Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 06:50
Static task
static1
Behavioral task
behavioral1
Sample
a5ca28c615e6a984676e4ba60bdbf0e6_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
a5ca28c615e6a984676e4ba60bdbf0e6_JaffaCakes118.exe
-
Size
320KB
-
MD5
a5ca28c615e6a984676e4ba60bdbf0e6
-
SHA1
d69368efb77a06b72d6202fb694110c5795ac510
-
SHA256
681396b8c1aa211a7ecb96c1c9061107cb6ef5e6bb5e515f9218fc42576938e3
-
SHA512
84ea6390e0119653eec8ad00364f006ad678208c0a5133a3069571e18181df04fa76650e21f28d8f31f4b8d3bbadefb1dc798ebe01c644375ca72f938314abf1
-
SSDEEP
3072:MOD6ZcqrlZiOOO9L7a73LdJyIrPRny4yoJiMKCH45+xJDOIfhRuwnd45Gb4uGOST:F6ZXZiu277BGon4AROIJH4uGOY
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 48 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2776 attrib.exe 1472 attrib.exe 2904 attrib.exe 2440 attrib.exe 2240 attrib.exe 2696 attrib.exe 1680 attrib.exe 2556 attrib.exe 2452 attrib.exe 1692 attrib.exe 2676 attrib.exe 1684 attrib.exe 1920 attrib.exe 1016 attrib.exe 2772 attrib.exe 1384 attrib.exe 2204 attrib.exe 1856 attrib.exe 2304 attrib.exe 2680 attrib.exe 2416 attrib.exe 2224 attrib.exe 2684 attrib.exe 1688 attrib.exe 684 attrib.exe 1360 attrib.exe 2560 attrib.exe 1804 attrib.exe 2444 attrib.exe 2628 attrib.exe 2116 attrib.exe 1948 attrib.exe 372 attrib.exe 348 attrib.exe 1712 attrib.exe 2304 attrib.exe 1584 attrib.exe 2360 attrib.exe 3032 attrib.exe 2244 attrib.exe 3024 attrib.exe 2096 attrib.exe 2688 attrib.exe 2420 attrib.exe 1548 attrib.exe 2876 attrib.exe 2564 attrib.exe 2884 attrib.exe -
Deletes itself 1 IoCs
pid Process 1852 cmd.exe -
Executes dropped EXE 64 IoCs
pid Process 2112 iniuser1.exe 2364 iniuser1.exe 2692 iniuser1.exe 2852 iniuser1.exe 2856 iniuser1.exe 2740 iniuser1.exe 2720 iniuser1.exe 2968 iniuser1.exe 2872 iniuser1.exe 2820 iniuser1.exe 2612 iniuser1.exe 2808 iniuser1.exe 2644 iniuser1.exe 2600 iniuser1.exe 2652 iniuser1.exe 3044 iniuser1.exe 2068 iniuser1.exe 1800 iniuser1.exe 2488 iniuser1.exe 2648 iniuser1.exe 1976 iniuser1.exe 2408 iniuser1.exe 2004 iniuser1.exe 1540 iniuser1.exe 2036 iniuser1.exe 2412 iniuser1.exe 2128 iniuser1.exe 1492 iniuser1.exe 1500 iniuser1.exe 828 iniuser1.exe 536 iniuser1.exe 568 iniuser1.exe 1328 iniuser1.exe 888 iniuser1.exe 2656 iniuser1.exe 984 iniuser1.exe 1040 iniuser1.exe 1184 iniuser1.exe 1564 iniuser1.exe 1960 iniuser1.exe 2780 iniuser1.exe 1656 iniuser1.exe 1848 iniuser1.exe 2940 iniuser1.exe 1208 iniuser1.exe 1436 iniuser1.exe 1156 iniuser1.exe 1752 iniuser1.exe 2936 iniuser1.exe 2772 iniuser1.exe 2904 iniuser1.exe 2676 iniuser1.exe 1624 iniuser1.exe 1556 iniuser1.exe 1100 iniuser1.exe 1716 iniuser1.exe 1992 iniuser1.exe 760 iniuser1.exe 2900 iniuser1.exe 1632 iniuser1.exe 1552 iniuser1.exe 2456 iniuser1.exe 1720 iniuser1.exe 580 iniuser1.exe -
Loads dropped DLL 64 IoCs
pid Process 3036 cmd.exe 3036 cmd.exe 3036 cmd.exe 3036 cmd.exe 3036 cmd.exe 3036 cmd.exe 3036 cmd.exe 3036 cmd.exe 3036 cmd.exe 3036 cmd.exe 3036 cmd.exe 3036 cmd.exe 3036 cmd.exe 3036 cmd.exe 3036 cmd.exe 3036 cmd.exe 3036 cmd.exe 3036 cmd.exe 3036 cmd.exe 3036 cmd.exe 3036 cmd.exe 3036 cmd.exe 3036 cmd.exe 3036 cmd.exe 3036 cmd.exe 3036 cmd.exe 3036 cmd.exe 3036 cmd.exe 3036 cmd.exe 3036 cmd.exe 3036 cmd.exe 3036 cmd.exe 3036 cmd.exe 3036 cmd.exe 3036 cmd.exe 3036 cmd.exe 3036 cmd.exe 3036 cmd.exe 3036 cmd.exe 3036 cmd.exe 3036 cmd.exe 3036 cmd.exe 3036 cmd.exe 3036 cmd.exe 3036 cmd.exe 3036 cmd.exe 3036 cmd.exe 3036 cmd.exe 3036 cmd.exe 3036 cmd.exe 3036 cmd.exe 3036 cmd.exe 3036 cmd.exe 3036 cmd.exe 3036 cmd.exe 3036 cmd.exe 3036 cmd.exe 3036 cmd.exe 3036 cmd.exe 3036 cmd.exe 3036 cmd.exe 3036 cmd.exe 3036 cmd.exe 3036 cmd.exe -
Drops file in System32 directory 30 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\log.exe attrib.exe File created C:\Windows\SysWOW64\iniuser1.exe cmd.exe File created C:\Windows\SysWOW64\iniftp.exe cmd.exe File opened for modification C:\Windows\SysWOW64\iniuser1.exe attrib.exe File opened for modification C:\Windows\SysWOW64\iniftp.exe attrib.exe File opened for modification C:\Windows\SysWOW64\iniftp.exe attrib.exe File opened for modification C:\Windows\SysWOW64\log.exe attrib.exe File opened for modification C:\Windows\SysWOW64\iniftp.exe attrib.exe File opened for modification C:\Windows\SysWOW64\iniftp.exe attrib.exe File opened for modification C:\Windows\SysWOW64\log.exe cmd.exe File opened for modification C:\Windows\SysWOW64\iniuser1.exe cmd.exe File opened for modification C:\Windows\SysWOW64\log.exe attrib.exe File opened for modification C:\Windows\SysWOW64\iniftp.exe attrib.exe File opened for modification C:\Windows\SysWOW64\log.exe attrib.exe File created C:\Windows\SysWOW64\log.exe cmd.exe File opened for modification C:\Windows\SysWOW64\iniuser1.exe attrib.exe File opened for modification C:\Windows\SysWOW64\iniftp.exe attrib.exe File opened for modification C:\Windows\SysWOW64\iniuser1.exe attrib.exe File opened for modification C:\Windows\SysWOW64\iniuser1.exe attrib.exe File opened for modification C:\Windows\SysWOW64\log.exe attrib.exe File opened for modification C:\Windows\SysWOW64\iniuser1.exe attrib.exe File opened for modification C:\Windows\SysWOW64\log.exe attrib.exe File opened for modification C:\Windows\SysWOW64\iniuser1.exe attrib.exe File opened for modification C:\Windows\SysWOW64\log.exe attrib.exe File opened for modification C:\Windows\SysWOW64\iniuser1.exe attrib.exe File opened for modification C:\Windows\SysWOW64\iniuser1.exe attrib.exe File opened for modification C:\Windows\SysWOW64\iniftp.exe cmd.exe File opened for modification C:\Windows\SysWOW64\iniftp.exe attrib.exe File opened for modification C:\Windows\SysWOW64\iniftp.exe attrib.exe File opened for modification C:\Windows\SysWOW64\log.exe attrib.exe -
System Location Discovery: System Language Discovery 1 TTPs 58 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a5ca28c615e6a984676e4ba60bdbf0e6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2356 a5ca28c615e6a984676e4ba60bdbf0e6_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2356 wrote to memory of 3036 2356 a5ca28c615e6a984676e4ba60bdbf0e6_JaffaCakes118.exe 30 PID 2356 wrote to memory of 3036 2356 a5ca28c615e6a984676e4ba60bdbf0e6_JaffaCakes118.exe 30 PID 2356 wrote to memory of 3036 2356 a5ca28c615e6a984676e4ba60bdbf0e6_JaffaCakes118.exe 30 PID 2356 wrote to memory of 3036 2356 a5ca28c615e6a984676e4ba60bdbf0e6_JaffaCakes118.exe 30 PID 3036 wrote to memory of 1712 3036 cmd.exe 32 PID 3036 wrote to memory of 1712 3036 cmd.exe 32 PID 3036 wrote to memory of 1712 3036 cmd.exe 32 PID 3036 wrote to memory of 1712 3036 cmd.exe 32 PID 3036 wrote to memory of 1680 3036 cmd.exe 33 PID 3036 wrote to memory of 1680 3036 cmd.exe 33 PID 3036 wrote to memory of 1680 3036 cmd.exe 33 PID 3036 wrote to memory of 1680 3036 cmd.exe 33 PID 3036 wrote to memory of 2224 3036 cmd.exe 34 PID 3036 wrote to memory of 2224 3036 cmd.exe 34 PID 3036 wrote to memory of 2224 3036 cmd.exe 34 PID 3036 wrote to memory of 2224 3036 cmd.exe 34 PID 3036 wrote to memory of 2560 3036 cmd.exe 35 PID 3036 wrote to memory of 2560 3036 cmd.exe 35 PID 3036 wrote to memory of 2560 3036 cmd.exe 35 PID 3036 wrote to memory of 2560 3036 cmd.exe 35 PID 3036 wrote to memory of 2304 3036 cmd.exe 36 PID 3036 wrote to memory of 2304 3036 cmd.exe 36 PID 3036 wrote to memory of 2304 3036 cmd.exe 36 PID 3036 wrote to memory of 2304 3036 cmd.exe 36 PID 3036 wrote to memory of 2776 3036 cmd.exe 37 PID 3036 wrote to memory of 2776 3036 cmd.exe 37 PID 3036 wrote to memory of 2776 3036 cmd.exe 37 PID 3036 wrote to memory of 2776 3036 cmd.exe 37 PID 3036 wrote to memory of 2112 3036 cmd.exe 38 PID 3036 wrote to memory of 2112 3036 cmd.exe 38 PID 3036 wrote to memory of 2112 3036 cmd.exe 38 PID 3036 wrote to memory of 2112 3036 cmd.exe 38 PID 3036 wrote to memory of 2364 3036 cmd.exe 39 PID 3036 wrote to memory of 2364 3036 cmd.exe 39 PID 3036 wrote to memory of 2364 3036 cmd.exe 39 PID 3036 wrote to memory of 2364 3036 cmd.exe 39 PID 3036 wrote to memory of 2692 3036 cmd.exe 40 PID 3036 wrote to memory of 2692 3036 cmd.exe 40 PID 3036 wrote to memory of 2692 3036 cmd.exe 40 PID 3036 wrote to memory of 2692 3036 cmd.exe 40 PID 3036 wrote to memory of 2852 3036 cmd.exe 41 PID 3036 wrote to memory of 2852 3036 cmd.exe 41 PID 3036 wrote to memory of 2852 3036 cmd.exe 41 PID 3036 wrote to memory of 2852 3036 cmd.exe 41 PID 3036 wrote to memory of 2856 3036 cmd.exe 42 PID 3036 wrote to memory of 2856 3036 cmd.exe 42 PID 3036 wrote to memory of 2856 3036 cmd.exe 42 PID 3036 wrote to memory of 2856 3036 cmd.exe 42 PID 3036 wrote to memory of 2740 3036 cmd.exe 43 PID 3036 wrote to memory of 2740 3036 cmd.exe 43 PID 3036 wrote to memory of 2740 3036 cmd.exe 43 PID 3036 wrote to memory of 2740 3036 cmd.exe 43 PID 3036 wrote to memory of 2720 3036 cmd.exe 44 PID 3036 wrote to memory of 2720 3036 cmd.exe 44 PID 3036 wrote to memory of 2720 3036 cmd.exe 44 PID 3036 wrote to memory of 2720 3036 cmd.exe 44 PID 3036 wrote to memory of 2968 3036 cmd.exe 45 PID 3036 wrote to memory of 2968 3036 cmd.exe 45 PID 3036 wrote to memory of 2968 3036 cmd.exe 45 PID 3036 wrote to memory of 2968 3036 cmd.exe 45 PID 3036 wrote to memory of 2872 3036 cmd.exe 46 PID 3036 wrote to memory of 2872 3036 cmd.exe 46 PID 3036 wrote to memory of 2872 3036 cmd.exe 46 PID 3036 wrote to memory of 2872 3036 cmd.exe 46 -
Views/modifies file attributes 1 TTPs 48 IoCs
pid Process 2676 attrib.exe 1712 attrib.exe 2304 attrib.exe 2776 attrib.exe 2452 attrib.exe 1688 attrib.exe 2884 attrib.exe 684 attrib.exe 2680 attrib.exe 2224 attrib.exe 1472 attrib.exe 2360 attrib.exe 1856 attrib.exe 372 attrib.exe 2444 attrib.exe 2904 attrib.exe 2628 attrib.exe 2416 attrib.exe 2240 attrib.exe 2772 attrib.exe 1684 attrib.exe 2876 attrib.exe 1948 attrib.exe 348 attrib.exe 2304 attrib.exe 2096 attrib.exe 1920 attrib.exe 2564 attrib.exe 1360 attrib.exe 2684 attrib.exe 2204 attrib.exe 1804 attrib.exe 2556 attrib.exe 1384 attrib.exe 1548 attrib.exe 2116 attrib.exe 3024 attrib.exe 1680 attrib.exe 2560 attrib.exe 1016 attrib.exe 2688 attrib.exe 2440 attrib.exe 1692 attrib.exe 1584 attrib.exe 2696 attrib.exe 3032 attrib.exe 2244 attrib.exe 2420 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5ca28c615e6a984676e4ba60bdbf0e6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5ca28c615e6a984676e4ba60bdbf0e6_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\del.bat2⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\attrib.exeattrib +s +h iniuser1.exe3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1712
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h iniftp.exe3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1680
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h log.exe3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2224
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Windows\system32\iniuser1.exe3⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2560
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Windows\system32\iniftp.exe3⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2304
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Windows\system32\log.exe3⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2776
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user pywl$ /del3⤵
- Executes dropped EXE
PID:2112
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user SQL$ /del3⤵
- Executes dropped EXE
PID:2364
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user uiop /del3⤵
- Executes dropped EXE
PID:2692
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user h8894526$ /del3⤵
- Executes dropped EXE
PID:2852
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user qqadmin$ /del3⤵
- Executes dropped EXE
PID:2856
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user zhu$ /del3⤵
- Executes dropped EXE
PID:2740
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user mari /del3⤵
- Executes dropped EXE
PID:2720
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user madmin$ /del3⤵
- Executes dropped EXE
PID:2968
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user mike /del3⤵
- Executes dropped EXE
PID:2872
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user radmin$ /del3⤵
- Executes dropped EXE
PID:2820
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user james /del3⤵
- Executes dropped EXE
PID:2612
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user ken /del3⤵
- Executes dropped EXE
PID:2808
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user dtwwd$ /del3⤵
- Executes dropped EXE
PID:2644
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user edmin /del3⤵
- Executes dropped EXE
PID:2600
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user guestss /del3⤵
- Executes dropped EXE
PID:2652
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user hejianhack$ /del3⤵
- Executes dropped EXE
PID:3044
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user nicam0706 /del3⤵
- Executes dropped EXE
PID:2068
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user cbooth /del3⤵
- Executes dropped EXE
PID:1800
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user kmeyer /del3⤵
- Executes dropped EXE
PID:2488
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user phillips /del3⤵
- Executes dropped EXE
PID:2648
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user spitech /del3⤵
- Executes dropped EXE
PID:1976
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user support /del3⤵
- Executes dropped EXE
PID:2408
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user yuiop /del3⤵
- Executes dropped EXE
PID:2004
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user guest$ /del3⤵
- Executes dropped EXE
PID:1540
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user system$ /del3⤵
- Executes dropped EXE
PID:2036
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user iisadmin /del3⤵
- Executes dropped EXE
PID:2412
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user ts /del3⤵
- Executes dropped EXE
PID:2128
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user admin /del3⤵
- Executes dropped EXE
PID:1492
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user user /del3⤵
- Executes dropped EXE
PID:1500
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user net2$ /del3⤵
- Executes dropped EXE
PID:828
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user 123 /del3⤵
- Executes dropped EXE
PID:536
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user 123$ /del3⤵
- Executes dropped EXE
PID:568
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user guests$ /del3⤵
- Executes dropped EXE
PID:1328
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user smokin$ /del3⤵
- Executes dropped EXE
PID:888
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user new1 /del3⤵
- Executes dropped EXE
PID:2656
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user hao$ /del3⤵
- Executes dropped EXE
PID:984
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user yi$ /del3⤵
- Executes dropped EXE
PID:1040
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user James /del3⤵
- Executes dropped EXE
PID:1184
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user qq /del3⤵
- Executes dropped EXE
PID:1564
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user qq$ /del3⤵
- Executes dropped EXE
PID:1960
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user admin$ /del3⤵
- Executes dropped EXE
PID:2780
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user admin /del3⤵
- Executes dropped EXE
PID:1656
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user administrator$ /del3⤵
- Executes dropped EXE
PID:1848
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user Jenny /del3⤵
- Executes dropped EXE
PID:2940
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user kevin /del3⤵
- Executes dropped EXE
PID:1208
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user krbtgt /del3⤵
- Executes dropped EXE
PID:1436
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user yyse /del3⤵
- Executes dropped EXE
PID:1156
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user yyse$ /del3⤵
- Executes dropped EXE
PID:1752
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user sorry /del3⤵
- Executes dropped EXE
PID:2936
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user hello /del3⤵
- Executes dropped EXE
PID:2772
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user fofo /del3⤵
- Executes dropped EXE
PID:2904
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user aaa /del3⤵
- Executes dropped EXE
PID:2676
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\del.bat2⤵
- System Location Discovery: System Language Discovery
PID:2308 -
C:\Windows\SysWOW64\attrib.exeattrib +s +h iniuser1.exe3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2556
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h iniftp.exe3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1384
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h log.exe3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2452
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Windows\system32\iniuser1.exe3⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2684
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Windows\system32\iniftp.exe3⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1472
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Windows\system32\log.exe3⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2204
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user pywl$ /del3⤵
- Executes dropped EXE
PID:1624
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user SQL$ /del3⤵
- Executes dropped EXE
PID:1556
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user uiop /del3⤵
- Executes dropped EXE
PID:1100
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user h8894526$ /del3⤵
- Executes dropped EXE
PID:1716
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user qqadmin$ /del3⤵
- Executes dropped EXE
PID:1992
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user zhu$ /del3⤵
- Executes dropped EXE
PID:760
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user mari /del3⤵
- Executes dropped EXE
PID:2900
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user madmin$ /del3⤵
- Executes dropped EXE
PID:1632
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user mike /del3⤵
- Executes dropped EXE
PID:1552
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user radmin$ /del3⤵
- Executes dropped EXE
PID:2456
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user james /del3⤵
- Executes dropped EXE
PID:1720
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user ken /del3⤵
- Executes dropped EXE
PID:580
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user dtwwd$ /del3⤵PID:2108
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user edmin /del3⤵PID:404
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user guestss /del3⤵PID:836
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user hejianhack$ /del3⤵PID:1520
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user nicam0706 /del3⤵PID:2032
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user cbooth /del3⤵PID:1036
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user kmeyer /del3⤵PID:1180
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user phillips /del3⤵PID:1592
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user spitech /del3⤵PID:1804
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user support /del3⤵PID:2564
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user yuiop /del3⤵PID:2444
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user guest$ /del3⤵PID:348
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user system$ /del3⤵PID:1016
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user iisadmin /del3⤵PID:684
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user ts /del3⤵PID:1536
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user admin /del3⤵PID:1084
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user user /del3⤵PID:2568
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user net2$ /del3⤵PID:1676
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user 123 /del3⤵PID:1324
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user 123$ /del3⤵PID:464
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user guests$ /del3⤵PID:1876
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user smokin$ /del3⤵PID:1560
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user new1 /del3⤵PID:1932
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user hao$ /del3⤵PID:892
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user yi$ /del3⤵PID:688
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user James /del3⤵PID:1088
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user qq /del3⤵PID:940
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user qq$ /del3⤵PID:560
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user admin$ /del3⤵PID:2172
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user admin /del3⤵PID:1956
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user administrator$ /del3⤵PID:1048
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user Jenny /del3⤵PID:2336
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user kevin /del3⤵PID:2312
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user krbtgt /del3⤵PID:1972
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user yyse /del3⤵PID:2148
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user yyse$ /del3⤵PID:2100
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user sorry /del3⤵PID:2952
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user hello /del3⤵PID:1132
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user fofo /del3⤵PID:2192
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user aaa /del3⤵PID:2464
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\del.bat2⤵
- System Location Discovery: System Language Discovery
PID:2252 -
C:\Windows\SysWOW64\attrib.exeattrib +s +h iniuser1.exe3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1684
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h iniftp.exe3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1548
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h log.exe3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1692
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Windows\system32\iniuser1.exe3⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1688
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Windows\system32\iniftp.exe3⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1584
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Windows\system32\log.exe3⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2360
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user pywl$ /del3⤵PID:2396
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user SQL$ /del3⤵PID:1708
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user uiop /del3⤵PID:3020
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user h8894526$ /del3⤵PID:3028
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user qqadmin$ /del3⤵PID:2040
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user zhu$ /del3⤵PID:2380
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user mari /del3⤵PID:2520
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user madmin$ /del3⤵PID:2376
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user mike /del3⤵PID:2008
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user radmin$ /del3⤵PID:1980
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user james /del3⤵PID:1888
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user ken /del3⤵PID:2960
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user dtwwd$ /del3⤵PID:2264
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user edmin /del3⤵PID:2956
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user guestss /del3⤵PID:2304
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user hejianhack$ /del3⤵PID:2884
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user nicam0706 /del3⤵PID:2096
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user cbooth /del3⤵PID:2240
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user kmeyer /del3⤵PID:2680
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user phillips /del3⤵PID:2696
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user spitech /del3⤵PID:2120
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user support /del3⤵PID:2364
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user yuiop /del3⤵PID:2736
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user guest$ /del3⤵PID:2732
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user system$ /del3⤵PID:2832
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user iisadmin /del3⤵PID:2824
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user ts /del3⤵PID:2852
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user admin /del3⤵PID:2984
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user user /del3⤵PID:2864
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user net2$ /del3⤵PID:2728
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user 123 /del3⤵PID:2712
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user 123$ /del3⤵PID:2740
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user guests$ /del3⤵PID:2332
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user smokin$ /del3⤵PID:2596
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user new1 /del3⤵PID:2704
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user hao$ /del3⤵PID:2816
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user yi$ /del3⤵PID:2968
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user James /del3⤵PID:2836
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user qq /del3⤵PID:2768
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user qq$ /del3⤵PID:2924
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user admin$ /del3⤵PID:2892
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user admin /del3⤵PID:2820
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user administrator$ /del3⤵PID:2752
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user Jenny /del3⤵PID:3068
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user kevin /del3⤵PID:2756
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user krbtgt /del3⤵PID:2700
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user yyse /del3⤵PID:2808
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user yyse$ /del3⤵PID:2588
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user sorry /del3⤵PID:2784
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user hello /del3⤵PID:2608
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user fofo /del3⤵PID:2640
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user aaa /del3⤵PID:2600
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\del.bat2⤵
- System Location Discovery: System Language Discovery
PID:2592 -
C:\Windows\SysWOW64\attrib.exeattrib +s +h iniuser1.exe3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2116
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h iniftp.exe3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2876
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h log.exe3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1948
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Windows\system32\iniuser1.exe3⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1920
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Windows\system32\iniftp.exe3⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1856
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Windows\system32\log.exe3⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:372
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user pywl$ /del3⤵PID:1336
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user SQL$ /del3⤵PID:1476
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user uiop /del3⤵PID:2352
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user h8894526$ /del3⤵PID:1068
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user qqadmin$ /del3⤵PID:1072
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user zhu$ /del3⤵PID:532
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user mari /del3⤵PID:752
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user madmin$ /del3⤵PID:480
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user mike /del3⤵PID:1340
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user radmin$ /del3⤵PID:1596
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user james /del3⤵PID:2804
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user ken /del3⤵PID:860
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user dtwwd$ /del3⤵PID:1252
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user edmin /del3⤵PID:1924
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user guestss /del3⤵PID:1968
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user hejianhack$ /del3⤵PID:1332
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user nicam0706 /del3⤵PID:820
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user cbooth /del3⤵PID:1724
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user kmeyer /del3⤵PID:1604
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user phillips /del3⤵PID:1852
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user spitech /del3⤵PID:1392
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user support /del3⤵PID:1152
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user yuiop /del3⤵PID:2896
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user guest$ /del3⤵PID:3040
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user system$ /del3⤵PID:1484
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user iisadmin /del3⤵PID:2928
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user ts /del3⤵PID:2920
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user admin /del3⤵PID:2912
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user user /del3⤵PID:2156
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user net2$ /del3⤵PID:3036
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user 123 /del3⤵PID:2212
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user 123$ /del3⤵PID:2888
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user guests$ /del3⤵PID:2544
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user smokin$ /del3⤵PID:1360
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user new1 /del3⤵PID:2420
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user hao$ /del3⤵PID:2440
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user yi$ /del3⤵PID:2084
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user James /del3⤵PID:2416
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user qq /del3⤵PID:1896
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user qq$ /del3⤵PID:2448
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user admin$ /del3⤵PID:2232
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user admin /del3⤵PID:2072
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user administrator$ /del3⤵PID:1624
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user Jenny /del3⤵PID:1556
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user kevin /del3⤵PID:1100
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user krbtgt /del3⤵PID:1716
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user yyse /del3⤵PID:1992
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user yyse$ /del3⤵PID:760
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user sorry /del3⤵PID:2900
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user hello /del3⤵PID:1632
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user fofo /del3⤵PID:1552
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user aaa /del3⤵PID:2456
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\del.bat2⤵
- System Location Discovery: System Language Discovery
PID:1036 -
C:\Windows\SysWOW64\attrib.exeattrib +s +h iniuser1.exe3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1804
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h iniftp.exe3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2564
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h log.exe3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2444
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Windows\system32\iniuser1.exe3⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:348
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Windows\system32\iniftp.exe3⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1016
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Windows\system32\log.exe3⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:684
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user pywl$ /del3⤵PID:1536
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user SQL$ /del3⤵PID:1084
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user uiop /del3⤵PID:2568
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user h8894526$ /del3⤵PID:1676
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user qqadmin$ /del3⤵PID:1324
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user zhu$ /del3⤵PID:464
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user mari /del3⤵PID:1876
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user madmin$ /del3⤵PID:1560
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user mike /del3⤵PID:1932
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user radmin$ /del3⤵PID:892
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user james /del3⤵PID:688
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user ken /del3⤵PID:492
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user dtwwd$ /del3⤵PID:3000
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user edmin /del3⤵PID:1640
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user guestss /del3⤵PID:1648
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user hejianhack$ /del3⤵PID:292
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user nicam0706 /del3⤵PID:2944
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user cbooth /del3⤵PID:2160
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user kmeyer /del3⤵PID:2208
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user phillips /del3⤵PID:2256
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user spitech /del3⤵PID:2024
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user support /del3⤵PID:2100
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user yuiop /del3⤵PID:2952
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user guest$ /del3⤵PID:1132
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user system$ /del3⤵PID:2192
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user iisadmin /del3⤵PID:2464
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user ts /del3⤵PID:2472
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user admin /del3⤵PID:1864
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user user /del3⤵PID:2424
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user net2$ /del3⤵PID:2668
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user 123 /del3⤵PID:1728
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user 123$ /del3⤵PID:968
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user guests$ /del3⤵PID:324
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user smokin$ /del3⤵PID:1224
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user new1 /del3⤵PID:1168
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user hao$ /del3⤵PID:1076
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user yi$ /del3⤵PID:2484
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user James /del3⤵PID:2468
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user qq /del3⤵PID:2976
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user qq$ /del3⤵PID:2104
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user admin$ /del3⤵PID:2268
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user admin /del3⤵PID:1996
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user administrator$ /del3⤵PID:1684
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user Jenny /del3⤵PID:1548
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user kevin /del3⤵PID:1692
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user krbtgt /del3⤵PID:1688
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user yyse /del3⤵PID:1584
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user yyse$ /del3⤵PID:2360
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user sorry /del3⤵PID:2396
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user hello /del3⤵PID:1708
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user fofo /del3⤵PID:3020
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user aaa /del3⤵PID:3028
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\del.bat2⤵
- System Location Discovery: System Language Discovery
PID:2960 -
C:\Windows\SysWOW64\attrib.exeattrib +s +h iniuser1.exe3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2304
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h iniftp.exe3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2884
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h log.exe3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2096
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Windows\system32\iniuser1.exe3⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2240
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Windows\system32\iniftp.exe3⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2680
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Windows\system32\log.exe3⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2696
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user pywl$ /del3⤵PID:2120
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user SQL$ /del3⤵PID:2364
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user uiop /del3⤵PID:2736
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user h8894526$ /del3⤵PID:2732
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user qqadmin$ /del3⤵PID:2832
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user zhu$ /del3⤵PID:2824
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user mari /del3⤵PID:2852
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user madmin$ /del3⤵PID:2984
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user mike /del3⤵PID:2864
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user radmin$ /del3⤵PID:2728
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user james /del3⤵PID:2712
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user ken /del3⤵PID:2740
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user dtwwd$ /del3⤵PID:2332
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user edmin /del3⤵PID:2596
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user guestss /del3⤵PID:2704
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user hejianhack$ /del3⤵PID:2816
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user nicam0706 /del3⤵PID:2968
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user cbooth /del3⤵PID:2836
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user kmeyer /del3⤵PID:2768
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user phillips /del3⤵PID:2924
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user spitech /del3⤵PID:2892
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user support /del3⤵PID:2820
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user yuiop /del3⤵PID:2752
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user guest$ /del3⤵PID:3068
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user system$ /del3⤵PID:2756
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user iisadmin /del3⤵PID:2700
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user ts /del3⤵PID:2808
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user admin /del3⤵PID:2588
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user user /del3⤵PID:2784
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user net2$ /del3⤵PID:2608
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user 123 /del3⤵PID:2640
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user 123$ /del3⤵PID:2600
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user guests$ /del3⤵PID:2288
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user smokin$ /del3⤵PID:2188
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user new1 /del3⤵PID:2708
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user hao$ /del3⤵PID:2664
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user yi$ /del3⤵PID:872
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user James /del3⤵PID:2088
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user qq /del3⤵PID:2632
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user qq$ /del3⤵PID:992
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user admin$ /del3⤵PID:1872
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user admin /del3⤵PID:2068
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user administrator$ /del3⤵PID:3056
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user Jenny /del3⤵PID:768
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user kevin /del3⤵PID:2116
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user krbtgt /del3⤵PID:2876
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user yyse /del3⤵PID:1948
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user yyse$ /del3⤵PID:1920
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user sorry /del3⤵PID:1856
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user hello /del3⤵PID:372
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user fofo /del3⤵PID:1336
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user aaa /del3⤵PID:1476
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\del.bat2⤵
- System Location Discovery: System Language Discovery
PID:888 -
C:\Windows\SysWOW64\attrib.exeattrib +s +h iniuser1.exe3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2772
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h iniftp.exe3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3032
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h log.exe3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2244
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Windows\system32\iniuser1.exe3⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2628
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Windows\system32\iniftp.exe3⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3024
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Windows\system32\log.exe3⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2420
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user pywl$ /del3⤵PID:2084
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user SQL$ /del3⤵PID:1896
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user uiop /del3⤵PID:2448
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user h8894526$ /del3⤵PID:2072
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user qqadmin$ /del3⤵PID:1556
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user zhu$ /del3⤵PID:1100
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user mari /del3⤵PID:1992
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user madmin$ /del3⤵PID:2900
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user mike /del3⤵PID:1552
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user radmin$ /del3⤵PID:1800
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user james /del3⤵PID:1420
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user ken /del3⤵PID:2392
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user dtwwd$ /del3⤵PID:836
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user edmin /del3⤵PID:944
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user guestss /del3⤵PID:2436
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user hejianhack$ /del3⤵PID:1732
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user nicam0706 /del3⤵PID:2480
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user cbooth /del3⤵PID:1668
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user kmeyer /del3⤵PID:2044
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user phillips /del3⤵PID:1696
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user spitech /del3⤵PID:1772
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user support /del3⤵PID:1796
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user yuiop /del3⤵PID:548
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user guest$ /del3⤵PID:2788
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user system$ /del3⤵PID:940
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user iisadmin /del3⤵PID:2172
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user ts /del3⤵PID:1956
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user admin /del3⤵PID:2336
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user user /del3⤵PID:1972
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user net2$ /del3⤵PID:2368
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user 123 /del3⤵PID:796
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user 123$ /del3⤵PID:2932
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user guests$ /del3⤵PID:2308
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user smokin$ /del3⤵PID:2672
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user new1 /del3⤵PID:2140
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user hao$ /del3⤵PID:1544
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user yi$ /del3⤵PID:280
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user James /del3⤵PID:1952
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user qq /del3⤵PID:2284
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user qq$ /del3⤵PID:2496
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user admin$ /del3⤵PID:1580
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user admin /del3⤵PID:2512
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user administrator$ /del3⤵PID:2000
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user Jenny /del3⤵PID:1880
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user kevin /del3⤵PID:2168
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user krbtgt /del3⤵PID:1652
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user yyse /del3⤵PID:1180
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user yyse$ /del3⤵PID:2380
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user sorry /del3⤵PID:2376
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user hello /del3⤵PID:1680
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user fofo /del3⤵PID:2880
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user aaa /del3⤵PID:2884
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\del.bat2⤵
- System Location Discovery: System Language Discovery
PID:1184 -
C:\Windows\SysWOW64\attrib.exeattrib +s +h iniuser1.exe3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2904
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h iniftp.exe3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2676
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h log.exe3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2688
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Windows\system32\iniuser1.exe3⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1360
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Windows\system32\iniftp.exe3⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2440
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Windows\system32\log.exe3⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2416
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user pywl$ /del3⤵PID:2232
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user SQL$ /del3⤵PID:1624
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user uiop /del3⤵PID:1716
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user h8894526$ /del3⤵PID:760
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user qqadmin$ /del3⤵PID:1632
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user zhu$ /del3⤵PID:2456
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user mari /del3⤵PID:2488
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user madmin$ /del3⤵PID:1388
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user mike /del3⤵PID:444
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user radmin$ /del3⤵PID:1520
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user james /del3⤵PID:636
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user ken /del3⤵PID:1748
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user dtwwd$ /del3⤵PID:2792
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user edmin /del3⤵PID:1080
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user guestss /del3⤵PID:2460
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user hejianhack$ /del3⤵PID:1672
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user nicam0706 /del3⤵PID:1428
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user cbooth /del3⤵PID:740
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user kmeyer /del3⤵PID:1088
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user phillips /del3⤵PID:560
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user spitech /del3⤵PID:1048
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user support /del3⤵PID:2312
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user yuiop /del3⤵PID:2148
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user guest$ /del3⤵PID:680
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user system$ /del3⤵PID:2052
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user iisadmin /del3⤵PID:2076
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user ts /del3⤵PID:1900
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user admin /del3⤵PID:1444
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user user /del3⤵PID:2260
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user net2$ /del3⤵PID:980
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user 123 /del3⤵PID:1736
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user 123$ /del3⤵PID:2272
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user guests$ /del3⤵PID:1576
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user smokin$ /del3⤵PID:2136
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user new1 /del3⤵PID:2504
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user hao$ /del3⤵PID:1808
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user yi$ /del3⤵PID:3016
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user James /del3⤵PID:1908
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user qq /del3⤵PID:1036
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user qq$ /del3⤵PID:2040
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user admin$ /del3⤵PID:2520
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user admin /del3⤵PID:1712
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user administrator$ /del3⤵PID:2008
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user Jenny /del3⤵PID:2304
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user kevin /del3⤵PID:2096
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\kill.bat""2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5a9f2b97a2df10c496dfc6e703b9f5734
SHA11a79c949cfb648b78cbd8723a99895c11064f497
SHA256be677274a8698d5d636b7fcf3f00fa61e0d0a3495ff68e6731ba2802d4e0999a
SHA51245efc59f156b5bbc4fb7157e5ce432187dd2b9290bab1e968ff635f0948f773d81c55b0bf8714bfe8e91a3f97922ef5c61d8324eda75d79963f66cb007f08bfd
-
Filesize
38KB
MD56ac1283f150e8d3c0720f0a32c1194ac
SHA1ba3a75ac20ebf71762ab8b54ef88a0cef448836b
SHA256813ed2c50b11cc7e0af87d07d6cd2475409da7db6e65b8994585ebd8f3fc01d0
SHA5126be7b25f0f98e6a98e06d6478b7871c81ccd41cbc5129a1a6ab330e75c6e80596b3f65b52daf4df54aca61569578a374b9ff3d18cb5b750008e301e42dd1853e
-
Filesize
121KB
MD56a07794dcc374ada19aba9eab740c157
SHA1887357ce7a0155db9c238bb4bedb78100fc61b8a
SHA2565a50cd918f66cfb223cd4025e1681aed7799a9a6ed26363df3febebeeb2414ed
SHA512aaa708bea94d43cdebf5520745c87f8860337f11968d4902bd7eab22114c0ff08820a79035246da0b89a2753fc0ff0dd26d6936a3bf4e29960fabafdc6f2da2d
-
Filesize
216B
MD54f8cd83c65b156d9bd8bcc9fb458284c
SHA1cef218be1ba1c95d993358bd87b303b13e748e76
SHA256bfba0c2ce495b6fa640a79bbb21aba91bec491e6db2947fd110b54b3ad95cf20
SHA5121685b07cb7d31ebf509177f0863bb7e4326a8725474370be583366f66bf56796e5ae8f5ec8ad81eaff422223df2f966b2904904dcae496807ed94620148f7ebf
-
Filesize
84KB
MD51fcc8557632070508932b67fcab6050b
SHA12c8b53d9b7624c8a95a81125e85bfedaa428144a
SHA256a17e317bdfb14cd3b4ba6cc923770c6604b155d0eebe0c2bfac4dd18b7e3f548
SHA5125f683eed854b0b8f10402ba118d8d71ffd69f1f4a4b0da6ea6fc41fc1211472feece6affb8d2f6f8adcd3bc10e321bc1e0aa23b4dbe9fd5ff80c0c76c566a777