Resubmissions
19-10-2024 11:46
241019-nxh3lawepj 1019-10-2024 11:42
241019-nvc4kathmg 719-10-2024 11:38
241019-nrspvawcnp 1019-10-2024 11:33
241019-nnzc8atfla 1019-10-2024 11:27
241019-nkpplswakl 1019-10-2024 11:23
241019-nhfnxsvhmk 1019-10-2024 11:11
241019-najevashqf 1019-10-2024 11:07
241019-m762qssgph 3Analysis
-
max time kernel
164s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-10-2024 11:23
Static task
static1
General
-
Target
6812964531.exe
-
Size
67KB
-
MD5
7de65122a13ab9d81368ee3dff3cc80a
-
SHA1
ecbb4db641431d4d672e4b88e8d309419fd32f04
-
SHA256
a73a05a4b6ec6ae1c1ba6d3d12b68cc52b899e2a6dbbaaa1f48f2c260a733123
-
SHA512
b156d77a665c3256ddfd016e46105b6e87db6a4c1ca77e9bb25b221c368f3cc53dddc7159602cfb926ef0cc9bacac57b6bd41e7e28998883c996727d58d29401
-
SSDEEP
1536:pr3rob4nqB6veqHnq+Pgm5NN9vbDTc+1vIQ/EXyBej:h7PEg3qcv5PvB/EVj
Malware Config
Signatures
-
Detect Neshta payload 10 IoCs
resource yara_rule behavioral1/files/0x000400000001e518-361.dat family_neshta behavioral1/files/0x000200000001e51a-375.dat family_neshta behavioral1/files/0x000200000001e51c-380.dat family_neshta behavioral1/files/0x000600000002022f-482.dat family_neshta behavioral1/files/0x000100000002023e-498.dat family_neshta behavioral1/files/0x00010000000202c0-504.dat family_neshta behavioral1/files/0x0006000000020246-512.dat family_neshta behavioral1/files/0x0004000000020322-510.dat family_neshta behavioral1/files/0x00010000000202a8-509.dat family_neshta behavioral1/files/0x0002000000020326-553.dat family_neshta -
Detect Umbral payload 1 IoCs
resource yara_rule behavioral1/files/0x000200000001e51b-440.dat family_umbral -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Checks computer location settings 2 TTPs 17 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation cheats.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation cheats.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation cheats.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation cheats.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation cheats.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation cheats.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation cheats.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation cheats.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation cheats.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation cheats.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation cheats.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation cheats.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation cheats.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation cheats.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation cheats.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation cheats.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation cheats.exe -
Executes dropped EXE 36 IoCs
pid Process 1756 cheats.exe 3152 cheats.exe 4620 svchost.com 2840 cheats.exe 4044 svchost.com 1808 cheats.exe 2828 svchost.com 1364 cheats.exe 1980 svchost.com 3444 cheats.exe 556 svchost.com 2608 cheats.exe 1112 svchost.com 4100 cheat.exe 3904 svchost.com 3476 cheats.exe 4644 svchost.com 4852 cheats.exe 1748 svchost.com 4564 cheats.exe 1572 svchost.com 2188 cheats.exe 4116 svchost.com 4848 cheats.exe 3860 svchost.com 4648 cheats.exe 4196 svchost.com 4924 cheats.exe 3760 svchost.com 2508 cheats.exe 3512 svchost.com 1852 cheats.exe 4584 svchost.com 4560 cheats.exe 4564 svchost.com 4860 cheats.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" cheats.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 93 ip-api.com -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE cheats.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE cheats.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE cheats.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE cheats.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe cheats.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe cheats.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE cheats.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE cheats.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe cheats.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe cheats.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE cheats.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe cheats.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE cheats.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe cheats.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe cheats.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe cheats.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE cheats.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE cheats.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~2.EXE cheats.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe cheats.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE cheats.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE cheats.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe cheats.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe cheats.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GO664E~1.EXE cheats.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe cheats.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe cheats.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe cheats.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe cheats.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe cheats.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE cheats.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~4.EXE cheats.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE cheats.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE cheats.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE cheats.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE cheats.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE cheats.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE cheats.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE cheats.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe cheats.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe cheats.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe cheats.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE cheats.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe cheats.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~4.EXE cheats.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE cheats.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE cheats.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE cheats.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe cheats.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE cheats.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe cheats.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe cheats.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE cheats.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE cheats.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE cheats.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE cheats.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe cheats.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE cheats.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe cheats.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE cheats.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe cheats.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE cheats.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe cheats.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE cheats.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\directx.sys cheats.exe File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys cheats.exe File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com cheats.exe File opened for modification C:\Windows\directx.sys cheats.exe File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com cheats.exe File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com cheats.exe File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys cheats.exe File opened for modification C:\Windows\directx.sys cheats.exe File opened for modification C:\Windows\svchost.com cheats.exe File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys cheats.exe File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys cheats.exe File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com cheats.exe File opened for modification C:\Windows\svchost.com cheats.exe File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com cheats.exe File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com cheats.exe File opened for modification C:\Windows\svchost.com cheats.exe File opened for modification C:\Windows\directx.sys cheats.exe File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com cheats.exe File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys cheats.exe File opened for modification C:\Windows\svchost.com cheats.exe File opened for modification C:\Windows\svchost.com cheats.exe File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys cheats.exe File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys cheats.exe File opened for modification C:\Windows\svchost.com cheats.exe File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com cheats.exe File opened for modification C:\Windows\svchost.com cheats.exe File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys cheats.exe File opened for modification C:\Windows\svchost.com cheats.exe File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com cheats.exe File opened for modification C:\Windows\directx.sys cheats.exe File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys cheats.exe File opened for modification C:\Windows\directx.sys cheats.exe File opened for modification C:\Windows\svchost.com svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 36 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cheats.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cheats.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cheats.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cheats.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6812964531.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cheats.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cheats.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cheats.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cheats.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cheats.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cheats.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cheats.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cheats.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cheats.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cheats.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cheats.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cheats.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cheats.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cheats.exe -
Modifies registry class 19 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings cheats.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings cheats.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings cheats.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings cheats.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings cheats.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings cheats.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings cheats.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings cheats.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings java.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings cheats.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings cheats.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings cheats.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" cheats.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings cheats.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings cheats.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings cheats.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings cheats.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings javaw.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings cheats.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1436 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2280 WMIC.exe Token: SeSecurityPrivilege 2280 WMIC.exe Token: SeTakeOwnershipPrivilege 2280 WMIC.exe Token: SeLoadDriverPrivilege 2280 WMIC.exe Token: SeSystemProfilePrivilege 2280 WMIC.exe Token: SeSystemtimePrivilege 2280 WMIC.exe Token: SeProfSingleProcessPrivilege 2280 WMIC.exe Token: SeIncBasePriorityPrivilege 2280 WMIC.exe Token: SeCreatePagefilePrivilege 2280 WMIC.exe Token: SeBackupPrivilege 2280 WMIC.exe Token: SeRestorePrivilege 2280 WMIC.exe Token: SeShutdownPrivilege 2280 WMIC.exe Token: SeDebugPrivilege 2280 WMIC.exe Token: SeSystemEnvironmentPrivilege 2280 WMIC.exe Token: SeRemoteShutdownPrivilege 2280 WMIC.exe Token: SeUndockPrivilege 2280 WMIC.exe Token: SeManageVolumePrivilege 2280 WMIC.exe Token: 33 2280 WMIC.exe Token: 34 2280 WMIC.exe Token: 35 2280 WMIC.exe Token: 36 2280 WMIC.exe Token: SeIncreaseQuotaPrivilege 2280 WMIC.exe Token: SeSecurityPrivilege 2280 WMIC.exe Token: SeTakeOwnershipPrivilege 2280 WMIC.exe Token: SeLoadDriverPrivilege 2280 WMIC.exe Token: SeSystemProfilePrivilege 2280 WMIC.exe Token: SeSystemtimePrivilege 2280 WMIC.exe Token: SeProfSingleProcessPrivilege 2280 WMIC.exe Token: SeIncBasePriorityPrivilege 2280 WMIC.exe Token: SeCreatePagefilePrivilege 2280 WMIC.exe Token: SeBackupPrivilege 2280 WMIC.exe Token: SeRestorePrivilege 2280 WMIC.exe Token: SeShutdownPrivilege 2280 WMIC.exe Token: SeDebugPrivilege 2280 WMIC.exe Token: SeSystemEnvironmentPrivilege 2280 WMIC.exe Token: SeRemoteShutdownPrivilege 2280 WMIC.exe Token: SeUndockPrivilege 2280 WMIC.exe Token: SeManageVolumePrivilege 2280 WMIC.exe Token: 33 2280 WMIC.exe Token: 34 2280 WMIC.exe Token: 35 2280 WMIC.exe Token: 36 2280 WMIC.exe Token: SeIncreaseQuotaPrivilege 1852 WMIC.exe Token: SeSecurityPrivilege 1852 WMIC.exe Token: SeTakeOwnershipPrivilege 1852 WMIC.exe Token: SeLoadDriverPrivilege 1852 WMIC.exe Token: SeSystemProfilePrivilege 1852 WMIC.exe Token: SeSystemtimePrivilege 1852 WMIC.exe Token: SeProfSingleProcessPrivilege 1852 WMIC.exe Token: SeIncBasePriorityPrivilege 1852 WMIC.exe Token: SeCreatePagefilePrivilege 1852 WMIC.exe Token: SeBackupPrivilege 1852 WMIC.exe Token: SeRestorePrivilege 1852 WMIC.exe Token: SeShutdownPrivilege 1852 WMIC.exe Token: SeDebugPrivilege 1852 WMIC.exe Token: SeSystemEnvironmentPrivilege 1852 WMIC.exe Token: SeRemoteShutdownPrivilege 1852 WMIC.exe Token: SeUndockPrivilege 1852 WMIC.exe Token: SeManageVolumePrivilege 1852 WMIC.exe Token: 33 1852 WMIC.exe Token: 34 1852 WMIC.exe Token: 35 1852 WMIC.exe Token: 36 1852 WMIC.exe Token: SeIncreaseQuotaPrivilege 1852 WMIC.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4560 java.exe 1836 javaw.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2296 wrote to memory of 3020 2296 6812964531.exe 86 PID 2296 wrote to memory of 3020 2296 6812964531.exe 86 PID 3020 wrote to memory of 4560 3020 javaw.exe 114 PID 3020 wrote to memory of 4560 3020 javaw.exe 114 PID 4560 wrote to memory of 4808 4560 java.exe 116 PID 4560 wrote to memory of 4808 4560 java.exe 116 PID 4808 wrote to memory of 2292 4808 cmd.exe 118 PID 4808 wrote to memory of 2292 4808 cmd.exe 118 PID 4560 wrote to memory of 2176 4560 java.exe 119 PID 4560 wrote to memory of 2176 4560 java.exe 119 PID 2176 wrote to memory of 1436 2176 cmd.exe 121 PID 2176 wrote to memory of 1436 2176 cmd.exe 121 PID 4560 wrote to memory of 1836 4560 java.exe 122 PID 4560 wrote to memory of 1836 4560 java.exe 122 PID 1836 wrote to memory of 3124 1836 javaw.exe 129 PID 1836 wrote to memory of 3124 1836 javaw.exe 129 PID 3124 wrote to memory of 2280 3124 cmd.exe 131 PID 3124 wrote to memory of 2280 3124 cmd.exe 131 PID 1836 wrote to memory of 4804 1836 javaw.exe 132 PID 1836 wrote to memory of 4804 1836 javaw.exe 132 PID 4804 wrote to memory of 1852 4804 cmd.exe 134 PID 4804 wrote to memory of 1852 4804 cmd.exe 134 PID 1836 wrote to memory of 1756 1836 javaw.exe 137 PID 1836 wrote to memory of 1756 1836 javaw.exe 137 PID 1836 wrote to memory of 1756 1836 javaw.exe 137 PID 1756 wrote to memory of 3152 1756 cheats.exe 138 PID 1756 wrote to memory of 3152 1756 cheats.exe 138 PID 1756 wrote to memory of 3152 1756 cheats.exe 138 PID 3152 wrote to memory of 4620 3152 cheats.exe 139 PID 3152 wrote to memory of 4620 3152 cheats.exe 139 PID 3152 wrote to memory of 4620 3152 cheats.exe 139 PID 4620 wrote to memory of 2840 4620 svchost.com 140 PID 4620 wrote to memory of 2840 4620 svchost.com 140 PID 4620 wrote to memory of 2840 4620 svchost.com 140 PID 2840 wrote to memory of 4044 2840 cheats.exe 141 PID 2840 wrote to memory of 4044 2840 cheats.exe 141 PID 2840 wrote to memory of 4044 2840 cheats.exe 141 PID 4044 wrote to memory of 1808 4044 svchost.com 142 PID 4044 wrote to memory of 1808 4044 svchost.com 142 PID 4044 wrote to memory of 1808 4044 svchost.com 142 PID 1808 wrote to memory of 2828 1808 cheats.exe 143 PID 1808 wrote to memory of 2828 1808 cheats.exe 143 PID 1808 wrote to memory of 2828 1808 cheats.exe 143 PID 2828 wrote to memory of 1364 2828 svchost.com 144 PID 2828 wrote to memory of 1364 2828 svchost.com 144 PID 2828 wrote to memory of 1364 2828 svchost.com 144 PID 1364 wrote to memory of 1980 1364 cheats.exe 145 PID 1364 wrote to memory of 1980 1364 cheats.exe 145 PID 1364 wrote to memory of 1980 1364 cheats.exe 145 PID 1980 wrote to memory of 3444 1980 svchost.com 146 PID 1980 wrote to memory of 3444 1980 svchost.com 146 PID 1980 wrote to memory of 3444 1980 svchost.com 146 PID 3444 wrote to memory of 556 3444 cheats.exe 147 PID 3444 wrote to memory of 556 3444 cheats.exe 147 PID 3444 wrote to memory of 556 3444 cheats.exe 147 PID 556 wrote to memory of 2608 556 svchost.com 148 PID 556 wrote to memory of 2608 556 svchost.com 148 PID 556 wrote to memory of 2608 556 svchost.com 148 PID 1836 wrote to memory of 1112 1836 javaw.exe 149 PID 1836 wrote to memory of 1112 1836 javaw.exe 149 PID 1836 wrote to memory of 1112 1836 javaw.exe 149 PID 1112 wrote to memory of 4100 1112 svchost.com 150 PID 1112 wrote to memory of 4100 1112 svchost.com 150 PID 2608 wrote to memory of 3904 2608 cheats.exe 151 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\6812964531.exe"C:\Users\Admin\AppData\Local\Temp\6812964531.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Temp\6812964531.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Program Files\Java\jre-1.8\bin\java.exejava -jar C:\Users\Admin\download_libra.jar3⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Windows\SYSTEM32\cmd.execmd.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\system32\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"5⤵PID:2292
-
-
-
C:\Windows\SYSTEM32\cmd.execmd /c SCHTASKS /CREATE /F /SC MINUTE /TN OneDrive\OneDriveUpdateTask /RL HIGHEST /TR C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\cache.jar4⤵
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\system32\schtasks.exeSCHTASKS /CREATE /F /SC MINUTE /TN OneDrive\OneDriveUpdateTask /RL HIGHEST /TR C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\cache.jar5⤵
- Scheduled Task/Job: Scheduled Task
PID:1436
-
-
-
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\cache.jar"4⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\SYSTEM32\cmd.execmd /c wmic /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /Format:List5⤵
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Windows\System32\Wbem\WMIC.exewmic /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /Format:List6⤵
- Suspicious use of AdjustPrivilegeToken
PID:2280
-
-
-
C:\Windows\SYSTEM32\cmd.execmd /c wmic cpu get name5⤵
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Windows\System32\Wbem\WMIC.exewmic cpu get name6⤵
- Suspicious use of AdjustPrivilegeToken
PID:1852
-
-
-
C:\Users\Admin\AppData\Local\Temp\cheats.exe"C:\Users\Admin\AppData\Local\Temp\cheats.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe"7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exeC:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe"9⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exeC:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe"11⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exeC:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe"13⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exeC:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe14⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe"15⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exeC:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe16⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe"17⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3904 -
C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exeC:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe18⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3476 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe"19⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exeC:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe20⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4852 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe"21⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exeC:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe22⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4564 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe"23⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exeC:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe24⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2188 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe"25⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4116 -
C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exeC:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe26⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4848 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe"27⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3860 -
C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exeC:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe28⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4648 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe"29⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4196 -
C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exeC:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe30⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4924 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe"31⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3760 -
C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exeC:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe32⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2508 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe"33⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3512 -
C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exeC:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe34⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1852 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe"35⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4584 -
C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exeC:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe36⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4560 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe"37⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exeC:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe38⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4860 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe"39⤵PID:4620
-
C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exeC:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe40⤵PID:2840
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe"41⤵PID:4848
-
C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exeC:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe42⤵PID:4484
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe"43⤵PID:4444
-
C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exeC:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe44⤵PID:1772
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe"45⤵PID:4456
-
C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exeC:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe46⤵PID:2640
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe"47⤵PID:812
-
C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exeC:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe48⤵PID:1764
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe"49⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exeC:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe50⤵PID:3188
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe"51⤵PID:3504
-
C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exeC:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe52⤵PID:4196
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe"53⤵PID:4816
-
C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exeC:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe54⤵PID:3168
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe"55⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exeC:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe56⤵PID:4592
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe"57⤵PID:4844
-
C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exeC:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe58⤵PID:1296
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe"59⤵PID:4644
-
C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exeC:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe60⤵PID:3052
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe"61⤵PID:1896
-
C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exeC:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe62⤵PID:1996
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe"63⤵PID:1308
-
C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exeC:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe64⤵PID:3388
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe"65⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exeC:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe66⤵PID:4420
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe"67⤵PID:1540
-
C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exeC:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe68⤵PID:4076
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe"69⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exeC:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe70⤵PID:3292
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe"71⤵PID:4172
-
C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exeC:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe72⤵PID:3012
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe"73⤵PID:3444
-
C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exeC:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe74⤵PID:752
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe"75⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exeC:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe76⤵PID:1396
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe"77⤵PID:2396
-
C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exeC:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe78⤵PID:5052
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe"79⤵PID:3100
-
C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exeC:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe80⤵PID:4216
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe"81⤵PID:3216
-
C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exeC:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe82⤵PID:3452
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe"83⤵PID:3284
-
C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exeC:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe84⤵PID:3776
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe"85⤵PID:2304
-
C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exeC:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe86⤵PID:1148
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe"87⤵PID:2168
-
C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exeC:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe88⤵PID:720
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe"89⤵PID:4296
-
C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exeC:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe90⤵PID:2724
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe"91⤵PID:1088
-
C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exeC:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe92⤵PID:1964
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe"93⤵PID:4800
-
C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exeC:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe94⤵PID:3644
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe"95⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exeC:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe96⤵PID:3764
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe"97⤵PID:5080
-
C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exeC:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe98⤵PID:1160
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe"99⤵PID:3860
-
C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exeC:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe100⤵PID:2820
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe"101⤵PID:440
-
C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exeC:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe102⤵PID:556
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe"103⤵PID:3524
-
C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exeC:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe104⤵PID:2192
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe"105⤵PID:3056
-
C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exeC:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe106⤵PID:2260
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe"107⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exeC:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe108⤵PID:684
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe"109⤵PID:4888
-
C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exeC:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe110⤵PID:3476
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe"111⤵PID:4856
-
C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exeC:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe112⤵PID:4100
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe"113⤵PID:4592
-
C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exeC:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe114⤵PID:1844
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe"115⤵PID:4220
-
C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exeC:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe116⤵PID:1296
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe"117⤵PID:4468
-
C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exeC:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe118⤵PID:4544
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe"119⤵PID:1896
-
C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exeC:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe120⤵PID:4560
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe"121⤵PID:1456
-
C:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exeC:\Users\Admin\AppData\Local\Temp\3582-490\cheats.exe122⤵PID:1572
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-