Analysis
-
max time kernel
50s -
max time network
44s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
27/01/2024, 22:03
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7b65f3b2f451ca36d1f2ae8f797b7ca5.exe
Resource
win7-20231215-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
7b65f3b2f451ca36d1f2ae8f797b7ca5.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
7b65f3b2f451ca36d1f2ae8f797b7ca5.exe
-
Size
17KB
-
MD5
7b65f3b2f451ca36d1f2ae8f797b7ca5
-
SHA1
76e5a8a0ec9059aa4bfb3217b3cb2683ad3cd364
-
SHA256
f277c264e31b5a55b2fb33e6bd32964b455b7d47da22907fc04e13d2c5d1d0e0
-
SHA512
546a00abadc7f7f88705552ff3e0d3ae27c54f366fb5521d7a502ac5e363ca233701f48e81ede8f9eadbbb224a5a105801f40e357389e23b768983c2ceb9ee0d
-
SSDEEP
192:ITgIiRyRmYwekxp9H4E6o4xOQ1ZxwkgzIUgHS7/vbmjsDLobVyUvV6GYHj9YdmN7:I1Et1956L310tJDvigvopXcN3L
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 9 IoCs
pid Process 5612 mkjraler.exe 7592 mkjraler.exe 10396 mkjraler.exe 8132 mkjraler.exe 11040 mkjraler.exe 3792 mkjraler.exe 4348 mkjraler.exe 8936 mkjraler.exe 7532 mkjraler.exe -
Drops file in System32 directory 49 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\mkjraler.exe mkjraler.exe File created C:\Windows\SysWOW64\arjrkler.dll mkjraler.exe File opened for modification C:\Windows\SysWOW64\mkjraler.exe mkjraler.exe File created C:\Windows\SysWOW64\arjrkler.dll mkjraler.exe File created C:\Windows\SysWOW64\arjrkler.dll mkjraler.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe mkjraler.exe File opened for modification C:\Windows\SysWOW64\mkjraler.exe 7b65f3b2f451ca36d1f2ae8f797b7ca5.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe mkjraler.exe File created C:\Windows\SysWOW64\arjrkler.dll mkjraler.exe File opened for modification C:\Windows\SysWOW64\iujraler.sys mkjraler.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe mkjraler.exe File opened for modification C:\Windows\SysWOW64\arjrkler.dll mkjraler.exe File opened for modification C:\Windows\SysWOW64\arjrkler.dll mkjraler.exe File opened for modification C:\Windows\SysWOW64\iujraler.sys mkjraler.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe mkjraler.exe File opened for modification C:\Windows\SysWOW64\arjrkler.dll mkjraler.exe File opened for modification C:\Windows\SysWOW64\iujraler.sys mkjraler.exe File created C:\Windows\SysWOW64\arjrkler.dll mkjraler.exe File opened for modification C:\Windows\SysWOW64\mkjraler.exe mkjraler.exe File opened for modification C:\Windows\SysWOW64\mkjraler.exe mkjraler.exe File opened for modification C:\Windows\SysWOW64\iujraler.sys mkjraler.exe File opened for modification C:\Windows\SysWOW64\iujraler.sys 7b65f3b2f451ca36d1f2ae8f797b7ca5.exe File created C:\Windows\SysWOW64\arjrkler.dll mkjraler.exe File opened for modification C:\Windows\SysWOW64\arjrkler.dll mkjraler.exe File opened for modification C:\Windows\SysWOW64\iujraler.sys mkjraler.exe File created C:\Windows\SysWOW64\arjrkler.dll mkjraler.exe File opened for modification C:\Windows\SysWOW64\mkjraler.exe mkjraler.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe mkjraler.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe mkjraler.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe mkjraler.exe File created C:\Windows\SysWOW64\arjrkler.dll 7b65f3b2f451ca36d1f2ae8f797b7ca5.exe File created C:\Windows\SysWOW64\mkjraler.exe 7b65f3b2f451ca36d1f2ae8f797b7ca5.exe File created C:\Windows\SysWOW64\arjrkler.dll mkjraler.exe File opened for modification C:\Windows\SysWOW64\arjrkler.dll 7b65f3b2f451ca36d1f2ae8f797b7ca5.exe File created C:\Windows\SysWOW64\arjrkler.dll mkjraler.exe File opened for modification C:\Windows\SysWOW64\arjrkler.dll mkjraler.exe File opened for modification C:\Windows\SysWOW64\iujraler.sys mkjraler.exe File opened for modification C:\Windows\SysWOW64\arjrkler.dll mkjraler.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe mkjraler.exe File opened for modification C:\Windows\SysWOW64\arjrkler.dll mkjraler.exe File opened for modification C:\Windows\SysWOW64\iujraler.sys mkjraler.exe File opened for modification C:\Windows\SysWOW64\mkjraler.exe mkjraler.exe File opened for modification C:\Windows\SysWOW64\mkjraler.exe mkjraler.exe File opened for modification C:\Windows\SysWOW64\arjrkler.dll mkjraler.exe File opened for modification C:\Windows\SysWOW64\mkjraler.exe mkjraler.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe 7b65f3b2f451ca36d1f2ae8f797b7ca5.exe File opened for modification C:\Windows\SysWOW64\iujraler.sys mkjraler.exe File opened for modification C:\Windows\SysWOW64\arjrkler.dll mkjraler.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe mkjraler.exe -
Modifies registry class 30 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 7b65f3b2f451ca36d1f2ae8f797b7ca5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DC69134A-F15F-D14D-A31A-C31C4D124FCD}\InprocServer32\ = "C:\\Windows\\SysWow64\\arjrkler.dll" 7b65f3b2f451ca36d1f2ae8f797b7ca5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DC69134A-F15F-D14D-A31A-C31C4D124FCD}\InprocServer32\ThreadingModel = "Apartment" mkjraler.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DC69134A-F15F-D14D-A31A-C31C4D124FCD}\InprocServer32\ThreadingModel = "Apartment" mkjraler.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DC69134A-F15F-D14D-A31A-C31C4D124FCD}\InprocServer32\ThreadingModel = "Apartment" mkjraler.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DC69134A-F15F-D14D-A31A-C31C4D124FCD}\InprocServer32\ = "C:\\Windows\\SysWow64\\arjrkler.dll" mkjraler.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 7b65f3b2f451ca36d1f2ae8f797b7ca5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DC69134A-F15F-D14D-A31A-C31C4D124FCD}\InprocServer32\ThreadingModel = "Apartment" mkjraler.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DC69134A-F15F-D14D-A31A-C31C4D124FCD}\InprocServer32 mkjraler.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DC69134A-F15F-D14D-A31A-C31C4D124FCD}\InprocServer32\ = "C:\\Windows\\SysWow64\\arjrkler.dll" mkjraler.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DC69134A-F15F-D14D-A31A-C31C4D124FCD}\InprocServer32 7b65f3b2f451ca36d1f2ae8f797b7ca5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DC69134A-F15F-D14D-A31A-C31C4D124FCD}\InprocServer32\ = "C:\\Windows\\SysWow64\\arjrkler.dll" mkjraler.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DC69134A-F15F-D14D-A31A-C31C4D124FCD}\InprocServer32\ = "C:\\Windows\\SysWow64\\arjrkler.dll" mkjraler.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DC69134A-F15F-D14D-A31A-C31C4D124FCD}\InprocServer32\ThreadingModel = "Apartment" mkjraler.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DC69134A-F15F-D14D-A31A-C31C4D124FCD}\InprocServer32 mkjraler.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DC69134A-F15F-D14D-A31A-C31C4D124FCD}\InprocServer32\ThreadingModel = "Apartment" 7b65f3b2f451ca36d1f2ae8f797b7ca5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DC69134A-F15F-D14D-A31A-C31C4D124FCD}\InprocServer32 mkjraler.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DC69134A-F15F-D14D-A31A-C31C4D124FCD}\InprocServer32\ = "C:\\Windows\\SysWow64\\arjrkler.dll" mkjraler.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DC69134A-F15F-D14D-A31A-C31C4D124FCD}\InprocServer32 mkjraler.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DC69134A-F15F-D14D-A31A-C31C4D124FCD}\InprocServer32\ThreadingModel = "Apartment" mkjraler.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DC69134A-F15F-D14D-A31A-C31C4D124FCD} 7b65f3b2f451ca36d1f2ae8f797b7ca5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DC69134A-F15F-D14D-A31A-C31C4D124FCD}\InprocServer32 mkjraler.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DC69134A-F15F-D14D-A31A-C31C4D124FCD}\InprocServer32 mkjraler.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DC69134A-F15F-D14D-A31A-C31C4D124FCD}\InprocServer32 mkjraler.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DC69134A-F15F-D14D-A31A-C31C4D124FCD}\InprocServer32\ = "C:\\Windows\\SysWow64\\arjrkler.dll" mkjraler.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DC69134A-F15F-D14D-A31A-C31C4D124FCD}\InprocServer32\ = "C:\\Windows\\SysWow64\\arjrkler.dll" mkjraler.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DC69134A-F15F-D14D-A31A-C31C4D124FCD}\InprocServer32\ThreadingModel = "Apartment" mkjraler.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DC69134A-F15F-D14D-A31A-C31C4D124FCD}\InprocServer32\ThreadingModel = "Apartment" mkjraler.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DC69134A-F15F-D14D-A31A-C31C4D124FCD}\InprocServer32 mkjraler.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DC69134A-F15F-D14D-A31A-C31C4D124FCD}\InprocServer32\ = "C:\\Windows\\SysWow64\\arjrkler.dll" mkjraler.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 4320 7b65f3b2f451ca36d1f2ae8f797b7ca5.exe 4320 7b65f3b2f451ca36d1f2ae8f797b7ca5.exe 5612 mkjraler.exe 5612 mkjraler.exe 7592 mkjraler.exe 7592 mkjraler.exe 10396 mkjraler.exe 10396 mkjraler.exe 8132 mkjraler.exe 8132 mkjraler.exe 11040 mkjraler.exe 11040 mkjraler.exe 3792 mkjraler.exe 3792 mkjraler.exe 4348 mkjraler.exe 4348 mkjraler.exe 8936 mkjraler.exe 8936 mkjraler.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 4320 7b65f3b2f451ca36d1f2ae8f797b7ca5.exe Token: SeDebugPrivilege 5612 mkjraler.exe Token: SeDebugPrivilege 7592 mkjraler.exe Token: SeDebugPrivilege 10396 mkjraler.exe Token: SeDebugPrivilege 8132 mkjraler.exe Token: SeDebugPrivilege 11040 mkjraler.exe Token: SeDebugPrivilege 3792 mkjraler.exe Token: SeDebugPrivilege 4348 mkjraler.exe Token: SeDebugPrivilege 8936 mkjraler.exe -
Suspicious use of WriteProcessMemory 57 IoCs
description pid Process procid_target PID 4320 wrote to memory of 4976 4320 7b65f3b2f451ca36d1f2ae8f797b7ca5.exe 85 PID 4320 wrote to memory of 4976 4320 7b65f3b2f451ca36d1f2ae8f797b7ca5.exe 85 PID 4320 wrote to memory of 4976 4320 7b65f3b2f451ca36d1f2ae8f797b7ca5.exe 85 PID 4320 wrote to memory of 5612 4320 7b65f3b2f451ca36d1f2ae8f797b7ca5.exe 87 PID 4320 wrote to memory of 5612 4320 7b65f3b2f451ca36d1f2ae8f797b7ca5.exe 87 PID 4320 wrote to memory of 5612 4320 7b65f3b2f451ca36d1f2ae8f797b7ca5.exe 87 PID 5612 wrote to memory of 5652 5612 mkjraler.exe 88 PID 5612 wrote to memory of 5652 5612 mkjraler.exe 88 PID 5612 wrote to memory of 5652 5612 mkjraler.exe 88 PID 5612 wrote to memory of 7592 5612 mkjraler.exe 89 PID 5612 wrote to memory of 7592 5612 mkjraler.exe 89 PID 5612 wrote to memory of 7592 5612 mkjraler.exe 89 PID 7592 wrote to memory of 7628 7592 mkjraler.exe 101 PID 7592 wrote to memory of 7628 7592 mkjraler.exe 101 PID 7592 wrote to memory of 7628 7592 mkjraler.exe 101 PID 7592 wrote to memory of 10396 7592 mkjraler.exe 100 PID 7592 wrote to memory of 10396 7592 mkjraler.exe 100 PID 7592 wrote to memory of 10396 7592 mkjraler.exe 100 PID 10396 wrote to memory of 10428 10396 mkjraler.exe 97 PID 10396 wrote to memory of 10428 10396 mkjraler.exe 97 PID 10396 wrote to memory of 10428 10396 mkjraler.exe 97 PID 10396 wrote to memory of 8132 10396 mkjraler.exe 96 PID 10396 wrote to memory of 8132 10396 mkjraler.exe 96 PID 10396 wrote to memory of 8132 10396 mkjraler.exe 96 PID 8132 wrote to memory of 8352 8132 mkjraler.exe 92 PID 8132 wrote to memory of 8352 8132 mkjraler.exe 92 PID 8132 wrote to memory of 8352 8132 mkjraler.exe 92 PID 8132 wrote to memory of 11040 8132 mkjraler.exe 95 PID 8132 wrote to memory of 11040 8132 mkjraler.exe 95 PID 8132 wrote to memory of 11040 8132 mkjraler.exe 95 PID 11040 wrote to memory of 11072 11040 mkjraler.exe 94 PID 11040 wrote to memory of 11072 11040 mkjraler.exe 94 PID 11040 wrote to memory of 11072 11040 mkjraler.exe 94 PID 11040 wrote to memory of 3792 11040 mkjraler.exe 98 PID 11040 wrote to memory of 3792 11040 mkjraler.exe 98 PID 11040 wrote to memory of 3792 11040 mkjraler.exe 98 PID 3792 wrote to memory of 704 3792 mkjraler.exe 103 PID 3792 wrote to memory of 704 3792 mkjraler.exe 103 PID 3792 wrote to memory of 704 3792 mkjraler.exe 103 PID 3792 wrote to memory of 4348 3792 mkjraler.exe 105 PID 3792 wrote to memory of 4348 3792 mkjraler.exe 105 PID 3792 wrote to memory of 4348 3792 mkjraler.exe 105 PID 4348 wrote to memory of 2268 4348 mkjraler.exe 106 PID 4348 wrote to memory of 2268 4348 mkjraler.exe 106 PID 4348 wrote to memory of 2268 4348 mkjraler.exe 106 PID 4348 wrote to memory of 8936 4348 mkjraler.exe 108 PID 4348 wrote to memory of 8936 4348 mkjraler.exe 108 PID 4348 wrote to memory of 8936 4348 mkjraler.exe 108 PID 8936 wrote to memory of 8988 8936 mkjraler.exe 109 PID 8936 wrote to memory of 8988 8936 mkjraler.exe 109 PID 8936 wrote to memory of 8988 8936 mkjraler.exe 109 PID 8936 wrote to memory of 7532 8936 mkjraler.exe 110 PID 8936 wrote to memory of 7532 8936 mkjraler.exe 110 PID 8936 wrote to memory of 7532 8936 mkjraler.exe 110 PID 7532 wrote to memory of 7584 7532 mkjraler.exe 121 PID 7532 wrote to memory of 7584 7532 mkjraler.exe 121 PID 7532 wrote to memory of 7584 7532 mkjraler.exe 121
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b65f3b2f451ca36d1f2ae8f797b7ca5.exe"C:\Users\Admin\AppData\Local\Temp\7b65f3b2f451ca36d1f2ae8f797b7ca5.exe"1⤵
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240603281.bat2⤵PID:4976
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5612 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240603625.bat3⤵PID:5652
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:7592 -
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:10396 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240634906.bat5⤵PID:14396
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240603765.bat4⤵PID:7628
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240634515.bat4⤵PID:9340
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240634312.bat3⤵PID:11768
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240634187.bat2⤵PID:15272
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240604234.bat1⤵PID:8352
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240604546.bat1⤵PID:11072
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:11040 -
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240604984.bat3⤵PID:704
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240605187.bat4⤵PID:2268
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:8936 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240605484.bat5⤵PID:8988
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:7532 -
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe6⤵PID:5648
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240636750.bat7⤵PID:14760
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240605750.bat6⤵PID:7584
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240636593.bat6⤵PID:2640
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240636375.bat5⤵PID:15448
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240636031.bat4⤵PID:8312
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240635781.bat3⤵PID:13948
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240635515.bat2⤵PID:11484
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:8132 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240635140.bat2⤵PID:13360
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240603953.bat1⤵PID:10428
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240606000.bat1⤵PID:5916
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe1⤵PID:3588
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240606234.bat2⤵PID:5948
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe2⤵PID:10944
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240606546.bat3⤵PID:10872
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe3⤵PID:6928
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240606750.bat4⤵PID:10060
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe4⤵PID:11172
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240607078.bat5⤵PID:11216
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe5⤵PID:7836
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240607296.bat6⤵PID:5408
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe6⤵PID:7896
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe7⤵PID:4468
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240607859.bat8⤵PID:10052
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe8⤵PID:5440
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240608109.bat9⤵PID:9416
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe9⤵PID:5688
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240608781.bat10⤵PID:3112
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe10⤵PID:4544
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240609109.bat11⤵PID:3892
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe11⤵PID:5592
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe12⤵PID:8148
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240609703.bat13⤵PID:6872
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe13⤵PID:8208
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240609953.bat14⤵PID:9644
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe14⤵PID:10692
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240610250.bat15⤵PID:9392
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe15⤵PID:7260
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe16⤵PID:8600
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240610734.bat17⤵PID:7800
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe17⤵PID:4420
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240611000.bat18⤵PID:4908
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe18⤵PID:10756
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240611281.bat19⤵PID:9196
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe19⤵PID:8024
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240611531.bat20⤵PID:9480
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe20⤵PID:4808
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240611796.bat21⤵PID:2768
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe21⤵PID:5244
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240611953.bat22⤵PID:10012
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe22⤵PID:8260
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240612281.bat23⤵PID:9728
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe23⤵PID:9980
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240612468.bat24⤵PID:7672
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe24⤵PID:8864
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240612734.bat25⤵PID:1100
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe25⤵PID:10644
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240613093.bat26⤵PID:10600
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe26⤵PID:7160
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240613656.bat27⤵PID:6452
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe27⤵PID:12236
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240613984.bat28⤵PID:11512
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe28⤵PID:9256
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240614281.bat29⤵PID:7144
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe29⤵PID:5360
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240614546.bat30⤵PID:1048
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe30⤵PID:10472
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240614937.bat31⤵PID:11540
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe31⤵PID:5396
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240615218.bat32⤵PID:9876
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe32⤵PID:3640
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240615484.bat33⤵PID:6280
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe33⤵PID:972
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240615671.bat34⤵PID:3232
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe34⤵PID:11332
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe35⤵PID:10904
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240616218.bat36⤵PID:9152
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe36⤵PID:12152
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240616406.bat37⤵PID:12092
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe37⤵PID:12216
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240616734.bat38⤵PID:10560
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe38⤵PID:8056
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240617062.bat39⤵PID:8392
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe39⤵PID:2072
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240617390.bat40⤵PID:2612
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe40⤵PID:2124
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240617703.bat41⤵PID:6588
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe41⤵PID:11884
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240618015.bat42⤵PID:8532
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe42⤵PID:6320
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240618296.bat43⤵PID:8636
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe43⤵PID:1288
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240618531.bat44⤵PID:8812
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe44⤵PID:11732
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240618781.bat45⤵PID:6644
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe45⤵PID:10816
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240619140.bat46⤵PID:8944
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe46⤵PID:11572
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240619375.bat47⤵PID:11424
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe47⤵PID:6040
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240619609.bat48⤵PID:5856
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe48⤵PID:6876
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240619968.bat49⤵PID:6540
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe49⤵PID:5580
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240620171.bat50⤵PID:11720
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe50⤵PID:5728
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240620468.bat51⤵PID:11932
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe51⤵PID:2684
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240620750.bat52⤵PID:5492
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe52⤵PID:1956
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240621015.bat53⤵PID:12492
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe53⤵PID:7700
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240621281.bat54⤵PID:4872
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe54⤵PID:9244
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240621500.bat55⤵PID:7916
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe55⤵PID:1208
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240621781.bat56⤵PID:7972
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe56⤵PID:12964
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240622109.bat57⤵PID:9424
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe57⤵PID:12252
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240622390.bat58⤵PID:8388
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe58⤵PID:6444
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240622750.bat59⤵PID:5788
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe59⤵PID:11684
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240623109.bat60⤵PID:3352
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe60⤵PID:4492
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240623421.bat61⤵PID:9992
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe61⤵PID:3276
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240623703.bat62⤵PID:1756
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe62⤵PID:9984
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240624031.bat63⤵PID:12028
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe63⤵PID:5316
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240624281.bat64⤵PID:12360
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe64⤵PID:12164
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240624484.bat65⤵PID:6332
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe65⤵PID:10768
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240624750.bat66⤵PID:11968
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe66⤵PID:10264
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240625046.bat67⤵PID:13140
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe67⤵PID:7928
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240625437.bat68⤵PID:7368
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe68⤵PID:7792
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240625734.bat69⤵PID:6724
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe69⤵PID:3084
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240625984.bat70⤵PID:10956
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe70⤵PID:9584
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240626218.bat71⤵PID:12864
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe71⤵PID:8712
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240626515.bat72⤵PID:12836
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe72⤵PID:8544
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240626765.bat73⤵PID:10820
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe73⤵PID:7500
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240627000.bat74⤵PID:13044
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe74⤵PID:4668
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240627281.bat75⤵PID:5760
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe75⤵PID:12640
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240627562.bat76⤵PID:12556
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe76⤵PID:4724
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240627828.bat77⤵PID:5972
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe77⤵PID:6908
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240628203.bat78⤵PID:10000
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe78⤵PID:7772
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240628437.bat79⤵PID:1608
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe79⤵PID:9592
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240628593.bat80⤵PID:8268
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe80⤵PID:16020
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240629171.bat81⤵PID:16052
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe81⤵PID:7312
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240629453.bat82⤵PID:10608
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe82⤵PID:15740
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240629750.bat83⤵PID:15768
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe83⤵PID:13132
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240630046.bat84⤵PID:12392
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe84⤵PID:13988
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240630390.bat85⤵PID:16328
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe85⤵PID:10800
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240630625.bat86⤵PID:8748
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe86⤵PID:14392
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240630890.bat87⤵PID:14356
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe87⤵PID:9936
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240631234.bat88⤵PID:8044
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe88⤵PID:8704
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240631484.bat89⤵PID:5140
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe89⤵PID:15560
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240631828.bat90⤵PID:15684
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe90⤵PID:5220
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240632109.bat91⤵PID:9508
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe91⤵PID:15164
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240632468.bat92⤵PID:15192
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe92⤵PID:12648
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240632671.bat93⤵PID:7140
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe93⤵PID:15108
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240633015.bat94⤵PID:16080
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe94⤵PID:2924
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240633281.bat95⤵PID:3312
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe95⤵PID:13192
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240633703.bat96⤵PID:12988
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe96⤵PID:14588
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240633921.bat97⤵PID:14544
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe97⤵PID:16240
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240634171.bat98⤵PID:16164
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe98⤵PID:9052
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240634531.bat99⤵PID:15496
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe99⤵PID:5252
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe100⤵PID:9488
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240635406.bat101⤵PID:10516
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe101⤵PID:10288
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe102⤵PID:12320
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240636000.bat103⤵PID:552
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe103⤵PID:6892
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240636234.bat104⤵PID:7436
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe104⤵PID:14932
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240636703.bat105⤵PID:9888
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe105⤵PID:9000
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240637015.bat106⤵PID:14400
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe106⤵PID:6480
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240637312.bat107⤵PID:1320
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe107⤵PID:4804
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240637703.bat108⤵PID:13412
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe108⤵PID:15440
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240637890.bat109⤵PID:5668
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe109⤵PID:18140
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240638296.bat110⤵PID:18272
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe110⤵PID:12948
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240638718.bat111⤵PID:15776
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe111⤵PID:18360
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240639015.bat112⤵PID:10636
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe112⤵PID:4384
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240639312.bat113⤵PID:12672
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe113⤵PID:14340
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240639687.bat114⤵PID:5872
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe114⤵PID:5488
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240639953.bat115⤵PID:16212
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe115⤵PID:13532
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe116⤵PID:9248
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240640562.bat117⤵PID:15568
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe117⤵PID:13848
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240641156.bat118⤵PID:7824
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe118⤵PID:3544
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240641578.bat119⤵PID:9252
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe119⤵PID:13996
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe120⤵PID:14056
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240642265.bat121⤵PID:17316
-
-
C:\Windows\SysWOW64\mkjraler.exeC:\Windows\system32\mkjraler.exe121⤵PID:10156
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240642718.bat122⤵PID:10028
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-