Analysis
-
max time kernel
25s -
max time network
168s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
08-10-2024 17:49
Static task
static1
Behavioral task
behavioral1
Sample
cheat(crack).zip
Resource
win10-20240611-en
Behavioral task
behavioral2
Sample
cheat(crack).zip
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
cheat(crack)/Cheat(crack).exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
cheat(crack)/Cheat(crack).exe
Resource
win11-20241007-en
General
-
Target
cheat(crack)/Cheat(crack).exe
-
Size
19.1MB
-
MD5
f9da6a2308ad8b33759396eba9d71a55
-
SHA1
d2897b32f46c232f14958a2458331274360f297d
-
SHA256
25f7453e76cd457a4646bbba21a1c2dedb0e0cd8f90e7d249e93dfd6c2b77de3
-
SHA512
c04e5804fdaf7642cade1c8d943260e2315f358cfb749dca9311798bc43d3b393b8012e3f33fea9d33745ef53c212a0592102e1b3b9d979610f3a940eb1b0bd2
-
SSDEEP
393216:CDTF+si4rs4FMRk/aD+CeXhX7NqtSmqu/2o4Pe5MCEJXZrHyxMz6:YT7zhMRk/NhhsFqu/d4PJBXmMz6
Malware Config
Extracted
njrat
im523
HacKed
inn-communications.gl.at.ply.gg:59113
8f5d693a6c9562fb214f7b3d3aabc00c
-
reg_key
8f5d693a6c9562fb214f7b3d3aabc00c
-
splitter
|'|'|
Signatures
-
Deletes Windows Defender Definitions 2 TTPs 1 IoCs
Uses mpcmdrun utility to delete all AV definitions.
pid Process 1480 MpCmdRun.exe -
pid Process 4900 powershell.exe 4964 powershell.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 3064 netsh.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8f5d693a6c9562fb214f7b3d3aabc00c.exe Microsoft OneDriveFile Co-Authoring Executable Security.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8f5d693a6c9562fb214f7b3d3aabc00c.exe Microsoft OneDriveFile Co-Authoring Executable Security.exe -
Executes dropped EXE 64 IoCs
pid Process 4348 1.exe 3988 44.exe 2972 3.exe 3608 44.exe 4696 1.exe 2280 1.exe 2236 1.exe 2704 1.exe 4148 1.exe 1716 1.exe 852 1.exe 1496 1.exe 1440 1.exe 4444 Microsoft OneDriveFile Co-Authoring Executable Security.exe 3940 1.exe 60 1.exe 2744 1.exe 3000 1.exe 4376 1.exe 3076 1.exe 1692 1.exe 3788 1.exe 808 1.exe 3628 1.exe 504 1.exe 2284 1.exe 1252 1.exe 3056 1.exe 4928 1.exe 5024 1.exe 4924 1.exe 2388 1.exe 2828 1.exe 4704 1.exe 424 1.exe 3144 1.exe 4780 1.exe 2472 1.exe 4004 1.exe 5132 1.exe 5180 1.exe 5228 1.exe 5280 1.exe 5328 1.exe 5376 1.exe 5424 1.exe 5472 1.exe 5520 1.exe 5572 1.exe 5620 1.exe 5668 1.exe 5716 1.exe 5764 1.exe 5812 1.exe 5864 1.exe 5912 1.exe 5960 1.exe 6008 1.exe 6056 1.exe 6108 1.exe 1976 1.exe 5188 1.exe 5236 1.exe 5732 1.exe -
Loads dropped DLL 17 IoCs
pid Process 3608 44.exe 3608 44.exe 3608 44.exe 3608 44.exe 3608 44.exe 3608 44.exe 3608 44.exe 3608 44.exe 3608 44.exe 3608 44.exe 3608 44.exe 3608 44.exe 3608 44.exe 3608 44.exe 3608 44.exe 3608 44.exe 3608 44.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000\Software\Microsoft\Windows\CurrentVersion\Run\8f5d693a6c9562fb214f7b3d3aabc00c = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft OneDriveFile Co-Authoring Executable Security.exe\" .." Microsoft OneDriveFile Co-Authoring Executable Security.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\8f5d693a6c9562fb214f7b3d3aabc00c = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft OneDriveFile Co-Authoring Executable Security.exe\" .." Microsoft OneDriveFile Co-Authoring Executable Security.exe -
Drops autorun.inf file 1 TTPs 5 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created D:\autorun.inf Microsoft OneDriveFile Co-Authoring Executable Security.exe File created F:\autorun.inf Microsoft OneDriveFile Co-Authoring Executable Security.exe File opened for modification F:\autorun.inf Microsoft OneDriveFile Co-Authoring Executable Security.exe File created C:\autorun.inf Microsoft OneDriveFile Co-Authoring Executable Security.exe File opened for modification C:\autorun.inf Microsoft OneDriveFile Co-Authoring Executable Security.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 3504 tasklist.exe -
resource yara_rule behavioral3/memory/3608-51-0x00007FFC2A130000-0x00007FFC2A722000-memory.dmp upx behavioral3/files/0x000700000001ac76-54.dat upx behavioral3/memory/3608-78-0x00007FFC2EAA0000-0x00007FFC2EAAF000-memory.dmp upx behavioral3/files/0x000700000001ac7d-77.dat upx behavioral3/files/0x000700000001ac7c-76.dat upx behavioral3/files/0x000700000001ac7b-75.dat upx behavioral3/files/0x000700000001ac7a-74.dat upx behavioral3/files/0x000700000001ac79-73.dat upx behavioral3/files/0x000700000001ac78-72.dat upx behavioral3/files/0x000700000001ac77-71.dat upx behavioral3/files/0x000700000001ac75-70.dat upx behavioral3/files/0x000700000001ac89-69.dat upx behavioral3/files/0x000700000001ac88-68.dat upx behavioral3/files/0x000700000001ac87-67.dat upx behavioral3/files/0x000700000001ac83-64.dat upx behavioral3/files/0x000700000001ac81-63.dat upx behavioral3/files/0x000700000001ac82-61.dat upx behavioral3/memory/3608-60-0x00007FFC2DB20000-0x00007FFC2DB44000-memory.dmp upx behavioral3/files/0x000700000001ac84-45.dat upx behavioral3/memory/3608-90-0x00007FFC2B500000-0x00007FFC2B52D000-memory.dmp upx behavioral3/memory/3608-95-0x00007FFC2DAE0000-0x00007FFC2DAF9000-memory.dmp upx behavioral3/memory/3608-97-0x00007FFC29D10000-0x00007FFC29D33000-memory.dmp upx behavioral3/memory/3608-99-0x00007FFC29B90000-0x00007FFC29D0E000-memory.dmp upx behavioral3/memory/3608-109-0x00007FFC28B60000-0x00007FFC28C2D000-memory.dmp upx behavioral3/memory/3608-113-0x00007FFC2DB20000-0x00007FFC2DB44000-memory.dmp upx behavioral3/memory/3608-112-0x00007FFC28C30000-0x00007FFC28C63000-memory.dmp upx behavioral3/memory/3608-110-0x00007FFC1AF60000-0x00007FFC1B489000-memory.dmp upx behavioral3/memory/3608-108-0x00007FFC2A130000-0x00007FFC2A722000-memory.dmp upx behavioral3/memory/3608-103-0x00007FFC2DFD0000-0x00007FFC2DFDD000-memory.dmp upx behavioral3/memory/3608-102-0x00007FFC2A110000-0x00007FFC2A129000-memory.dmp upx behavioral3/memory/3608-117-0x00007FFC2B400000-0x00007FFC2B40D000-memory.dmp upx behavioral3/memory/3608-116-0x00007FFC29B70000-0x00007FFC29B84000-memory.dmp upx behavioral3/memory/3608-122-0x00007FFC28440000-0x00007FFC2855C000-memory.dmp upx behavioral3/memory/3608-155-0x00007FFC2B400000-0x00007FFC2B40D000-memory.dmp upx behavioral3/memory/3608-167-0x00007FFC28B60000-0x00007FFC28C2D000-memory.dmp upx behavioral3/memory/3608-166-0x00007FFC2DFD0000-0x00007FFC2DFDD000-memory.dmp upx behavioral3/memory/3608-165-0x00007FFC2A110000-0x00007FFC2A129000-memory.dmp upx behavioral3/memory/3608-164-0x00007FFC29B90000-0x00007FFC29D0E000-memory.dmp upx behavioral3/memory/3608-153-0x00007FFC1AF60000-0x00007FFC1B489000-memory.dmp upx behavioral3/memory/3608-163-0x00007FFC29D10000-0x00007FFC29D33000-memory.dmp upx behavioral3/memory/3608-162-0x00007FFC2DAE0000-0x00007FFC2DAF9000-memory.dmp upx behavioral3/memory/3608-161-0x00007FFC2B500000-0x00007FFC2B52D000-memory.dmp upx behavioral3/memory/3608-160-0x00007FFC2EAA0000-0x00007FFC2EAAF000-memory.dmp upx behavioral3/memory/3608-159-0x00007FFC2DB20000-0x00007FFC2DB44000-memory.dmp upx behavioral3/memory/3608-158-0x00007FFC28C30000-0x00007FFC28C63000-memory.dmp upx behavioral3/memory/3608-157-0x00007FFC28440000-0x00007FFC2855C000-memory.dmp upx behavioral3/memory/3608-154-0x00007FFC29B70000-0x00007FFC29B84000-memory.dmp upx behavioral3/memory/3608-142-0x00007FFC2A130000-0x00007FFC2A722000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Microsoft OneDriveFile Co-Authoring Executable Security.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Kills process with taskkill 1 IoCs
pid Process 5052 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4964 powershell.exe 4964 powershell.exe 4900 powershell.exe 4900 powershell.exe 4964 powershell.exe 4900 powershell.exe 4964 powershell.exe 4900 powershell.exe 4444 Microsoft OneDriveFile Co-Authoring Executable Security.exe 4444 Microsoft OneDriveFile Co-Authoring Executable Security.exe 4444 Microsoft OneDriveFile Co-Authoring Executable Security.exe 4444 Microsoft OneDriveFile Co-Authoring Executable Security.exe 4444 Microsoft OneDriveFile Co-Authoring Executable Security.exe 4444 Microsoft OneDriveFile Co-Authoring Executable Security.exe 4444 Microsoft OneDriveFile Co-Authoring Executable Security.exe 4444 Microsoft OneDriveFile Co-Authoring Executable Security.exe 4444 Microsoft OneDriveFile Co-Authoring Executable Security.exe 4444 Microsoft OneDriveFile Co-Authoring Executable Security.exe 4444 Microsoft OneDriveFile Co-Authoring Executable Security.exe 4444 Microsoft OneDriveFile Co-Authoring Executable Security.exe 4444 Microsoft OneDriveFile Co-Authoring Executable Security.exe 4444 Microsoft OneDriveFile Co-Authoring Executable Security.exe 4444 Microsoft OneDriveFile Co-Authoring Executable Security.exe 4444 Microsoft OneDriveFile Co-Authoring Executable Security.exe 4444 Microsoft OneDriveFile Co-Authoring Executable Security.exe 4444 Microsoft OneDriveFile Co-Authoring Executable Security.exe 4444 Microsoft OneDriveFile Co-Authoring Executable Security.exe 4444 Microsoft OneDriveFile Co-Authoring Executable Security.exe 4444 Microsoft OneDriveFile Co-Authoring Executable Security.exe 4444 Microsoft OneDriveFile Co-Authoring Executable Security.exe 4444 Microsoft OneDriveFile Co-Authoring Executable Security.exe 4444 Microsoft OneDriveFile Co-Authoring Executable Security.exe 4444 Microsoft OneDriveFile Co-Authoring Executable Security.exe 4444 Microsoft OneDriveFile Co-Authoring Executable Security.exe 4444 Microsoft OneDriveFile Co-Authoring Executable Security.exe 4444 Microsoft OneDriveFile Co-Authoring Executable Security.exe 4444 Microsoft OneDriveFile Co-Authoring Executable Security.exe 4444 Microsoft OneDriveFile Co-Authoring Executable Security.exe 4444 Microsoft OneDriveFile Co-Authoring Executable Security.exe 4444 Microsoft OneDriveFile Co-Authoring Executable Security.exe 4444 Microsoft OneDriveFile Co-Authoring Executable Security.exe 4444 Microsoft OneDriveFile Co-Authoring Executable Security.exe 4444 Microsoft OneDriveFile Co-Authoring Executable Security.exe 4444 Microsoft OneDriveFile Co-Authoring Executable Security.exe 4444 Microsoft OneDriveFile Co-Authoring Executable Security.exe 4444 Microsoft OneDriveFile Co-Authoring Executable Security.exe 4444 Microsoft OneDriveFile Co-Authoring Executable Security.exe 4444 Microsoft OneDriveFile Co-Authoring Executable Security.exe 4444 Microsoft OneDriveFile Co-Authoring Executable Security.exe 4444 Microsoft OneDriveFile Co-Authoring Executable Security.exe 4444 Microsoft OneDriveFile Co-Authoring Executable Security.exe 4444 Microsoft OneDriveFile Co-Authoring Executable Security.exe 4444 Microsoft OneDriveFile Co-Authoring Executable Security.exe 4444 Microsoft OneDriveFile Co-Authoring Executable Security.exe 4444 Microsoft OneDriveFile Co-Authoring Executable Security.exe 4444 Microsoft OneDriveFile Co-Authoring Executable Security.exe 4444 Microsoft OneDriveFile Co-Authoring Executable Security.exe 4444 Microsoft OneDriveFile Co-Authoring Executable Security.exe 4444 Microsoft OneDriveFile Co-Authoring Executable Security.exe 4444 Microsoft OneDriveFile Co-Authoring Executable Security.exe 4444 Microsoft OneDriveFile Co-Authoring Executable Security.exe 4444 Microsoft OneDriveFile Co-Authoring Executable Security.exe 4444 Microsoft OneDriveFile Co-Authoring Executable Security.exe 4444 Microsoft OneDriveFile Co-Authoring Executable Security.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3504 tasklist.exe Token: SeIncreaseQuotaPrivilege 4908 WMIC.exe Token: SeSecurityPrivilege 4908 WMIC.exe Token: SeTakeOwnershipPrivilege 4908 WMIC.exe Token: SeLoadDriverPrivilege 4908 WMIC.exe Token: SeSystemProfilePrivilege 4908 WMIC.exe Token: SeSystemtimePrivilege 4908 WMIC.exe Token: SeProfSingleProcessPrivilege 4908 WMIC.exe Token: SeIncBasePriorityPrivilege 4908 WMIC.exe Token: SeCreatePagefilePrivilege 4908 WMIC.exe Token: SeBackupPrivilege 4908 WMIC.exe Token: SeRestorePrivilege 4908 WMIC.exe Token: SeShutdownPrivilege 4908 WMIC.exe Token: SeDebugPrivilege 4908 WMIC.exe Token: SeSystemEnvironmentPrivilege 4908 WMIC.exe Token: SeRemoteShutdownPrivilege 4908 WMIC.exe Token: SeUndockPrivilege 4908 WMIC.exe Token: SeManageVolumePrivilege 4908 WMIC.exe Token: 33 4908 WMIC.exe Token: 34 4908 WMIC.exe Token: 35 4908 WMIC.exe Token: 36 4908 WMIC.exe Token: SeIncreaseQuotaPrivilege 4908 WMIC.exe Token: SeSecurityPrivilege 4908 WMIC.exe Token: SeTakeOwnershipPrivilege 4908 WMIC.exe Token: SeLoadDriverPrivilege 4908 WMIC.exe Token: SeSystemProfilePrivilege 4908 WMIC.exe Token: SeSystemtimePrivilege 4908 WMIC.exe Token: SeProfSingleProcessPrivilege 4908 WMIC.exe Token: SeIncBasePriorityPrivilege 4908 WMIC.exe Token: SeCreatePagefilePrivilege 4908 WMIC.exe Token: SeBackupPrivilege 4908 WMIC.exe Token: SeRestorePrivilege 4908 WMIC.exe Token: SeShutdownPrivilege 4908 WMIC.exe Token: SeDebugPrivilege 4908 WMIC.exe Token: SeSystemEnvironmentPrivilege 4908 WMIC.exe Token: SeRemoteShutdownPrivilege 4908 WMIC.exe Token: SeUndockPrivilege 4908 WMIC.exe Token: SeManageVolumePrivilege 4908 WMIC.exe Token: 33 4908 WMIC.exe Token: 34 4908 WMIC.exe Token: 35 4908 WMIC.exe Token: 36 4908 WMIC.exe Token: SeDebugPrivilege 4964 powershell.exe Token: SeDebugPrivilege 4900 powershell.exe Token: SeIncreaseQuotaPrivilege 4964 powershell.exe Token: SeSecurityPrivilege 4964 powershell.exe Token: SeTakeOwnershipPrivilege 4964 powershell.exe Token: SeLoadDriverPrivilege 4964 powershell.exe Token: SeSystemProfilePrivilege 4964 powershell.exe Token: SeSystemtimePrivilege 4964 powershell.exe Token: SeProfSingleProcessPrivilege 4964 powershell.exe Token: SeIncBasePriorityPrivilege 4964 powershell.exe Token: SeCreatePagefilePrivilege 4964 powershell.exe Token: SeBackupPrivilege 4964 powershell.exe Token: SeRestorePrivilege 4964 powershell.exe Token: SeShutdownPrivilege 4964 powershell.exe Token: SeDebugPrivilege 4964 powershell.exe Token: SeSystemEnvironmentPrivilege 4964 powershell.exe Token: SeRemoteShutdownPrivilege 4964 powershell.exe Token: SeUndockPrivilege 4964 powershell.exe Token: SeManageVolumePrivilege 4964 powershell.exe Token: 33 4964 powershell.exe Token: 34 4964 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2536 wrote to memory of 4348 2536 Cheat(crack).exe 72 PID 2536 wrote to memory of 4348 2536 Cheat(crack).exe 72 PID 2536 wrote to memory of 3988 2536 Cheat(crack).exe 74 PID 2536 wrote to memory of 3988 2536 Cheat(crack).exe 74 PID 2536 wrote to memory of 2972 2536 Cheat(crack).exe 75 PID 2536 wrote to memory of 2972 2536 Cheat(crack).exe 75 PID 2536 wrote to memory of 2972 2536 Cheat(crack).exe 75 PID 3988 wrote to memory of 3608 3988 44.exe 76 PID 3988 wrote to memory of 3608 3988 44.exe 76 PID 4348 wrote to memory of 4696 4348 1.exe 77 PID 4348 wrote to memory of 4696 4348 1.exe 77 PID 4696 wrote to memory of 2280 4696 1.exe 78 PID 4696 wrote to memory of 2280 4696 1.exe 78 PID 2280 wrote to memory of 2236 2280 1.exe 79 PID 2280 wrote to memory of 2236 2280 1.exe 79 PID 2236 wrote to memory of 2704 2236 1.exe 80 PID 2236 wrote to memory of 2704 2236 1.exe 80 PID 3608 wrote to memory of 3064 3608 44.exe 81 PID 3608 wrote to memory of 3064 3608 44.exe 81 PID 3608 wrote to memory of 4636 3608 44.exe 82 PID 3608 wrote to memory of 4636 3608 44.exe 82 PID 2704 wrote to memory of 4148 2704 1.exe 85 PID 2704 wrote to memory of 4148 2704 1.exe 85 PID 3608 wrote to memory of 1780 3608 44.exe 86 PID 3608 wrote to memory of 1780 3608 44.exe 86 PID 3608 wrote to memory of 5008 3608 44.exe 88 PID 3608 wrote to memory of 5008 3608 44.exe 88 PID 1780 wrote to memory of 3504 1780 cmd.exe 90 PID 1780 wrote to memory of 3504 1780 cmd.exe 90 PID 5008 wrote to memory of 4908 5008 cmd.exe 91 PID 5008 wrote to memory of 4908 5008 cmd.exe 91 PID 4148 wrote to memory of 1716 4148 1.exe 93 PID 4148 wrote to memory of 1716 4148 1.exe 93 PID 4636 wrote to memory of 4900 4636 cmd.exe 94 PID 4636 wrote to memory of 4900 4636 cmd.exe 94 PID 3064 wrote to memory of 4964 3064 cmd.exe 95 PID 3064 wrote to memory of 4964 3064 cmd.exe 95 PID 1716 wrote to memory of 852 1716 1.exe 96 PID 1716 wrote to memory of 852 1716 1.exe 96 PID 852 wrote to memory of 1496 852 1.exe 97 PID 852 wrote to memory of 1496 852 1.exe 97 PID 1496 wrote to memory of 1440 1496 1.exe 99 PID 1496 wrote to memory of 1440 1496 1.exe 99 PID 2972 wrote to memory of 4444 2972 3.exe 98 PID 2972 wrote to memory of 4444 2972 3.exe 98 PID 2972 wrote to memory of 4444 2972 3.exe 98 PID 1440 wrote to memory of 3940 1440 1.exe 101 PID 1440 wrote to memory of 3940 1440 1.exe 101 PID 4636 wrote to memory of 1480 4636 cmd.exe 102 PID 4636 wrote to memory of 1480 4636 cmd.exe 102 PID 3940 wrote to memory of 60 3940 1.exe 103 PID 3940 wrote to memory of 60 3940 1.exe 103 PID 60 wrote to memory of 2744 60 1.exe 104 PID 60 wrote to memory of 2744 60 1.exe 104 PID 2744 wrote to memory of 3000 2744 1.exe 105 PID 2744 wrote to memory of 3000 2744 1.exe 105 PID 3000 wrote to memory of 4376 3000 1.exe 106 PID 3000 wrote to memory of 4376 3000 1.exe 106 PID 4376 wrote to memory of 3076 4376 1.exe 107 PID 4376 wrote to memory of 3076 4376 1.exe 107 PID 3076 wrote to memory of 1692 3076 1.exe 108 PID 3076 wrote to memory of 1692 3076 1.exe 108 PID 1692 wrote to memory of 3788 1692 1.exe 109 PID 1692 wrote to memory of 3788 1692 1.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\cheat(crack)\Cheat(crack).exe"C:\Users\Admin\AppData\Local\Temp\cheat(crack)\Cheat(crack).exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"19⤵
- Executes dropped EXE
PID:3788 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"20⤵
- Executes dropped EXE
PID:808 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"21⤵
- Executes dropped EXE
PID:3628 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"22⤵
- Executes dropped EXE
PID:504 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"23⤵
- Executes dropped EXE
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"24⤵
- Executes dropped EXE
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"25⤵
- Executes dropped EXE
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"26⤵
- Executes dropped EXE
PID:4928 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"27⤵
- Executes dropped EXE
PID:5024 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"28⤵
- Executes dropped EXE
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"29⤵
- Executes dropped EXE
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"30⤵
- Executes dropped EXE
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"31⤵
- Executes dropped EXE
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"32⤵
- Executes dropped EXE
PID:424 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"33⤵
- Executes dropped EXE
PID:3144 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"34⤵
- Executes dropped EXE
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"35⤵
- Executes dropped EXE
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"36⤵
- Executes dropped EXE
PID:4004 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"37⤵
- Executes dropped EXE
PID:5132 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"38⤵
- Executes dropped EXE
PID:5180 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"39⤵
- Executes dropped EXE
PID:5228 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"40⤵
- Executes dropped EXE
PID:5280 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"41⤵
- Executes dropped EXE
PID:5328 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"42⤵
- Executes dropped EXE
PID:5376 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"43⤵
- Executes dropped EXE
PID:5424 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"44⤵
- Executes dropped EXE
PID:5472 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"45⤵
- Executes dropped EXE
PID:5520 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"46⤵
- Executes dropped EXE
PID:5572 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"47⤵
- Executes dropped EXE
PID:5620 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"48⤵
- Executes dropped EXE
PID:5668 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"49⤵
- Executes dropped EXE
PID:5716 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"50⤵
- Executes dropped EXE
PID:5764 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"51⤵
- Executes dropped EXE
PID:5812 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"52⤵
- Executes dropped EXE
PID:5864 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"53⤵
- Executes dropped EXE
PID:5912 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"54⤵
- Executes dropped EXE
PID:5960 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"55⤵
- Executes dropped EXE
PID:6008 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"56⤵
- Executes dropped EXE
PID:6056 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"57⤵
- Executes dropped EXE
PID:6108 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"58⤵
- Executes dropped EXE
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"59⤵
- Executes dropped EXE
PID:5188 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"60⤵
- Executes dropped EXE
PID:5236 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"61⤵
- Executes dropped EXE
PID:5732 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"62⤵PID:5972
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"63⤵PID:5240
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"64⤵PID:6152
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"65⤵PID:6204
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"66⤵PID:6252
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"67⤵PID:6300
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"68⤵PID:6348
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"69⤵PID:6396
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"70⤵PID:6444
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"71⤵PID:6492
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"72⤵PID:6544
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"73⤵PID:6592
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"74⤵PID:6640
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"75⤵PID:6688
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"76⤵PID:6736
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"77⤵PID:6784
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"78⤵PID:6836
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"79⤵PID:6884
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"80⤵PID:6932
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"81⤵PID:6980
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"82⤵PID:7028
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"83⤵PID:7076
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"84⤵PID:7124
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"85⤵PID:6216
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"86⤵PID:6184
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"87⤵PID:6748
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"88⤵PID:7036
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"89⤵PID:6796
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"90⤵PID:7208
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"91⤵PID:7260
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"92⤵PID:7308
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"93⤵PID:7356
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"94⤵PID:7404
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"95⤵PID:7452
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"96⤵PID:7500
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"97⤵PID:7552
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"98⤵PID:7600
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"99⤵PID:7648
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"100⤵PID:7696
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"101⤵PID:7744
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"102⤵PID:7792
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"103⤵PID:7840
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"104⤵PID:7892
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"105⤵PID:7940
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"106⤵PID:7988
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"107⤵PID:8036
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"108⤵PID:8084
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"109⤵PID:8132
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"110⤵PID:8184
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"111⤵PID:7368
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"112⤵PID:7608
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"113⤵PID:7848
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"114⤵PID:8140
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"115⤵PID:2544
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"116⤵PID:8244
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"117⤵PID:8292
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"118⤵PID:8340
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"119⤵PID:8392
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"120⤵PID:8448
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"121⤵PID:8496
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"122⤵PID:8548
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-