Analysis
-
max time kernel
12s -
max time network
6s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
19-12-2024 22:47
Behavioral task
behavioral1
Sample
Perm Loader.vmp.exe
Resource
win10ltsc2021-20241211-en
General
-
Target
Perm Loader.vmp.exe
-
Size
5.7MB
-
MD5
50c87f75cb5583c0456b582ec37fba1e
-
SHA1
3c8625a583a3e7fd1f668150a5072b477182a4f1
-
SHA256
c83954ab01cc2d5ad6a91325fda5c3758769044143275690685d53b87c7bb588
-
SHA512
28211a4a90a335ca016f2b74e9f18dc4ca49f6c3c205f5ee4d7ef229220f576083284b8cd47888ccd20b24e378ecbdecd7eeffb2e172363e5aa9f6bfd1c99841
-
SSDEEP
98304:NP5gmktJUfGLCwRcIoMPPqpnNUjhfKwXV1b27OMvTUDsiBribTsOyCT+eiFZ:Nxgm4qf18PqpN4Kwq79TUDsii0OpiFZ
Malware Config
Signatures
-
Cerber 47 IoCs
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
description ioc pid Process 4320 taskkill.exe 2828 taskkill.exe 2216 taskkill.exe 2496 taskkill.exe 3428 taskkill.exe 1852 taskkill.exe Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE 4324 taskkill.exe 380 taskkill.exe 1708 taskkill.exe 436 taskkill.exe Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE 2584 taskkill.exe Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE 2316 taskkill.exe Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE 2052 taskkill.exe 3716 taskkill.exe 4644 taskkill.exe 3680 taskkill.exe Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE 4416 taskkill.exe 4744 taskkill.exe Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE 3344 taskkill.exe 2240 taskkill.exe 816 taskkill.exe 2836 taskkill.exe Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE 4140 taskkill.exe 3784 taskkill.exe 2020 taskkill.exe Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.EXE -
Cerber family
-
Executes dropped EXE 22 IoCs
pid Process 3040 AMIDEWINx64.EXE 3412 AMIDEWINx64.EXE 1952 AMIDEWINx64.EXE 3260 AMIDEWINx64.EXE 4556 AMIDEWINx64.EXE 1108 AMIDEWINx64.EXE 3152 AMIDEWINx64.EXE 4336 AMIDEWINx64.EXE 1684 AMIDEWINx64.EXE 3012 AMIDEWINx64.EXE 1600 AMIDEWINx64.EXE 4984 AMIDEWINx64.EXE 4428 AMIDEWINx64.EXE 3656 AMIDEWINx64.EXE 1512 AMIDEWINx64.EXE 2544 AMIDEWINx64.EXE 3516 AMIDEWINx64.EXE 860 AMIDEWINx64.EXE 1924 AMIDEWINx64.EXE 1856 AMIDEWINx64.EXE 2500 AMIDEWINx64.EXE 4244 AMIDEWINx64.EXE -
resource yara_rule behavioral1/memory/3760-2-0x00007FF667160000-0x00007FF667C10000-memory.dmp vmprotect behavioral1/memory/3760-5-0x00007FF667160000-0x00007FF667C10000-memory.dmp vmprotect behavioral1/memory/3760-34-0x00007FF667160000-0x00007FF667C10000-memory.dmp vmprotect -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\amifldrv64.sys Perm Loader.vmp.exe File created C:\Windows\System32\AMIDEWINx64.EXE Perm Loader.vmp.exe -
Kills process with taskkill 59 IoCs
pid Process 3784 taskkill.exe 2052 taskkill.exe 2216 taskkill.exe 2000 taskkill.exe 5060 taskkill.exe 2020 taskkill.exe 2584 taskkill.exe 4384 taskkill.exe 3660 taskkill.exe 3900 taskkill.exe 4416 taskkill.exe 1556 taskkill.exe 1344 taskkill.exe 1148 taskkill.exe 2836 taskkill.exe 2316 taskkill.exe 2632 taskkill.exe 1576 taskkill.exe 1852 taskkill.exe 4324 taskkill.exe 2956 taskkill.exe 4644 taskkill.exe 1708 taskkill.exe 4636 taskkill.exe 4132 taskkill.exe 1776 taskkill.exe 816 taskkill.exe 1920 taskkill.exe 2240 taskkill.exe 1812 taskkill.exe 2496 taskkill.exe 2488 taskkill.exe 2852 taskkill.exe 2828 taskkill.exe 1084 taskkill.exe 1864 taskkill.exe 3680 taskkill.exe 4744 taskkill.exe 3364 taskkill.exe 3412 taskkill.exe 4140 taskkill.exe 3716 taskkill.exe 380 taskkill.exe 2920 taskkill.exe 1124 taskkill.exe 4960 taskkill.exe 3344 taskkill.exe 1368 taskkill.exe 3900 taskkill.exe 3192 taskkill.exe 4904 taskkill.exe 4788 taskkill.exe 888 taskkill.exe 3428 taskkill.exe 3344 taskkill.exe 436 taskkill.exe 4320 taskkill.exe 3680 taskkill.exe 4536 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3760 Perm Loader.vmp.exe 3760 Perm Loader.vmp.exe 3760 Perm Loader.vmp.exe 3760 Perm Loader.vmp.exe 3760 Perm Loader.vmp.exe 3760 Perm Loader.vmp.exe -
Suspicious behavior: LoadsDriver 22 IoCs
pid Process 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found -
Suspicious use of AdjustPrivilegeToken 53 IoCs
description pid Process Token: SeDebugPrivilege 1852 taskkill.exe Token: SeDebugPrivilege 4644 taskkill.exe Token: SeDebugPrivilege 3428 taskkill.exe Token: SeDebugPrivilege 3344 taskkill.exe Token: SeDebugPrivilege 4324 taskkill.exe Token: SeDebugPrivilege 2836 taskkill.exe Token: SeDebugPrivilege 3784 taskkill.exe Token: SeDebugPrivilege 2316 taskkill.exe Token: SeDebugPrivilege 2052 taskkill.exe Token: SeDebugPrivilege 2020 taskkill.exe Token: SeDebugPrivilege 3680 taskkill.exe Token: SeDebugPrivilege 2828 taskkill.exe Token: SeDebugPrivilege 2240 taskkill.exe Token: SeDebugPrivilege 2584 taskkill.exe Token: SeDebugPrivilege 2216 taskkill.exe Token: SeDebugPrivilege 4744 taskkill.exe Token: SeDebugPrivilege 4140 taskkill.exe Token: SeDebugPrivilege 3716 taskkill.exe Token: SeDebugPrivilege 436 taskkill.exe Token: SeDebugPrivilege 4416 taskkill.exe Token: SeDebugPrivilege 816 taskkill.exe Token: SeDebugPrivilege 2496 taskkill.exe Token: SeDebugPrivilege 4320 taskkill.exe Token: SeDebugPrivilege 2000 taskkill.exe Token: SeDebugPrivilege 1556 taskkill.exe Token: SeDebugPrivilege 2488 taskkill.exe Token: SeDebugPrivilege 2920 taskkill.exe Token: SeDebugPrivilege 1084 taskkill.exe Token: SeDebugPrivilege 3900 taskkill.exe Token: SeDebugPrivilege 1920 taskkill.exe Token: SeDebugPrivilege 4636 taskkill.exe Token: SeDebugPrivilege 2632 taskkill.exe Token: SeDebugPrivilege 4536 taskkill.exe Token: SeDebugPrivilege 1576 taskkill.exe Token: SeDebugPrivilege 1124 taskkill.exe Token: SeDebugPrivilege 4960 taskkill.exe Token: SeDebugPrivilege 3364 taskkill.exe Token: SeDebugPrivilege 1864 taskkill.exe Token: SeDebugPrivilege 3412 taskkill.exe Token: SeDebugPrivilege 4384 taskkill.exe Token: SeDebugPrivilege 1344 taskkill.exe Token: SeDebugPrivilege 4132 taskkill.exe Token: SeDebugPrivilege 1148 taskkill.exe Token: SeDebugPrivilege 5060 taskkill.exe Token: SeDebugPrivilege 3192 taskkill.exe Token: SeDebugPrivilege 2852 taskkill.exe Token: SeDebugPrivilege 1812 taskkill.exe Token: SeDebugPrivilege 3660 taskkill.exe Token: SeDebugPrivilege 3344 taskkill.exe Token: SeDebugPrivilege 4904 taskkill.exe Token: SeDebugPrivilege 4788 taskkill.exe Token: SeDebugPrivilege 2956 taskkill.exe Token: SeDebugPrivilege 1776 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3760 wrote to memory of 444 3760 Perm Loader.vmp.exe 85 PID 3760 wrote to memory of 444 3760 Perm Loader.vmp.exe 85 PID 444 wrote to memory of 1852 444 cmd.exe 86 PID 444 wrote to memory of 1852 444 cmd.exe 86 PID 3760 wrote to memory of 3132 3760 Perm Loader.vmp.exe 88 PID 3760 wrote to memory of 3132 3760 Perm Loader.vmp.exe 88 PID 3132 wrote to memory of 4644 3132 cmd.exe 89 PID 3132 wrote to memory of 4644 3132 cmd.exe 89 PID 3760 wrote to memory of 4904 3760 Perm Loader.vmp.exe 90 PID 3760 wrote to memory of 4904 3760 Perm Loader.vmp.exe 90 PID 4904 wrote to memory of 3428 4904 cmd.exe 91 PID 4904 wrote to memory of 3428 4904 cmd.exe 91 PID 3760 wrote to memory of 3900 3760 Perm Loader.vmp.exe 92 PID 3760 wrote to memory of 3900 3760 Perm Loader.vmp.exe 92 PID 3760 wrote to memory of 2172 3760 Perm Loader.vmp.exe 93 PID 3760 wrote to memory of 2172 3760 Perm Loader.vmp.exe 93 PID 2172 wrote to memory of 3344 2172 cmd.exe 94 PID 2172 wrote to memory of 3344 2172 cmd.exe 94 PID 3760 wrote to memory of 2884 3760 Perm Loader.vmp.exe 95 PID 3760 wrote to memory of 2884 3760 Perm Loader.vmp.exe 95 PID 2884 wrote to memory of 4324 2884 cmd.exe 96 PID 2884 wrote to memory of 4324 2884 cmd.exe 96 PID 3760 wrote to memory of 2992 3760 Perm Loader.vmp.exe 97 PID 3760 wrote to memory of 2992 3760 Perm Loader.vmp.exe 97 PID 2992 wrote to memory of 2836 2992 cmd.exe 98 PID 2992 wrote to memory of 2836 2992 cmd.exe 98 PID 3760 wrote to memory of 4252 3760 Perm Loader.vmp.exe 99 PID 3760 wrote to memory of 4252 3760 Perm Loader.vmp.exe 99 PID 4252 wrote to memory of 3784 4252 cmd.exe 100 PID 4252 wrote to memory of 3784 4252 cmd.exe 100 PID 3760 wrote to memory of 5004 3760 Perm Loader.vmp.exe 101 PID 3760 wrote to memory of 5004 3760 Perm Loader.vmp.exe 101 PID 5004 wrote to memory of 2316 5004 cmd.exe 102 PID 5004 wrote to memory of 2316 5004 cmd.exe 102 PID 3760 wrote to memory of 3144 3760 Perm Loader.vmp.exe 103 PID 3760 wrote to memory of 3144 3760 Perm Loader.vmp.exe 103 PID 3144 wrote to memory of 2052 3144 cmd.exe 104 PID 3144 wrote to memory of 2052 3144 cmd.exe 104 PID 3760 wrote to memory of 3248 3760 Perm Loader.vmp.exe 105 PID 3760 wrote to memory of 3248 3760 Perm Loader.vmp.exe 105 PID 3248 wrote to memory of 2020 3248 cmd.exe 106 PID 3248 wrote to memory of 2020 3248 cmd.exe 106 PID 3760 wrote to memory of 4428 3760 Perm Loader.vmp.exe 107 PID 3760 wrote to memory of 4428 3760 Perm Loader.vmp.exe 107 PID 4428 wrote to memory of 3680 4428 cmd.exe 108 PID 4428 wrote to memory of 3680 4428 cmd.exe 108 PID 3760 wrote to memory of 3168 3760 Perm Loader.vmp.exe 109 PID 3760 wrote to memory of 3168 3760 Perm Loader.vmp.exe 109 PID 3168 wrote to memory of 2828 3168 cmd.exe 110 PID 3168 wrote to memory of 2828 3168 cmd.exe 110 PID 3760 wrote to memory of 3656 3760 Perm Loader.vmp.exe 111 PID 3760 wrote to memory of 3656 3760 Perm Loader.vmp.exe 111 PID 3656 wrote to memory of 2240 3656 cmd.exe 112 PID 3656 wrote to memory of 2240 3656 cmd.exe 112 PID 3760 wrote to memory of 3644 3760 Perm Loader.vmp.exe 113 PID 3760 wrote to memory of 3644 3760 Perm Loader.vmp.exe 113 PID 3644 wrote to memory of 2584 3644 cmd.exe 114 PID 3644 wrote to memory of 2584 3644 cmd.exe 114 PID 3760 wrote to memory of 1512 3760 Perm Loader.vmp.exe 115 PID 3760 wrote to memory of 1512 3760 Perm Loader.vmp.exe 115 PID 3760 wrote to memory of 1860 3760 Perm Loader.vmp.exe 116 PID 3760 wrote to memory of 1860 3760 Perm Loader.vmp.exe 116 PID 1860 wrote to memory of 1708 1860 cmd.exe 117 PID 1860 wrote to memory of 1708 1860 cmd.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\Perm Loader.vmp.exe"C:\Users\Admin\AppData\Local\Temp\Perm Loader.vmp.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im KsDumperClient.exe >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:444 -
C:\Windows\system32\taskkill.exetaskkill /f /im KsDumperClient.exe3⤵
- Cerber
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1852
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im KsDumper.exe >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Windows\system32\taskkill.exetaskkill /f /im KsDumper.exe3⤵
- Cerber
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4644
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Windows\system32\taskkill.exetaskkill /f /im HTTPDebuggerUI.exe3⤵
- Cerber
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3428
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:3900
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\system32\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe3⤵
- Cerber
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3344
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im ProcessHacker.exe >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\system32\taskkill.exetaskkill /f /im ProcessHacker.exe3⤵
- Cerber
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4324
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im idaq.exe >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\system32\taskkill.exetaskkill /f /im idaq.exe3⤵
- Cerber
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2836
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im idaq64.exe >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\Windows\system32\taskkill.exetaskkill /f /im idaq64.exe3⤵
- Cerber
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3784
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im Wireshark.exe >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\system32\taskkill.exetaskkill /f /im Wireshark.exe3⤵
- Cerber
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2316
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im Fiddler.exe >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Windows\system32\taskkill.exetaskkill /f /im Fiddler.exe3⤵
- Cerber
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2052
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im FiddlerEverywhere.exe >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Windows\system32\taskkill.exetaskkill /f /im FiddlerEverywhere.exe3⤵
- Cerber
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2020
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im Xenos64.exe >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\system32\taskkill.exetaskkill /f /im Xenos64.exe3⤵
- Cerber
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3680
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im Xenos.exe >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Windows\system32\taskkill.exetaskkill /f /im Xenos.exe3⤵
- Cerber
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2828
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im Xenos32.exe >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Windows\system32\taskkill.exetaskkill /f /im Xenos32.exe3⤵
- Cerber
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2240
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im de4dot.exe >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Windows\system32\taskkill.exetaskkill /f /im de4dot.exe3⤵
- Cerber
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2584
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:1512
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im Cheat Engine.exe >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\system32\taskkill.exetaskkill /f /im Cheat Engine.exe3⤵
- Cerber
- Kills process with taskkill
PID:1708
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im cheatengine-x86_64.exe >nul 2>&12⤵PID:3400
-
C:\Windows\system32\taskkill.exetaskkill /f /im cheatengine-x86_64.exe3⤵
- Cerber
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2216
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im cheatengine-x86_64-SSE4-AVX2.exe >nul 2>&12⤵PID:1908
-
C:\Windows\system32\taskkill.exetaskkill /f /im cheatengine-x86_64-SSE4-AVX2.exe3⤵
- Cerber
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4744
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im MugenJinFuu-x86_64-SSE4-AVX2.exe >nul 2>&12⤵PID:3692
-
C:\Windows\system32\taskkill.exetaskkill /f /im MugenJinFuu-x86_64-SSE4-AVX2.exe3⤵
- Cerber
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4140
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im MugenJinFuu-i386.exe >nul 2>&12⤵PID:4348
-
C:\Windows\system32\taskkill.exetaskkill /f /im MugenJinFuu-i386.exe3⤵
- Cerber
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3716
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im cheatengine-x86_64.exe >nul 2>&12⤵PID:4116
-
C:\Windows\system32\taskkill.exetaskkill /f /im cheatengine-x86_64.exe3⤵
- Cerber
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:436
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im cheatengine-i386.exe >nul 2>&12⤵PID:2660
-
C:\Windows\system32\taskkill.exetaskkill /f /im cheatengine-i386.exe3⤵
- Cerber
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4416
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im HTTP Debugger Windows Service (32 bit).exe >nul 2>&12⤵PID:2292
-
C:\Windows\system32\taskkill.exetaskkill /f /im HTTP Debugger Windows Service (32 bit).exe3⤵
- Cerber
- Kills process with taskkill
PID:380
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im KsDumper.exe >nul 2>&12⤵PID:4640
-
C:\Windows\system32\taskkill.exetaskkill /f /im KsDumper.exe3⤵
- Cerber
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:816
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\System32\AMIDEWINx64.EXE /IVN "AMI"2⤵PID:1644
-
C:\Windows\System32\AMIDEWINx64.EXEC:\Windows\System32\AMIDEWINx64.EXE /IVN "AMI"3⤵
- Cerber
- Executes dropped EXE
PID:3040
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im OllyDbg.exe >nul 2>&12⤵PID:3396
-
C:\Windows\system32\taskkill.exetaskkill /f /im OllyDbg.exe3⤵
- Cerber
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2496
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\System32\AMIDEWINx64.EXE /SP "System product name"2⤵PID:872
-
C:\Windows\System32\AMIDEWINx64.EXEC:\Windows\System32\AMIDEWINx64.EXE /SP "System product name"3⤵
- Cerber
- Executes dropped EXE
PID:3412
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im x64dbg.exe >nul 2>&12⤵PID:3816
-
C:\Windows\system32\taskkill.exetaskkill /f /im x64dbg.exe3⤵
- Cerber
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4320
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\System32\AMIDEWINx64.EXE /SP "System product name"2⤵PID:2004
-
C:\Windows\System32\AMIDEWINx64.EXEC:\Windows\System32\AMIDEWINx64.EXE /SP "System product name"3⤵
- Cerber
- Executes dropped EXE
PID:1952
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im x32dbg.exe >nul 2>&12⤵PID:3056
-
C:\Windows\system32\taskkill.exetaskkill /f /im x32dbg.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2000
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\System32\AMIDEWINx64.EXE /SV "System version"2⤵PID:1244
-
C:\Windows\System32\AMIDEWINx64.EXEC:\Windows\System32\AMIDEWINx64.EXE /SV "System version"3⤵
- Cerber
- Executes dropped EXE
PID:3260
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵PID:4648
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1556
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\System32\AMIDEWINx64.EXE /SS MZ40GCAI0R2⤵PID:2332
-
C:\Windows\System32\AMIDEWINx64.EXEC:\Windows\System32\AMIDEWINx64.EXE /SS MZ40GCAI0R3⤵
- Cerber
- Executes dropped EXE
PID:4556
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&12⤵PID:4624
-
C:\Windows\system32\taskkill.exetaskkill /f /im HTTPDebuggerUI.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2488
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\System32\AMIDEWINx64.EXE /SU AUTO2⤵PID:1192
-
C:\Windows\System32\AMIDEWINx64.EXEC:\Windows\System32\AMIDEWINx64.EXE /SU AUTO3⤵
- Cerber
- Executes dropped EXE
PID:1108
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵PID:1812
-
C:\Windows\system32\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2920
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\System32\AMIDEWINx64.EXE /SK "To Be Filled By O.E.M"2⤵PID:4452
-
C:\Windows\System32\AMIDEWINx64.EXEC:\Windows\System32\AMIDEWINx64.EXE /SK "To Be Filled By O.E.M"3⤵
- Cerber
- Executes dropped EXE
PID:3152
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\System32\AMIDEWINx64.EXE /SK "To Be Filled By O.E.M"2⤵PID:4928
-
C:\Windows\System32\AMIDEWINx64.EXEC:\Windows\System32\AMIDEWINx64.EXE /SK "To Be Filled By O.E.M"3⤵
- Cerber
- Executes dropped EXE
PID:4336
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im Ida64.exe >nul 2>&12⤵PID:1072
-
C:\Windows\system32\taskkill.exetaskkill /f /im Ida64.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1084
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\System32\AMIDEWINx64.EXE /BM "ASRock"2⤵PID:4328
-
C:\Windows\System32\AMIDEWINx64.EXEC:\Windows\System32\AMIDEWINx64.EXE /BM "ASRock"3⤵
- Cerber
- Executes dropped EXE
PID:1684
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im OllyDbg.exe >nul 2>&12⤵PID:4904
-
C:\Windows\system32\taskkill.exetaskkill /f /im OllyDbg.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3900
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\System32\AMIDEWINx64.EXE /BP "B560M-C"2⤵PID:2872
-
C:\Windows\System32\AMIDEWINx64.EXEC:\Windows\System32\AMIDEWINx64.EXE /BP "B560M-C"3⤵
- Cerber
- Executes dropped EXE
PID:3012
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im Dbg64.exe >nul 2>&12⤵PID:2628
-
C:\Windows\system32\taskkill.exetaskkill /f /im Dbg64.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1920
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\System32\AMIDEWINx64.EXE /BV " "2⤵PID:2668
-
C:\Windows\System32\AMIDEWINx64.EXEC:\Windows\System32\AMIDEWINx64.EXE /BV " "3⤵
- Cerber
- Executes dropped EXE
PID:1600
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im Dbg32.exe >nul 2>&12⤵PID:888
-
C:\Windows\system32\taskkill.exetaskkill /f /im Dbg32.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4636
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\System32\AMIDEWINx64.EXE /BS PBC8ZFQ7FZ8W9S2⤵PID:3608
-
C:\Windows\System32\AMIDEWINx64.EXEC:\Windows\System32\AMIDEWINx64.EXE /BS PBC8ZFQ7FZ8W9S3⤵
- Cerber
- Executes dropped EXE
PID:4984
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im Taskmgr.exe >nul 2>&12⤵PID:4676
-
C:\Windows\system32\taskkill.exetaskkill /f /im Taskmgr.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2632
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\System32\AMIDEWINx64.EXE /BT "Default string"2⤵PID:4056
-
C:\Windows\System32\AMIDEWINx64.EXEC:\Windows\System32\AMIDEWINx64.EXE /BT "Default string"3⤵
- Cerber
- Executes dropped EXE
PID:4428
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&12⤵PID:4800
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4536
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\System32\AMIDEWINx64.EXE /BLC "Default string"2⤵PID:820
-
C:\Windows\System32\AMIDEWINx64.EXEC:\Windows\System32\AMIDEWINx64.EXE /BLC "Default string"3⤵
- Cerber
- Executes dropped EXE
PID:3656
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\System32\AMIDEWINx64.EXE /CM "Default string"2⤵PID:3460
-
C:\Windows\System32\AMIDEWINx64.EXEC:\Windows\System32\AMIDEWINx64.EXE /CM "Default string"3⤵
- Cerber
- Executes dropped EXE
PID:1512
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵PID:1416
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1576
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\System32\AMIDEWINx64.EXE /CV "Default string"2⤵PID:3640
-
C:\Windows\System32\AMIDEWINx64.EXEC:\Windows\System32\AMIDEWINx64.EXE /CV "Default string"3⤵
- Cerber
- Executes dropped EXE
PID:2544
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\System32\AMIDEWINx64.EXE /CS SWCF9IZW372⤵PID:3400
-
C:\Windows\System32\AMIDEWINx64.EXEC:\Windows\System32\AMIDEWINx64.EXE /CS SWCF9IZW373⤵
- Cerber
- Executes dropped EXE
PID:3516
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&12⤵PID:1516
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1124
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im KsDumperClient.exe >nul 2>&12⤵PID:4660
-
C:\Windows\system32\taskkill.exetaskkill /f /im KsDumperClient.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4960
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\System32\AMIDEWINx64.EXE /CA "Default string"2⤵PID:1128
-
C:\Windows\System32\AMIDEWINx64.EXEC:\Windows\System32\AMIDEWINx64.EXE /CA "Default string"3⤵
- Cerber
- Executes dropped EXE
PID:860
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\System32\AMIDEWINx64.EXE /CSK "SKU"2⤵PID:436
-
C:\Windows\System32\AMIDEWINx64.EXEC:\Windows\System32\AMIDEWINx64.EXE /CSK "SKU"3⤵
- Cerber
- Executes dropped EXE
PID:1924
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im KsDumper.exe >nul 2>&12⤵PID:4260
-
C:\Windows\system32\taskkill.exetaskkill /f /im KsDumper.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3364
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\System32\AMIDEWINx64.EXE /PSN "To Be Filled By O.E.M."2⤵PID:4724
-
C:\Windows\System32\AMIDEWINx64.EXEC:\Windows\System32\AMIDEWINx64.EXE /PSN "To Be Filled By O.E.M."3⤵
- Cerber
- Executes dropped EXE
PID:1856
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\System32\AMIDEWINx64.EXE /PAT "To Be Filled By O.E.M."2⤵PID:2416
-
C:\Windows\System32\AMIDEWINx64.EXEC:\Windows\System32\AMIDEWINx64.EXE /PAT "To Be Filled By O.E.M."3⤵
- Cerber
- Executes dropped EXE
PID:2500
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&12⤵PID:5052
-
C:\Windows\system32\taskkill.exetaskkill /f /im HTTPDebuggerUI.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1864
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\System32\AMIDEWINx64.EXE /PPN "To Be Filled By O.E.M."2⤵PID:1644
-
C:\Windows\System32\AMIDEWINx64.EXEC:\Windows\System32\AMIDEWINx64.EXE /PPN "To Be Filled By O.E.M."3⤵
- Cerber
- Executes dropped EXE
PID:4244
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵PID:3396
-
C:\Windows\system32\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3412
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:3060
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im ProcessHacker.exe >nul 2>&12⤵PID:648
-
C:\Windows\system32\taskkill.exetaskkill /f /im ProcessHacker.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4384
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im idaq.exe >nul 2>&12⤵PID:4868
-
C:\Windows\system32\taskkill.exetaskkill /f /im idaq.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1344
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im idaq64.exe >nul 2>&12⤵PID:3820
-
C:\Windows\system32\taskkill.exetaskkill /f /im idaq64.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4132
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im Wireshark.exe >nul 2>&12⤵PID:1244
-
C:\Windows\system32\taskkill.exetaskkill /f /im Wireshark.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1148
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im Fiddler.exe >nul 2>&12⤵PID:4532
-
C:\Windows\system32\taskkill.exetaskkill /f /im Fiddler.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5060
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im FiddlerEverywhere.exe >nul 2>&12⤵PID:4624
-
C:\Windows\system32\taskkill.exetaskkill /f /im FiddlerEverywhere.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3192
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im Xenos64.exe >nul 2>&12⤵PID:3884
-
C:\Windows\system32\taskkill.exetaskkill /f /im Xenos64.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2852
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im Xenos.exe >nul 2>&12⤵PID:2920
-
C:\Windows\system32\taskkill.exetaskkill /f /im Xenos.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1812
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im Xenos32.exe >nul 2>&12⤵PID:3920
-
C:\Windows\system32\taskkill.exetaskkill /f /im Xenos32.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3660
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im de4dot.exe >nul 2>&12⤵PID:3768
-
C:\Windows\system32\taskkill.exetaskkill /f /im de4dot.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3344
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im Cheat Engine.exe >nul 2>&12⤵PID:516
-
C:\Windows\system32\taskkill.exetaskkill /f /im Cheat Engine.exe3⤵
- Kills process with taskkill
PID:3900
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im cheatengine-x86_64.exe >nul 2>&12⤵PID:4328
-
C:\Windows\system32\taskkill.exetaskkill /f /im cheatengine-x86_64.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4904
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im cheatengine-x86_64-SSE4-AVX2.exe >nul 2>&12⤵PID:3000
-
C:\Windows\system32\taskkill.exetaskkill /f /im cheatengine-x86_64-SSE4-AVX2.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4788
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im MugenJinFuu-x86_64-SSE4-AVX2.exe >nul 2>&12⤵PID:2628
-
C:\Windows\system32\taskkill.exetaskkill /f /im MugenJinFuu-x86_64-SSE4-AVX2.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2956
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im MugenJinFuu-i386.exe >nul 2>&12⤵PID:3144
-
C:\Windows\system32\taskkill.exetaskkill /f /im MugenJinFuu-i386.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1776
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im cheatengine-x86_64.exe >nul 2>&12⤵PID:4304
-
C:\Windows\system32\taskkill.exetaskkill /f /im cheatengine-x86_64.exe3⤵
- Kills process with taskkill
PID:888
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im cheatengine-i386.exe >nul 2>&12⤵PID:4100
-
C:\Windows\system32\taskkill.exetaskkill /f /im cheatengine-i386.exe3⤵
- Kills process with taskkill
PID:3680
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c shutdown /r /t 02⤵PID:2876
-
C:\Windows\system32\shutdown.exeshutdown /r /t 03⤵PID:2476
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im HTTP Debugger Windows Service (32 bit).exe >nul 2>&12⤵PID:3248
-
C:\Windows\system32\taskkill.exetaskkill /f /im HTTP Debugger Windows Service (32 bit).exe3⤵
- Kills process with taskkill
PID:1368
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa39da055 /state1:0x41c64e6d1⤵PID:2752
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
455KB
MD59adfcdac59db3286690c7eede8da2528
SHA10b54d251438a634bd13b49a1f20587cf03d4598d
SHA25613037eedd91f9313ec0d807947db65c639642e5ae6497e87d12fa6d19951f78e
SHA512fde1700cdb4212593ec2733944a169c7d02f436ca6831719a33482fbfd0be289697c9aa6ce7ddfb6c245e87952b35416929bbf69753d21a24197ac6c2d1243cc
-
Filesize
29KB
MD5f22740ba54a400fd2be7690bb204aa08
SHA15812387783d61c6ab5702213bb968590a18065e3
SHA25665c26276cadda7a36f8977d1d01120edb5c3418be2317d501761092d5f9916c9
SHA512ac1f89736cf348f634b526569b5783118a1a35324f9ce2f2804001e5a04751f8cc21d09bfa1c4803cd14a64152beba868f5ecf119f10fa3ccbe680d2fb481500