Analysis
-
max time kernel
445s -
max time network
965s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
27-11-2024 19:26
Static task
static1
URLScan task
urlscan1
General
Malware Config
Extracted
Family
xenorat
C2
1683.3.3
158.346.1231
1683.3.3.3
127.0.0.1
Mutex
\asdawads
Attributes
-
delay
5000
-
install_path
temp
-
port
114234
-
startup_name
nolice
Signatures
-
Detect XenoRat Payload 8 IoCs
resource yara_rule behavioral1/files/0x0005000000024f51-916.dat family_xenorat behavioral1/files/0x0005000000024f53-933.dat family_xenorat behavioral1/files/0x0005000000024f55-954.dat family_xenorat behavioral1/files/0x0005000000024f55-1036.dat family_xenorat behavioral1/memory/1412-1047-0x0000000000DE0000-0x0000000000DF2000-memory.dmp family_xenorat behavioral1/memory/3452-1092-0x00000000000A0000-0x00000000000B2000-memory.dmp family_xenorat behavioral1/memory/4128-1093-0x0000000000C30000-0x0000000000C42000-memory.dmp family_xenorat behavioral1/memory/2684-1094-0x00000000009B0000-0x00000000009C2000-memory.dmp family_xenorat -
Xenorat family
-
Executes dropped EXE 64 IoCs
pid Process 1412 asds.exe 4664 asds.exe 756 asds.exe 1020 asds.exe 4884 asds.exe 1424 asds.exe 2292 asds.exe 1068 asds.exe 2100 asds.exe 2192 asds.exe 3168 asds.exe 1084 asds.exe 4752 asds.exe 4948 asds.exe 3360 asds.exe 3816 asds.exe 3804 asds.exe 3828 asds.exe 3888 asds.exe 4772 asds.exe 2992 asds.exe 3248 asds.exe 2216 asds.exe 1556 asds.exe 3812 asds.exe 1708 asds.exe 2012 asds.exe 4636 asds.exe 3876 asds.exe 3908 asds.exe 8 asds.exe 1100 asds.exe 3168 asds.exe 3256 asds.exe 3452 asds.exe 1392 asds.exe 2032 asds.exe 2044 asds.exe 5116 asds.exe 1320 asds.exe 1476 asds.exe 240 asds.exe 3612 asds.exe 3584 asds.exe 112 asds.exe 4544 asds.exe 4696 asds.exe 1020 asds.exe 4464 asds.exe 3400 asds.exe 4084 asds.exe 2292 asds.exe 280 asds.exe 3016 asds.exe 772 asds.exe 912 asds.exe 2056 asds.exe 3920 asds.exe 4196 asds.exe 3584 asds.exe 1116 asds.exe 2064 asds.exe 2848 asds.exe 2340 asds.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 1 raw.githubusercontent.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 4828 2056 Process not Found 6132 5036 2940 Process not Found 6130 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asds.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 48 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} xeno rat server.exe Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" xeno rat server.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell xeno rat server.exe Set value (data) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1 = 19002f433a5c000000000000000000000000000000000000000000 xeno rat server.exe Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\0\0\0\NodeSlot = "6" xeno rat server.exe Set value (data) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\0\0\0\MRUListEx = ffffffff xeno rat server.exe Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" xeno rat server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix BackgroundTransferHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" BackgroundTransferHost.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\0\0\0 xeno rat server.exe Set value (data) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\0\0\MRUListEx = 00000000ffffffff xeno rat server.exe Set value (data) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202020202 xeno rat server.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ xeno rat server.exe Set value (data) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202020202020202 xeno rat server.exe Set value (data) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 010000000200000000000000ffffffff xeno rat server.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings xeno rat server.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU xeno rat server.exe Set value (data) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202020202 xeno rat server.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\0 xeno rat server.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\MuiCache BackgroundTransferHost.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff xeno rat server.exe Set value (data) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\MRUListEx = 00000000ffffffff xeno rat server.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags xeno rat server.exe Set value (data) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202020202020202 xeno rat server.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell xeno rat server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell\SniffedFolderType = "Generic" xeno rat server.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg xeno rat server.exe Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" xeno rat server.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1 xeno rat server.exe Set value (data) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\0\0 = 500031000000000047598863100041646d696e003c0009000400efbe4759855e7b59499b2e0000002c570200000001000000000000000000000000000000d3b69b00410064006d0069006e00000014000000 xeno rat server.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\0\0 xeno rat server.exe Set value (data) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\0\0\0 = 7e003100000000004759e56211004465736b746f7000680009000400efbe4759855e7b594f9b2e000000365702000000010000000000000000003e0000000000ea8f29014400650073006b0074006f007000000040007300680065006c006c00330032002e0064006c006c002c002d0032003100370036003900000016000000 xeno rat server.exe Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" xeno rat server.exe Set value (data) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 xeno rat server.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6 xeno rat server.exe Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" xeno rat server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" xeno rat server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" BackgroundTransferHost.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ xeno rat server.exe Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" xeno rat server.exe Set value (data) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 xeno rat server.exe Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" xeno rat server.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 xeno rat server.exe Set value (data) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 0100000000000000ffffffff xeno rat server.exe Set value (data) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\0 = 78003100000000004759855e1100557365727300640009000400efbec5522d607b59499b2e0000006c0500000000010000000000000000003a0000000000753f7d0055007300650072007300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100380031003300000014000000 xeno rat server.exe Set value (data) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\0\MRUListEx = 00000000ffffffff xeno rat server.exe Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" xeno rat server.exe -
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\PySilon-malware-3.7.5.zip:Zone.Identifier msedge.exe File opened for modification C:\Users\Admin\Downloads\Release.zip:Zone.Identifier msedge.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 3572 msedge.exe 3572 msedge.exe 3412 msedge.exe 3412 msedge.exe 5068 identity_helper.exe 5068 identity_helper.exe 4344 msedge.exe 4344 msedge.exe 1080 msedge.exe 1080 msedge.exe 4884 msedge.exe 4884 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5000 xeno rat server.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 17 IoCs
pid Process 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4664 asds.exe Token: SeDebugPrivilege 756 asds.exe Token: SeDebugPrivilege 1020 asds.exe Token: SeDebugPrivilege 4884 asds.exe Token: SeDebugPrivilege 1424 asds.exe Token: SeDebugPrivilege 2292 asds.exe Token: SeDebugPrivilege 1068 asds.exe Token: SeDebugPrivilege 2100 asds.exe Token: SeDebugPrivilege 2192 asds.exe Token: SeDebugPrivilege 3168 asds.exe Token: SeDebugPrivilege 1084 asds.exe Token: SeDebugPrivilege 4752 asds.exe Token: SeDebugPrivilege 4948 asds.exe Token: SeDebugPrivilege 3360 asds.exe Token: SeDebugPrivilege 3816 asds.exe Token: SeDebugPrivilege 3804 asds.exe Token: SeDebugPrivilege 3828 asds.exe Token: SeDebugPrivilege 3888 asds.exe Token: SeDebugPrivilege 4772 asds.exe Token: SeDebugPrivilege 2992 asds.exe Token: SeDebugPrivilege 3248 asds.exe Token: SeDebugPrivilege 2216 asds.exe Token: SeDebugPrivilege 1556 asds.exe Token: SeDebugPrivilege 3812 asds.exe Token: SeDebugPrivilege 1708 asds.exe Token: SeDebugPrivilege 2012 asds.exe Token: SeDebugPrivilege 4636 asds.exe Token: SeDebugPrivilege 3876 asds.exe Token: SeDebugPrivilege 3908 asds.exe Token: SeDebugPrivilege 8 asds.exe Token: SeDebugPrivilege 1100 asds.exe Token: SeDebugPrivilege 3168 asds.exe Token: SeDebugPrivilege 3256 asds.exe Token: SeDebugPrivilege 3452 asds.exe Token: SeDebugPrivilege 1392 asds.exe Token: SeDebugPrivilege 2032 asds.exe Token: SeDebugPrivilege 2044 asds.exe Token: SeDebugPrivilege 5116 asds.exe Token: SeDebugPrivilege 1320 asds.exe Token: SeDebugPrivilege 1476 asds.exe Token: SeDebugPrivilege 240 asds.exe Token: SeDebugPrivilege 3612 asds.exe Token: SeDebugPrivilege 3584 asds.exe Token: SeDebugPrivilege 112 asds.exe Token: SeDebugPrivilege 4544 asds.exe Token: SeDebugPrivilege 4696 asds.exe Token: SeDebugPrivilege 1020 asds.exe Token: SeDebugPrivilege 4464 asds.exe Token: SeDebugPrivilege 3400 asds.exe Token: SeDebugPrivilege 4084 asds.exe Token: SeDebugPrivilege 2292 asds.exe Token: SeDebugPrivilege 280 asds.exe Token: SeDebugPrivilege 3016 asds.exe Token: SeDebugPrivilege 772 asds.exe Token: SeDebugPrivilege 912 asds.exe Token: SeDebugPrivilege 2056 asds.exe Token: SeDebugPrivilege 3920 asds.exe Token: SeDebugPrivilege 4196 asds.exe Token: SeDebugPrivilege 3584 asds.exe Token: SeDebugPrivilege 1116 asds.exe Token: SeDebugPrivilege 2064 asds.exe Token: SeDebugPrivilege 2848 asds.exe Token: SeDebugPrivilege 2340 asds.exe Token: SeDebugPrivilege 4704 asds.exe -
Suspicious use of FindShellTrayWindow 44 IoCs
pid Process 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 5000 xeno rat server.exe 5000 xeno rat server.exe 5000 xeno rat server.exe 5000 xeno rat server.exe 5000 xeno rat server.exe 5000 xeno rat server.exe 5000 xeno rat server.exe 5000 xeno rat server.exe 5000 xeno rat server.exe 5000 xeno rat server.exe 5000 xeno rat server.exe 5000 xeno rat server.exe 5000 xeno rat server.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3412 wrote to memory of 4960 3412 msedge.exe 78 PID 3412 wrote to memory of 4960 3412 msedge.exe 78 PID 3412 wrote to memory of 872 3412 msedge.exe 79 PID 3412 wrote to memory of 872 3412 msedge.exe 79 PID 3412 wrote to memory of 872 3412 msedge.exe 79 PID 3412 wrote to memory of 872 3412 msedge.exe 79 PID 3412 wrote to memory of 872 3412 msedge.exe 79 PID 3412 wrote to memory of 872 3412 msedge.exe 79 PID 3412 wrote to memory of 872 3412 msedge.exe 79 PID 3412 wrote to memory of 872 3412 msedge.exe 79 PID 3412 wrote to memory of 872 3412 msedge.exe 79 PID 3412 wrote to memory of 872 3412 msedge.exe 79 PID 3412 wrote to memory of 872 3412 msedge.exe 79 PID 3412 wrote to memory of 872 3412 msedge.exe 79 PID 3412 wrote to memory of 872 3412 msedge.exe 79 PID 3412 wrote to memory of 872 3412 msedge.exe 79 PID 3412 wrote to memory of 872 3412 msedge.exe 79 PID 3412 wrote to memory of 872 3412 msedge.exe 79 PID 3412 wrote to memory of 872 3412 msedge.exe 79 PID 3412 wrote to memory of 872 3412 msedge.exe 79 PID 3412 wrote to memory of 872 3412 msedge.exe 79 PID 3412 wrote to memory of 872 3412 msedge.exe 79 PID 3412 wrote to memory of 872 3412 msedge.exe 79 PID 3412 wrote to memory of 872 3412 msedge.exe 79 PID 3412 wrote to memory of 872 3412 msedge.exe 79 PID 3412 wrote to memory of 872 3412 msedge.exe 79 PID 3412 wrote to memory of 872 3412 msedge.exe 79 PID 3412 wrote to memory of 872 3412 msedge.exe 79 PID 3412 wrote to memory of 872 3412 msedge.exe 79 PID 3412 wrote to memory of 872 3412 msedge.exe 79 PID 3412 wrote to memory of 872 3412 msedge.exe 79 PID 3412 wrote to memory of 872 3412 msedge.exe 79 PID 3412 wrote to memory of 872 3412 msedge.exe 79 PID 3412 wrote to memory of 872 3412 msedge.exe 79 PID 3412 wrote to memory of 872 3412 msedge.exe 79 PID 3412 wrote to memory of 872 3412 msedge.exe 79 PID 3412 wrote to memory of 872 3412 msedge.exe 79 PID 3412 wrote to memory of 872 3412 msedge.exe 79 PID 3412 wrote to memory of 872 3412 msedge.exe 79 PID 3412 wrote to memory of 872 3412 msedge.exe 79 PID 3412 wrote to memory of 872 3412 msedge.exe 79 PID 3412 wrote to memory of 872 3412 msedge.exe 79 PID 3412 wrote to memory of 3572 3412 msedge.exe 80 PID 3412 wrote to memory of 3572 3412 msedge.exe 80 PID 3412 wrote to memory of 4804 3412 msedge.exe 81 PID 3412 wrote to memory of 4804 3412 msedge.exe 81 PID 3412 wrote to memory of 4804 3412 msedge.exe 81 PID 3412 wrote to memory of 4804 3412 msedge.exe 81 PID 3412 wrote to memory of 4804 3412 msedge.exe 81 PID 3412 wrote to memory of 4804 3412 msedge.exe 81 PID 3412 wrote to memory of 4804 3412 msedge.exe 81 PID 3412 wrote to memory of 4804 3412 msedge.exe 81 PID 3412 wrote to memory of 4804 3412 msedge.exe 81 PID 3412 wrote to memory of 4804 3412 msedge.exe 81 PID 3412 wrote to memory of 4804 3412 msedge.exe 81 PID 3412 wrote to memory of 4804 3412 msedge.exe 81 PID 3412 wrote to memory of 4804 3412 msedge.exe 81 PID 3412 wrote to memory of 4804 3412 msedge.exe 81 PID 3412 wrote to memory of 4804 3412 msedge.exe 81 PID 3412 wrote to memory of 4804 3412 msedge.exe 81 PID 3412 wrote to memory of 4804 3412 msedge.exe 81 PID 3412 wrote to memory of 4804 3412 msedge.exe 81 PID 3412 wrote to memory of 4804 3412 msedge.exe 81 PID 3412 wrote to memory of 4804 3412 msedge.exe 81
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/mategol/PySilon-malware/releases/tag/v3.7.51⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff8fd713cb8,0x7ff8fd713cc8,0x7ff8fd713cd82⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1904,8223567201305811035,11314531253229270995,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1924 /prefetch:22⤵PID:872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1904,8223567201305811035,11314531253229270995,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1904,8223567201305811035,11314531253229270995,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2560 /prefetch:82⤵PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,8223567201305811035,11314531253229270995,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:4348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,8223567201305811035,11314531253229270995,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,8223567201305811035,11314531253229270995,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4528 /prefetch:12⤵PID:4236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,8223567201305811035,11314531253229270995,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:12⤵PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,8223567201305811035,11314531253229270995,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:3196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,8223567201305811035,11314531253229270995,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1904,8223567201305811035,11314531253229270995,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5440 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1904,8223567201305811035,11314531253229270995,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5296 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,8223567201305811035,11314531253229270995,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4884 /prefetch:12⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1904,8223567201305811035,11314531253229270995,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4968 /prefetch:82⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:1080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,8223567201305811035,11314531253229270995,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:12⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,8223567201305811035,11314531253229270995,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5852 /prefetch:12⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,8223567201305811035,11314531253229270995,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5920 /prefetch:12⤵PID:1392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,8223567201305811035,11314531253229270995,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6004 /prefetch:12⤵PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,8223567201305811035,11314531253229270995,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5816 /prefetch:12⤵PID:3816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,8223567201305811035,11314531253229270995,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6604 /prefetch:12⤵PID:772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,8223567201305811035,11314531253229270995,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6628 /prefetch:12⤵PID:996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,8223567201305811035,11314531253229270995,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:12⤵PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,8223567201305811035,11314531253229270995,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6892 /prefetch:12⤵PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,8223567201305811035,11314531253229270995,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6492 /prefetch:12⤵PID:844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1904,8223567201305811035,11314531253229270995,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6456 /prefetch:82⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1904,8223567201305811035,11314531253229270995,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=6540 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1776
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1796
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3308
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:876
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Downloads\PySilon-malware-3.7.5\PySilon-malware-3.7.5\PySilon.bat" "1⤵PID:4348
-
C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.42251.0_x64__8wekyb3d8bbwe\AppInstallerPythonRedirector.exepython -m venv pysilon2⤵PID:4700
-
-
C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.42251.0_x64__8wekyb3d8bbwe\AppInstallerPythonRedirector.exepython -m pip install --upgrade pip2⤵PID:4212
-
-
C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.42251.0_x64__8wekyb3d8bbwe\AppInstallerPythonRedirector.exepython builder.py2⤵PID:2868
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Downloads\PySilon-malware-3.7.5\PySilon-malware-3.7.5\PySilon.bat" "1⤵PID:3152
-
C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.42251.0_x64__8wekyb3d8bbwe\AppInstallerPythonRedirector.exepython -m venv pysilon2⤵PID:4600
-
-
C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.42251.0_x64__8wekyb3d8bbwe\AppInstallerPythonRedirector.exepython -m pip install --upgrade pip2⤵PID:3908
-
-
C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.42251.0_x64__8wekyb3d8bbwe\AppInstallerPythonRedirector.exepython builder.py2⤵PID:4932
-
-
C:\Users\Admin\Downloads\Release\xeno rat server.exe"C:\Users\Admin\Downloads\Release\xeno rat server.exe"1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:5000
-
C:\Users\Admin\Desktop\asds.exe"C:\Users\Admin\Desktop\asds.exe"1⤵
- Executes dropped EXE
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4664 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:756 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1020 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1068 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"9⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"10⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"11⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"12⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"13⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4752 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"14⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"15⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3360 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"16⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3816 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"17⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3804 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"18⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3828 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"19⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3888 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"20⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"21⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"22⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3248 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"23⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"24⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"25⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3812 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"26⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"27⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"28⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4636 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"29⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"30⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3908 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"31⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:8 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"32⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"33⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"34⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3256 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"35⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"36⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1392 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"37⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"38⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"39⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"40⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"41⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"42⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:240 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"43⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3612 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"44⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3584 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"45⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:112 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"46⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"47⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"48⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1020 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"49⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"50⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3400 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"51⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4084 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"52⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"53⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:280 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"54⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"55⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:772 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"56⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:912 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"57⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"58⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"59⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4196 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"60⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3584 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"61⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1116 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"62⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"63⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"64⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"65⤵
- Suspicious use of AdjustPrivilegeToken
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"66⤵PID:4084
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"67⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"68⤵PID:280
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"69⤵PID:2448
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"70⤵PID:584
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"71⤵PID:1452
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"72⤵
- System Location Discovery: System Language Discovery
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"73⤵PID:4196
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"74⤵PID:5068
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"75⤵PID:4696
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"76⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"77⤵PID:3228
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"78⤵PID:4264
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"79⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"80⤵PID:4088
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"81⤵PID:3304
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"82⤵
- System Location Discovery: System Language Discovery
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"83⤵PID:432
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"84⤵PID:2908
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"85⤵PID:3784
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"86⤵PID:4576
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"87⤵PID:772
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"88⤵PID:2452
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"89⤵PID:4408
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"90⤵PID:4088
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"91⤵PID:3304
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"92⤵PID:4544
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"93⤵PID:964
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"94⤵PID:4464
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"95⤵PID:4664
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"96⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"97⤵PID:1824
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"98⤵PID:4240
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"99⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"100⤵PID:800
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"101⤵PID:104
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"102⤵PID:4828
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"103⤵PID:1176
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"104⤵PID:584
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"105⤵PID:2352
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"106⤵PID:1432
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"107⤵PID:2552
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"108⤵PID:3816
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"109⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"110⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"111⤵PID:776
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"112⤵PID:4976
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"113⤵PID:3228
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"114⤵PID:2684
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"115⤵PID:2452
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"116⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"117⤵PID:112
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"118⤵PID:3804
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"119⤵PID:696
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"120⤵PID:2552
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"121⤵PID:3404
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\asds.exe"122⤵PID:2384
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-