Edit tour
Windows
Analysis Report
Lets-x64.exe
Overview
General Information
Detection
Nitol, Zegost
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus detection for dropped file
Detected unpacking (creates a PE file in dynamic memory)
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Nitol
Yara detected Zegost
AI detected suspicious sample
Contains functionality to capture and log keystrokes
Contains functionality to modify Windows User Account Control (UAC) settings
Disable UAC(promptonsecuredesktop)
Disables UAC (registry)
Encrypted powershell cmdline option found
Found stalling execution ending in API Sleep call
Found suspicious powershell code related to unpacking or dynamic code loading
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Execution from Suspicious Folder
Sigma detected: Parent in Public Folder Suspicious Process
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Suspicious Program Location with Network Connections
Suspicious powershell command line found
Tries to delay execution (extensive OutputDebugStringW loop)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Uses schtasks.exe or at.exe to add and modify task schedules
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Contains capabilities to detect virtual machines
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to clear windows event logs (to hide its activities)
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates COM task schedule object (often to register a task for autostart)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Enables debug privileges
Entry point lies outside standard sections
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found dropped PE file which has not been started or loaded
Found evasive API chain (may stop execution after accessing registry keys)
Found evasive API chain (may stop execution after checking a module file name)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
PE file contains an invalid checksum
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Wow6432Node CurrentVersion Autorun Keys Modification
Too many similar processes found
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match
Classification
- System is w10x64
- Lets-x64.exe (PID: 4500 cmdline:
"C:\Users\ user\Deskt op\Lets-x6 4.exe" MD5: A702CC254B31FBC4A5EC45FA16573521) - irsetup.exe (PID: 320 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\_ir_sf _temp_0\ir setup.exe" __IRAOFF: 5664114 "_ _IRAFN:C:\ Users\user \Desktop\L ets-x64.ex e" "__IRCT :0" "__IRT SS:0" "__I RSID:S-1-5 -21-224612 2658-36934 05117-2476 756634-100 3" MD5: 2A7D5F8D3FB4AB753B226FD88D31453B) - powershell.exe (PID: 5620 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"msmpen g.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 5996 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 5588 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"securi tyhealthsy stray.exe\ ")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 2920 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 3364 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"mpcopy accelerato r.exe\")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 4676 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 5620 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"MpDefe nderCoreSe rvice.exe\ ")); MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7060 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 2820 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" $mypid=(Ge t-WmiObjec t -Query ' select Par entProcess Id from Wi n32_Proces s where Pr ocessId=32 0').Parent ProcessId; if($mypid) {Stop-Proc ess -Id $m ypid -Forc e;} MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 6564 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 2952 cmdline:
"C:\Window s\System32 \cmd.exe" /c start " title" "C: \Users\Pub lic\Docume nts\dtw_H3 NyEy\_P18s PbB.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 5632 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - _P18sPbB.exe (PID: 6104 cmdline:
"C:\Users\ Public\Doc uments\dtw _H3NyEy\_P 18sPbB.exe " MD5: 3BAED7BF765E1631DAF431D29173213C) - powershell.exe (PID: 1088 cmdline:
powershell .exe -NoPr ofile -C " Set-Conten t -Value @ ('[Unicode ]','Unicod e=yes','[V ersion]',' signature= \"$CHICAGO $\"','Revi sion=1','[ Privilege Rights]',' SeDebugPri vilege = * S-1-5-18', '[File Sec urity]','\ "C:\Progra mData\Prog ram\",0,\" D:AR(D;OIC I;DTSDRCWD ;;;WD)\"') -Path ([I O.Path]::C ombine($en v:TEMP, 'S eDebugPriv ilege1.inf ')) -Encod ing Unicod e; secedit .exe /conf igure /db ([IO.Path] ::Combine( $env:TEMP, 'SeDebugP rivilege1. sdb')) /cf g ([IO.Pat h]::Combin e($env:TEM P, 'SeDebu gPrivilege 1.inf')) / overwrite /log ([IO. Path]::Com bine($env: TEMP, 'SeD ebugPrivil ege1.log') ) /quiet; Remove-Ite m -Path ([ IO.Path]:: Combine($e nv:TEMP, ' SeDebugPri vilege1.*' )) -Force; " MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 3364 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - SecEdit.exe (PID: 7396 cmdline:
"C:\Window s\system32 \SecEdit.e xe" /confi gure /db C :\Users\us er\AppData \Local\Tem p\SeDebugP rivilege1. sdb /cfg C :\Users\us er\AppData \Local\Tem p\SeDebugP rivilege1. inf /overw rite /log C:\Users\u ser\AppDat a\Local\Te mp\SeDebug Privilege1 .log /quie t MD5: BFC13856291E4B804D33BBAEFC8CB3B5) - powershell.exe (PID: 984 cmdline:
powershell .exe -NoPr ofile -C " Set-Conten t -Value @ ('[Unicode ]','Unicod e=yes','[V ersion]',' signature= \"$CHICAGO $\"','Revi sion=1','[ Privilege Rights]',' SeDebugPri vilege = * S-1-5-18', '[File Sec urity]','\ "C:\Progra mData\Data \",0,\"D:A R(D;OICI;D TSDRCWD;;; WD)\"') -P ath ([IO.P ath]::Comb ine($env:T EMP, 'SeDe bugPrivile ge3.inf')) -Encoding Unicode; secedit.ex e /configu re /db ([I O.Path]::C ombine($en v:TEMP, 'S eDebugPriv ilege3.sdb ')) /cfg ( [IO.Path]: :Combine($ env:TEMP, 'SeDebugPr ivilege3.i nf')) /ove rwrite /lo g ([IO.Pat h]::Combin e($env:TEM P, 'SeDebu gPrivilege 3.log')) / quiet; Rem ove-Item - Path ([IO. Path]::Com bine($env: TEMP, 'SeD ebugPrivil ege3.*')) -Force;" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 4592 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - SecEdit.exe (PID: 7420 cmdline:
"C:\Window s\system32 \SecEdit.e xe" /confi gure /db C :\Users\us er\AppData \Local\Tem p\SeDebugP rivilege3. sdb /cfg C :\Users\us er\AppData \Local\Tem p\SeDebugP rivilege3. inf /overw rite /log C:\Users\u ser\AppDat a\Local\Te mp\SeDebug Privilege3 .log /quie t MD5: BFC13856291E4B804D33BBAEFC8CB3B5) - powershell.exe (PID: 5996 cmdline:
powershell .exe -NoPr ofile -C " [IO.File]: :WriteAllB ytes([IO.P ath]::Comb ine($env:T EMP, 'SeDe bugPrivile ge4.inf'), [Convert] ::FromBase 64String(' //5bAFUAbg BpAGMAbwBk AGUAXQANAA oAVQBuAGkA YwBvAGQAZQ A9AHkAZQBz AA0ACgBbAF YAZQByAHMA aQBvAG4AXQ ANAAoAcwBp AGcAbgBhAH QAdQByAGUA PQAiACQAQw BIAEkAQwBB AEcATwAkAC IADQAKAFIA ZQB2AGkAcw BpAG8AbgA9 ADEADQAKAF sAUAByAGkA dgBpAGwAZQ BnAGUAIABS AGkAZwBoAH QAcwBdAA0A CgBTAGUARA BlAGIAdQBn AFAAcgBpAH YAaQBsAGUA ZwBlACAAPQ AgACoAUwAt ADEALQA1AC 0AMQA4AA0A CgA=')); s ecedit.exe /configur e /db ([IO .Path]::Co mbine($env :TEMP, 'Se DebugPrivi lege4.sdb' )) /cfg ([ IO.Path]:: Combine($e nv:TEMP, ' SeDebugPri vilege4.in f')) /over write /log ([IO.Path ]::Combine ($env:TEMP , 'SeDebug Privilege4 .log')) /q uiet; Remo ve-Item -P ath ([IO.P ath]::Comb ine($env:T EMP, 'SeDe bugPrivile ge4.*')) - Force;" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 5332 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - SecEdit.exe (PID: 7328 cmdline:
"C:\Window s\system32 \SecEdit.e xe" /confi gure /db C :\Users\us er\AppData \Local\Tem p\SeDebugP rivilege4. sdb /cfg C :\Users\us er\AppData \Local\Tem p\SeDebugP rivilege4. inf /overw rite /log C:\Users\u ser\AppDat a\Local\Te mp\SeDebug Privilege4 .log /quie t MD5: BFC13856291E4B804D33BBAEFC8CB3B5) - powershell.exe (PID: 2436 cmdline:
powershell .exe -NoPr ofile -C " Set-Conten t -Value @ ('[Unicode ]','Unicod e=yes','[V ersion]',' signature= \"$CHICAGO $\"','Revi sion=1','[ Privilege Rights]',' SeDebugPri vilege = * S-1-5-18', '[File Sec urity]','\ "C:\Progra mData\Prog ram\",0,\" D:AR(D;OIC I;DTSDRCWD ;;;WD)\"') -Path ([I O.Path]::C ombine($en v:TEMP, 'S eDebugPriv ilege1.inf ')) -Encod ing Unicod e; secedit .exe /conf igure /db ([IO.Path] ::Combine( $env:TEMP, 'SeDebugP rivilege1. sdb')) /cf g ([IO.Pat h]::Combin e($env:TEM P, 'SeDebu gPrivilege 1.inf')) / overwrite /log ([IO. Path]::Com bine($env: TEMP, 'SeD ebugPrivil ege1.log') ) /quiet; Remove-Ite m -Path ([ IO.Path]:: Combine($e nv:TEMP, ' SeDebugPri vilege1.*' )) -Force; " MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 6436 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - SecEdit.exe (PID: 7412 cmdline:
"C:\Window s\system32 \SecEdit.e xe" /confi gure /db C :\Users\us er\AppData \Local\Tem p\SeDebugP rivilege1. sdb /cfg C :\Users\us er\AppData \Local\Tem p\SeDebugP rivilege1. inf /overw rite /log C:\Users\u ser\AppDat a\Local\Te mp\SeDebug Privilege1 .log /quie t MD5: BFC13856291E4B804D33BBAEFC8CB3B5) - cmd.exe (PID: 7224 cmdline:
cmd /c ech o.>c:\inst .ini MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7240 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 7600 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7620 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 7680 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - powershell.exe (PID: 7632 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"_P18sP bB.exe\")) ; MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7664 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 8068 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"_P18sP bB.exe\")) ; MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 8076 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7772 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"_P18sP bB.exe\")) ; MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7780 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 8128 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"_P18sP bB.exe\")) ; MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 8152 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 5064 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"_P18sP bB.exe\")) ; MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7500 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 1264 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"_P18sP bB.exe\")) ; MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 6020 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7104 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"_P18sP bB.exe\")) ; MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7724 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7504 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"_P18sP bB.exe\")) ; MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 3112 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 5036 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"_P18sP bB.exe\")) ; MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 4748 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 3560 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"_P18sP bB.exe\")) ; MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7220 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 5020 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"_P18sP bB.exe\")) ; MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 180 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 5812 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"_P18sP bB.exe\")) ; MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 5800 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 6388 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"_P18sP bB.exe\")) ; MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 5292 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7460 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"_P18sP bB.exe\")) ; MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7472 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 984 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"_P18sP bB.exe\")) ; MD5: 04029E121A0CFA5991749937DD22A1D9) - powershell.exe (PID: 8028 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"_P18sP bB.exe\")) ; MD5: 04029E121A0CFA5991749937DD22A1D9) - powershell.exe (PID: 7332 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"_P18sP bB.exe\")) ; MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 8044 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 1516 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"_P18sP bB.exe\")) ; MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7068 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 408 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"_P18sP bB.exe\")) ; MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 3360 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7392 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"_P18sP bB.exe\")) ; MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 6368 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7508 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"_P18sP bB.exe\")) ; MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 2980 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 2364 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"_P18sP bB.exe\")) ; MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 2892 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 2076 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"_P18sP bB.exe\")) ; MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 2956 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7552 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"_P18sP bB.exe\")) ; MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7556 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 6548 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"_P18sP bB.exe\")) ; MD5: 04029E121A0CFA5991749937DD22A1D9) - powershell.exe (PID: 5308 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"_P18sP bB.exe\")) ; MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 5312 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7292 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"_P18sP bB.exe\")) ; MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 4696 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7436 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"_P18sP bB.exe\")) ; MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7400 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7980 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Get-Proces s ([IO.Pat h]::GetFil eNameWitho utExtensio n(\"_P18sP bB.exe\")) ; MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 8048 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- rundll32.exe (PID: 6540 cmdline:
C:\Windows \System32\ rundll32.e xe C:\Wind ows\System 32\shell32 .dll,SHCre ateLocalSe rverRunDll {9aa46009 -3ce0-458a -a354-7156 10a075e6} -Embedding MD5: EF3179D498793BF4234F708D3BE28633)
- iusb3mon.exe (PID: 7272 cmdline:
C:\Program Data\progr am\iusb3mo n.exe MD5: 3BAED7BF765E1631DAF431D29173213C) - powershell.exe (PID: 7936 cmdline:
powershell .exe -NoPr ofile -C " Set-Conten t -Value @ ('[Unicode ]','Unicod e=yes','[V ersion]',' signature= \"$CHICAGO $\"','Revi sion=1','[ Privilege Rights]',' SeDebugPri vilege = * S-1-5-18', '[File Sec urity]','\ "C:\Progra mData\Prog ram\",0,\" D:AR(D;OIC I;DTSDRCWD ;;;WD)\"') -Path ([I O.Path]::C ombine($en v:TEMP, 'S eDebugPriv ilege1.inf ')) -Encod ing Unicod e; secedit .exe /conf igure /db ([IO.Path] ::Combine( $env:TEMP, 'SeDebugP rivilege1. sdb')) /cf g ([IO.Pat h]::Combin e($env:TEM P, 'SeDebu gPrivilege 1.inf')) / overwrite /log ([IO. Path]::Com bine($env: TEMP, 'SeD ebugPrivil ege1.log') ) /quiet; Remove-Ite m -Path ([ IO.Path]:: Combine($e nv:TEMP, ' SeDebugPri vilege1.*' )) -Force; " MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 7952 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - SecEdit.exe (PID: 7676 cmdline:
"C:\Window s\system32 \SecEdit.e xe" /confi gure /db C :\Users\us er\AppData \Local\Tem p\SeDebugP rivilege1. sdb /cfg C :\Users\us er\AppData \Local\Tem p\SeDebugP rivilege1. inf /overw rite /log C:\Users\u ser\AppDat a\Local\Te mp\SeDebug Privilege1 .log /quie t MD5: BFC13856291E4B804D33BBAEFC8CB3B5) - powershell.exe (PID: 7944 cmdline:
powershell .exe -NoPr ofile -C " Set-Conten t -Value @ ('[Unicode ]','Unicod e=yes','[V ersion]',' signature= \"$CHICAGO $\"','Revi sion=1','[ Privilege Rights]',' SeDebugPri vilege = * S-1-5-18', '[File Sec urity]','\ "C:\Progra mData\Data \",0,\"D:A R(D;OICI;D TSDRCWD;;; WD)\"') -P ath ([IO.P ath]::Comb ine($env:T EMP, 'SeDe bugPrivile ge3.inf')) -Encoding Unicode; secedit.ex e /configu re /db ([I O.Path]::C ombine($en v:TEMP, 'S eDebugPriv ilege3.sdb ')) /cfg ( [IO.Path]: :Combine($ env:TEMP, 'SeDebugPr ivilege3.i nf')) /ove rwrite /lo g ([IO.Pat h]::Combin e($env:TEM P, 'SeDebu gPrivilege 3.log')) / quiet; Rem ove-Item - Path ([IO. Path]::Com bine($env: TEMP, 'SeD ebugPrivil ege3.*')) -Force;" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 7968 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - SecEdit.exe (PID: 7648 cmdline:
"C:\Window s\system32 \SecEdit.e xe" /confi gure /db C :\Users\us er\AppData \Local\Tem p\SeDebugP rivilege3. sdb /cfg C :\Users\us er\AppData \Local\Tem p\SeDebugP rivilege3. inf /overw rite /log C:\Users\u ser\AppDat a\Local\Te mp\SeDebug Privilege3 .log /quie t MD5: BFC13856291E4B804D33BBAEFC8CB3B5) - powershell.exe (PID: 7960 cmdline:
powershell .exe -NoPr ofile -C " [IO.File]: :WriteAllB ytes([IO.P ath]::Comb ine($env:T EMP, 'SeDe bugPrivile ge4.inf'), [Convert] ::FromBase 64String(' //5bAFUAbg BpAGMAbwBk AGUAXQANAA oAVQBuAGkA YwBvAGQAZQ A9AHkAZQBz AA0ACgBbAF YAZQByAHMA aQBvAG4AXQ ANAAoAcwBp AGcAbgBhAH QAdQByAGUA PQAiACQAQw BIAEkAQwBB AEcATwAkAC IADQAKAFIA ZQB2AGkAcw BpAG8AbgA9 ADEADQAKAF sAUAByAGkA dgBpAGwAZQ BnAGUAIABS AGkAZwBoAH QAcwBdAA0A CgBTAGUARA BlAGIAdQBn AFAAcgBpAH YAaQBsAGUA ZwBlACAAPQ AgACoAUwAt ADEALQA1AC 0AMQA4AA0A CgA=')); s ecedit.exe /configur e /db ([IO .Path]::Co mbine($env :TEMP, 'Se DebugPrivi lege4.sdb' )) /cfg ([ IO.Path]:: Combine($e nv:TEMP, ' SeDebugPri vilege4.in f')) /over write /log ([IO.Path ]::Combine ($env:TEMP , 'SeDebug Privilege4 .log')) /q uiet; Remo ve-Item -P ath ([IO.P ath]::Comb ine($env:T EMP, 'SeDe bugPrivile ge4.*')) - Force;" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 8028 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - conhost.exe (PID: 2848 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - SecEdit.exe (PID: 7684 cmdline:
"C:\Window s\system32 \SecEdit.e xe" /confi gure /db C :\Users\us er\AppData \Local\Tem p\SeDebugP rivilege4. sdb /cfg C :\Users\us er\AppData \Local\Tem p\SeDebugP rivilege4. inf /overw rite /log C:\Users\u ser\AppDat a\Local\Te mp\SeDebug Privilege4 .log /quie t MD5: BFC13856291E4B804D33BBAEFC8CB3B5) - cmd.exe (PID: 4612 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 2604 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 7736 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - cmd.exe (PID: 8032 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 8148 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 7220 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - cmd.exe (PID: 1164 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7188 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 5136 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - cmd.exe (PID: 7200 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 1864 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 984 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - conhost.exe (PID: 2296 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 7748 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7768 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 4292 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - cmd.exe (PID: 7908 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7708 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 828 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - cmd.exe (PID: 8068 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 5632 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 8144 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - cmd.exe (PID: 3304 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 3552 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 5956 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - cmd.exe (PID: 6472 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 6548 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - conhost.exe (PID: 5776 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 6532 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - cmd.exe (PID: 5856 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 1524 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 7700 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - cmd.exe (PID: 7304 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7960 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 6388 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - cmd.exe (PID: 5612 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 3004 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 5660 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - cmd.exe (PID: 1128 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7440 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 3772 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - cmd.exe (PID: 7600 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 4024 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 3448 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - cmd.exe (PID: 5716 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 3848 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 6776 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - cmd.exe (PID: 4140 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 8120 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 4180 cmdline:
schtasks.e xe /create /tn "Wind ows Audio Endpoint B uilder( )" /xml "C:\Progr amData\Mic rosoft\Mic rosoftNetF ramework.x ml MD5: 48C2FE20575769DE916F48EF0676A965) - cmd.exe (PID: 3664 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 6532 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 6036 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7160 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 7752 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 1864 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 7964 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7192 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 8092 cmdline:
cmd.exe /c schtasks. exe /creat e /tn "Win dows Audio Endpoint Builder( )" /xm l "C:\Prog ramData\Mi crosoft\Mi crosoftNet Framework. xml MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
- svchost.exe (PID: 7544 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p -s B ITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Nitol | No Attribution |
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Zegost | Yara detected Zegost | Joe Security | ||
JoeSecurity_Nitol | Yara detected Nitol | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Zegost | Yara detected Zegost | Joe Security | ||
JoeSecurity_Nitol | Yara detected Nitol | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Zegost | Yara detected Zegost | Joe Security | ||
JoeSecurity_Nitol | Yara detected Nitol | Joe Security | ||
JoeSecurity_Zegost | Yara detected Zegost | Joe Security | ||
JoeSecurity_Nitol | Yara detected Nitol | Joe Security | ||
JoeSecurity_Zegost | Yara detected Zegost | Joe Security | ||
Click to see the 4 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Zegost | Yara detected Zegost | Joe Security | ||
JoeSecurity_Nitol | Yara detected Nitol | Joe Security | ||
JoeSecurity_Zegost | Yara detected Zegost | Joe Security | ||
JoeSecurity_Nitol | Yara detected Nitol | Joe Security | ||
JoeSecurity_Zegost | Yara detected Zegost | Joe Security | ||
Click to see the 7 entries |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |