13⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:2504 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All14⤵PID:6940
-
C:\Windows\SysWOW64\chcp.comchcp 6500115⤵
- System Location Discovery: System Language Discovery
PID:3664
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile15⤵PID:6132
-
-
C:\Windows\SysWOW64\findstr.exefindstr All15⤵
- System Location Discovery: System Language Discovery
PID:6708
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid14⤵PID:7020
-
C:\Windows\SysWOW64\chcp.comchcp 6500115⤵
- System Location Discovery: System Language Discovery
PID:6992
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid15⤵
- Event Triggered Execution: Netsh Helper DLL
PID:6656
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"12⤵
- Checks computer location settings
PID:4556 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4508 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"14⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Suspicious use of AdjustPrivilegeToken
PID:2304 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All15⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:6460 -
C:\Windows\SysWOW64\chcp.comchcp 6500116⤵PID:3216
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile16⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:6784
-
-
C:\Windows\SysWOW64\findstr.exefindstr All16⤵PID:6796
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid15⤵PID:6396
-
C:\Windows\SysWOW64\chcp.comchcp 6500116⤵PID:6812
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid16⤵PID:7088
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"13⤵
- Checks computer location settings
PID:3420 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"14⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2024 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"15⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:2928 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All16⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:6108 -
C:\Windows\SysWOW64\chcp.comchcp 6500117⤵PID:6180
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile17⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:6348
-
-
C:\Windows\SysWOW64\findstr.exefindstr All17⤵PID:6356
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid16⤵PID:6644
-
C:\Windows\SysWOW64\chcp.comchcp 6500117⤵PID:7036
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid17⤵PID:6160
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"14⤵
- Checks computer location settings
PID:2592 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4352 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"16⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:3288 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All17⤵PID:6788
-
C:\Windows\SysWOW64\chcp.comchcp 6500118⤵PID:6756
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile18⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4956
-
-
C:\Windows\SysWOW64\findstr.exefindstr All18⤵PID:6456
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid17⤵PID:5692
-
C:\Windows\SysWOW64\chcp.comchcp 6500118⤵PID:7080
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid18⤵PID:6328
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"15⤵
- Checks computer location settings
PID:2160 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"16⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3756 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"17⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:2044 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All18⤵PID:6216
-
C:\Windows\SysWOW64\chcp.comchcp 6500119⤵PID:4400
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile19⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:4684
-
-
C:\Windows\SysWOW64\findstr.exefindstr All19⤵PID:5784
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid18⤵PID:1292
-
C:\Windows\SysWOW64\chcp.comchcp 6500119⤵PID:688
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid19⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1964
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"16⤵
- Checks computer location settings
PID:5008 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4948 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"18⤵PID:2088
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"18⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:1896 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All19⤵PID:5808
-
C:\Windows\SysWOW64\chcp.comchcp 6500120⤵
- System Location Discovery: System Language Discovery
PID:6116
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile20⤵PID:6016
-
-
C:\Windows\SysWOW64\findstr.exefindstr All20⤵PID:4408
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid19⤵PID:1604
-
C:\Windows\SysWOW64\chcp.comchcp 6500120⤵PID:1868
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid20⤵
- Event Triggered Execution: Netsh Helper DLL
PID:7032
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"17⤵
- Checks computer location settings
PID:4868 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"18⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2024 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"19⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:4556 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All20⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:2484 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV121⤵PID:1148
-
-
C:\Windows\SysWOW64\chcp.comchcp 6500121⤵PID:1124
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile21⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:6636
-
-
C:\Windows\SysWOW64\findstr.exefindstr All21⤵PID:1536
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid20⤵PID:5812
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV121⤵PID:2304
-
-
C:\Windows\SysWOW64\chcp.comchcp 6500121⤵PID:6248
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid21⤵PID:5432
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"18⤵
- Checks computer location settings
PID:1628 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3216 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"20⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:5008 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All21⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:5948 -
C:\Windows\SysWOW64\chcp.comchcp 6500122⤵PID:4276
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile22⤵PID:6748
-
-
C:\Windows\SysWOW64\findstr.exefindstr All22⤵PID:5800
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid21⤵PID:6152
-
C:\Windows\SysWOW64\chcp.comchcp 6500122⤵
- System Location Discovery: System Language Discovery
PID:5932
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid22⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2412
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"19⤵PID:2216
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"20⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2936 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"21⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:4948 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All22⤵PID:6656
-
C:\Windows\SysWOW64\chcp.comchcp 6500123⤵PID:5692
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile23⤵
- System Location Discovery: System Language Discovery
PID:180
-
-
C:\Windows\SysWOW64\findstr.exefindstr All23⤵PID:5808
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid22⤵PID:432
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV123⤵PID:6104
-
-
C:\Windows\SysWOW64\chcp.comchcp 6500123⤵PID:4276
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid23⤵
- System Location Discovery: System Language Discovery
PID:7120
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"20⤵
- Checks computer location settings
PID:1976 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3620 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"22⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:3756 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All23⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:5048 -
C:\Windows\SysWOW64\chcp.comchcp 6500124⤵PID:6216
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile24⤵
- Event Triggered Execution: Netsh Helper DLL
PID:6180
-
-
C:\Windows\SysWOW64\findstr.exefindstr All24⤵PID:6268
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid23⤵PID:6696
-
C:\Windows\SysWOW64\chcp.comchcp 6500124⤵PID:5936
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid24⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2208
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"21⤵
- Checks computer location settings
PID:4472 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"22⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1104 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"23⤵PID:4616
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"23⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:1348 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All24⤵PID:1988
-
C:\Windows\SysWOW64\chcp.comchcp 6500125⤵PID:5612
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile25⤵
- Event Triggered Execution: Netsh Helper DLL
PID:6032
-
-
C:\Windows\SysWOW64\findstr.exefindstr All25⤵PID:1920
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid24⤵PID:4976
-
C:\Windows\SysWOW64\chcp.comchcp 6500125⤵
- System Location Discovery: System Language Discovery
PID:4480
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid25⤵PID:6832
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"22⤵
- Checks computer location settings
PID:2548 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1092 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"24⤵PID:1432
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"24⤵PID:2216
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"24⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:3168 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All25⤵PID:5796
-
C:\Windows\SysWOW64\chcp.comchcp 6500126⤵PID:688
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile26⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2956
-
-
C:\Windows\SysWOW64\findstr.exefindstr All26⤵
- System Location Discovery: System Language Discovery
PID:2364
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid25⤵PID:1920
-
C:\Windows\SysWOW64\chcp.comchcp 6500126⤵
- System Location Discovery: System Language Discovery
PID:5212
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid26⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4656
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"23⤵
- Checks computer location settings
PID:4008 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"24⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4868 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"25⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:4400 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All26⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:7084 -
C:\Windows\SysWOW64\chcp.comchcp 6500127⤵PID:6332
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile27⤵
- Event Triggered Execution: Netsh Helper DLL
PID:6352
-
-
C:\Windows\SysWOW64\findstr.exefindstr All27⤵PID:6360
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid26⤵PID:6868
-
C:\Windows\SysWOW64\chcp.comchcp 6500127⤵PID:6380
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid27⤵
- Event Triggered Execution: Netsh Helper DLL
PID:7036
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"24⤵
- Checks computer location settings
PID:5048 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1260 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"26⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:4956 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All27⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:6128 -
C:\Windows\SysWOW64\chcp.comchcp 6500128⤵PID:6108
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile28⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:2040
-
-
C:\Windows\SysWOW64\findstr.exefindstr All28⤵PID:5692
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid27⤵PID:5388
-
C:\Windows\SysWOW64\chcp.comchcp 6500128⤵
- System Location Discovery: System Language Discovery
PID:4340
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid28⤵
- Event Triggered Execution: Netsh Helper DLL
PID:632
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"25⤵
- Checks computer location settings
PID:4268 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"26⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1912 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"27⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Suspicious use of AdjustPrivilegeToken
PID:1232 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All28⤵PID:7288
-
C:\Windows\SysWOW64\chcp.comchcp 6500129⤵
- System Location Discovery: System Language Discovery
PID:5568
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile29⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4968
-
-
C:\Windows\SysWOW64\findstr.exefindstr All29⤵PID:7520
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid28⤵PID:6880
-
C:\Windows\SysWOW64\chcp.comchcp 6500129⤵
- System Location Discovery: System Language Discovery
PID:3004
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid29⤵PID:7716
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"26⤵
- Checks computer location settings
PID:3700 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5176 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"28⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:5672 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All29⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:6348 -
C:\Windows\SysWOW64\chcp.comchcp 6500130⤵PID:7028
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile30⤵PID:6864
-
-
C:\Windows\SysWOW64\findstr.exefindstr All30⤵PID:7088
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid29⤵PID:6648
-
C:\Windows\SysWOW64\chcp.comchcp 6500130⤵PID:6360
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid30⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:6468
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"27⤵
- Checks computer location settings
PID:5388 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"28⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5260 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"29⤵PID:5272
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"29⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:2292 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All30⤵PID:6820
-
C:\Windows\SysWOW64\chcp.comchcp 6500131⤵PID:7068
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile31⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
PID:2556
-
-
C:\Windows\SysWOW64\findstr.exefindstr All31⤵PID:7136
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid30⤵PID:1292
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV131⤵PID:1372
-
-
C:\Windows\SysWOW64\chcp.comchcp 6500131⤵PID:6804
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid31⤵
- Event Triggered Execution: Netsh Helper DLL
PID:5568
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"28⤵
- Checks computer location settings
PID:5712 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:6116 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"30⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:5232 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All31⤵PID:6512
-
C:\Windows\SysWOW64\chcp.comchcp 6500132⤵PID:4812
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile32⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:5600
-
-
C:\Windows\SysWOW64\findstr.exefindstr All32⤵PID:6608
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid31⤵
- System Location Discovery: System Language Discovery
PID:5432 -
C:\Windows\SysWOW64\chcp.comchcp 6500132⤵PID:2096
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid32⤵PID:5792
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"29⤵
- Checks computer location settings
PID:6084 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"30⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5176 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"31⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:2676 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All32⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
PID:7032 -
C:\Windows\SysWOW64\chcp.comchcp 6500133⤵PID:400
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile33⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:3848
-
-
C:\Windows\SysWOW64\findstr.exefindstr All33⤵PID:6216
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid32⤵PID:6360
-
C:\Windows\SysWOW64\chcp.comchcp 6500133⤵PID:2556
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid33⤵
- System Location Discovery: System Language Discovery
PID:2992
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"30⤵
- Checks computer location settings
PID:5700 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5916 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"32⤵PID:4212
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"32⤵
- Blocklisted process makes network request
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:5568 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All33⤵PID:5824
-
C:\Windows\SysWOW64\chcp.comchcp 6500134⤵PID:6748
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile34⤵
- Event Triggered Execution: Netsh Helper DLL
PID:6816
-
-
C:\Windows\SysWOW64\findstr.exefindstr All34⤵PID:7036
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid33⤵PID:6456
-
C:\Windows\SysWOW64\chcp.comchcp 6500134⤵PID:6328
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid34⤵
- Event Triggered Execution: Netsh Helper DLL
PID:6344
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"31⤵
- Checks computer location settings
PID:4276 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"32⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2592 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"33⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:3620 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All34⤵PID:6268
-
C:\Windows\SysWOW64\chcp.comchcp 6500135⤵PID:6512
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile35⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2412
-
-
C:\Windows\SysWOW64\findstr.exefindstr All35⤵PID:6128
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid34⤵
- System Location Discovery: System Language Discovery
PID:512 -
C:\Windows\SysWOW64\chcp.comchcp 6500135⤵PID:2608
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid35⤵PID:1564
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"32⤵
- Checks computer location settings
PID:4504 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4016 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"34⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:6228 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All35⤵
- System Location Discovery: System Language Discovery
PID:5876 -
C:\Windows\SysWOW64\chcp.comchcp 6500136⤵PID:5752
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile36⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4908
-
-
C:\Windows\SysWOW64\findstr.exefindstr All36⤵PID:644
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid35⤵
- System Location Discovery: System Language Discovery
PID:3316 -
C:\Windows\SysWOW64\chcp.comchcp 6500136⤵
- System Location Discovery: System Language Discovery
PID:5088
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid36⤵
- Event Triggered Execution: Netsh Helper DLL
PID:6296
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"33⤵
- Checks computer location settings
PID:6168 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"34⤵
- Suspicious use of SetThreadContext
PID:7076 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"35⤵
- Suspicious use of AdjustPrivilegeToken
PID:5124 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All36⤵PID:3264
-
C:\Windows\SysWOW64\chcp.comchcp 6500137⤵PID:7940
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile37⤵PID:6960
-
-
C:\Windows\SysWOW64\findstr.exefindstr All37⤵PID:8156
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid36⤵PID:3672
-
C:\Windows\SysWOW64\chcp.comchcp 6500137⤵PID:6128
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid37⤵PID:4128
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"34⤵
- Checks computer location settings
PID:7124 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"35⤵
- Suspicious use of SetThreadContext
PID:6356 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"36⤵
- Drops desktop.ini file(s)
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:6732 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All37⤵PID:3204
-
C:\Windows\SysWOW64\chcp.comchcp 6500138⤵
- System Location Discovery: System Language Discovery
PID:6836
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile38⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
PID:5816
-
-
C:\Windows\SysWOW64\findstr.exefindstr All38⤵PID:1148
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid37⤵PID:1124
-
C:\Windows\SysWOW64\chcp.comchcp 6500138⤵
- System Location Discovery: System Language Discovery
PID:6128
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid38⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4628
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"35⤵
- Checks computer location settings
PID:6652 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"36⤵
- Suspicious use of SetThreadContext
PID:6352 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"37⤵PID:6856
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"37⤵
- Drops desktop.ini file(s)
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:6704 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All38⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:6708 -
C:\Windows\SysWOW64\chcp.comchcp 6500139⤵PID:6596
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile39⤵PID:4932
-
-
C:\Windows\SysWOW64\findstr.exefindstr All39⤵PID:4408
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid38⤵PID:6788
-
C:\Windows\SysWOW64\chcp.comchcp 6500139⤵PID:1440
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid39⤵PID:6592
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"36⤵
- Checks computer location settings
PID:6356 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"37⤵
- Suspicious use of SetThreadContext
PID:7044 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"38⤵PID:5772
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"38⤵
- Suspicious use of AdjustPrivilegeToken
PID:5280 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All39⤵PID:7468
-
C:\Windows\SysWOW64\chcp.comchcp 6500140⤵PID:7652
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile40⤵
- Event Triggered Execution: Netsh Helper DLL
PID:7680
-
-
C:\Windows\SysWOW64\findstr.exefindstr All40⤵PID:7688
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid39⤵PID:7860
-
C:\Windows\SysWOW64\chcp.comchcp 6500140⤵PID:7944
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid40⤵
- Event Triggered Execution: Netsh Helper DLL
PID:7992
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"37⤵
- Checks computer location settings
PID:6948 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"38⤵
- Suspicious use of SetThreadContext
PID:6464 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"39⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:6496 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All40⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:3924 -
C:\Windows\SysWOW64\chcp.comchcp 6500141⤵PID:4480
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile41⤵
- Event Triggered Execution: Netsh Helper DLL
PID:6608
-
-
C:\Windows\SysWOW64\findstr.exefindstr All41⤵PID:392
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid40⤵PID:5460
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV141⤵PID:4628
-
-
C:\Windows\SysWOW64\chcp.comchcp 6500141⤵PID:4680
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid41⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3444
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"38⤵
- Checks computer location settings
PID:3216 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"39⤵
- Suspicious use of SetThreadContext
PID:6104 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"40⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6948 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All41⤵PID:5040
-
C:\Windows\SysWOW64\chcp.comchcp 6500142⤵PID:1784
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile42⤵PID:2164
-
-
C:\Windows\SysWOW64\findstr.exefindstr All42⤵PID:6956
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid41⤵PID:2184
-
C:\Windows\SysWOW64\chcp.comchcp 6500142⤵PID:6772
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid42⤵PID:7920
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"39⤵
- Checks computer location settings
PID:5468 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"40⤵
- Suspicious use of SetThreadContext
PID:2484 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"41⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:2220 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All42⤵PID:8184
-
C:\Windows\SysWOW64\chcp.comchcp 6500143⤵PID:8120
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile43⤵
- Event Triggered Execution: Netsh Helper DLL
PID:6208
-
-
C:\Windows\SysWOW64\findstr.exefindstr All43⤵PID:5612
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid42⤵
- System Location Discovery: System Language Discovery
PID:8040 -
C:\Windows\SysWOW64\chcp.comchcp 6500143⤵PID:5472
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid43⤵PID:7660
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"40⤵
- Checks computer location settings
PID:4504 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"41⤵
- Suspicious use of SetThreadContext
PID:5816 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"42⤵
- Drops desktop.ini file(s)
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:7096 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All43⤵PID:6788
-
C:\Windows\SysWOW64\chcp.comchcp 6500144⤵PID:5920
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile44⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:6380
-
-
C:\Windows\SysWOW64\findstr.exefindstr All44⤵PID:768
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid43⤵PID:5236
-
C:\Windows\SysWOW64\chcp.comchcp 6500144⤵PID:6468
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid44⤵PID:4660
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"41⤵
- Checks computer location settings
PID:5468 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"42⤵
- Suspicious use of SetThreadContext
PID:4016 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"43⤵
- Suspicious use of AdjustPrivilegeToken
PID:7024 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All44⤵PID:5040
-
C:\Windows\SysWOW64\chcp.comchcp 6500145⤵PID:2964
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile45⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:3120
-
-
C:\Windows\SysWOW64\findstr.exefindstr All45⤵PID:8156
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid44⤵PID:7760
-
C:\Windows\SysWOW64\chcp.comchcp 6500145⤵PID:4128
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid45⤵PID:7368
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"42⤵
- Checks computer location settings
PID:6064 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"43⤵
- Suspicious use of SetThreadContext
PID:6952 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"44⤵
- Drops desktop.ini file(s)
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:116 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All45⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:4608 -
C:\Windows\SysWOW64\chcp.comchcp 6500146⤵
- System Location Discovery: System Language Discovery
PID:644
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile46⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:1372
-
-
C:\Windows\SysWOW64\findstr.exefindstr All46⤵PID:2044
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid45⤵PID:6432
-
C:\Windows\SysWOW64\chcp.comchcp 6500146⤵
- System Location Discovery: System Language Discovery
PID:1892
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid46⤵
- Event Triggered Execution: Netsh Helper DLL
PID:5612
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"43⤵
- Checks computer location settings
PID:4044 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"44⤵
- Suspicious use of SetThreadContext
PID:2608 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"45⤵
- Drops desktop.ini file(s)
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:6196 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All46⤵PID:4808
-
C:\Windows\SysWOW64\chcp.comchcp 6500147⤵PID:6160
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile47⤵PID:3692
-
-
C:\Windows\SysWOW64\findstr.exefindstr All47⤵PID:1920
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid46⤵PID:5720
-
C:\Windows\SysWOW64\chcp.comchcp 6500147⤵PID:1988
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid47⤵
- Event Triggered Execution: Netsh Helper DLL
PID:5780
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"44⤵
- Checks computer location settings
PID:6124 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"45⤵
- Suspicious use of SetThreadContext
PID:4408 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"46⤵
- Drops desktop.ini file(s)
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:6944 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All47⤵PID:6724
-
C:\Windows\SysWOW64\chcp.comchcp 6500148⤵PID:7880
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile48⤵
- Event Triggered Execution: Netsh Helper DLL
PID:7488
-
-
C:\Windows\SysWOW64\findstr.exefindstr All48⤵PID:7516
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid47⤵PID:7520
-
C:\Windows\SysWOW64\chcp.comchcp 6500148⤵PID:7492
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid48⤵PID:7404
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"45⤵
- Checks computer location settings
PID:6832 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"46⤵
- Suspicious use of SetThreadContext
PID:2104 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"47⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:5820 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All48⤵PID:7064
-
C:\Windows\SysWOW64\chcp.comchcp 6500149⤵PID:6724
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile49⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4360
-
-
C:\Windows\SysWOW64\findstr.exefindstr All49⤵PID:6032
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid48⤵PID:4948
-
C:\Windows\SysWOW64\chcp.comchcp 6500149⤵PID:5828
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid49⤵
- Event Triggered Execution: Netsh Helper DLL
PID:728
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"46⤵
- Checks computer location settings
PID:6876 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"47⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4276 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"48⤵
- Suspicious use of AdjustPrivilegeToken
PID:6012 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All49⤵PID:7244
-
C:\Windows\SysWOW64\chcp.comchcp 6500150⤵PID:7844
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile50⤵PID:6392
-
-
C:\Windows\SysWOW64\findstr.exefindstr All50⤵PID:6268
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid49⤵PID:7660
-
C:\Windows\SysWOW64\chcp.comchcp 6500150⤵PID:1424
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid50⤵PID:976
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"47⤵
- Checks computer location settings
PID:6152 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"48⤵
- Suspicious use of SetThreadContext
PID:6188 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"49⤵
- Suspicious use of AdjustPrivilegeToken
PID:6212 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All50⤵PID:3248
-
C:\Windows\SysWOW64\chcp.comchcp 6500151⤵PID:7892
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile51⤵PID:1352
-
-
C:\Windows\SysWOW64\findstr.exefindstr All51⤵PID:1744
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid50⤵PID:7156
-
C:\Windows\SysWOW64\chcp.comchcp 6500151⤵PID:7704
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid51⤵PID:7480
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"48⤵
- Checks computer location settings
PID:6964 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"49⤵
- Suspicious use of SetThreadContext
PID:644 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"50⤵
- Drops desktop.ini file(s)
- Suspicious use of AdjustPrivilegeToken
PID:5424 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All51⤵PID:6388
-
C:\Windows\SysWOW64\chcp.comchcp 6500152⤵
- System Location Discovery: System Language Discovery
PID:3292
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile52⤵PID:6916
-
-
C:\Windows\SysWOW64\findstr.exefindstr All52⤵
- System Location Discovery: System Language Discovery
PID:1292
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid51⤵PID:7360
-
C:\Windows\SysWOW64\chcp.comchcp 6500152⤵PID:6484
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid52⤵PID:3924
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"49⤵
- Checks computer location settings
PID:3692 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"50⤵
- Suspicious use of SetThreadContext
PID:4976 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"51⤵
- Drops desktop.ini file(s)
- Suspicious use of AdjustPrivilegeToken
PID:6396 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All52⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:2992 -
C:\Windows\SysWOW64\chcp.comchcp 6500153⤵
- System Location Discovery: System Language Discovery
PID:1872
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile53⤵PID:7256
-
-
C:\Windows\SysWOW64\findstr.exefindstr All53⤵PID:5924
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid52⤵PID:952
-
C:\Windows\SysWOW64\chcp.comchcp 6500153⤵PID:1036
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid53⤵PID:5512
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"50⤵
- Checks computer location settings
PID:6672 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"51⤵
- Suspicious use of SetThreadContext
PID:2992 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"52⤵
- Drops desktop.ini file(s)
- Suspicious use of AdjustPrivilegeToken
PID:5884 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All53⤵PID:7812
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV154⤵PID:6268
-
-
C:\Windows\SysWOW64\chcp.comchcp 6500154⤵PID:5668
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile54⤵PID:7848
-
-
C:\Windows\SysWOW64\findstr.exefindstr All54⤵PID:7468
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid53⤵PID:7436
-
C:\Windows\SysWOW64\chcp.comchcp 6500154⤵PID:5712
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid54⤵PID:7660
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"51⤵
- Checks computer location settings
PID:1604 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"52⤵
- Suspicious use of SetThreadContext
PID:868 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"53⤵PID:7012
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"53⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:2628 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All54⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:5236 -
C:\Windows\SysWOW64\chcp.comchcp 6500155⤵
- System Location Discovery: System Language Discovery
PID:7476
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile55⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:7812
-
-
C:\Windows\SysWOW64\findstr.exefindstr All55⤵PID:7368
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid54⤵PID:6472
-
C:\Windows\SysWOW64\chcp.comchcp 6500155⤵
- System Location Discovery: System Language Discovery
PID:7276
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid55⤵
- Event Triggered Execution: Netsh Helper DLL
PID:7300
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"52⤵
- Checks computer location settings
PID:6684 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"53⤵
- Suspicious use of SetThreadContext
PID:6516 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"54⤵
- Drops desktop.ini file(s)
- Suspicious use of AdjustPrivilegeToken
PID:1536
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"53⤵
- Checks computer location settings
PID:6708 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"54⤵
- Suspicious use of SetThreadContext
PID:2664 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"55⤵
- Drops desktop.ini file(s)
- Suspicious use of AdjustPrivilegeToken
PID:4932 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All56⤵PID:4344
-
C:\Windows\SysWOW64\chcp.comchcp 6500157⤵PID:8060
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile57⤵
- Event Triggered Execution: Netsh Helper DLL
PID:7852
-
-
C:\Windows\SysWOW64\findstr.exefindstr All57⤵PID:7692
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid56⤵PID:7932
-
C:\Windows\SysWOW64\chcp.comchcp 6500157⤵PID:7748
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid57⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4576
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"54⤵
- Checks computer location settings
PID:768 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"55⤵
- Suspicious use of SetThreadContext
PID:1788 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"56⤵PID:7048
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"56⤵
- Drops desktop.ini file(s)
- Suspicious use of AdjustPrivilegeToken
PID:7056 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All57⤵PID:5040
-
C:\Windows\SysWOW64\chcp.comchcp 6500158⤵PID:3900
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile58⤵PID:5732
-
-
C:\Windows\SysWOW64\findstr.exefindstr All58⤵PID:5508
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid57⤵PID:6148
-
C:\Windows\SysWOW64\chcp.comchcp 6500158⤵PID:6380
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid58⤵PID:2408
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"55⤵
- Checks computer location settings
PID:4428 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"56⤵
- Suspicious use of SetThreadContext
PID:1980 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"57⤵
- Drops desktop.ini file(s)
- Suspicious use of AdjustPrivilegeToken
PID:5720 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All58⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:7932 -
C:\Windows\SysWOW64\chcp.comchcp 6500159⤵PID:8036
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile59⤵PID:6472
-
-
C:\Windows\SysWOW64\findstr.exefindstr All59⤵PID:4964
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid58⤵PID:8128
-
C:\Windows\SysWOW64\chcp.comchcp 6500159⤵PID:7500
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid59⤵PID:5664
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"56⤵
- Checks computer location settings
PID:6516 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"57⤵
- Suspicious use of SetThreadContext
PID:1512 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"58⤵PID:1788
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"58⤵
- Drops desktop.ini file(s)
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:3524 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All59⤵PID:5316
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV160⤵PID:4676
-
-
C:\Windows\SysWOW64\chcp.comchcp 6500160⤵PID:8172
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile60⤵PID:2472
-
-
C:\Windows\SysWOW64\findstr.exefindstr All60⤵PID:8096
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid59⤵PID:7172
-
C:\Windows\SysWOW64\chcp.comchcp 6500160⤵PID:7684
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid60⤵
- Event Triggered Execution: Netsh Helper DLL
PID:5692
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"57⤵
- Checks computer location settings
PID:4676 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"58⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:400 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"59⤵
- Suspicious use of AdjustPrivilegeToken
PID:688 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All60⤵PID:7512
-
C:\Windows\SysWOW64\chcp.comchcp 6500161⤵PID:7880
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile61⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:7368
-
-
C:\Windows\SysWOW64\findstr.exefindstr All61⤵PID:768
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid60⤵PID:5984
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV161⤵PID:4408
-
-
C:\Windows\SysWOW64\chcp.comchcp 6500161⤵PID:6624
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid61⤵PID:2184
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"58⤵
- Checks computer location settings
PID:4360 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"59⤵
- Suspicious use of SetThreadContext
PID:7484 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"60⤵
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:7596 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All61⤵PID:7876
-
C:\Windows\SysWOW64\chcp.comchcp 6500162⤵PID:7200
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile62⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:6920
-
-
C:\Windows\SysWOW64\findstr.exefindstr All62⤵PID:5376
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid61⤵PID:2532
-
C:\Windows\SysWOW64\chcp.comchcp 6500162⤵PID:7932
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid62⤵PID:7476
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"59⤵
- Checks computer location settings
PID:7548 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"60⤵
- Suspicious use of SetThreadContext
PID:7396 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"61⤵
- Drops desktop.ini file(s)
- Suspicious use of AdjustPrivilegeToken
PID:7568 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All62⤵PID:3120
-
C:\Windows\SysWOW64\chcp.comchcp 6500163⤵PID:4428
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile63⤵PID:7440
-
-
C:\Windows\SysWOW64\findstr.exefindstr All63⤵PID:1352
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid62⤵PID:4044
-
C:\Windows\SysWOW64\chcp.comchcp 6500163⤵PID:5836
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid63⤵PID:8128
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"60⤵
- Checks computer location settings
PID:7564 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"61⤵
- Suspicious use of SetThreadContext
PID:7304 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"62⤵
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:7580 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All63⤵PID:5936
-
C:\Windows\SysWOW64\chcp.comchcp 6500164⤵PID:5472
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile64⤵PID:4656
-
-
C:\Windows\SysWOW64\findstr.exefindstr All64⤵PID:7304
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid63⤵PID:7312
-
C:\Windows\SysWOW64\chcp.comchcp 6500164⤵PID:5236
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid64⤵
- Event Triggered Execution: Netsh Helper DLL
PID:5612
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"61⤵
- Checks computer location settings
PID:7532 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"62⤵
- Suspicious use of SetThreadContext
PID:7576 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"63⤵PID:7264
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"63⤵
- Drops desktop.ini file(s)
- Suspicious use of AdjustPrivilegeToken
PID:7772 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All64⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:8036 -
C:\Windows\SysWOW64\chcp.comchcp 6500165⤵PID:5212
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile65⤵PID:5876
-
-
C:\Windows\SysWOW64\findstr.exefindstr All65⤵PID:2472
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid64⤵PID:7300
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV165⤵PID:5316
-
-
C:\Windows\SysWOW64\chcp.comchcp 6500165⤵PID:5952
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid65⤵PID:400
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"62⤵
- Checks computer location settings
PID:7912 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"63⤵
- Suspicious use of SetThreadContext
PID:7908 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"64⤵
- Suspicious use of AdjustPrivilegeToken
PID:7484 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All65⤵PID:4796
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV166⤵PID:1064
-
-
C:\Windows\SysWOW64\chcp.comchcp 6500166⤵PID:6116
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile66⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:5376
-
-
C:\Windows\SysWOW64\findstr.exefindstr All66⤵PID:5288
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid65⤵PID:6724
-
C:\Windows\SysWOW64\chcp.comchcp 6500166⤵PID:3248
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid66⤵PID:3004
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"63⤵PID:4816
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"64⤵
- Suspicious use of SetThreadContext
PID:8008 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"65⤵
- Drops desktop.ini file(s)
- Suspicious use of AdjustPrivilegeToken
PID:8144 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All66⤵PID:7268
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV167⤵PID:5828
-
-
C:\Windows\SysWOW64\chcp.comchcp 6500167⤵PID:6512
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile67⤵PID:5712
-
-
C:\Windows\SysWOW64\findstr.exefindstr All67⤵PID:6168
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid66⤵PID:5044
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV167⤵PID:7748
-
-
C:\Windows\SysWOW64\chcp.comchcp 6500167⤵PID:2440
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid67⤵PID:3980
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"64⤵
- Checks computer location settings
PID:8068 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"65⤵
- Suspicious use of SetThreadContext
PID:7716 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"66⤵
- Drops desktop.ini file(s)
- Suspicious use of AdjustPrivilegeToken
PID:7956
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"65⤵
- Checks computer location settings
PID:952 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"66⤵PID:2912
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"67⤵PID:5484
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All68⤵PID:6612
-
C:\Windows\SysWOW64\chcp.comchcp 6500169⤵PID:5040
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile69⤵PID:6380
-
-
C:\Windows\SysWOW64\findstr.exefindstr All69⤵PID:4572
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid68⤵PID:6012
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV169⤵PID:6816
-
-
C:\Windows\SysWOW64\chcp.comchcp 6500169⤵PID:1624
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid69⤵PID:6468
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"66⤵
- Checks computer location settings
PID:7524 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"67⤵PID:6944
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"68⤵PID:6540
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"68⤵
- System Location Discovery: System Language Discovery
PID:7340
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"67⤵
- Checks computer location settings
PID:4360 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"68⤵PID:6792
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"69⤵
- System Location Discovery: System Language Discovery
PID:3064 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All70⤵PID:4900
-
C:\Windows\SysWOW64\chcp.comchcp 6500171⤵PID:6892
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile71⤵PID:4632
-
-
C:\Windows\SysWOW64\findstr.exefindstr All71⤵PID:7700
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid70⤵PID:1424
-
C:\Windows\SysWOW64\chcp.comchcp 6500171⤵PID:6612
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid71⤵PID:1660
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"68⤵
- Checks computer location settings
PID:2276 -
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"69⤵PID:7040
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"70⤵PID:7972
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"70⤵PID:8012
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All71⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:7308 -
C:\Windows\SysWOW64\chcp.comchcp 6500172⤵PID:6392
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile72⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:6772
-
-
C:\Windows\SysWOW64\findstr.exefindstr All72⤵PID:7208
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid71⤵PID:8080
-
C:\Windows\SysWOW64\chcp.comchcp 6500172⤵PID:6568
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid72⤵PID:5664
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"69⤵PID:2508
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"70⤵PID:7496
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"71⤵PID:6804
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All72⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:6904 -
C:\Windows\SysWOW64\chcp.comchcp 6500173⤵PID:5952
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile73⤵PID:6968
-
-
C:\Windows\SysWOW64\findstr.exefindstr All73⤵PID:732
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid72⤵PID:536
-
C:\Windows\SysWOW64\chcp.comchcp 6500173⤵PID:1428
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid73⤵PID:2980
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"70⤵PID:5692
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"71⤵PID:6844
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"72⤵PID:7128
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All73⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:6628 -
C:\Windows\SysWOW64\chcp.comchcp 6500174⤵PID:6844
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile74⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:6944
-
-
C:\Windows\SysWOW64\findstr.exefindstr All74⤵PID:7520
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid73⤵PID:1624
-
C:\Windows\SysWOW64\chcp.comchcp 6500174⤵PID:7336
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid74⤵PID:4508
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"71⤵PID:6688
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"72⤵PID:5972
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"73⤵PID:1292
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All74⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:7308 -
C:\Windows\SysWOW64\chcp.comchcp 6500175⤵PID:6908
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile75⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:632
-
-
C:\Windows\SysWOW64\findstr.exefindstr All75⤵PID:7208
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid74⤵PID:4044
-
C:\Windows\SysWOW64\chcp.comchcp 6500175⤵PID:6060
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid75⤵PID:5216
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"72⤵PID:7924
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"73⤵PID:7204
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"74⤵PID:4488
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All75⤵PID:6972
-
C:\Windows\SysWOW64\chcp.comchcp 6500176⤵PID:4816
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile76⤵PID:3692
-
-
C:\Windows\SysWOW64\findstr.exefindstr All76⤵PID:2696
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid75⤵PID:7608
-
C:\Windows\SysWOW64\chcp.comchcp 6500176⤵PID:2556
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid76⤵PID:6344
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"73⤵PID:6880
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"74⤵PID:7888
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"75⤵PID:4140
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"74⤵PID:3124
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"75⤵PID:4084
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"76⤵PID:8152
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"75⤵PID:4864
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"76⤵PID:7436
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"77⤵PID:7252
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"77⤵PID:8092
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"76⤵PID:1660
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"77⤵PID:4136
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"78⤵PID:8156
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"77⤵PID:7976
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"78⤵PID:5472
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"79⤵PID:7800
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All80⤵PID:7072
-
C:\Windows\SysWOW64\chcp.comchcp 6500181⤵PID:4392
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile81⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:6612
-
-
C:\Windows\SysWOW64\findstr.exefindstr All81⤵PID:7640
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid80⤵PID:3292
-
C:\Windows\SysWOW64\chcp.comchcp 6500181⤵PID:6736
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid81⤵PID:6340
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"78⤵PID:2444
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"79⤵PID:6060
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"80⤵PID:7928
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"80⤵PID:3332
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"79⤵PID:7544
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"80⤵PID:7816
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"81⤵PID:7496
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All82⤵PID:7744
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV183⤵PID:6792
-
-
C:\Windows\SysWOW64\chcp.comchcp 6500183⤵PID:7656
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile83⤵PID:1160
-
-
C:\Windows\SysWOW64\findstr.exefindstr All83⤵PID:1428
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid82⤵PID:5560
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV183⤵PID:5720
-
-
C:\Windows\SysWOW64\chcp.comchcp 6500183⤵PID:7292
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid83⤵PID:3444
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"80⤵PID:7208
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"81⤵PID:6060
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"82⤵PID:2412
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"82⤵PID:1872
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"82⤵PID:6524
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All83⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:7800 -
C:\Windows\SysWOW64\chcp.comchcp 6500184⤵PID:2944
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile84⤵PID:6516
-
-
C:\Windows\SysWOW64\findstr.exefindstr All84⤵PID:3384
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid83⤵PID:5804
-
C:\Windows\SysWOW64\chcp.comchcp 6500184⤵PID:7192
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid84⤵PID:6140
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"81⤵PID:7552
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"82⤵PID:3240
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"83⤵PID:7388
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"83⤵PID:4972
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All84⤵PID:7672
-
C:\Windows\SysWOW64\chcp.comchcp 6500185⤵PID:1832
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile85⤵PID:2944
-
-
C:\Windows\SysWOW64\findstr.exefindstr All85⤵PID:4764
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid84⤵PID:1892
-
C:\Windows\SysWOW64\chcp.comchcp 6500185⤵PID:4092
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid85⤵PID:524
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"82⤵PID:2396
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"83⤵PID:4900
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"84⤵PID:8000
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"83⤵PID:6488
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"84⤵PID:2208
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"85⤵PID:1744
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"84⤵PID:5792
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"85⤵PID:1892
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"86⤵PID:408
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"85⤵PID:7276
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"86⤵PID:5172
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"87⤵PID:7212
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All88⤵PID:5948
-
C:\Windows\SysWOW64\chcp.comchcp 6500189⤵PID:2292
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile89⤵PID:6512
-
-
C:\Windows\SysWOW64\findstr.exefindstr All89⤵PID:3056
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid88⤵PID:6344
-
C:\Windows\SysWOW64\chcp.comchcp 6500189⤵PID:1164
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid89⤵PID:7964
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"86⤵PID:6264
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"87⤵PID:5024
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"88⤵PID:512
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"88⤵PID:7836
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All89⤵PID:6460
-
C:\Windows\SysWOW64\chcp.comchcp 6500190⤵PID:3280
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile90⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:7896
-
-
C:\Windows\SysWOW64\findstr.exefindstr All90⤵PID:7748
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid89⤵PID:1160
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV190⤵PID:6652
-
-
C:\Windows\SysWOW64\chcp.comchcp 6500190⤵PID:7496
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid90⤵PID:3292
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"87⤵PID:7244
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"88⤵PID:3524
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"89⤵PID:4480
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"89⤵PID:7880
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"88⤵PID:3004
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"89⤵PID:4764
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"90⤵PID:5644
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All91⤵PID:8120
-
C:\Windows\SysWOW64\chcp.comchcp 6500192⤵PID:1940
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile92⤵PID:7308
-
-
C:\Windows\SysWOW64\findstr.exefindstr All92⤵PID:1992
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid91⤵PID:2752
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV192⤵PID:8172
-
-
C:\Windows\SysWOW64\chcp.comchcp 6500192⤵PID:7376
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid92⤵PID:4864
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"89⤵PID:524
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"90⤵PID:7308
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"91⤵PID:8008
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"91⤵PID:1444
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"90⤵PID:7448
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"91⤵PID:6676
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"92⤵PID:4392
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"91⤵PID:2992
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"92⤵PID:6560
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"93⤵PID:5224
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"93⤵PID:6156
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"92⤵PID:7932
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"93⤵PID:7500
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"94⤵PID:3180
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All95⤵PID:7208
-
C:\Windows\SysWOW64\chcp.comchcp 6500196⤵PID:8112
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile96⤵PID:6692
-
-
C:\Windows\SysWOW64\findstr.exefindstr All96⤵PID:5952
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid95⤵PID:648
-
C:\Windows\SysWOW64\chcp.comchcp 6500196⤵PID:5392
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid96⤵PID:2348
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"93⤵PID:6400
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"94⤵PID:5604
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"95⤵PID:840
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All96⤵PID:1144
-
C:\Windows\SysWOW64\chcp.comchcp 6500197⤵PID:5816
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile97⤵PID:6528
-
-
C:\Windows\SysWOW64\findstr.exefindstr All97⤵PID:1980
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid96⤵PID:4968
-
C:\Windows\SysWOW64\chcp.comchcp 6500197⤵PID:4532
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid97⤵PID:5112
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"94⤵PID:7464
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"95⤵PID:5608
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"96⤵PID:6404
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"96⤵PID:7656
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All97⤵PID:7128
-
C:\Windows\SysWOW64\chcp.comchcp 6500198⤵PID:4632
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile98⤵PID:7392
-
-
C:\Windows\SysWOW64\findstr.exefindstr All98⤵PID:1036
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid97⤵PID:5796
-
C:\Windows\SysWOW64\chcp.comchcp 6500198⤵PID:5488
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid98⤵PID:4812
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"95⤵PID:2908
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"96⤵PID:2440
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"97⤵PID:5884
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"97⤵PID:6128
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All98⤵PID:5872
-
C:\Windows\SysWOW64\chcp.comchcp 6500199⤵PID:7708
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile99⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:556
-
-
C:\Windows\SysWOW64\findstr.exefindstr All99⤵PID:7356
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid98⤵PID:6116
-
C:\Windows\SysWOW64\chcp.comchcp 6500199⤵PID:864
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid99⤵PID:7404
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"96⤵PID:6428
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"97⤵PID:3908
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"98⤵PID:2436
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"97⤵PID:7208
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"98⤵PID:5668
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"99⤵PID:7176
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"98⤵PID:1376
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"99⤵PID:4020
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"100⤵PID:7644
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"99⤵PID:396
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"100⤵PID:1812
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"101⤵PID:7784
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"100⤵PID:5112
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"101⤵PID:3808
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"102⤵PID:2320
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"102⤵PID:7232
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"101⤵PID:1716
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"102⤵PID:6320
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"103⤵PID:3504
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"102⤵PID:5324
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"103⤵PID:1152
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"104⤵PID:7552
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"103⤵PID:7896
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"104⤵PID:6364
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"105⤵PID:7496
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"104⤵PID:8072
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"105⤵PID:7244
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"106⤵PID:5288
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"105⤵PID:1624
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"106⤵PID:6780
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"107⤵PID:7792
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"106⤵PID:6620
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"107⤵PID:7896
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"108⤵PID:3324
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"107⤵PID:7392
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"108⤵PID:5972
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"109⤵PID:732
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"108⤵PID:2408
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"109⤵PID:6520
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"110⤵PID:4832
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All111⤵PID:2432
-
C:\Windows\SysWOW64\chcp.comchcp 65001112⤵PID:3136
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile112⤵PID:508
-
-
C:\Windows\SysWOW64\findstr.exefindstr All112⤵PID:7716
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"109⤵PID:8144
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"110⤵PID:7660
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"111⤵PID:5724
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"110⤵PID:1428
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"111⤵PID:7060
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"112⤵PID:7352
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"112⤵PID:2908
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All113⤵PID:3444
-
C:\Windows\SysWOW64\chcp.comchcp 65001114⤵PID:6264
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile114⤵PID:2432
-
-
C:\Windows\SysWOW64\findstr.exefindstr All114⤵PID:7732
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid113⤵PID:8148
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1114⤵PID:4964
-
-
C:\Windows\SysWOW64\chcp.comchcp 65001114⤵PID:7700
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid114⤵PID:3808
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"111⤵PID:1932
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"112⤵PID:8120
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"113⤵PID:7944
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"113⤵PID:5536
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"112⤵PID:6492
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"113⤵PID:5948
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"114⤵PID:8124
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"113⤵PID:7056
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"114⤵PID:8148
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"115⤵PID:2284
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"114⤵PID:4948
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"115⤵PID:5112
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"116⤵PID:2024
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"115⤵PID:1612
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"116⤵PID:2440
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"117⤵PID:7992
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"117⤵PID:7624
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"116⤵PID:1036
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"117⤵PID:7964
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"118⤵PID:1144
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"118⤵PID:6600
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"117⤵PID:644
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"118⤵PID:7464
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"119⤵PID:5860
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"119⤵PID:1672
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"118⤵PID:3224
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"119⤵PID:1124
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"120⤵PID:6528
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"119⤵PID:5044
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"120⤵PID:3192
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"121⤵PID:6452
-
-
-
C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"C:\Users\Admin\AppData\Local\Temp\RebelCracked.exe"120⤵PID:6344
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"121⤵PID:7268
-
C:\Users\Admin\AppData\Local\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\RuntimeBroker.exe"122⤵PID:7200
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-