![]() ![]() Spawned process "ati.EXE" with commandline "C:\AppPatch\PCAT\ati.EXE" "" ( Show Process) Spawned process "taskkill.exe" with commandline "%WINDIR%\System32\taskkill.exe" /f /im hlds.exe"" ( Show Process) Spawned process "taskkill.exe" with commandline "%WINDIR%\System32\taskkill.exe" /f /im ati.exe"" ( Show Process) Malicious artifacts seen in the context of a contacted host ![]() 9/61 Antivirus vendors marked spawned process "ati.EXE" (PID: 2648) as malicious (classified as "QVM41.1.9E59.Malware" with 14% detection rate)Ģ/62 Antivirus vendors marked spawned process "ati.exe" (PID: 1500) as malicious (classified as "ML.Attribute" with 3% detection rate)ġ/60 Antivirus vendors marked spawned process "hlds.exe" (PID: 2956) as malicious (classified as "Trojan.Neshta" with 1% detection rate)ġ/60 Antivirus vendors marked spawned process "hlds.exe" (PID: 1140) as malicious (classified as "Trojan.Neshta" with 1% detection rate)ġ/60 Antivirus vendors marked spawned process "hlds.exe" (PID: 2896) as malicious (classified as "Trojan.Neshta" with 1% detection rate)ġ/60 Antivirus vendors marked spawned process "hlds.exe" (PID: 1352) as malicious (classified as "Trojan.Neshta" with 1% detection rate)ġ/60 Antivirus vendors marked spawned process "hlds.exe" (PID: 3536) as malicious (classified as "Trojan.Neshta" with 1% detection rate) ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |