Resubmissions
24-02-2022 10:10
220224-l7djracga3 10Analysis
-
max time kernel
132s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
24-02-2022 10:10
Static task
static1
Behavioral task
behavioral1
Sample
c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe
Resource
win10v2004-en-20220113
General
-
Target
c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe
-
Size
7.6MB
-
MD5
33f612338b6b5e6b4fe8cbb17208795c
-
SHA1
66535700bbce7f90d2add7c504bc0e0523d4d71d
-
SHA256
c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a
-
SHA512
7dfce042f5287858cf1d2942f6672084d01ad5677c7b47a1e9c2bcd4e0a2ea375ccd3a33676dc64dbe28edfe4fd19d25de5232c8fd23c0c7b24708c85b647fb2
Malware Config
Extracted
C:\re_ad_me.txt
http://zeonrefpbompx6rwdqa5hxgtp2cxgfmoymlli3azoanisze33pp3x3yd.onion/
Signatures
-
Modifies extensions of user files 8 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File created C:\Users\Admin\Pictures\ExportWrite.png.zeon c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe File created C:\Users\Admin\Pictures\FormatNew.png.zeon c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe File created C:\Users\Admin\Pictures\LimitPush.crw.zeon c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe File created C:\Users\Admin\Pictures\PushCopy.png.zeon c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe File created C:\Users\Admin\Pictures\RepairDeny.crw.zeon c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe File created C:\Users\Admin\Pictures\SwitchSubmit.crw.zeon c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe File created C:\Users\Admin\Pictures\BackupUnprotect.raw.zeon c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe File created C:\Users\Admin\Pictures\EditDisable.crw.zeon c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe -
Loads dropped DLL 31 IoCs
pid Process 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\pqBxGx.jpg" c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1652 schtasks.exe 552 schtasks.exe 564 schtasks.exe -
Kills process with taskkill 53 IoCs
pid Process 2128 taskkill.exe 4396 taskkill.exe 5016 taskkill.exe 4024 taskkill.exe 908 taskkill.exe 3164 taskkill.exe 3476 taskkill.exe 2196 taskkill.exe 1564 taskkill.exe 4252 taskkill.exe 1088 taskkill.exe 2020 taskkill.exe 2272 taskkill.exe 4820 taskkill.exe 420 taskkill.exe 312 taskkill.exe 4164 taskkill.exe 1964 taskkill.exe 1424 taskkill.exe 4904 taskkill.exe 3996 taskkill.exe 1124 taskkill.exe 4608 taskkill.exe 4808 taskkill.exe 4324 taskkill.exe 1144 taskkill.exe 4892 taskkill.exe 4164 taskkill.exe 3844 taskkill.exe 1964 taskkill.exe 2944 taskkill.exe 4740 taskkill.exe 4916 taskkill.exe 624 taskkill.exe 2276 taskkill.exe 2268 taskkill.exe 4216 taskkill.exe 1224 taskkill.exe 1364 taskkill.exe 2644 taskkill.exe 1948 taskkill.exe 444 taskkill.exe 2348 taskkill.exe 4196 taskkill.exe 3400 taskkill.exe 4392 taskkill.exe 5024 taskkill.exe 4896 taskkill.exe 856 taskkill.exe 4040 taskkill.exe 4648 taskkill.exe 3080 taskkill.exe 1324 taskkill.exe -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 53 IoCs
description pid Process Token: SeDebugPrivilege 2128 taskkill.exe Token: SeDebugPrivilege 4024 taskkill.exe Token: SeDebugPrivilege 1088 taskkill.exe Token: SeDebugPrivilege 444 taskkill.exe Token: SeDebugPrivilege 4740 taskkill.exe Token: SeDebugPrivilege 4396 taskkill.exe Token: SeDebugPrivilege 1364 taskkill.exe Token: SeDebugPrivilege 2348 taskkill.exe Token: SeDebugPrivilege 4904 taskkill.exe Token: SeDebugPrivilege 2020 taskkill.exe Token: SeDebugPrivilege 908 taskkill.exe Token: SeDebugPrivilege 420 taskkill.exe Token: SeDebugPrivilege 2272 taskkill.exe Token: SeDebugPrivilege 3164 taskkill.exe Token: SeDebugPrivilege 3996 taskkill.exe Token: SeDebugPrivilege 4648 taskkill.exe Token: SeDebugPrivilege 4216 taskkill.exe Token: SeDebugPrivilege 3476 taskkill.exe Token: SeDebugPrivilege 4916 taskkill.exe Token: SeDebugPrivilege 2268 taskkill.exe Token: SeDebugPrivilege 1124 taskkill.exe Token: SeDebugPrivilege 3844 taskkill.exe Token: SeDebugPrivilege 1964 taskkill.exe Token: SeDebugPrivilege 624 taskkill.exe Token: SeDebugPrivilege 4608 taskkill.exe Token: SeDebugPrivilege 4820 taskkill.exe Token: SeDebugPrivilege 312 taskkill.exe Token: SeDebugPrivilege 4164 taskkill.exe Token: SeDebugPrivilege 4252 taskkill.exe Token: SeDebugPrivilege 5016 taskkill.exe Token: SeDebugPrivilege 1144 taskkill.exe Token: SeDebugPrivilege 1964 taskkill.exe Token: SeDebugPrivilege 2944 taskkill.exe Token: SeDebugPrivilege 4892 taskkill.exe Token: SeDebugPrivilege 3080 taskkill.exe Token: SeDebugPrivilege 4196 taskkill.exe Token: SeDebugPrivilege 1424 taskkill.exe Token: SeDebugPrivilege 3400 taskkill.exe Token: SeDebugPrivilege 4392 taskkill.exe Token: SeDebugPrivilege 4040 taskkill.exe Token: SeDebugPrivilege 5024 taskkill.exe Token: SeDebugPrivilege 2196 taskkill.exe Token: SeDebugPrivilege 4808 taskkill.exe Token: SeDebugPrivilege 4896 taskkill.exe Token: SeDebugPrivilege 2276 taskkill.exe Token: SeDebugPrivilege 2644 taskkill.exe Token: SeDebugPrivilege 1224 taskkill.exe Token: SeDebugPrivilege 1564 taskkill.exe Token: SeDebugPrivilege 856 taskkill.exe Token: SeDebugPrivilege 4324 taskkill.exe Token: SeDebugPrivilege 1948 taskkill.exe Token: SeDebugPrivilege 1324 taskkill.exe Token: SeDebugPrivilege 4164 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3824 wrote to memory of 4064 3824 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 82 PID 3824 wrote to memory of 4064 3824 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 82 PID 3824 wrote to memory of 4064 3824 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 82 PID 4064 wrote to memory of 3368 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 83 PID 4064 wrote to memory of 3368 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 83 PID 4064 wrote to memory of 3368 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 83 PID 3368 wrote to memory of 4888 3368 net.exe 85 PID 3368 wrote to memory of 4888 3368 net.exe 85 PID 3368 wrote to memory of 4888 3368 net.exe 85 PID 4064 wrote to memory of 3788 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 86 PID 4064 wrote to memory of 3788 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 86 PID 4064 wrote to memory of 3788 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 86 PID 3788 wrote to memory of 4232 3788 net.exe 88 PID 3788 wrote to memory of 4232 3788 net.exe 88 PID 3788 wrote to memory of 4232 3788 net.exe 88 PID 4064 wrote to memory of 4224 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 89 PID 4064 wrote to memory of 4224 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 89 PID 4064 wrote to memory of 4224 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 89 PID 4224 wrote to memory of 1276 4224 net.exe 91 PID 4224 wrote to memory of 1276 4224 net.exe 91 PID 4224 wrote to memory of 1276 4224 net.exe 91 PID 4064 wrote to memory of 2128 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 92 PID 4064 wrote to memory of 2128 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 92 PID 4064 wrote to memory of 2128 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 92 PID 4064 wrote to memory of 3512 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 98 PID 4064 wrote to memory of 3512 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 98 PID 4064 wrote to memory of 3512 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 98 PID 3512 wrote to memory of 1936 3512 net.exe 100 PID 3512 wrote to memory of 1936 3512 net.exe 100 PID 3512 wrote to memory of 1936 3512 net.exe 100 PID 4064 wrote to memory of 4988 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 101 PID 4064 wrote to memory of 4988 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 101 PID 4064 wrote to memory of 4988 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 101 PID 4988 wrote to memory of 2020 4988 net.exe 103 PID 4988 wrote to memory of 2020 4988 net.exe 103 PID 4988 wrote to memory of 2020 4988 net.exe 103 PID 4064 wrote to memory of 1484 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 104 PID 4064 wrote to memory of 1484 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 104 PID 4064 wrote to memory of 1484 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 104 PID 1484 wrote to memory of 5016 1484 net.exe 106 PID 1484 wrote to memory of 5016 1484 net.exe 106 PID 1484 wrote to memory of 5016 1484 net.exe 106 PID 4064 wrote to memory of 4024 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 107 PID 4064 wrote to memory of 4024 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 107 PID 4064 wrote to memory of 4024 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 107 PID 4064 wrote to memory of 1308 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 109 PID 4064 wrote to memory of 1308 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 109 PID 4064 wrote to memory of 1308 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 109 PID 1308 wrote to memory of 1072 1308 net.exe 112 PID 1308 wrote to memory of 1072 1308 net.exe 112 PID 1308 wrote to memory of 1072 1308 net.exe 112 PID 4064 wrote to memory of 1088 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 113 PID 4064 wrote to memory of 1088 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 113 PID 4064 wrote to memory of 1088 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 113 PID 4064 wrote to memory of 2140 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 115 PID 4064 wrote to memory of 2140 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 115 PID 4064 wrote to memory of 2140 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 115 PID 2140 wrote to memory of 2280 2140 net.exe 117 PID 2140 wrote to memory of 2280 2140 net.exe 117 PID 2140 wrote to memory of 2280 2140 net.exe 117 PID 4064 wrote to memory of 1036 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 118 PID 4064 wrote to memory of 1036 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 118 PID 4064 wrote to memory of 1036 4064 c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe 118 PID 1036 wrote to memory of 548 1036 net.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe"C:\Users\Admin\AppData\Local\Temp\c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Users\Admin\AppData\Local\Temp\c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe"C:\Users\Admin\AppData\Local\Temp\c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a.exe"2⤵
- Modifies extensions of user files
- Loads dropped DLL
- Sets desktop wallpaper using registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Windows\SysWOW64\net.exenet stop /y backup3⤵
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y backup4⤵PID:4888
-
-
-
C:\Windows\SysWOW64\net.exenet stop /y wbengine3⤵
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y wbengine4⤵PID:4232
-
-
-
C:\Windows\SysWOW64\net.exenet stop /y McShield3⤵
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y McShield4⤵PID:1276
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im steam.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2128
-
-
C:\Windows\SysWOW64\net.exenet stop /y mfefire3⤵
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y mfefire4⤵PID:1936
-
-
-
C:\Windows\SysWOW64\net.exenet stop /y EhttpSrv3⤵
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y EhttpSrv4⤵PID:2020
-
-
-
C:\Windows\SysWOW64\net.exenet stop /y KAVF3⤵
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y KAVF4⤵PID:5016
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im ocautoupds.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4024
-
-
C:\Windows\SysWOW64\net.exenet stop /y VeeamNFSSvc3⤵
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y VeeamNFSSvc4⤵PID:1072
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im backup.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1088
-
-
C:\Windows\SysWOW64\net.exenet stop /y bedbg3⤵
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y bedbg4⤵PID:2280
-
-
-
C:\Windows\SysWOW64\net.exenet stop /y SmcService3⤵
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y SmcService4⤵PID:548
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im winword.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:444
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im thunderbird.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4740
-
-
C:\Windows\SysWOW64\net.exenet stop /y Sophos3⤵PID:1516
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y Sophos4⤵PID:4972
-
-
-
C:\Windows\SysWOW64\net.exenet stop /y CCSF3⤵PID:2104
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y CCSF4⤵PID:3060
-
-
-
C:\Windows\SysWOW64\net.exenet stop /y tmlisten3⤵PID:4092
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y tmlisten4⤵PID:4896
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im dbsnmp.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4396
-
-
C:\Windows\SysWOW64\net.exenet stop /y ekrn3⤵PID:360
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y ekrn4⤵PID:4228
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im mydesktopservice.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1364
-
-
C:\Windows\SysWOW64\net.exenet stop /y RESvc3⤵PID:4168
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y RESvc4⤵PID:3476
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im Raccine.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2348
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im firefox.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4904
-
-
C:\Windows\SysWOW64\net.exenet stop /y EPSecurity3⤵PID:1936
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y EPSecurity4⤵PID:3140
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im veeam.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2020
-
-
C:\Windows\SysWOW64\net.exenet stop /y xchange3⤵PID:5016
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y xchange4⤵PID:4460
-
-
-
C:\Windows\SysWOW64\net.exenet stop /y TrueKey3⤵PID:1980
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y TrueKey4⤵PID:3624
-
-
-
C:\Windows\SysWOW64\net.exenet stop /y MsDts3⤵PID:1096
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y MsDts4⤵PID:1316
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im vmwp.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:908
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im msaccess.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:420
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im wordpad.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2272
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im oracle.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3164
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im sofos.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3996
-
-
C:\Windows\SysWOW64\net.exenet stop /y swi_3⤵PID:4088
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y swi_4⤵PID:4324
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im xfssvccon.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4648
-
-
C:\Windows\SysWOW64\net.exenet stop /y Enterprise3⤵PID:860
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y Enterprise4⤵PID:4888
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im xchange.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4216
-
-
C:\Windows\SysWOW64\net.exenet stop /y AVP3⤵PID:4236
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y AVP4⤵PID:4160
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im isqlplussvc.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3476
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im notepad.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4916
-
-
C:\Windows\SysWOW64\net.exenet stop /y Exchange3⤵PID:4272
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y Exchange4⤵PID:5064
-
-
-
C:\Windows\SysWOW64\net.exenet stop /y Smcinst3⤵PID:1936
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y Smcinst4⤵PID:5004
-
-
-
C:\Windows\SysWOW64\net.exenet stop /y Antivirus3⤵PID:4060
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y Antivirus4⤵PID:4492
-
-
-
C:\Windows\SysWOW64\net.exenet stop /y NetMsmq3⤵PID:5016
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y NetMsmq4⤵PID:3624
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im ocomm.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2268
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im ocssd.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1124
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im dbeng50.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3844
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im firefoxconfig.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1964
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im synctime.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:624
-
-
C:\Windows\SysWOW64\net.exenet stop /y mfemms3⤵PID:444
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y mfemms4⤵PID:3576
-
-
-
C:\Windows\SysWOW64\net.exenet stop /y Monitor3⤵PID:2944
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y Monitor4⤵PID:1948
-
-
-
C:\Windows\SysWOW64\net.exenet stop /y WRSVC3⤵PID:4328
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y WRSVC4⤵PID:4648
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im calc.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4608
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im powerpnt.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4820
-
-
C:\Windows\SysWOW64\net.exenet stop /y veeam3⤵PID:4604
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y veeam4⤵PID:2364
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im encsvc.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:312
-
-
C:\Windows\SysWOW64\net.exenet stop /y Veeam3⤵PID:3952
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y Veeam4⤵PID:4012
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im virtual.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4164
-
-
C:\Windows\SysWOW64\net.exenet stop /y vmcomp3⤵PID:3512
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y vmcomp4⤵PID:1424
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im raccine.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4252
-
-
C:\Windows\SysWOW64\net.exenet stop /y SMTP3⤵PID:5044
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y SMTP4⤵PID:4760
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im mbamtray.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5016
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im vmcomp.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1144
-
-
C:\Windows\SysWOW64\net.exenet stop /y W3S3⤵PID:4112
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y W3S4⤵PID:2060
-
-
-
C:\Windows\SysWOW64\net.exenet stop /y vss3⤵PID:1780
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y vss4⤵PID:2064
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im Ntrtscan.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1964
-
-
C:\Windows\SysWOW64\net.exenet stop /y EsgShKernel3⤵PID:4644
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y EsgShKernel4⤵PID:3936
-
-
-
C:\Windows\SysWOW64\net.exenet stop /y ntrt3⤵PID:444
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y ntrt4⤵PID:2104
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im sqlbcoreservice.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2944
-
-
C:\Windows\SysWOW64\net.exenet stop /y Eraser3⤵PID:796
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y Eraser4⤵PID:860
-
-
-
C:\Windows\SysWOW64\net.exenet stop /y task3⤵PID:4812
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y task4⤵PID:2840
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im dbeng.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4892
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im word.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3080
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im PccNTMon.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4196
-
-
C:\Windows\SysWOW64\net.exenet stop /y IMAP43⤵PID:1356
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y IMAP44⤵PID:3440
-
-
-
C:\Windows\SysWOW64\net.exenet stop /y klnagent3⤵PID:4916
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y klnagent4⤵PID:4988
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im mspub.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1424
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im tmlisten.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3400
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im ekrn.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4392
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im mydesktop.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4040
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im sqbcoreservice.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5024
-
-
C:\Windows\SysWOW64\net.exenet stop /y FA_Scheduler3⤵PID:4008
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y FA_Scheduler4⤵PID:1072
-
-
-
C:\Windows\SysWOW64\net.exenet stop /y VeeamTransportSvc3⤵PID:2712
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y VeeamTransportSvc4⤵PID:2140
-
-
-
C:\Windows\SysWOW64\net.exenet stop /y sql3⤵PID:4112
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y sql4⤵PID:3864
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im infopath.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2196
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im tbirdconfig.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4808
-
-
C:\Windows\SysWOW64\net.exenet stop /y EPUpdate3⤵PID:1220
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y EPUpdate4⤵PID:4596
-
-
-
C:\Windows\SysWOW64\net.exenet stop /y Back3⤵PID:2844
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y Back4⤵PID:2944
-
-
-
C:\Windows\SysWOW64\net.exenet stop /y UIODetect3⤵PID:4884
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y UIODetect4⤵PID:796
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im visio.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4896
-
-
C:\Windows\SysWOW64\net.exenet stop /y ESHASRV3⤵PID:4316
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y ESHASRV4⤵PID:1684
-
-
-
C:\Windows\SysWOW64\net.exenet stop /y vmwp3⤵PID:2364
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y vmwp4⤵PID:4816
-
-
-
C:\Windows\SysWOW64\net.exenet stop /y acronis3⤵PID:1868
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y acronis4⤵PID:1496
-
-
-
C:\Windows\SysWOW64\net.exenet stop /y POP33⤵PID:4472
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y POP34⤵PID:2348
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im zoolz.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2276
-
-
C:\Windows\SysWOW64\net.exenet stop /y mms3⤵PID:2020
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y mms4⤵PID:1736
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im mydesktopqos.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2644
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im thebat.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1224
-
-
C:\Windows\SysWOW64\net.exenet stop /y Endpoint3⤵PID:5044
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y Endpoint4⤵PID:4660
-
-
-
C:\Windows\SysWOW64\net.exenet stop /y Afee3⤵PID:1308
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y Afee4⤵PID:1144
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im CNTAoSMgr.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1564
-
-
C:\Windows\SysWOW64\net.exenet stop /y Report3⤵PID:4748
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y Report4⤵PID:4872
-
-
-
C:\Windows\SysWOW64\net.exenet stop /y IISAdmin3⤵PID:1916
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y IISAdmin4⤵PID:3332
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im sql.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:856
-
-
C:\Windows\SysWOW64\net.exenet stop /y DCAgent3⤵PID:3908
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y DCAgent4⤵PID:2256
-
-
-
C:\Windows\SysWOW64\net.exenet stop /y MBAM3⤵PID:4948
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y MBAM4⤵PID:4744
-
-
-
C:\Windows\SysWOW64\net.exenet stop /y PDVF3⤵PID:3060
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y PDVF4⤵PID:3424
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im onenote.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4324
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im outlook.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1948
-
-
C:\Windows\SysWOW64\net.exenet stop /y mfevtp3⤵PID:4812
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y mfevtp4⤵PID:3708
-
-
-
C:\Windows\SysWOW64\net.exenet stop /y AcrSch3⤵PID:2424
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y AcrSch4⤵PID:1580
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im Backup.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1324
-
-
C:\Windows\SysWOW64\net.exenet stop /y SNAC3⤵PID:1364
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y SNAC4⤵PID:4912
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im excel.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4164
-
-
C:\Windows\SysWOW64\net.exenet stop /y Backup3⤵PID:5012
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y Backup4⤵PID:4460
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks.exe /Create /TN zE0xO6us /TR "CMD.EXE DEL /F /Q "{DNAME}\{PRNAME}" >> NUL" /sc once /st 00:00 /RL HIGHEST3⤵PID:2100
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN zE0xO6us /TR "CMD.EXE DEL /F /Q "{DNAME}\{PRNAME}" >> NUL" /sc once /st 00:00 /RL HIGHEST4⤵
- Creates scheduled task(s)
PID:1652
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks.exe /Create /TN zE0xO6tMpus /TR "CMD.EXE DEL /F /Q "{PATHIM}" >> NUL" /sc once /st 00:00 /RL HIGHEST3⤵PID:1920
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN zE0xO6tMpus /TR "CMD.EXE DEL /F /Q "{PATHIM}" >> NUL" /sc once /st 00:00 /RL HIGHEST4⤵
- Creates scheduled task(s)
PID:552
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks.exe /Create /TN zE0xO6bGus /TR "CMD.EXE DEL /F /Q "C:\ProgramData\pqBxGx.jpg" >> NUL" /sc once /st 00:00 /RL HIGHEST3⤵PID:3844
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN zE0xO6bGus /TR "CMD.EXE DEL /F /Q "C:\ProgramData\pqBxGx.jpg" >> NUL" /sc once /st 00:00 /RL HIGHEST4⤵
- Creates scheduled task(s)
PID:564
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks.exe /Run /TN zE0xO6us3⤵PID:4984
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Run /TN zE0xO6us4⤵PID:4340
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks.exe /Run /TN zE0xO6tMpus3⤵PID:4884
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Run /TN zE0xO6tMpus4⤵PID:3788
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks.exe /Run /TN zE0xO6bGus3⤵PID:3648
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Run /TN zE0xO6bGus4⤵PID:2880
-
-
-
-
C:\Windows\system32\CMD.EXECMD.EXE DEL /F /Q {DNAME}\{PRNAME} >> NUL1⤵PID:3700
-
C:\Windows\system32\CMD.EXECMD.EXE DEL /F /Q {PATHIM} >> NUL1⤵PID:2840
-
C:\Windows\system32\CMD.EXECMD.EXE DEL /F /Q C:\ProgramData\pqBxGx.jpg >> NUL1⤵PID:2864