Overview
overview
10Static
static
10UDP.exe
windows11-21h2-x64
3a
windows11-21h2-x64
1arm1
windows11-21h2-x64
1bj.exe
windows11-21h2-x64
10bjyk.exe
windows11-21h2-x64
10cctv.exe
windows11-21h2-x64
10cctv_2.exe
windows11-21h2-x64
10cn.exe
windows11-21h2-x64
7cn1.exe
windows11-21h2-x64
3dhl.exe
windows11-21h2-x64
10java
windows11-21h2-x64
1java (2)
windows11-21h2-x64
1java1
windows11-21h2-x64
1k5.exe
windows11-21h2-x64
10ly1
windows11-21h2-x64
1mh.exe
windows11-21h2-x64
10mips
windows11-21h2-x64
1pjhxx
windows11-21h2-x64
1rootkit
windows11-21h2-x64
1se.exe
windows11-21h2-x64
7server.exe
windows11-21h2-x64
10smss.exe
windows11-21h2-x64
10sqlrer
windows11-21h2-x64
1squld
windows11-21h2-x64
1ssh.sh
windows11-21h2-x64
3taskmgr.exe
windows11-21h2-x64
10win.exe
windows11-21h2-x64
10wm.html
windows11-21h2-x64
4wrt1
windows11-21h2-x64
1xm.exe
windows11-21h2-x64
10yk.exe
windows11-21h2-x64
10yk1.exe
windows11-21h2-x64
10Analysis
-
max time kernel
489s -
max time network
1798s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
07-12-2024 18:43
Behavioral task
behavioral1
Sample
UDP.exe
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
a
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
arm1
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
bj.exe
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
bjyk.exe
Resource
win11-20241007-en
Behavioral task
behavioral6
Sample
cctv.exe
Resource
win11-20241007-en
Behavioral task
behavioral7
Sample
cctv_2.exe
Resource
win11-20241007-en
Behavioral task
behavioral8
Sample
cn.exe
Resource
win11-20241007-en
Behavioral task
behavioral9
Sample
cn1.exe
Resource
win11-20241007-en
Behavioral task
behavioral10
Sample
dhl.exe
Resource
win11-20241007-en
Behavioral task
behavioral11
Sample
java
Resource
win11-20241007-en
Behavioral task
behavioral12
Sample
java (2)
Resource
win11-20241007-en
Behavioral task
behavioral13
Sample
java1
Resource
win11-20241007-en
Behavioral task
behavioral14
Sample
k5.exe
Resource
win11-20241007-en
Behavioral task
behavioral15
Sample
ly1
Resource
win11-20241007-en
Behavioral task
behavioral16
Sample
mh.exe
Resource
win11-20241007-en
Behavioral task
behavioral17
Sample
mips
Resource
win11-20241007-en
Behavioral task
behavioral18
Sample
pjhxx
Resource
win11-20241007-en
Behavioral task
behavioral19
Sample
rootkit
Resource
win11-20241007-en
Behavioral task
behavioral20
Sample
se.exe
Resource
win11-20241007-en
Behavioral task
behavioral21
Sample
server.exe
Resource
win11-20241007-en
Behavioral task
behavioral22
Sample
smss.exe
Resource
win11-20241007-en
Behavioral task
behavioral23
Sample
sqlrer
Resource
win11-20241007-en
Behavioral task
behavioral24
Sample
squld
Resource
win11-20241007-en
Behavioral task
behavioral25
Sample
ssh.sh
Resource
win11-20241007-en
Behavioral task
behavioral26
Sample
taskmgr.exe
Resource
win11-20241007-en
Behavioral task
behavioral27
Sample
win.exe
Resource
win11-20241007-en
Behavioral task
behavioral28
Sample
wm.html
Resource
win11-20241007-en
Behavioral task
behavioral29
Sample
wrt1
Resource
win11-20241007-en
Behavioral task
behavioral30
Sample
xm.exe
Resource
win11-20241007-en
Behavioral task
behavioral31
Sample
yk.exe
Resource
win11-20241007-en
General
-
Target
taskmgr.exe
-
Size
288KB
-
MD5
bc59e8a47d288a3411399884af9ed624
-
SHA1
f3abc633afb3b1a8d1439499e05a507f9899df73
-
SHA256
554c68f17fb687c3941f0cc2b141e25541d1ce66e47ad512d7cfd80f3ea5c026
-
SHA512
03aeb3e64f78e6df60e32bedf5a50408708ab562e55ec92221a92290e1599ff527a2a8bdac0b043b2c97fa8507f7c57f21db4b4f9acd87a313384a4f5422bc01
-
SSDEEP
6144:5gZNATdYlG4AnjhEkgS1bW4+QZbOQUhFS+W9RPNuULSWlJZg:5gZNodYlG4qEk1dYhFSbDNP14
Malware Config
Signatures
-
Gh0st RAT payload 18 IoCs
resource yara_rule behavioral26/memory/5064-17-0x0000000010000000-0x0000000010121000-memory.dmp family_gh0strat behavioral26/memory/5064-15-0x0000000010000000-0x0000000010121000-memory.dmp family_gh0strat behavioral26/memory/5064-14-0x0000000010000000-0x0000000010121000-memory.dmp family_gh0strat behavioral26/memory/5064-13-0x0000000010000000-0x0000000010121000-memory.dmp family_gh0strat behavioral26/memory/4464-28-0x0000000010000000-0x0000000010121000-memory.dmp family_gh0strat behavioral26/memory/4140-40-0x0000000010000000-0x0000000010121000-memory.dmp family_gh0strat behavioral26/memory/4140-37-0x0000000010000000-0x0000000010121000-memory.dmp family_gh0strat behavioral26/memory/4140-38-0x0000000010000000-0x0000000010121000-memory.dmp family_gh0strat behavioral26/memory/924-52-0x0000000010000000-0x0000000010121000-memory.dmp family_gh0strat behavioral26/memory/924-50-0x0000000010000000-0x0000000010121000-memory.dmp family_gh0strat behavioral26/memory/924-49-0x0000000010000000-0x0000000010121000-memory.dmp family_gh0strat behavioral26/memory/4832-64-0x0000000010000000-0x0000000010121000-memory.dmp family_gh0strat behavioral26/memory/3016-76-0x0000000010000000-0x0000000010121000-memory.dmp family_gh0strat behavioral26/memory/3016-74-0x0000000010000000-0x0000000010121000-memory.dmp family_gh0strat behavioral26/memory/3016-73-0x0000000010000000-0x0000000010121000-memory.dmp family_gh0strat behavioral26/memory/4832-62-0x0000000010000000-0x0000000010121000-memory.dmp family_gh0strat behavioral26/memory/4832-61-0x0000000010000000-0x0000000010121000-memory.dmp family_gh0strat behavioral26/memory/5064-852-0x0000000010000000-0x0000000010121000-memory.dmp family_gh0strat -
Gh0strat family
-
Executes dropped EXE 64 IoCs
pid Process 5064 server.exe 4464 server.exe 4140 server.exe 924 server.exe 4832 server.exe 3016 server.exe 1616 server.exe 3260 server.exe 4128 server.exe 1448 server.exe 2920 server.exe 4072 server.exe 3208 server.exe 1596 server.exe 1388 server.exe 1784 server.exe 4636 server.exe 4296 server.exe 4780 server.exe 1904 server.exe 2332 server.exe 2328 server.exe 2152 server.exe 3400 server.exe 2076 server.exe 4280 server.exe 3316 server.exe 1688 server.exe 3820 server.exe 2780 server.exe 4612 server.exe 3392 server.exe 4636 server.exe 4140 server.exe 924 server.exe 844 server.exe 1912 server.exe 2328 server.exe 3260 server.exe 4148 server.exe 1320 server.exe 3724 server.exe 1116 server.exe 5108 server.exe 3076 server.exe 4628 server.exe 2712 server.exe 3536 server.exe 5004 server.exe 2688 server.exe 3292 server.exe 2316 server.exe 3464 server.exe 4908 server.exe 1612 server.exe 4268 server.exe 4028 server.exe 3868 server.exe 4232 server.exe 4500 server.exe 3820 server.exe 2108 server.exe 976 server.exe 2216 server.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\XXXXXX2063534F = "C:\\Windows\\XXXXXX2063534F\\svchsot.exe" server.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\XXXXXX2063534F\svchsot.exe server.exe File opened for modification C:\Windows\XXXXXX2063534F\svchsot.exe server.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5064 server.exe 5064 server.exe 5064 server.exe 5064 server.exe 5064 server.exe 5064 server.exe 4464 server.exe 4464 server.exe 4464 server.exe 4464 server.exe 4140 server.exe 4140 server.exe 4140 server.exe 4140 server.exe 924 server.exe 924 server.exe 924 server.exe 924 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 4832 server.exe 3016 server.exe 3016 server.exe 3016 server.exe 3016 server.exe 1616 server.exe 1616 server.exe 1616 server.exe 1616 server.exe 3260 server.exe 3260 server.exe 3260 server.exe 3260 server.exe 4128 server.exe 4128 server.exe 4128 server.exe 4128 server.exe 1448 server.exe 1448 server.exe 1448 server.exe 1448 server.exe 2920 server.exe 2920 server.exe 2920 server.exe 2920 server.exe 4072 server.exe 4072 server.exe 4072 server.exe 4072 server.exe 3208 server.exe 3208 server.exe 3208 server.exe 3208 server.exe 1596 server.exe 1596 server.exe 1596 server.exe 1596 server.exe 1388 server.exe 1388 server.exe 1388 server.exe 1388 server.exe 1784 server.exe 1784 server.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1920 wrote to memory of 4116 1920 taskmgr.exe 77 PID 1920 wrote to memory of 4116 1920 taskmgr.exe 77 PID 1920 wrote to memory of 4116 1920 taskmgr.exe 77 PID 1920 wrote to memory of 5064 1920 taskmgr.exe 78 PID 1920 wrote to memory of 5064 1920 taskmgr.exe 78 PID 1920 wrote to memory of 5064 1920 taskmgr.exe 78 PID 4116 wrote to memory of 1468 4116 taskmgr.exe 79 PID 4116 wrote to memory of 1468 4116 taskmgr.exe 79 PID 4116 wrote to memory of 1468 4116 taskmgr.exe 79 PID 4116 wrote to memory of 4464 4116 taskmgr.exe 80 PID 4116 wrote to memory of 4464 4116 taskmgr.exe 80 PID 4116 wrote to memory of 4464 4116 taskmgr.exe 80 PID 1468 wrote to memory of 4336 1468 taskmgr.exe 81 PID 1468 wrote to memory of 4336 1468 taskmgr.exe 81 PID 1468 wrote to memory of 4336 1468 taskmgr.exe 81 PID 1468 wrote to memory of 4140 1468 taskmgr.exe 82 PID 1468 wrote to memory of 4140 1468 taskmgr.exe 82 PID 1468 wrote to memory of 4140 1468 taskmgr.exe 82 PID 4336 wrote to memory of 3368 4336 taskmgr.exe 83 PID 4336 wrote to memory of 3368 4336 taskmgr.exe 83 PID 4336 wrote to memory of 3368 4336 taskmgr.exe 83 PID 4336 wrote to memory of 924 4336 taskmgr.exe 84 PID 4336 wrote to memory of 924 4336 taskmgr.exe 84 PID 4336 wrote to memory of 924 4336 taskmgr.exe 84 PID 3368 wrote to memory of 4380 3368 taskmgr.exe 85 PID 3368 wrote to memory of 4380 3368 taskmgr.exe 85 PID 3368 wrote to memory of 4380 3368 taskmgr.exe 85 PID 3368 wrote to memory of 4832 3368 taskmgr.exe 86 PID 3368 wrote to memory of 4832 3368 taskmgr.exe 86 PID 3368 wrote to memory of 4832 3368 taskmgr.exe 86 PID 4380 wrote to memory of 4680 4380 taskmgr.exe 87 PID 4380 wrote to memory of 4680 4380 taskmgr.exe 87 PID 4380 wrote to memory of 4680 4380 taskmgr.exe 87 PID 4380 wrote to memory of 3016 4380 taskmgr.exe 88 PID 4380 wrote to memory of 3016 4380 taskmgr.exe 88 PID 4380 wrote to memory of 3016 4380 taskmgr.exe 88 PID 4680 wrote to memory of 784 4680 taskmgr.exe 89 PID 4680 wrote to memory of 784 4680 taskmgr.exe 89 PID 4680 wrote to memory of 784 4680 taskmgr.exe 89 PID 4680 wrote to memory of 1616 4680 taskmgr.exe 90 PID 4680 wrote to memory of 1616 4680 taskmgr.exe 90 PID 4680 wrote to memory of 1616 4680 taskmgr.exe 90 PID 784 wrote to memory of 1612 784 taskmgr.exe 91 PID 784 wrote to memory of 1612 784 taskmgr.exe 91 PID 784 wrote to memory of 1612 784 taskmgr.exe 91 PID 784 wrote to memory of 3260 784 taskmgr.exe 154 PID 784 wrote to memory of 3260 784 taskmgr.exe 154 PID 784 wrote to memory of 3260 784 taskmgr.exe 154 PID 1612 wrote to memory of 4088 1612 taskmgr.exe 93 PID 1612 wrote to memory of 4088 1612 taskmgr.exe 93 PID 1612 wrote to memory of 4088 1612 taskmgr.exe 93 PID 1612 wrote to memory of 4128 1612 taskmgr.exe 94 PID 1612 wrote to memory of 4128 1612 taskmgr.exe 94 PID 1612 wrote to memory of 4128 1612 taskmgr.exe 94 PID 4088 wrote to memory of 2548 4088 taskmgr.exe 95 PID 4088 wrote to memory of 2548 4088 taskmgr.exe 95 PID 4088 wrote to memory of 2548 4088 taskmgr.exe 95 PID 4088 wrote to memory of 1448 4088 taskmgr.exe 127 PID 4088 wrote to memory of 1448 4088 taskmgr.exe 127 PID 4088 wrote to memory of 1448 4088 taskmgr.exe 127 PID 2548 wrote to memory of 2776 2548 taskmgr.exe 97 PID 2548 wrote to memory of 2776 2548 taskmgr.exe 97 PID 2548 wrote to memory of 2776 2548 taskmgr.exe 97 PID 2548 wrote to memory of 2920 2548 taskmgr.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"7⤵
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"8⤵
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"9⤵
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"10⤵
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"11⤵
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"12⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"13⤵PID:1176
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"14⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"15⤵PID:3404
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"16⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"17⤵PID:1896
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"18⤵PID:248
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"19⤵PID:4624
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"20⤵PID:4944
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"21⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"22⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"23⤵PID:648
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"24⤵PID:1888
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"25⤵PID:3204
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"26⤵PID:4084
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"27⤵PID:1448
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"28⤵PID:5092
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"29⤵PID:4072
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"30⤵PID:3548
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"31⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"32⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"33⤵PID:580
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"34⤵PID:1860
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"35⤵PID:3024
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"36⤵PID:4152
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"37⤵PID:4832
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"38⤵PID:3020
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"39⤵PID:3248
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"40⤵PID:2152
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"41⤵PID:3400
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"42⤵PID:3168
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"43⤵PID:4976
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"44⤵PID:4000
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"45⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"46⤵PID:780
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"47⤵PID:4392
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"48⤵PID:4612
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"49⤵PID:5000
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"50⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"51⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"52⤵PID:4744
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"53⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"54⤵PID:776
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"55⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"56⤵PID:3144
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"57⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"58⤵PID:752
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"59⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"60⤵PID:2344
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"61⤵PID:1176
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"62⤵PID:3552
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"63⤵PID:3208
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"64⤵PID:4492
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"65⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"66⤵PID:580
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"67⤵PID:1860
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"68⤵PID:4888
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"69⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"70⤵PID:3136
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"71⤵PID:4668
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"72⤵PID:348
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"73⤵PID:4528
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"74⤵PID:4148
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"75⤵PID:1320
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"76⤵PID:3168
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"77⤵PID:3724
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"78⤵PID:1028
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"79⤵PID:4804
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"80⤵PID:3820
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"81⤵PID:4628
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"82⤵PID:4340
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"83⤵PID:3328
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"84⤵PID:3196
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"85⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"86⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"87⤵PID:4944
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"88⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"89⤵PID:648
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"90⤵PID:3064
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"91⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"92⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"93⤵PID:1448
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"94⤵PID:4740
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"95⤵PID:5092
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"96⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"97⤵PID:3676
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"98⤵PID:1016
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"99⤵PID:3908
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"100⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"101⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"102⤵PID:580
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"103⤵PID:2524
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"104⤵PID:2564
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"105⤵PID:4708
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"106⤵PID:2100
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"107⤵PID:3736
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"108⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"109⤵PID:4128
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"110⤵PID:3396
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"111⤵PID:1124
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"112⤵PID:3532
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"113⤵PID:916
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"114⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"115⤵PID:4508
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"116⤵PID:3404
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"117⤵PID:1784
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"118⤵PID:1896
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"119⤵PID:248
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"120⤵PID:2304
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"121⤵PID:1076
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"122⤵PID:836
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-