Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
04/04/2025, 08:14
Behavioral task
behavioral1
Sample
USDTFlasherPrivatev2.2.exe
Resource
win10v2004-20250314-en
General
-
Target
USDTFlasherPrivatev2.2.exe
-
Size
1.9MB
-
MD5
051d7528b34a6a04c5a99ebde64adcb4
-
SHA1
4ceee7ca158359a5ac373442c83b3942d97c5124
-
SHA256
acb84a0336a45dc387209935852c267abba63b86d820c6a8ea5cbcce0dd7d5e4
-
SHA512
15cfe52738281764625e04cbb65ab1143d63587fa5a7546d2b016e93801584e82506871bb2810738583ecdb88a92e2bc60ceb106db696028f1f22221a8449c5b
-
SSDEEP
24576:gPgvWGZl9tJ5Mo2QhG3aMUFgEsNj9dfF2b6OZBfebd6bIt3MZ2N6zKnBDB+obJwK:0+hZd0Nj9vi6WGkb43uz49B+obC+/v
Malware Config
Extracted
svcstealer
176.113.115.149
185.81.68.156
Signatures
-
Detects SvcStealer Payload 64 IoCs
SvcStealer aka Diamotrix Clipper is a stealer/downloader written in C++.
resource yara_rule behavioral1/files/0x00350000000237db-6.dat family_svcstealer behavioral1/memory/2056-28-0x00007FF668600000-0x00007FF668705000-memory.dmp family_svcstealer behavioral1/memory/3564-17-0x0000000003420000-0x000000000352B000-memory.dmp family_svcstealer behavioral1/memory/3564-18-0x0000000003420000-0x000000000352B000-memory.dmp family_svcstealer behavioral1/memory/3564-43-0x0000000003420000-0x000000000352B000-memory.dmp family_svcstealer behavioral1/memory/2056-45-0x00007FF668600000-0x00007FF668705000-memory.dmp family_svcstealer behavioral1/memory/3564-40-0x0000000003680000-0x00000000036C1000-memory.dmp family_svcstealer behavioral1/memory/3564-32-0x0000000003420000-0x000000000352B000-memory.dmp family_svcstealer behavioral1/memory/3564-33-0x0000000003420000-0x000000000352B000-memory.dmp family_svcstealer behavioral1/memory/3564-29-0x0000000002F70000-0x0000000002FA3000-memory.dmp family_svcstealer behavioral1/memory/3564-27-0x0000000003420000-0x000000000352B000-memory.dmp family_svcstealer behavioral1/memory/4648-55-0x00007FF668600000-0x00007FF668705000-memory.dmp family_svcstealer behavioral1/memory/4712-58-0x00007FF617FA0000-0x00007FF6180A5000-memory.dmp family_svcstealer behavioral1/memory/4896-60-0x00007FF617FA0000-0x00007FF6180A5000-memory.dmp family_svcstealer behavioral1/memory/616-71-0x00007FF76CA40000-0x00007FF76CB45000-memory.dmp family_svcstealer behavioral1/memory/616-72-0x00007FF76CA40000-0x00007FF76CB45000-memory.dmp family_svcstealer behavioral1/memory/1292-78-0x00007FF644DD0000-0x00007FF644ED5000-memory.dmp family_svcstealer behavioral1/memory/1292-79-0x00007FF644DD0000-0x00007FF644ED5000-memory.dmp family_svcstealer behavioral1/memory/3564-82-0x0000000003420000-0x000000000352B000-memory.dmp family_svcstealer behavioral1/memory/3564-92-0x0000000003420000-0x000000000352B000-memory.dmp family_svcstealer behavioral1/memory/392-95-0x00007FF6F4700000-0x00007FF6F4805000-memory.dmp family_svcstealer behavioral1/memory/392-98-0x00007FF6F4700000-0x00007FF6F4805000-memory.dmp family_svcstealer behavioral1/files/0x000800000002427b-96.dat family_svcstealer behavioral1/memory/4468-100-0x00007FF6F4700000-0x00007FF6F4805000-memory.dmp family_svcstealer behavioral1/memory/5276-107-0x00007FF7FCC20000-0x00007FF7FCD25000-memory.dmp family_svcstealer behavioral1/memory/5276-108-0x00007FF7FCC20000-0x00007FF7FCD25000-memory.dmp family_svcstealer behavioral1/memory/1632-115-0x00007FF69FE10000-0x00007FF69FF15000-memory.dmp family_svcstealer behavioral1/memory/1632-116-0x00007FF69FE10000-0x00007FF69FF15000-memory.dmp family_svcstealer behavioral1/memory/5752-123-0x00007FF68C280000-0x00007FF68C385000-memory.dmp family_svcstealer behavioral1/memory/5752-124-0x00007FF68C280000-0x00007FF68C385000-memory.dmp family_svcstealer behavioral1/memory/5848-132-0x00007FF76F610000-0x00007FF76F715000-memory.dmp family_svcstealer behavioral1/memory/5848-133-0x00007FF76F610000-0x00007FF76F715000-memory.dmp family_svcstealer behavioral1/memory/5696-140-0x00007FF675B90000-0x00007FF675C95000-memory.dmp family_svcstealer behavioral1/memory/5696-141-0x00007FF675B90000-0x00007FF675C95000-memory.dmp family_svcstealer behavioral1/memory/4472-148-0x00007FF6931D0000-0x00007FF6932D5000-memory.dmp family_svcstealer behavioral1/memory/4472-149-0x00007FF6931D0000-0x00007FF6932D5000-memory.dmp family_svcstealer behavioral1/memory/5600-172-0x00007FF7525D0000-0x00007FF7526D5000-memory.dmp family_svcstealer behavioral1/memory/5600-173-0x00007FF7525D0000-0x00007FF7526D5000-memory.dmp family_svcstealer behavioral1/memory/5704-180-0x00007FF6225C0000-0x00007FF6226C5000-memory.dmp family_svcstealer behavioral1/memory/5704-181-0x00007FF6225C0000-0x00007FF6226C5000-memory.dmp family_svcstealer behavioral1/memory/3792-188-0x00007FF69CB60000-0x00007FF69CC65000-memory.dmp family_svcstealer behavioral1/memory/3792-189-0x00007FF69CB60000-0x00007FF69CC65000-memory.dmp family_svcstealer behavioral1/memory/3752-196-0x00007FF738F80000-0x00007FF739085000-memory.dmp family_svcstealer behavioral1/memory/3752-197-0x00007FF738F80000-0x00007FF739085000-memory.dmp family_svcstealer behavioral1/memory/3600-204-0x00007FF67E4E0000-0x00007FF67E5E5000-memory.dmp family_svcstealer behavioral1/memory/3600-205-0x00007FF67E4E0000-0x00007FF67E5E5000-memory.dmp family_svcstealer behavioral1/memory/2960-213-0x00007FF6566E0000-0x00007FF6567E5000-memory.dmp family_svcstealer behavioral1/memory/2436-219-0x00007FF7D5BD0000-0x00007FF7D5CD5000-memory.dmp family_svcstealer behavioral1/memory/2436-220-0x00007FF7D5BD0000-0x00007FF7D5CD5000-memory.dmp family_svcstealer behavioral1/memory/3256-227-0x00007FF633E30000-0x00007FF633F35000-memory.dmp family_svcstealer behavioral1/memory/3256-228-0x00007FF633E30000-0x00007FF633F35000-memory.dmp family_svcstealer behavioral1/memory/2356-251-0x00007FF60A7A0000-0x00007FF60A8A5000-memory.dmp family_svcstealer behavioral1/memory/2356-252-0x00007FF60A7A0000-0x00007FF60A8A5000-memory.dmp family_svcstealer behavioral1/memory/396-261-0x00007FF77AF60000-0x00007FF77B065000-memory.dmp family_svcstealer behavioral1/memory/396-260-0x00007FF77AF60000-0x00007FF77B065000-memory.dmp family_svcstealer behavioral1/memory/4360-268-0x00007FF7E9270000-0x00007FF7E9375000-memory.dmp family_svcstealer behavioral1/memory/4360-269-0x00007FF7E9270000-0x00007FF7E9375000-memory.dmp family_svcstealer behavioral1/memory/4200-276-0x00007FF62B700000-0x00007FF62B805000-memory.dmp family_svcstealer behavioral1/memory/4200-277-0x00007FF62B700000-0x00007FF62B805000-memory.dmp family_svcstealer behavioral1/memory/624-284-0x00007FF68EE30000-0x00007FF68EF35000-memory.dmp family_svcstealer behavioral1/memory/624-285-0x00007FF68EE30000-0x00007FF68EF35000-memory.dmp family_svcstealer behavioral1/memory/5776-292-0x00007FF6C9E80000-0x00007FF6C9F85000-memory.dmp family_svcstealer behavioral1/memory/5776-293-0x00007FF6C9E80000-0x00007FF6C9F85000-memory.dmp family_svcstealer behavioral1/memory/3792-300-0x00007FF7AEA30000-0x00007FF7AEB35000-memory.dmp family_svcstealer -
SvcStealer, Diamotrix
SvcStealer aka Diamotrix Clipper is a stealer/downloader written in C++.
-
Svcstealer family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Control Panel\International\Geo\Nation USDTFlasherPrivatev2.2.exe -
Executes dropped EXE 64 IoCs
pid Process 2056 uyghgvf.exe 4200 bnbnjhc.exe 4736 bvbvcdd.exe 4648 uyghgvf.exe 4712 ebfabcdcac.exe 4752 bvbvcdd.exe 4896 ebfabcdcac.exe 5832 winserv.exe 616 ebfabcdcac.exe 1292 ebfabcdcac.exe 392 ebfabcdcac.exe 4468 ebfabcdcac.exe 5276 ebfabcdcac.exe 1632 ebfabcdcac.exe 5752 ebfabcdcac.exe 5848 ebfabcdcac.exe 5696 ebfabcdcac.exe 4472 ebfabcdcac.exe 5600 ebfabcdcac.exe 5704 ebfabcdcac.exe 3792 ebfabcdcac.exe 3752 ebfabcdcac.exe 3600 ebfabcdcac.exe 2960 ebfabcdcac.exe 2436 ebfabcdcac.exe 3256 ebfabcdcac.exe 2356 ebfabcdcac.exe 396 ebfabcdcac.exe 4360 ebfabcdcac.exe 4200 ebfabcdcac.exe 624 ebfabcdcac.exe 5776 ebfabcdcac.exe 3792 ebfabcdcac.exe 4728 ebfabcdcac.exe 3148 ebfabcdcac.exe 2944 ebfabcdcac.exe 5168 ebfabcdcac.exe 1244 ebfabcdcac.exe 2672 ebfabcdcac.exe 992 ebfabcdcac.exe 4536 ebfabcdcac.exe 1300 ebfabcdcac.exe 2636 ebfabcdcac.exe 4024 ebfabcdcac.exe 1352 84AD.tmp.exe 2468 ebfabcdcac.exe 5916 ebfabcdcac.exe 1672 ebfabcdcac.exe 3656 ebfabcdcac.exe 5480 ebfabcdcac.exe 4640 ebfabcdcac.exe 4572 ebfabcdcac.exe 1660 ebfabcdcac.exe 3416 ebfabcdcac.exe 2216 ebfabcdcac.exe 5940 ebfabcdcac.exe 3152 ebfabcdcac.exe 3716 ebfabcdcac.exe 5252 ebfabcdcac.exe 3576 ebfabcdcac.exe 5164 ebfabcdcac.exe 4296 ebfabcdcac.exe 1972 ebfabcdcac.exe 1496 ebfabcdcac.exe -
Loads dropped DLL 5 IoCs
pid Process 1852 8F67.tmp.exe 1852 8F67.tmp.exe 1852 8F67.tmp.exe 1852 8F67.tmp.exe 1852 8F67.tmp.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ebfabcdcac = "\"C:\\ProgramData\\ebfabcdcac.exe\"" uyghgvf.exe Set value (str) \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ebfabcdcac = "\"C:\\Users\\Admin\\AppData\\Roaming\\uyghgvf.exe\"" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ebfabcdcac = "\"C:\\ProgramData\\ebfabcdcac.exe\"" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SystemServices = "C:\\Users\\Admin\\AppData\\Roaming\\bvbvcdd.exe" bvbvcdd.exe Set value (str) \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SystemServices = "C:\\Users\\Admin\\AppData\\Roaming\\Winserv\\winserv.exe" bvbvcdd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bvbvcdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bvbvcdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winserv.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Explorer.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2056 uyghgvf.exe 2056 uyghgvf.exe 3564 Explorer.EXE 3564 Explorer.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3564 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3564 Explorer.EXE Token: SeCreatePagefilePrivilege 3564 Explorer.EXE Token: SeShutdownPrivilege 3564 Explorer.EXE Token: SeCreatePagefilePrivilege 3564 Explorer.EXE Token: SeShutdownPrivilege 3564 Explorer.EXE Token: SeCreatePagefilePrivilege 3564 Explorer.EXE Token: SeShutdownPrivilege 3564 Explorer.EXE Token: SeCreatePagefilePrivilege 3564 Explorer.EXE Token: SeShutdownPrivilege 3564 Explorer.EXE Token: SeCreatePagefilePrivilege 3564 Explorer.EXE Token: SeShutdownPrivilege 3564 Explorer.EXE Token: SeCreatePagefilePrivilege 3564 Explorer.EXE Token: SeShutdownPrivilege 3564 Explorer.EXE Token: SeCreatePagefilePrivilege 3564 Explorer.EXE Token: SeShutdownPrivilege 3564 Explorer.EXE Token: SeCreatePagefilePrivilege 3564 Explorer.EXE Token: SeShutdownPrivilege 3564 Explorer.EXE Token: SeCreatePagefilePrivilege 3564 Explorer.EXE Token: SeShutdownPrivilege 3564 Explorer.EXE Token: SeCreatePagefilePrivilege 3564 Explorer.EXE Token: SeShutdownPrivilege 3564 Explorer.EXE Token: SeCreatePagefilePrivilege 3564 Explorer.EXE Token: SeShutdownPrivilege 3564 Explorer.EXE Token: SeCreatePagefilePrivilege 3564 Explorer.EXE Token: SeShutdownPrivilege 3564 Explorer.EXE Token: SeCreatePagefilePrivilege 3564 Explorer.EXE Token: SeShutdownPrivilege 3564 Explorer.EXE Token: SeCreatePagefilePrivilege 3564 Explorer.EXE Token: SeShutdownPrivilege 3564 Explorer.EXE Token: SeCreatePagefilePrivilege 3564 Explorer.EXE Token: SeShutdownPrivilege 3564 Explorer.EXE Token: SeCreatePagefilePrivilege 3564 Explorer.EXE Token: SeShutdownPrivilege 3564 Explorer.EXE Token: SeCreatePagefilePrivilege 3564 Explorer.EXE Token: SeShutdownPrivilege 3564 Explorer.EXE Token: SeCreatePagefilePrivilege 3564 Explorer.EXE Token: SeShutdownPrivilege 3564 Explorer.EXE Token: SeCreatePagefilePrivilege 3564 Explorer.EXE Token: SeShutdownPrivilege 3564 Explorer.EXE Token: SeCreatePagefilePrivilege 3564 Explorer.EXE Token: SeShutdownPrivilege 3564 Explorer.EXE Token: SeCreatePagefilePrivilege 3564 Explorer.EXE Token: SeShutdownPrivilege 3564 Explorer.EXE Token: SeCreatePagefilePrivilege 3564 Explorer.EXE Token: SeShutdownPrivilege 3564 Explorer.EXE Token: SeCreatePagefilePrivilege 3564 Explorer.EXE Token: SeShutdownPrivilege 3564 Explorer.EXE Token: SeCreatePagefilePrivilege 3564 Explorer.EXE Token: SeShutdownPrivilege 3564 Explorer.EXE Token: SeCreatePagefilePrivilege 3564 Explorer.EXE Token: SeShutdownPrivilege 3564 Explorer.EXE Token: SeCreatePagefilePrivilege 3564 Explorer.EXE Token: SeShutdownPrivilege 3564 Explorer.EXE Token: SeCreatePagefilePrivilege 3564 Explorer.EXE Token: SeShutdownPrivilege 3564 Explorer.EXE Token: SeCreatePagefilePrivilege 3564 Explorer.EXE Token: SeShutdownPrivilege 3564 Explorer.EXE Token: SeCreatePagefilePrivilege 3564 Explorer.EXE Token: SeShutdownPrivilege 3564 Explorer.EXE Token: SeCreatePagefilePrivilege 3564 Explorer.EXE Token: SeShutdownPrivilege 3564 Explorer.EXE Token: SeCreatePagefilePrivilege 3564 Explorer.EXE Token: SeShutdownPrivilege 3564 Explorer.EXE Token: SeCreatePagefilePrivilege 3564 Explorer.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4244 wrote to memory of 2056 4244 USDTFlasherPrivatev2.2.exe 86 PID 4244 wrote to memory of 2056 4244 USDTFlasherPrivatev2.2.exe 86 PID 4244 wrote to memory of 4200 4244 USDTFlasherPrivatev2.2.exe 87 PID 4244 wrote to memory of 4200 4244 USDTFlasherPrivatev2.2.exe 87 PID 2056 wrote to memory of 3564 2056 uyghgvf.exe 56 PID 3564 wrote to memory of 4344 3564 Explorer.EXE 88 PID 3564 wrote to memory of 4344 3564 Explorer.EXE 88 PID 3564 wrote to memory of 5576 3564 Explorer.EXE 89 PID 3564 wrote to memory of 5576 3564 Explorer.EXE 89 PID 3564 wrote to memory of 3136 3564 Explorer.EXE 90 PID 3564 wrote to memory of 3136 3564 Explorer.EXE 90 PID 4244 wrote to memory of 4736 4244 USDTFlasherPrivatev2.2.exe 93 PID 4244 wrote to memory of 4736 4244 USDTFlasherPrivatev2.2.exe 93 PID 4244 wrote to memory of 4736 4244 USDTFlasherPrivatev2.2.exe 93 PID 3564 wrote to memory of 1660 3564 Explorer.EXE 95 PID 3564 wrote to memory of 1660 3564 Explorer.EXE 95 PID 3564 wrote to memory of 1568 3564 Explorer.EXE 97 PID 3564 wrote to memory of 1568 3564 Explorer.EXE 97 PID 5576 wrote to memory of 4648 5576 cmd.exe 99 PID 5576 wrote to memory of 4648 5576 cmd.exe 99 PID 4344 wrote to memory of 4712 4344 cmd.exe 101 PID 4344 wrote to memory of 4712 4344 cmd.exe 101 PID 1660 wrote to memory of 4752 1660 cmd.exe 100 PID 1660 wrote to memory of 4752 1660 cmd.exe 100 PID 1660 wrote to memory of 4752 1660 cmd.exe 100 PID 3136 wrote to memory of 4896 3136 cmd.exe 102 PID 3136 wrote to memory of 4896 3136 cmd.exe 102 PID 1568 wrote to memory of 5832 1568 cmd.exe 103 PID 1568 wrote to memory of 5832 1568 cmd.exe 103 PID 1568 wrote to memory of 5832 1568 cmd.exe 103 PID 3564 wrote to memory of 4988 3564 Explorer.EXE 107 PID 3564 wrote to memory of 4988 3564 Explorer.EXE 107 PID 4988 wrote to memory of 616 4988 cmd.exe 109 PID 4988 wrote to memory of 616 4988 cmd.exe 109 PID 3564 wrote to memory of 4536 3564 Explorer.EXE 112 PID 3564 wrote to memory of 4536 3564 Explorer.EXE 112 PID 4536 wrote to memory of 1292 4536 cmd.exe 114 PID 4536 wrote to memory of 1292 4536 cmd.exe 114 PID 3564 wrote to memory of 4272 3564 Explorer.EXE 117 PID 3564 wrote to memory of 4272 3564 Explorer.EXE 117 PID 3564 wrote to memory of 5196 3564 Explorer.EXE 118 PID 3564 wrote to memory of 5196 3564 Explorer.EXE 118 PID 4272 wrote to memory of 392 4272 cmd.exe 121 PID 4272 wrote to memory of 392 4272 cmd.exe 121 PID 5196 wrote to memory of 4468 5196 cmd.exe 122 PID 5196 wrote to memory of 4468 5196 cmd.exe 122 PID 3564 wrote to memory of 5364 3564 Explorer.EXE 124 PID 3564 wrote to memory of 5364 3564 Explorer.EXE 124 PID 5364 wrote to memory of 5276 5364 cmd.exe 126 PID 5364 wrote to memory of 5276 5364 cmd.exe 126 PID 3564 wrote to memory of 2880 3564 Explorer.EXE 127 PID 3564 wrote to memory of 2880 3564 Explorer.EXE 127 PID 2880 wrote to memory of 1632 2880 cmd.exe 129 PID 2880 wrote to memory of 1632 2880 cmd.exe 129 PID 3564 wrote to memory of 3124 3564 Explorer.EXE 132 PID 3564 wrote to memory of 3124 3564 Explorer.EXE 132 PID 3124 wrote to memory of 5752 3124 cmd.exe 134 PID 3124 wrote to memory of 5752 3124 cmd.exe 134 PID 3564 wrote to memory of 1580 3564 Explorer.EXE 135 PID 3564 wrote to memory of 1580 3564 Explorer.EXE 135 PID 1580 wrote to memory of 5848 1580 cmd.exe 137 PID 1580 wrote to memory of 5848 1580 cmd.exe 137 PID 3564 wrote to memory of 1980 3564 Explorer.EXE 138 PID 3564 wrote to memory of 1980 3564 Explorer.EXE 138
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Users\Admin\AppData\Local\Temp\USDTFlasherPrivatev2.2.exe"C:\Users\Admin\AppData\Local\Temp\USDTFlasherPrivatev2.2.exe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Users\Admin\AppData\Roaming\uyghgvf.exe"C:\Users\Admin\AppData\Roaming\uyghgvf.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2056
-
-
C:\Users\Admin\AppData\Roaming\bnbnjhc.exe"C:\Users\Admin\AppData\Roaming\bnbnjhc.exe"3⤵
- Executes dropped EXE
PID:4200
-
-
C:\Users\Admin\AppData\Roaming\bvbvcdd.exe"C:\Users\Admin\AppData\Roaming\bvbvcdd.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4736
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵
- Executes dropped EXE
PID:4712
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\uyghgvf.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:5576 -
C:\Users\Admin\AppData\Roaming\uyghgvf.exeC:\Users\Admin\AppData\Roaming\uyghgvf.exe3⤵
- Executes dropped EXE
PID:4648
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵
- Executes dropped EXE
PID:4896
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\bvbvcdd.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Roaming\bvbvcdd.exeC:\Users\Admin\AppData\Roaming\bvbvcdd.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4752
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Winserv\winserv.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Users\Admin\AppData\Roaming\Winserv\winserv.exeC:\Users\Admin\AppData\Roaming\Winserv\winserv.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5832
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵
- Executes dropped EXE
PID:616
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵
- Executes dropped EXE
PID:1292
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵
- Executes dropped EXE
PID:392
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:5196 -
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵
- Executes dropped EXE
PID:4468
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:5364 -
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵
- Executes dropped EXE
PID:5276
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵
- Executes dropped EXE
PID:1632
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵
- Executes dropped EXE
PID:5752
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵
- Executes dropped EXE
PID:5848
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:1980
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵
- Executes dropped EXE
PID:5696
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:3760
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵
- Executes dropped EXE
PID:4472
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:1928
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵
- Executes dropped EXE
PID:5600
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:5612
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵
- Executes dropped EXE
PID:5704
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:4640
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵
- Executes dropped EXE
PID:3792
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:5524
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵
- Executes dropped EXE
PID:3752
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:1316
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵
- Executes dropped EXE
PID:3600
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:1492
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵
- Executes dropped EXE
PID:2960
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:4988
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵
- Executes dropped EXE
PID:2436
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:5404
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵
- Executes dropped EXE
PID:3256
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:5256
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵
- Executes dropped EXE
PID:2356
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:824
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵
- Executes dropped EXE
PID:396
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:1876
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵
- Executes dropped EXE
PID:4360
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:2396
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵
- Executes dropped EXE
PID:4200
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:5496
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵
- Executes dropped EXE
PID:624
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:2832
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵
- Executes dropped EXE
PID:5776
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:5248
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵
- Executes dropped EXE
PID:3792
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:4720
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵
- Executes dropped EXE
PID:4728
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:3416
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵
- Executes dropped EXE
PID:3148
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:4996
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵
- Executes dropped EXE
PID:2944
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:996
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵
- Executes dropped EXE
PID:5168
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:1992
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵
- Executes dropped EXE
PID:1244
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:3256
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵
- Executes dropped EXE
PID:2672
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:4600
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵
- Executes dropped EXE
PID:992
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:1744
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵
- Executes dropped EXE
PID:4536
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:6112
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵
- Executes dropped EXE
PID:1300
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:2096
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵
- Executes dropped EXE
PID:2636
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:396
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵
- Executes dropped EXE
PID:4024
-
-
-
C:\Users\Admin\AppData\Local\Temp\84AD.tmp.exeC:\Users\Admin\AppData\Local\Temp\84AD.tmp.exe2⤵
- Executes dropped EXE
PID:1352
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:6116
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵
- Executes dropped EXE
PID:2468
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:4388
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵
- Executes dropped EXE
PID:5916
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:5912
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵
- Executes dropped EXE
PID:1672
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:408
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵
- Executes dropped EXE
PID:3656
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:5884
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵
- Executes dropped EXE
PID:5480
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:4796
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵
- Executes dropped EXE
PID:4640
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:4692
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵
- Executes dropped EXE
PID:4572
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:5832
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵
- Executes dropped EXE
PID:1660
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:4928
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵
- Executes dropped EXE
PID:3416
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:3216
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵
- Executes dropped EXE
PID:2216
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:5168
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵
- Executes dropped EXE
PID:5940
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:1992
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵
- Executes dropped EXE
PID:3152
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:3932
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵
- Executes dropped EXE
PID:3716
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:2440
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵
- Executes dropped EXE
PID:5252
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:3452
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵
- Executes dropped EXE
PID:3576
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:2456
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵
- Executes dropped EXE
PID:5164
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:4332
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵
- Executes dropped EXE
PID:4296
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:1988
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵
- Executes dropped EXE
PID:1972
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:1632
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵
- Executes dropped EXE
PID:1496
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:1784
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵PID:1968
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:3028
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵PID:3908
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:2292
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵PID:4568
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:208
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵PID:2964
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:2232
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵PID:4508
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:5916
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵PID:2180
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:5232
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵PID:3520
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:408
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵PID:640
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:2792
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵PID:4716
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:5676
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵PID:5244
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:4572
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵PID:5524
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:3132
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵PID:3476
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:4580
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵PID:2816
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:4312
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵PID:4980
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:948
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵PID:4800
-
-
-
C:\Users\Admin\AppData\Local\Temp\8F67.tmp.exeC:\Users\Admin\AppData\Local\Temp\8F67.tmp.exe2⤵PID:1112
-
C:\Users\Admin\AppData\Local\Temp\8F67.tmp.exeC:\Users\Admin\AppData\Local\Temp\8F67.tmp.exe3⤵
- Loads dropped DLL
PID:1852
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:1320
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵PID:2456
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:1300
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵PID:3324
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:5356
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵PID:2368
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:908
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵PID:1632
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ebfabcdcac.exe"2⤵PID:1600
-
C:\ProgramData\ebfabcdcac.exeC:\ProgramData\ebfabcdcac.exe3⤵PID:4396
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
18B
MD507976dc64d379f2af43eb66bc070d2f9
SHA1230f2feb6219f4bfba08379350cc6c2a09f23653
SHA2561ae8a2a3113476f55218cb8ea53d2f38b9a01fa9590fd202273d92379d2a66ea
SHA512c855bf2b680ad2c8f271e54d1587180f8705468f876cbdfe53b895daf33408c27a05f37d157dc0825936fd1a607a3741fa2095d1fd3f45bca431176078d50ccc
-
Filesize
1021KB
MD5c6c6f92d42ef620e9dede90b6cc98f12
SHA1222edacf9193578ab5c848d434121afdcde25b2f
SHA256ab61de63b8bc1805d69dbae7573c2bb1863e2192f7dca72341a1483010217357
SHA5124f754942a10d9d2b865e798d9e021d51c48c58f173cc2e11557dd796fbe17e08869dd37c7888aed2f96135606a1b2b7b6328caa21a8c99a37c62487d1b6cb23c
-
Filesize
253KB
MD5a6799120a6cd0a439e69cef0b39766f1
SHA1370711ba4a565d3b2bfa70d593e3ae2abfdeed9f
SHA256e2f2eadd2865cc21f36f641be666beaab4e97ccd2c56ba522846d1dd89f3a484
SHA512bb4e2ce1efffcc0ab3d11316f6bbb936a81c6093541a0395f995451b300a8a531bec35f56d53ff110fac6c2d9d4d515388dc1b8a42c45d1108ad179e27ca186c
-
Filesize
253KB
MD55381a870d74ee49586aa9632e93c232b
SHA1f2ee6d461102d3353077d3d6f08bbda2b8dfb1ed
SHA256e90f2a5eae99811b65dc284734e0e295708d89bfef9a003b3ab2f8bc42e1fa9c
SHA512c611262eb7badc08486a6416dd470f14d09c5c86c04076a472d32da52bf2cc21344dd4130f85a83cb25556383528ce57ac94ad0de36cef6a67f1bdb9e87a65a9
-
Filesize
177KB
MD54d38d0416a7392711f340e87f22ea4ba
SHA185d501d7fd5fc843e96be88caf6c1f1054aa2f28
SHA25695b64cf5502b24d592c79f2611b76d5d8035c8061c4af6b1ff6800ec2b46442f
SHA5123a86a6521fb856220875c9bac2c01ce82e7e67e515285273f7687596dc6c169949af8703d835654506c8205bcf6d372403c9ea925c0bf2969f11227d7cacb5c0
-
Filesize
1021KB
MD5eb58ebd3579a53abafbe2b8326082f92
SHA1c290f4cbb2bd1c5f6a1b7ab97620f54be52909be
SHA256f1c97917335184a76cb5265af4e2d7a1e5ed58ff8c1d5700b2a95edca412657d
SHA5127d4302aca65d2d2296f66b7f21c6399b21c923723cb14bcb70a53045c9e7181d3b655595fb79b94a67f7e41a7afb0e44c49732b2f0434fc66cce0fb466440ca0