Edit tour
Windows
Analysis Report
Whyet-4.9.exe
Overview
General Information
Detection
Nitol, Zegost
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Nitol
Yara detected Zegost
AI detected suspicious sample
Contains functionality to capture and log keystrokes
Contains functionality to modify Windows User Account Control (UAC) settings
Disable UAC(promptonsecuredesktop)
Disables UAC (registry)
Encrypted powershell cmdline option found
Found evasive API chain (may stop execution after checking mutex)
Found stalling execution ending in API Sleep call
Found suspicious powershell code related to unpacking or dynamic code loading
Machine Learning detection for dropped file
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Execution from Suspicious Folder
Sigma detected: Parent in Public Folder Suspicious Process
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Suspicious Program Location with Network Connections
Suspicious powershell command line found
Tries to delay execution (extensive OutputDebugStringW loop)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Uses schtasks.exe or at.exe to add and modify task schedules
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Contains capabilities to detect virtual machines
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to clear windows event logs (to hide its activities)
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates COM task schedule object (often to register a task for autostart)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Enables debug privileges
Entry point lies outside standard sections
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found dropped PE file which has not been started or loaded
Found evasive API chain (may stop execution after accessing registry keys)
Found evasive API chain (may stop execution after checking a module file name)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE / OLE file has an invalid certificate
PE file contains an invalid checksum
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Wow6432Node CurrentVersion Autorun Keys Modification
Sleep loop found (likely to delay execution)
Too many similar processes found
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match
Classification
- System is w10x64
- Whyet-4.9.exe (PID: 4400 cmdline:
"C:\Users\ user\Deskt op\Whyet-4 .9.exe" MD5: F317C17035501AAAD0ABFAF9FBA4C085) - irsetup.exe (PID: 5800 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\_ir_sf _temp_0\ir setup.exe" __IRAOFF: 5655410 "_ _IRAFN:C:\ Users\user \Desktop\W hyet-4.9.e xe" "__IRC T:0" "__IR TSS:0" "__ IRSID:S-1- 5-21-22461 22658-3693 405117-247 6756634-10 03" MD5: 2A7D5F8D3FB4AB753B226FD88D31453B) - powershell.exe (PID: 6076 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"msmpen g.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 760 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 4208 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"securi tyhealthsy stray.exe\ ")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 5036 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 6980 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"mpcopy accelerato r.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 4088 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 6972 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"MpDefe nderCoreSe rvice.exe\ ")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 6000 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 320 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" $mypid=(Ge t-WmiObjec t -Query ' select Par entProcess Id from Wi n32_Proces s where Pr ocessId=58 00').Paren tProcessId ;if($mypid ){Stop-Pro cess -Id $ mypid -For ce;} MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 6076 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 5064 cmdline:
"C:\Window s\System32 \cmd.exe" /c start " title" "C: \Users\Pub lic\Docume nts\VCH0Sa g8\LxN_oT. exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 6660 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - LxN_oT.exe (PID: 4072 cmdline:
"C:\Users\ Public\Doc uments\VCH 0Sag8\LxN_ oT.exe" MD5: C4C5317AC1AB7077C53DB6D82B2A119F) - powershell.exe (PID: 1532 cmdline:
powershell .exe -NoPr ofile -C " Set-Conten t -Value @ ('[Unicode ]','Unicod e=yes','[V ersion]',' signature= \"$CHICAGO $\"','Revi sion=1','[ Privilege Rights]',' SeDebugPri vilege = * S-1-5-18', '[File Sec urity]','\ "C:\Progra mData\Prog ram\",0,\" D:AR(D;OIC I;DTSDRCWD ;;;WD)\"') -Path ([I O.Path]::C ombine($en v:TEMP, 'S eDebugPriv ilege1.inf ')) -Encod ing Unicod e; secedit .exe /conf igure /db ([IO.Path] ::Combine( $env:TEMP, 'SeDebugP rivilege1. sdb')) /cf g ([IO.Pat h]::Combin e($env:TEM P, 'SeDebu gPrivilege 1.inf')) / overwrite /log ([IO. Path]::Com bine($env: TEMP, 'SeD ebugPrivil ege1.log') ) /quiet; Remove-Ite m -Path ([ IO.Path]:: Combine($e nv:TEMP, ' SeDebugPri vilege1.*' )) -Force; " MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 5304 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - SecEdit.exe (PID: 5968 cmdline:
"C:\Window s\system32 \SecEdit.e xe" /confi gure /db C :\Users\us er\AppData \Local\Tem p\SeDebugP rivilege1. sdb /cfg C :\Users\us er\AppData \Local\Tem p\SeDebugP rivilege1. inf /overw rite /log C:\Users\u ser\AppDat a\Local\Te mp\SeDebug Privilege1 .log /quie t MD5: BFC13856291E4B804D33BBAEFC8CB3B5) - powershell.exe (PID: 5456 cmdline:
powershell .exe -NoPr ofile -C " Set-Conten t -Value @ ('[Unicode ]','Unicod e=yes','[V ersion]',' signature= \"$CHICAGO $\"','Revi sion=1','[ Privilege Rights]',' SeDebugPri vilege = * S-1-5-18', '[File Sec urity]','\ "C:\Progra mData\Data \",0,\"D:A R(D;OICI;D TSDRCWD;;; WD)\"') -P ath ([IO.P ath]::Comb ine($env:T EMP, 'SeDe bugPrivile ge3.inf')) -Encoding Unicode; secedit.ex e /configu re /db ([I O.Path]::C ombine($en v:TEMP, 'S eDebugPriv ilege3.sdb ')) /cfg ( [IO.Path]: :Combine($ env:TEMP, 'SeDebugPr ivilege3.i nf')) /ove rwrite /lo g ([IO.Pat h]::Combin e($env:TEM P, 'SeDebu gPrivilege 3.log')) / quiet; Rem ove-Item - Path ([IO. Path]::Com bine($env: TEMP, 'SeD ebugPrivil ege3.*')) -Force;" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 6784 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - SecEdit.exe (PID: 2696 cmdline:
"C:\Window s\system32 \SecEdit.e xe" /confi gure /db C :\Users\us er\AppData \Local\Tem p\SeDebugP rivilege3. sdb /cfg C :\Users\us er\AppData \Local\Tem p\SeDebugP rivilege3. inf /overw rite /log C:\Users\u ser\AppDat a\Local\Te mp\SeDebug Privilege3 .log /quie t MD5: BFC13856291E4B804D33BBAEFC8CB3B5) - powershell.exe (PID: 4956 cmdline:
powershell .exe -NoPr ofile -C " [IO.File]: :WriteAllB ytes([IO.P ath]::Comb ine($env:T EMP, 'SeDe bugPrivile ge4.inf'), [Convert] ::FromBase 64String(' //5bAFUAbg BpAGMAbwBk AGUAXQANAA oAVQBuAGkA YwBvAGQAZQ A9AHkAZQBz AA0ACgBbAF YAZQByAHMA aQBvAG4AXQ ANAAoAcwBp AGcAbgBhAH QAdQByAGUA PQAiACQAQw BIAEkAQwBB AEcATwAkAC IADQAKAFIA ZQB2AGkAcw BpAG8AbgA9 ADEADQAKAF sAUAByAGkA dgBpAGwAZQ BnAGUAIABS AGkAZwBoAH QAcwBdAA0A CgBTAGUARA BlAGIAdQBn AFAAcgBpAH YAaQBsAGUA ZwBlACAAPQ AgACoAUwAt ADEALQA1AC 0AMQA4AA0A CgA=')); s ecedit.exe /configur e /db ([IO .Path]::Co mbine($env :TEMP, 'Se DebugPrivi lege4.sdb' )) /cfg ([ IO.Path]:: Combine($e nv:TEMP, ' SeDebugPri vilege4.in f')) /over write /log ([IO.Path ]::Combine ($env:TEMP , 'SeDebug Privilege4 .log')) /q uiet; Remo ve-Item -P ath ([IO.P ath]::Comb ine($env:T EMP, 'SeDe bugPrivile ge4.*')) - Force;" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 5280 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - SecEdit.exe (PID: 2220 cmdline:
"C:\Window s\system32 \SecEdit.e xe" /confi gure /db C :\Users\us er\AppData \Local\Tem p\SeDebugP rivilege4. sdb /cfg C :\Users\us er\AppData \Local\Tem p\SeDebugP rivilege4. inf /overw rite /log C:\Users\u ser\AppDat a\Local\Te mp\SeDebug Privilege4 .log /quie t MD5: BFC13856291E4B804D33BBAEFC8CB3B5) - powershell.exe (PID: 1196 cmdline:
powershell .exe -NoPr ofile -C " Set-Conten t -Value @ ('[Unicode ]','Unicod e=yes','[V ersion]',' signature= \"$CHICAGO $\"','Revi sion=1','[ Privilege Rights]',' SeDebugPri vilege = * S-1-5-18', '[File Sec urity]','\ "C:\Progra mData\Prog ram\",0,\" D:AR(D;OIC I;DTSDRCWD ;;;WD)\"') -Path ([I O.Path]::C ombine($en v:TEMP, 'S eDebugPriv ilege1.inf ')) -Encod ing Unicod e; secedit .exe /conf igure /db ([IO.Path] ::Combine( $env:TEMP, 'SeDebugP rivilege1. sdb')) /cf g ([IO.Pat h]::Combin e($env:TEM P, 'SeDebu gPrivilege 1.inf')) / overwrite /log ([IO. Path]::Com bine($env: TEMP, 'SeD ebugPrivil ege1.log') ) /quiet; Remove-Ite m -Path ([ IO.Path]:: Combine($e nv:TEMP, ' SeDebugPri vilege1.*' )) -Force; " MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 6536 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - SecEdit.exe (PID: 6420 cmdline:
"C:\Window s\system32 \SecEdit.e xe" /confi gure /db C :\Users\us er\AppData \Local\Tem p\SeDebugP rivilege1. sdb /cfg C :\Users\us er\AppData \Local\Tem p\SeDebugP rivilege1. inf /overw rite /log C:\Users\u ser\AppDat a\Local\Te mp\SeDebug Privilege1 .log /quie t MD5: BFC13856291E4B804D33BBAEFC8CB3B5) - cmd.exe (PID: 6132 cmdline:
cmd /c ech o.>c:\inst .ini MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 4752 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 7184 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7212 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 7324 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - powershell.exe (PID: 7196 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"LxN_oT .exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7204 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7576 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"LxN_oT .exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7592 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 8132 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"LxN_oT .exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 8140 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7320 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"LxN_oT .exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7344 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7476 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"LxN_oT .exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 6824 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 6120 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"LxN_oT .exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 5512 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7116 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"LxN_oT .exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 5308 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 8100 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"LxN_oT .exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 8104 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 2180 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"LxN_oT .exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 3648 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 5252 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"LxN_oT .exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 5588 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 3276 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"LxN_oT .exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 2316 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 6588 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"LxN_oT .exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 4164 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7572 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"LxN_oT .exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 3848 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 3384 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"LxN_oT .exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 3004 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 1772 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"LxN_oT .exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 2816 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7152 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"LxN_oT .exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 344 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 6284 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"LxN_oT .exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 6036 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7716 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"LxN_oT .exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) - powershell.exe (PID: 3720 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"LxN_oT .exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 5672 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7188 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"LxN_oT .exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 8096 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 4984 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"LxN_oT .exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 3572 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7292 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"LxN_oT .exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7252 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 1256 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"LxN_oT .exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) - powershell.exe (PID: 4432 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"LxN_oT .exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 4128 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7736 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"LxN_oT .exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 6476 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7624 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"LxN_oT .exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 3360 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 1252 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"LxN_oT .exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 6052 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- rundll32.exe (PID: 1172 cmdline:
C:\Windows \System32\ rundll32.e xe C:\Wind ows\System 32\shell32 .dll,SHCre ateLocalSe rverRunDll {9aa46009 -3ce0-458a -a354-7156 10a075e6} -Embedding MD5: EF3179D498793BF4234F708D3BE28633)
- iusb3mon.exe (PID: 3680 cmdline:
C:\Program Data\progr am\iusb3mo n.exe MD5: C4C5317AC1AB7077C53DB6D82B2A119F) - powershell.exe (PID: 7700 cmdline:
powershell .exe -NoPr ofile -C " Set-Conten t -Value @ ('[Unicode ]','Unicod e=yes','[V ersion]',' signature= \"$CHICAGO $\"','Revi sion=1','[ Privilege Rights]',' SeDebugPri vilege = * S-1-5-18', '[File Sec urity]','\ "C:\Progra mData\Prog ram\",0,\" D:AR(D;OIC I;DTSDRCWD ;;;WD)\"') -Path ([I O.Path]::C ombine($en v:TEMP, 'S eDebugPriv ilege1.inf ')) -Encod ing Unicod e; secedit .exe /conf igure /db ([IO.Path] ::Combine( $env:TEMP, 'SeDebugP rivilege1. sdb')) /cf g ([IO.Pat h]::Combin e($env:TEM P, 'SeDebu gPrivilege 1.inf')) / overwrite /log ([IO. Path]::Com bine($env: TEMP, 'SeD ebugPrivil ege1.log') ) /quiet; Remove-Ite m -Path ([ IO.Path]:: Combine($e nv:TEMP, ' SeDebugPri vilege1.*' )) -Force; " MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 7716 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - conhost.exe (PID: 3480 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - SecEdit.exe (PID: 8088 cmdline:
"C:\Window s\system32 \SecEdit.e xe" /confi gure /db C :\Users\us er\AppData \Local\Tem p\SeDebugP rivilege1. sdb /cfg C :\Users\us er\AppData \Local\Tem p\SeDebugP rivilege1. inf /overw rite /log C:\Users\u ser\AppDat a\Local\Te mp\SeDebug Privilege1 .log /quie t MD5: BFC13856291E4B804D33BBAEFC8CB3B5) - powershell.exe (PID: 7708 cmdline:
powershell .exe -NoPr ofile -C " Set-Conten t -Value @ ('[Unicode ]','Unicod e=yes','[V ersion]',' signature= \"$CHICAGO $\"','Revi sion=1','[ Privilege Rights]',' SeDebugPri vilege = * S-1-5-18', '[File Sec urity]','\ "C:\Progra mData\Data \",0,\"D:A R(D;OICI;D TSDRCWD;;; WD)\"') -P ath ([IO.P ath]::Comb ine($env:T EMP, 'SeDe bugPrivile ge3.inf')) -Encoding Unicode; secedit.ex e /configu re /db ([I O.Path]::C ombine($en v:TEMP, 'S eDebugPriv ilege3.sdb ')) /cfg ( [IO.Path]: :Combine($ env:TEMP, 'SeDebugPr ivilege3.i nf')) /ove rwrite /lo g ([IO.Pat h]::Combin e($env:TEM P, 'SeDebu gPrivilege 3.log')) / quiet; Rem ove-Item - Path ([IO. Path]::Com bine($env: TEMP, 'SeD ebugPrivil ege3.*')) -Force;" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 7732 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - SecEdit.exe (PID: 8096 cmdline:
"C:\Window s\system32 \SecEdit.e xe" /confi gure /db C :\Users\us er\AppData \Local\Tem p\SeDebugP rivilege3. sdb /cfg C :\Users\us er\AppData \Local\Tem p\SeDebugP rivilege3. inf /overw rite /log C:\Users\u ser\AppDat a\Local\Te mp\SeDebug Privilege3 .log /quie t MD5: BFC13856291E4B804D33BBAEFC8CB3B5) - powershell.exe (PID: 7724 cmdline:
powershell .exe -NoPr ofile -C " [IO.File]: :WriteAllB ytes([IO.P ath]::Comb ine($env:T EMP, 'SeDe bugPrivile ge4.inf'), [Convert] ::FromBase 64String(' //5bAFUAbg BpAGMAbwBk AGUAXQANAA oAVQBuAGkA YwBvAGQAZQ A9AHkAZQBz AA0ACgBbAF YAZQByAHMA aQBvAG4AXQ ANAAoAcwBp AGcAbgBhAH QAdQByAGUA PQAiACQAQw BIAEkAQwBB AEcATwAkAC IADQAKAFIA ZQB2AGkAcw BpAG8AbgA9 ADEADQAKAF sAUAByAGkA dgBpAGwAZQ BnAGUAIABS AGkAZwBoAH QAcwBdAA0A CgBTAGUARA BlAGIAdQBn AFAAcgBpAH YAaQBsAGUA ZwBlACAAPQ AgACoAUwAt ADEALQA1AC 0AMQA4AA0A CgA=')); s ecedit.exe /configur e /db ([IO .Path]::Co mbine($env :TEMP, 'Se DebugPrivi lege4.sdb' )) /cfg ([ IO.Path]:: Combine($e nv:TEMP, ' SeDebugPri vilege4.in f')) /over write /log ([IO.Path ]::Combine ($env:TEMP , 'SeDebug Privilege4 .log')) /q uiet; Remo ve-Item -P ath ([IO.P ath]::Comb ine($env:T EMP, 'SeDe bugPrivile ge4.*')) - Force;" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 7780 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - SecEdit.exe (PID: 8072 cmdline:
"C:\Window s\system32 \SecEdit.e xe" /confi gure /db C :\Users\us er\AppData \Local\Tem p\SeDebugP rivilege4. sdb /cfg C :\Users\us er\AppData \Local\Tem p\SeDebugP rivilege4. inf /overw rite /log C:\Users\u ser\AppDat a\Local\Te mp\SeDebug Privilege4 .log /quie t MD5: BFC13856291E4B804D33BBAEFC8CB3B5) - cmd.exe (PID: 7184 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7240 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 7300 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - cmd.exe (PID: 4124 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 1084 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 4996 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - cmd.exe (PID: 7648 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7680 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 7592 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - cmd.exe (PID: 5824 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 2940 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 4956 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - cmd.exe (PID: 1524 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 6728 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 1196 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - cmd.exe (PID: 7284 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7332 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 2748 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - cmd.exe (PID: 3948 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 1288 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 892 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - cmd.exe (PID: 1256 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 1448 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 3944 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - conhost.exe (PID: 6524 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 6436 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 4408 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 7196 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - cmd.exe (PID: 6492 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7144 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 5284 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - cmd.exe (PID: 3876 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 6676 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 7620 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - cmd.exe (PID: 5396 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 8012 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 6588 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - cmd.exe (PID: 7952 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7700 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 6700 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - cmd.exe (PID: 760 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7964 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 6204 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - cmd.exe (PID: 2820 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 2860 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 2372 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - cmd.exe (PID: 7284 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 5948 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 6224 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 3792 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 5272 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - cmd.exe (PID: 3712 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7376 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 7200 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7688 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 6584 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 1128 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 64 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 6464 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 2504 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
- svchost.exe (PID: 3200 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p -s B ITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Nitol | No Attribution |
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Zegost | Yara detected Zegost | Joe Security | ||
JoeSecurity_Nitol | Yara detected Nitol | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Zegost | Yara detected Zegost | Joe Security | ||
JoeSecurity_Nitol | Yara detected Nitol | Joe Security | ||
JoeSecurity_Zegost | Yara detected Zegost | Joe Security | ||
JoeSecurity_Nitol | Yara detected Nitol | Joe Security | ||
JoeSecurity_Zegost | Yara detected Zegost | Joe Security | ||
Click to see the 6 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Zegost | Yara detected Zegost | Joe Security | ||
JoeSecurity_Nitol | Yara detected Nitol | Joe Security | ||
JoeSecurity_Zegost | Yara detected Zegost | Joe Security | ||
JoeSecurity_Nitol | Yara detected Nitol | Joe Security | ||
JoeSecurity_Zegost | Yara detected Zegost | Joe Security | ||
Click to see the 10 entries |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |