Edit tour
Windows
Analysis Report
KL-3.1.16.exe
Overview
General Information
Detection
Nitol, Zegost
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Nitol
Yara detected Zegost
AI detected suspicious sample
Contains functionality to capture and log keystrokes
Contains functionality to modify Windows User Account Control (UAC) settings
Disable UAC(promptonsecuredesktop)
Disables UAC (registry)
Encrypted powershell cmdline option found
Found stalling execution ending in API Sleep call
Found suspicious powershell code related to unpacking or dynamic code loading
Machine Learning detection for dropped file
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Execution from Suspicious Folder
Sigma detected: Parent in Public Folder Suspicious Process
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Suspicious Program Location with Network Connections
Suspicious powershell command line found
Tries to delay execution (extensive OutputDebugStringW loop)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Uses schtasks.exe or at.exe to add and modify task schedules
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Contains capabilities to detect virtual machines
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to clear windows event logs (to hide its activities)
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates COM task schedule object (often to register a task for autostart)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Enables debug privileges
Entry point lies outside standard sections
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found dropped PE file which has not been started or loaded
Found evasive API chain (may stop execution after accessing registry keys)
Found evasive API chain (may stop execution after checking a module file name)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
PE file contains an invalid checksum
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Wow6432Node CurrentVersion Autorun Keys Modification
Too many similar processes found
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match
Classification
- System is w10x64
- KL-3.1.16.exe (PID: 2632 cmdline:
"C:\Users\ user\Deskt op\KL-3.1. 16.exe" MD5: A741FBD12088E596142D3717B48502CF) - irsetup.exe (PID: 6980 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\_ir_sf _temp_0\ir setup.exe" __IRAOFF: 5904754 "_ _IRAFN:C:\ Users\user \Desktop\K L-3.1.16.e xe" "__IRC T:3" "__IR TSS:0" "__ IRSID:S-1- 5-21-22461 22658-3693 405117-247 6756634-10 03" MD5: 2A7D5F8D3FB4AB753B226FD88D31453B) - powershell.exe (PID: 2356 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"msmpen g.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 2496 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 5660 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"securi tyhealthsy stray.exe\ ")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 5776 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 5704 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"mpcopy accelerato r.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 420 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 2536 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"MpDefe nderCoreSe rvice.exe\ ")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 4896 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 4600 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" $mypid=(Ge t-WmiObjec t -Query ' select Par entProcess Id from Wi n32_Proces s where Pr ocessId=69 80').Paren tProcessId ;if($mypid ){Stop-Pro cess -Id $ mypid -For ce;} MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 1008 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 3204 cmdline:
"C:\Window s\System32 \cmd.exe" /c start " title" "C: \Users\Pub lic\Docume nts\B8_2rB P8O\5ar6Qs R4e.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 2168 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - 5ar6QsR4e.exe (PID: 5920 cmdline:
"C:\Users\ Public\Doc uments\B8_ 2rBP8O\5ar 6QsR4e.exe " MD5: 4764020339A4883862B79B60461B00D1) - powershell.exe (PID: 1584 cmdline:
powershell .exe -NoPr ofile -C " Set-Conten t -Value @ ('[Unicode ]','Unicod e=yes','[V ersion]',' signature= \"$CHICAGO $\"','Revi sion=1','[ Privilege Rights]',' SeDebugPri vilege = * S-1-5-18', '[File Sec urity]','\ "C:\Progra mData\Prog ram\",0,\" D:AR(D;OIC I;DTSDRCWD ;;;WD)\"') -Path ([I O.Path]::C ombine($en v:TEMP, 'S eDebugPriv ilege1.inf ')) -Encod ing Unicod e; secedit .exe /conf igure /db ([IO.Path] ::Combine( $env:TEMP, 'SeDebugP rivilege1. sdb')) /cf g ([IO.Pat h]::Combin e($env:TEM P, 'SeDebu gPrivilege 1.inf')) / overwrite /log ([IO. Path]::Com bine($env: TEMP, 'SeD ebugPrivil ege1.log') ) /quiet; Remove-Ite m -Path ([ IO.Path]:: Combine($e nv:TEMP, ' SeDebugPri vilege1.*' )) -Force; " MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 4896 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - SecEdit.exe (PID: 4040 cmdline:
"C:\Window s\system32 \SecEdit.e xe" /confi gure /db C :\Users\us er\AppData \Local\Tem p\SeDebugP rivilege1. sdb /cfg C :\Users\us er\AppData \Local\Tem p\SeDebugP rivilege1. inf /overw rite /log C:\Users\u ser\AppDat a\Local\Te mp\SeDebug Privilege1 .log /quie t MD5: BFC13856291E4B804D33BBAEFC8CB3B5) - powershell.exe (PID: 1340 cmdline:
powershell .exe -NoPr ofile -C " Set-Conten t -Value @ ('[Unicode ]','Unicod e=yes','[V ersion]',' signature= \"$CHICAGO $\"','Revi sion=1','[ Privilege Rights]',' SeDebugPri vilege = * S-1-5-18', '[File Sec urity]','\ "C:\Progra mData\Data \",0,\"D:A R(D;OICI;D TSDRCWD;;; WD)\"') -P ath ([IO.P ath]::Comb ine($env:T EMP, 'SeDe bugPrivile ge3.inf')) -Encoding Unicode; secedit.ex e /configu re /db ([I O.Path]::C ombine($en v:TEMP, 'S eDebugPriv ilege3.sdb ')) /cfg ( [IO.Path]: :Combine($ env:TEMP, 'SeDebugPr ivilege3.i nf')) /ove rwrite /lo g ([IO.Pat h]::Combin e($env:TEM P, 'SeDebu gPrivilege 3.log')) / quiet; Rem ove-Item - Path ([IO. Path]::Com bine($env: TEMP, 'SeD ebugPrivil ege3.*')) -Force;" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 4176 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - SecEdit.exe (PID: 572 cmdline:
"C:\Window s\system32 \SecEdit.e xe" /confi gure /db C :\Users\us er\AppData \Local\Tem p\SeDebugP rivilege3. sdb /cfg C :\Users\us er\AppData \Local\Tem p\SeDebugP rivilege3. inf /overw rite /log C:\Users\u ser\AppDat a\Local\Te mp\SeDebug Privilege3 .log /quie t MD5: BFC13856291E4B804D33BBAEFC8CB3B5) - powershell.exe (PID: 2536 cmdline:
powershell .exe -NoPr ofile -C " [IO.File]: :WriteAllB ytes([IO.P ath]::Comb ine($env:T EMP, 'SeDe bugPrivile ge4.inf'), [Convert] ::FromBase 64String(' //5bAFUAbg BpAGMAbwBk AGUAXQANAA oAVQBuAGkA YwBvAGQAZQ A9AHkAZQBz AA0ACgBbAF YAZQByAHMA aQBvAG4AXQ ANAAoAcwBp AGcAbgBhAH QAdQByAGUA PQAiACQAQw BIAEkAQwBB AEcATwAkAC IADQAKAFIA ZQB2AGkAcw BpAG8AbgA9 ADEADQAKAF sAUAByAGkA dgBpAGwAZQ BnAGUAIABS AGkAZwBoAH QAcwBdAA0A CgBTAGUARA BlAGIAdQBn AFAAcgBpAH YAaQBsAGUA ZwBlACAAPQ AgACoAUwAt ADEALQA1AC 0AMQA4AA0A CgA=')); s ecedit.exe /configur e /db ([IO .Path]::Co mbine($env :TEMP, 'Se DebugPrivi lege4.sdb' )) /cfg ([ IO.Path]:: Combine($e nv:TEMP, ' SeDebugPri vilege4.in f')) /over write /log ([IO.Path ]::Combine ($env:TEMP , 'SeDebug Privilege4 .log')) /q uiet; Remo ve-Item -P ath ([IO.P ath]::Comb ine($env:T EMP, 'SeDe bugPrivile ge4.*')) - Force;" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 6840 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - SecEdit.exe (PID: 5224 cmdline:
"C:\Window s\system32 \SecEdit.e xe" /confi gure /db C :\Users\us er\AppData \Local\Tem p\SeDebugP rivilege4. sdb /cfg C :\Users\us er\AppData \Local\Tem p\SeDebugP rivilege4. inf /overw rite /log C:\Users\u ser\AppDat a\Local\Te mp\SeDebug Privilege4 .log /quie t MD5: BFC13856291E4B804D33BBAEFC8CB3B5) - powershell.exe (PID: 2632 cmdline:
powershell .exe -NoPr ofile -C " Set-Conten t -Value @ ('[Unicode ]','Unicod e=yes','[V ersion]',' signature= \"$CHICAGO $\"','Revi sion=1','[ Privilege Rights]',' SeDebugPri vilege = * S-1-5-18', '[File Sec urity]','\ "C:\Progra mData\Prog ram\",0,\" D:AR(D;OIC I;DTSDRCWD ;;;WD)\"') -Path ([I O.Path]::C ombine($en v:TEMP, 'S eDebugPriv ilege1.inf ')) -Encod ing Unicod e; secedit .exe /conf igure /db ([IO.Path] ::Combine( $env:TEMP, 'SeDebugP rivilege1. sdb')) /cf g ([IO.Pat h]::Combin e($env:TEM P, 'SeDebu gPrivilege 1.inf')) / overwrite /log ([IO. Path]::Com bine($env: TEMP, 'SeD ebugPrivil ege1.log') ) /quiet; Remove-Ite m -Path ([ IO.Path]:: Combine($e nv:TEMP, ' SeDebugPri vilege1.*' )) -Force; " MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - cmd.exe (PID: 7064 cmdline:
cmd /c ech o.>c:\inst .ini MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 3908 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 7352 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7360 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 7412 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - powershell.exe (PID: 7404 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"5ar6Qs R4e.exe\") ); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7420 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7696 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"5ar6Qs R4e.exe\") ); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7704 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 880 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"5ar6Qs R4e.exe\") ); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7388 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7100 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"5ar6Qs R4e.exe\") ); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 5372 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7960 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"5ar6Qs R4e.exe\") ); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 5264 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 5796 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"5ar6Qs R4e.exe\") ); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 3064 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 760 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"5ar6Qs R4e.exe\") ); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 3460 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7488 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"5ar6Qs R4e.exe\") ); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7400 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7520 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"5ar6Qs R4e.exe\") ); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7436 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7700 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"5ar6Qs R4e.exe\") ); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7784 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 4816 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"5ar6Qs R4e.exe\") ); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 6872 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 5644 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"5ar6Qs R4e.exe\") ); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 2620 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7324 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"5ar6Qs R4e.exe\") ); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 5292 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 6780 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"5ar6Qs R4e.exe\") ); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 1816 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 2476 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"5ar6Qs R4e.exe\") ); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 2396 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 5740 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"5ar6Qs R4e.exe\") ); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 2192 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 8100 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"5ar6Qs R4e.exe\") ); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 8080 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7968 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"5ar6Qs R4e.exe\") ); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7992 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 1540 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"5ar6Qs R4e.exe\") ); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 1216 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 2168 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"5ar6Qs R4e.exe\") ); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 8160 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7368 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"5ar6Qs R4e.exe\") ); MD5: 04029E121A0CFA5991749937DD22A1D9) - powershell.exe (PID: 7768 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"5ar6Qs R4e.exe\") ); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 6272 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 6696 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"5ar6Qs R4e.exe\") ); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7220 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 3548 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"5ar6Qs R4e.exe\") ); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 6336 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 3476 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"5ar6Qs R4e.exe\") ); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 3360 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 1072 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"5ar6Qs R4e.exe\") ); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 6864 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 1132 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"5ar6Qs R4e.exe\") ); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 2456 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - conhost.exe (PID: 3892 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - SecEdit.exe (PID: 936 cmdline:
"C:\Window s\system32 \SecEdit.e xe" /confi gure /db C :\Users\us er\AppData \Local\Tem p\SeDebugP rivilege1. sdb /cfg C :\Users\us er\AppData \Local\Tem p\SeDebugP rivilege1. inf /overw rite /log C:\Users\u ser\AppDat a\Local\Te mp\SeDebug Privilege1 .log /quie t MD5: BFC13856291E4B804D33BBAEFC8CB3B5)
- rundll32.exe (PID: 2544 cmdline:
C:\Windows \System32\ rundll32.e xe C:\Wind ows\System 32\shell32 .dll,SHCre ateLocalSe rverRunDll {9aa46009 -3ce0-458a -a354-7156 10a075e6} -Embedding MD5: EF3179D498793BF4234F708D3BE28633)
- iusb3mon.exe (PID: 4196 cmdline:
C:\Program Data\progr am\iusb3mo n.exe MD5: 4764020339A4883862B79B60461B00D1) - powershell.exe (PID: 7816 cmdline:
powershell .exe -NoPr ofile -C " Set-Conten t -Value @ ('[Unicode ]','Unicod e=yes','[V ersion]',' signature= \"$CHICAGO $\"','Revi sion=1','[ Privilege Rights]',' SeDebugPri vilege = * S-1-5-18', '[File Sec urity]','\ "C:\Progra mData\Prog ram\",0,\" D:AR(D;OIC I;DTSDRCWD ;;;WD)\"') -Path ([I O.Path]::C ombine($en v:TEMP, 'S eDebugPriv ilege1.inf ')) -Encod ing Unicod e; secedit .exe /conf igure /db ([IO.Path] ::Combine( $env:TEMP, 'SeDebugP rivilege1. sdb')) /cf g ([IO.Pat h]::Combin e($env:TEM P, 'SeDebu gPrivilege 1.inf')) / overwrite /log ([IO. Path]::Com bine($env: TEMP, 'SeD ebugPrivil ege1.log') ) /quiet; Remove-Ite m -Path ([ IO.Path]:: Combine($e nv:TEMP, ' SeDebugPri vilege1.*' )) -Force; " MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 7836 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - SecEdit.exe (PID: 7528 cmdline:
"C:\Window s\system32 \SecEdit.e xe" /confi gure /db C :\Users\us er\AppData \Local\Tem p\SeDebugP rivilege1. sdb /cfg C :\Users\us er\AppData \Local\Tem p\SeDebugP rivilege1. inf /overw rite /log C:\Users\u ser\AppDat a\Local\Te mp\SeDebug Privilege1 .log /quie t MD5: BFC13856291E4B804D33BBAEFC8CB3B5) - powershell.exe (PID: 7824 cmdline:
powershell .exe -NoPr ofile -C " Set-Conten t -Value @ ('[Unicode ]','Unicod e=yes','[V ersion]',' signature= \"$CHICAGO $\"','Revi sion=1','[ Privilege Rights]',' SeDebugPri vilege = * S-1-5-18', '[File Sec urity]','\ "C:\Progra mData\Data \",0,\"D:A R(D;OICI;D TSDRCWD;;; WD)\"') -P ath ([IO.P ath]::Comb ine($env:T EMP, 'SeDe bugPrivile ge3.inf')) -Encoding Unicode; secedit.ex e /configu re /db ([I O.Path]::C ombine($en v:TEMP, 'S eDebugPriv ilege3.sdb ')) /cfg ( [IO.Path]: :Combine($ env:TEMP, 'SeDebugPr ivilege3.i nf')) /ove rwrite /lo g ([IO.Pat h]::Combin e($env:TEM P, 'SeDebu gPrivilege 3.log')) / quiet; Rem ove-Item - Path ([IO. Path]::Com bine($env: TEMP, 'SeD ebugPrivil ege3.*')) -Force;" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 7852 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - SecEdit.exe (PID: 7412 cmdline:
"C:\Window s\system32 \SecEdit.e xe" /confi gure /db C :\Users\us er\AppData \Local\Tem p\SeDebugP rivilege3. sdb /cfg C :\Users\us er\AppData \Local\Tem p\SeDebugP rivilege3. inf /overw rite /log C:\Users\u ser\AppDat a\Local\Te mp\SeDebug Privilege3 .log /quie t MD5: BFC13856291E4B804D33BBAEFC8CB3B5) - powershell.exe (PID: 7844 cmdline:
powershell .exe -NoPr ofile -C " [IO.File]: :WriteAllB ytes([IO.P ath]::Comb ine($env:T EMP, 'SeDe bugPrivile ge4.inf'), [Convert] ::FromBase 64String(' //5bAFUAbg BpAGMAbwBk AGUAXQANAA oAVQBuAGkA YwBvAGQAZQ A9AHkAZQBz AA0ACgBbAF YAZQByAHMA aQBvAG4AXQ ANAAoAcwBp AGcAbgBhAH QAdQByAGUA PQAiACQAQw BIAEkAQwBB AEcATwAkAC IADQAKAFIA ZQB2AGkAcw BpAG8AbgA9 ADEADQAKAF sAUAByAGkA dgBpAGwAZQ BnAGUAIABS AGkAZwBoAH QAcwBdAA0A CgBTAGUARA BlAGIAdQBn AFAAcgBpAH YAaQBsAGUA ZwBlACAAPQ AgACoAUwAt ADEALQA1AC 0AMQA4AA0A CgA=')); s ecedit.exe /configur e /db ([IO .Path]::Co mbine($env :TEMP, 'Se DebugPrivi lege4.sdb' )) /cfg ([ IO.Path]:: Combine($e nv:TEMP, ' SeDebugPri vilege4.in f')) /over write /log ([IO.Path ]::Combine ($env:TEMP , 'SeDebug Privilege4 .log')) /q uiet; Remo ve-Item -P ath ([IO.P ath]::Comb ine($env:T EMP, 'SeDe bugPrivile ge4.*')) - Force;" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 7912 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - SecEdit.exe (PID: 2032 cmdline:
"C:\Window s\system32 \SecEdit.e xe" /confi gure /db C :\Users\us er\AppData \Local\Tem p\SeDebugP rivilege4. sdb /cfg C :\Users\us er\AppData \Local\Tem p\SeDebugP rivilege4. inf /overw rite /log C:\Users\u ser\AppDat a\Local\Te mp\SeDebug Privilege4 .log /quie t MD5: BFC13856291E4B804D33BBAEFC8CB3B5) - cmd.exe (PID: 7516 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7524 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 4596 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - cmd.exe (PID: 7748 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7764 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 7808 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - cmd.exe (PID: 3160 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 5900 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 7336 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - cmd.exe (PID: 1584 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7104 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 2444 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - cmd.exe (PID: 4552 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 6316 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 2032 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - cmd.exe (PID: 7368 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7360 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 420 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - conhost.exe (PID: 8004 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 7684 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 6080 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 352 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - cmd.exe (PID: 3052 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 3656 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 3508 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - cmd.exe (PID: 6804 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 6844 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 6600 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - cmd.exe (PID: 3204 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 3172 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 1096 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - cmd.exe (PID: 6732 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 6140 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 2096 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - cmd.exe (PID: 8020 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 8044 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 5560 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - cmd.exe (PID: 8056 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7828 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 1932 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - cmd.exe (PID: 6448 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 6316 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 1456 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - cmd.exe (PID: 3916 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 5064 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 7508 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7396 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 5688 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7496 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 5828 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7572 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 6640 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 5928 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 5308 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 6052 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 2760 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7060 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 6304 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
- svchost.exe (PID: 6888 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p -s B ITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Nitol | No Attribution |
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Zegost | Yara detected Zegost | Joe Security | ||
JoeSecurity_Nitol | Yara detected Nitol | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Zegost | Yara detected Zegost | Joe Security | ||
JoeSecurity_Nitol | Yara detected Nitol | Joe Security | ||
JoeSecurity_Zegost | Yara detected Zegost | Joe Security | ||
JoeSecurity_Nitol | Yara detected Nitol | Joe Security | ||
JoeSecurity_Zegost | Yara detected Zegost | Joe Security | ||
Click to see the 6 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Zegost | Yara detected Zegost | Joe Security | ||
JoeSecurity_Nitol | Yara detected Nitol | Joe Security | ||
JoeSecurity_Zegost | Yara detected Zegost | Joe Security | ||
JoeSecurity_Nitol | Yara detected Nitol | Joe Security | ||
JoeSecurity_Zegost | Yara detected Zegost | Joe Security | ||
Click to see the 9 entries |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |