Source: 30.3.HealthTool.exe.880000.2.raw.unpack, type: UNPACKEDPE | Matched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25 |
Source: 30.3.HealthTool.exe.880000.2.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/ |
Source: 30.3.HealthTool.exe.880000.2.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware |
Source: 30.3.HealthTool.exe.880000.2.unpack, type: UNPACKEDPE | Matched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25 |
Source: 30.3.HealthTool.exe.880000.2.unpack, type: UNPACKEDPE | Matched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/ |
Source: 30.3.HealthTool.exe.880000.2.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware |
Source: 0000001E.00000003.2323266961.0000000000880000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY | Matched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25 |
Source: 0000001E.00000003.2323266961.0000000000880000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY | Matched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/ |
Source: 0000001E.00000003.2323266961.0000000000880000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY | Matched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware |
Source: Process Memory Space: HealthTool.exe PID: 2020, type: MEMORYSTR | Matched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6196:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1472:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4416:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \BaseNamedObjects\Local\SM0:3260:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3108:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \BaseNamedObjects\Local\SM0:6516:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3968:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \BaseNamedObjects\Local\SM0:1672:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5996:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \BaseNamedObjects\Local\SM0:5176:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2324:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \BaseNamedObjects\Local\SM0:3048:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \BaseNamedObjects\Local\SM0:5800:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \BaseNamedObjects\Local\SM0:2444:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6508:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \BaseNamedObjects\Local\SM0:3108:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5256:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \BaseNamedObjects\Local\SM0:6492:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1112:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3544:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1672:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3468:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2304:120:WilError_03 |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT Name FROM Win32_Processor |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: C:\Windows\explorer.exe | WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe" |
Source: unknown | Process created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe" | |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop UsoSvc | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop WaaSMedicSvc | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop wuauserv | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop bits | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop dosvc | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0 | |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0 | |
Source: C:\Windows\System32\powercfg.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0 | |
Source: C:\Windows\System32\powercfg.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0 | |
Source: C:\Windows\System32\powercfg.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe delete "PcHealthTool" | |
Source: C:\Windows\System32\powercfg.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe create "PcHealthTool" binpath= "C:\ProgramData\PcHealthTool\HealthTool.exe" start= "auto" | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop eventlog | |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe start "PcHealthTool" | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\Users\user\Desktop\file.exe" | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: unknown | Process created: C:\ProgramData\PcHealthTool\HealthTool.exe C:\ProgramData\PcHealthTool\HealthTool.exe | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\choice.exe choice /C Y /N /D Y /T 3 | |
Source: C:\ProgramData\PcHealthTool\HealthTool.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop UsoSvc | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\ProgramData\PcHealthTool\HealthTool.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop WaaSMedicSvc | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\ProgramData\PcHealthTool\HealthTool.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop wuauserv | |
Source: C:\ProgramData\PcHealthTool\HealthTool.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop bits | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\ProgramData\PcHealthTool\HealthTool.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop dosvc | |
Source: C:\Windows\System32\sc.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\ProgramData\PcHealthTool\HealthTool.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0 | |
Source: C:\ProgramData\PcHealthTool\HealthTool.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0 | |
Source: C:\Windows\System32\conhost.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\ProgramData\PcHealthTool\HealthTool.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0 | |
Source: C:\Windows\System32\powercfg.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\ProgramData\PcHealthTool\HealthTool.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0 | |
Source: C:\ProgramData\PcHealthTool\HealthTool.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe | |
Source: C:\Windows\System32\powercfg.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\ProgramData\PcHealthTool\HealthTool.exe | Process created: C:\Windows\explorer.exe explorer.exe | |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop UsoSvc | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop WaaSMedicSvc | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop wuauserv | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop bits | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop dosvc | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0 | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe delete "PcHealthTool" | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe create "PcHealthTool" binpath= "C:\ProgramData\PcHealthTool\HealthTool.exe" start= "auto" | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop eventlog | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe start "PcHealthTool" | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\Users\user\Desktop\file.exe" | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\choice.exe choice /C Y /N /D Y /T 3 | Jump to behavior |
Source: C:\ProgramData\PcHealthTool\HealthTool.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop UsoSvc | Jump to behavior |
Source: C:\ProgramData\PcHealthTool\HealthTool.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop WaaSMedicSvc | Jump to behavior |
Source: C:\ProgramData\PcHealthTool\HealthTool.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop wuauserv | Jump to behavior |
Source: C:\ProgramData\PcHealthTool\HealthTool.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop bits | Jump to behavior |
Source: C:\ProgramData\PcHealthTool\HealthTool.exe | Process created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop dosvc | Jump to behavior |
Source: C:\ProgramData\PcHealthTool\HealthTool.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0 | Jump to behavior |
Source: C:\ProgramData\PcHealthTool\HealthTool.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0 | Jump to behavior |
Source: C:\ProgramData\PcHealthTool\HealthTool.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0 | Jump to behavior |
Source: C:\ProgramData\PcHealthTool\HealthTool.exe | Process created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0 | Jump to behavior |
Source: C:\ProgramData\PcHealthTool\HealthTool.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe | Jump to behavior |
Source: C:\ProgramData\PcHealthTool\HealthTool.exe | Process created: C:\Windows\explorer.exe explorer.exe | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\ProgramData\PcHealthTool\HealthTool.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Windows\System32\choice.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\powercfg.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: dhcpcsvc6.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: napinsp.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: pnrpnsp.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wshbth.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: nlaapi.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: winrnr.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\explorer.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: explorer.exe, 00000034.00000002.4589900423.00000000010BB000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000034.00000003.3263289334.00000000010BC000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: PROCESSHACKER.EXE |
Source: explorer.exe, 00000034.00000003.2323562707.000000000107F000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXEOORAFPQNOCZNXGSA |
Source: explorer.exe, 00000034.00000002.4589900423.0000000001064000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: --CINIT-STEALTH-TARGETS=TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXE |
Source: explorer.exe, 00000034.00000002.4589900423.00000000010BB000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000034.00000003.3263289334.00000000010BC000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXEC |
Source: explorer.exe, 00000034.00000002.4589900423.0000000001064000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: EXPLORER.EXE--ALGO=RX/0--URL=XMR-EU1.NANOPOOL.ORG:10343--USER=48EZR9SZUQGF2S1GXVTKPEDREHZ6WPJX3KKSG6ZXMI447NKY7LQEN4P7YE13TKW7G3KGDKP5Q3C47ZUSQPSSXZA27TT3Z82.HERONWATER--PASS=HERONWATER--CPU-MAX-THREADS-HINT=50--CINIT-WINRING=CZPMOHHVQTJJ.SYS--RANDOMX-NO-RDMSR--CINIT-STEALTH-TARGETS=TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXE--CINIT-VERSION=3.4.1--TLS--CINIT-IDLE-WAIT=1--CINIT-IDLE-CPU=100--CINIT-ID=OORAFPQNOCZNXGSA |
Source: explorer.exe, 00000034.00000002.4589900423.0000000001064000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: --ALGO=RX/0 --URL=XMR-EU1.NANOPOOL.ORG:10343 --USER="48EZR9SZUQGF2S1GXVTKPEDREHZ6WPJX3KKSG6ZXMI447NKY7LQEN4P7YE13TKW7G3KGDKP5Q3C47ZUSQPSSXZA27TT3Z82.HERONWATER" --PASS="HERONWATER" --CPU-MAX-THREADS-HINT=50 --CINIT-WINRING="CZPMOHHVQTJJ.SYS" --RANDOMX-NO-RDMSR --CINIT-STEALTH-TARGETS="TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXE" --CINIT-VERSION="3.4.1" --TLS --CINIT-IDLE-WAIT=1 --CINIT-IDLE-CPU=100 --CINIT-ID="OORAFPQNOCZNXGSA" |
Source: explorer.exe, 00000034.00000002.4589900423.0000000001064000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000034.00000002.4589900423.00000000010BB000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000034.00000003.2323562707.000000000107F000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000034.00000003.3263289334.00000000010BC000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXE |