Analysis
-
max time kernel
94s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 06:50
Static task
static1
Behavioral task
behavioral1
Sample
a5ca28c615e6a984676e4ba60bdbf0e6_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
a5ca28c615e6a984676e4ba60bdbf0e6_JaffaCakes118.exe
-
Size
320KB
-
MD5
a5ca28c615e6a984676e4ba60bdbf0e6
-
SHA1
d69368efb77a06b72d6202fb694110c5795ac510
-
SHA256
681396b8c1aa211a7ecb96c1c9061107cb6ef5e6bb5e515f9218fc42576938e3
-
SHA512
84ea6390e0119653eec8ad00364f006ad678208c0a5133a3069571e18181df04fa76650e21f28d8f31f4b8d3bbadefb1dc798ebe01c644375ca72f938314abf1
-
SSDEEP
3072:MOD6ZcqrlZiOOO9L7a73LdJyIrPRny4yoJiMKCH45+xJDOIfhRuwnd45Gb4uGOST:F6ZXZiu277BGon4AROIJH4uGOY
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 48 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 3596 attrib.exe 1776 attrib.exe 4036 attrib.exe 3516 attrib.exe 3188 attrib.exe 4084 attrib.exe 4176 attrib.exe 2020 attrib.exe 1268 attrib.exe 1796 attrib.exe 3712 attrib.exe 4176 attrib.exe 4716 attrib.exe 3140 attrib.exe 4796 attrib.exe 224 attrib.exe 4312 attrib.exe 2900 attrib.exe 4084 attrib.exe 3972 attrib.exe 2940 attrib.exe 4204 attrib.exe 4900 attrib.exe 816 attrib.exe 3688 attrib.exe 660 attrib.exe 5000 attrib.exe 4804 attrib.exe 2872 attrib.exe 1372 attrib.exe 3964 attrib.exe 3760 attrib.exe 2320 attrib.exe 2348 attrib.exe 3596 attrib.exe 2512 attrib.exe 3456 attrib.exe 3864 attrib.exe 816 attrib.exe 4164 attrib.exe 2408 attrib.exe 3496 attrib.exe 4668 attrib.exe 4796 attrib.exe 3688 attrib.exe 848 attrib.exe 4828 attrib.exe 3164 attrib.exe -
Executes dropped EXE 64 IoCs
pid Process 2580 iniuser1.exe 3272 iniuser1.exe 4712 iniuser1.exe 3080 iniuser1.exe 3952 iniuser1.exe 1504 iniuser1.exe 4312 iniuser1.exe 3608 iniuser1.exe 3516 iniuser1.exe 4584 iniuser1.exe 3616 iniuser1.exe 1372 iniuser1.exe 4876 iniuser1.exe 3420 iniuser1.exe 4292 iniuser1.exe 5044 iniuser1.exe 2948 iniuser1.exe 2040 iniuser1.exe 584 iniuser1.exe 3960 iniuser1.exe 5036 iniuser1.exe 4528 iniuser1.exe 3620 iniuser1.exe 1084 iniuser1.exe 2924 iniuser1.exe 1880 iniuser1.exe 4324 iniuser1.exe 1408 iniuser1.exe 2044 iniuser1.exe 4084 iniuser1.exe 4000 iniuser1.exe 2628 iniuser1.exe 3924 iniuser1.exe 1380 iniuser1.exe 1456 iniuser1.exe 4028 iniuser1.exe 3992 iniuser1.exe 1924 iniuser1.exe 4168 iniuser1.exe 3152 iniuser1.exe 1708 iniuser1.exe 1032 iniuser1.exe 3128 iniuser1.exe 2068 iniuser1.exe 4176 iniuser1.exe 2236 iniuser1.exe 3536 iniuser1.exe 4556 iniuser1.exe 3864 iniuser1.exe 4716 iniuser1.exe 816 iniuser1.exe 3568 iniuser1.exe 4900 iniuser1.exe 3164 iniuser1.exe 2224 iniuser1.exe 1328 iniuser1.exe 5076 iniuser1.exe 3004 iniuser1.exe 3400 iniuser1.exe 2948 iniuser1.exe 4792 iniuser1.exe 444 iniuser1.exe 5036 iniuser1.exe 4528 iniuser1.exe -
Drops file in System32 directory 30 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\iniuser1.exe cmd.exe File opened for modification C:\Windows\SysWOW64\iniuser1.exe attrib.exe File opened for modification C:\Windows\SysWOW64\log.exe attrib.exe File opened for modification C:\Windows\SysWOW64\iniftp.exe attrib.exe File opened for modification C:\Windows\SysWOW64\iniuser1.exe attrib.exe File opened for modification C:\Windows\SysWOW64\iniftp.exe attrib.exe File opened for modification C:\Windows\SysWOW64\iniuser1.exe attrib.exe File opened for modification C:\Windows\SysWOW64\iniuser1.exe attrib.exe File created C:\Windows\SysWOW64\iniftp.exe cmd.exe File opened for modification C:\Windows\SysWOW64\log.exe cmd.exe File opened for modification C:\Windows\SysWOW64\iniftp.exe attrib.exe File opened for modification C:\Windows\SysWOW64\iniftp.exe attrib.exe File opened for modification C:\Windows\SysWOW64\iniftp.exe attrib.exe File opened for modification C:\Windows\SysWOW64\log.exe attrib.exe File opened for modification C:\Windows\SysWOW64\log.exe attrib.exe File opened for modification C:\Windows\SysWOW64\log.exe attrib.exe File created C:\Windows\SysWOW64\iniuser1.exe cmd.exe File created C:\Windows\SysWOW64\log.exe cmd.exe File opened for modification C:\Windows\SysWOW64\iniuser1.exe attrib.exe File opened for modification C:\Windows\SysWOW64\iniftp.exe attrib.exe File opened for modification C:\Windows\SysWOW64\iniftp.exe cmd.exe File opened for modification C:\Windows\SysWOW64\iniuser1.exe attrib.exe File opened for modification C:\Windows\SysWOW64\log.exe attrib.exe File opened for modification C:\Windows\SysWOW64\iniuser1.exe attrib.exe File opened for modification C:\Windows\SysWOW64\log.exe attrib.exe File opened for modification C:\Windows\SysWOW64\log.exe attrib.exe File opened for modification C:\Windows\SysWOW64\iniftp.exe attrib.exe File opened for modification C:\Windows\SysWOW64\log.exe attrib.exe File opened for modification C:\Windows\SysWOW64\iniuser1.exe attrib.exe File opened for modification C:\Windows\SysWOW64\iniftp.exe attrib.exe -
System Location Discovery: System Language Discovery 1 TTPs 59 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a5ca28c615e6a984676e4ba60bdbf0e6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iniuser1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4844 a5ca28c615e6a984676e4ba60bdbf0e6_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4844 wrote to memory of 3212 4844 a5ca28c615e6a984676e4ba60bdbf0e6_JaffaCakes118.exe 92 PID 4844 wrote to memory of 3212 4844 a5ca28c615e6a984676e4ba60bdbf0e6_JaffaCakes118.exe 92 PID 4844 wrote to memory of 3212 4844 a5ca28c615e6a984676e4ba60bdbf0e6_JaffaCakes118.exe 92 PID 3212 wrote to memory of 4828 3212 cmd.exe 94 PID 3212 wrote to memory of 4828 3212 cmd.exe 94 PID 3212 wrote to memory of 4828 3212 cmd.exe 94 PID 3212 wrote to memory of 2320 3212 cmd.exe 95 PID 3212 wrote to memory of 2320 3212 cmd.exe 95 PID 3212 wrote to memory of 2320 3212 cmd.exe 95 PID 3212 wrote to memory of 4804 3212 cmd.exe 96 PID 3212 wrote to memory of 4804 3212 cmd.exe 96 PID 3212 wrote to memory of 4804 3212 cmd.exe 96 PID 3212 wrote to memory of 224 3212 cmd.exe 97 PID 3212 wrote to memory of 224 3212 cmd.exe 97 PID 3212 wrote to memory of 224 3212 cmd.exe 97 PID 3212 wrote to memory of 4164 3212 cmd.exe 98 PID 3212 wrote to memory of 4164 3212 cmd.exe 98 PID 3212 wrote to memory of 4164 3212 cmd.exe 98 PID 3212 wrote to memory of 2348 3212 cmd.exe 99 PID 3212 wrote to memory of 2348 3212 cmd.exe 99 PID 3212 wrote to memory of 2348 3212 cmd.exe 99 PID 3212 wrote to memory of 2580 3212 cmd.exe 100 PID 3212 wrote to memory of 2580 3212 cmd.exe 100 PID 3212 wrote to memory of 2580 3212 cmd.exe 100 PID 3212 wrote to memory of 3272 3212 cmd.exe 101 PID 3212 wrote to memory of 3272 3212 cmd.exe 101 PID 3212 wrote to memory of 3272 3212 cmd.exe 101 PID 3212 wrote to memory of 4712 3212 cmd.exe 102 PID 3212 wrote to memory of 4712 3212 cmd.exe 102 PID 3212 wrote to memory of 4712 3212 cmd.exe 102 PID 3212 wrote to memory of 3080 3212 cmd.exe 103 PID 3212 wrote to memory of 3080 3212 cmd.exe 103 PID 3212 wrote to memory of 3080 3212 cmd.exe 103 PID 3212 wrote to memory of 3952 3212 cmd.exe 104 PID 3212 wrote to memory of 3952 3212 cmd.exe 104 PID 3212 wrote to memory of 3952 3212 cmd.exe 104 PID 3212 wrote to memory of 1504 3212 cmd.exe 105 PID 3212 wrote to memory of 1504 3212 cmd.exe 105 PID 3212 wrote to memory of 1504 3212 cmd.exe 105 PID 3212 wrote to memory of 4312 3212 cmd.exe 106 PID 3212 wrote to memory of 4312 3212 cmd.exe 106 PID 3212 wrote to memory of 4312 3212 cmd.exe 106 PID 3212 wrote to memory of 3608 3212 cmd.exe 107 PID 3212 wrote to memory of 3608 3212 cmd.exe 107 PID 3212 wrote to memory of 3608 3212 cmd.exe 107 PID 3212 wrote to memory of 3516 3212 cmd.exe 108 PID 3212 wrote to memory of 3516 3212 cmd.exe 108 PID 3212 wrote to memory of 3516 3212 cmd.exe 108 PID 3212 wrote to memory of 4584 3212 cmd.exe 109 PID 3212 wrote to memory of 4584 3212 cmd.exe 109 PID 3212 wrote to memory of 4584 3212 cmd.exe 109 PID 3212 wrote to memory of 3616 3212 cmd.exe 110 PID 3212 wrote to memory of 3616 3212 cmd.exe 110 PID 3212 wrote to memory of 3616 3212 cmd.exe 110 PID 3212 wrote to memory of 1372 3212 cmd.exe 111 PID 3212 wrote to memory of 1372 3212 cmd.exe 111 PID 3212 wrote to memory of 1372 3212 cmd.exe 111 PID 3212 wrote to memory of 4876 3212 cmd.exe 112 PID 3212 wrote to memory of 4876 3212 cmd.exe 112 PID 3212 wrote to memory of 4876 3212 cmd.exe 112 PID 3212 wrote to memory of 3420 3212 cmd.exe 113 PID 3212 wrote to memory of 3420 3212 cmd.exe 113 PID 3212 wrote to memory of 3420 3212 cmd.exe 113 PID 3212 wrote to memory of 4292 3212 cmd.exe 114 -
Views/modifies file attributes 1 TTPs 48 IoCs
pid Process 1776 attrib.exe 3964 attrib.exe 224 attrib.exe 3596 attrib.exe 3188 attrib.exe 4084 attrib.exe 2020 attrib.exe 660 attrib.exe 4036 attrib.exe 4828 attrib.exe 3516 attrib.exe 2872 attrib.exe 3164 attrib.exe 3972 attrib.exe 4312 attrib.exe 2940 attrib.exe 3596 attrib.exe 3688 attrib.exe 4900 attrib.exe 816 attrib.exe 1268 attrib.exe 3688 attrib.exe 2348 attrib.exe 1796 attrib.exe 2900 attrib.exe 2512 attrib.exe 816 attrib.exe 4804 attrib.exe 4796 attrib.exe 5000 attrib.exe 4796 attrib.exe 2320 attrib.exe 2408 attrib.exe 3712 attrib.exe 3864 attrib.exe 4716 attrib.exe 4084 attrib.exe 848 attrib.exe 4164 attrib.exe 1372 attrib.exe 4668 attrib.exe 3456 attrib.exe 4176 attrib.exe 3760 attrib.exe 4204 attrib.exe 3496 attrib.exe 4176 attrib.exe 3140 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5ca28c615e6a984676e4ba60bdbf0e6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5ca28c615e6a984676e4ba60bdbf0e6_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\del.bat2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Windows\SysWOW64\attrib.exeattrib +s +h iniuser1.exe3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4828
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h iniftp.exe3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2320
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h log.exe3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4804
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Windows\system32\iniuser1.exe3⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:224
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Windows\system32\iniftp.exe3⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4164
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Windows\system32\log.exe3⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2348
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user pywl$ /del3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2580
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user SQL$ /del3⤵
- Executes dropped EXE
PID:3272
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user uiop /del3⤵
- Executes dropped EXE
PID:4712
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user h8894526$ /del3⤵
- Executes dropped EXE
PID:3080
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user qqadmin$ /del3⤵
- Executes dropped EXE
PID:3952
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user zhu$ /del3⤵
- Executes dropped EXE
PID:1504
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user mari /del3⤵
- Executes dropped EXE
PID:4312
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user madmin$ /del3⤵
- Executes dropped EXE
PID:3608
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user mike /del3⤵
- Executes dropped EXE
PID:3516
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user radmin$ /del3⤵
- Executes dropped EXE
PID:4584
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user james /del3⤵
- Executes dropped EXE
PID:3616
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user ken /del3⤵
- Executes dropped EXE
PID:1372
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user dtwwd$ /del3⤵
- Executes dropped EXE
PID:4876
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user edmin /del3⤵
- Executes dropped EXE
PID:3420
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user guestss /del3⤵
- Executes dropped EXE
PID:4292
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user hejianhack$ /del3⤵
- Executes dropped EXE
PID:5044
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user nicam0706 /del3⤵
- Executes dropped EXE
PID:2948
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user cbooth /del3⤵
- Executes dropped EXE
PID:2040
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user kmeyer /del3⤵
- Executes dropped EXE
PID:584
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user phillips /del3⤵
- Executes dropped EXE
PID:3960
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user spitech /del3⤵
- Executes dropped EXE
PID:5036
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user support /del3⤵
- Executes dropped EXE
PID:4528
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user yuiop /del3⤵
- Executes dropped EXE
PID:3620
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user guest$ /del3⤵
- Executes dropped EXE
PID:1084
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user system$ /del3⤵
- Executes dropped EXE
PID:2924
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user iisadmin /del3⤵
- Executes dropped EXE
PID:1880
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user ts /del3⤵
- Executes dropped EXE
PID:4324
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user admin /del3⤵
- Executes dropped EXE
PID:1408
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user user /del3⤵
- Executes dropped EXE
PID:2044
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user net2$ /del3⤵
- Executes dropped EXE
PID:4084
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user 123 /del3⤵
- Executes dropped EXE
PID:4000
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user 123$ /del3⤵
- Executes dropped EXE
PID:2628
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user guests$ /del3⤵
- Executes dropped EXE
PID:3924
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user smokin$ /del3⤵
- Executes dropped EXE
PID:1380
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user new1 /del3⤵
- Executes dropped EXE
PID:1456
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user hao$ /del3⤵
- Executes dropped EXE
PID:4028
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user yi$ /del3⤵
- Executes dropped EXE
PID:3992
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user James /del3⤵
- Executes dropped EXE
PID:1924
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user qq /del3⤵
- Executes dropped EXE
PID:4168
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user qq$ /del3⤵
- Executes dropped EXE
PID:3152
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user admin$ /del3⤵
- Executes dropped EXE
PID:1708
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user admin /del3⤵
- Executes dropped EXE
PID:1032
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user administrator$ /del3⤵
- Executes dropped EXE
PID:3128
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user Jenny /del3⤵
- Executes dropped EXE
PID:2068
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user kevin /del3⤵
- Executes dropped EXE
PID:4176
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user krbtgt /del3⤵
- Executes dropped EXE
PID:2236
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user yyse /del3⤵
- Executes dropped EXE
PID:3536
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user yyse$ /del3⤵
- Executes dropped EXE
PID:4556
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user sorry /del3⤵
- Executes dropped EXE
PID:3864
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user hello /del3⤵
- Executes dropped EXE
PID:4716
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user fofo /del3⤵
- Executes dropped EXE
PID:816
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user aaa /del3⤵
- Executes dropped EXE
PID:3568
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\del.bat2⤵
- System Location Discovery: System Language Discovery
PID:2284 -
C:\Windows\SysWOW64\attrib.exeattrib +s +h iniuser1.exe3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4312
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h iniftp.exe3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2940
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h log.exe3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4204
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Windows\system32\iniuser1.exe3⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2408
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Windows\system32\iniftp.exe3⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3516
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Windows\system32\log.exe3⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1796
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user pywl$ /del3⤵
- Executes dropped EXE
PID:4900
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user SQL$ /del3⤵
- Executes dropped EXE
PID:3164
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user uiop /del3⤵
- Executes dropped EXE
PID:2224
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user h8894526$ /del3⤵
- Executes dropped EXE
PID:1328
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user qqadmin$ /del3⤵
- Executes dropped EXE
PID:5076
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user zhu$ /del3⤵
- Executes dropped EXE
PID:3004
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user mari /del3⤵
- Executes dropped EXE
PID:3400
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user madmin$ /del3⤵
- Executes dropped EXE
PID:2948
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user mike /del3⤵
- Executes dropped EXE
PID:4792
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user radmin$ /del3⤵
- Executes dropped EXE
PID:444
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user james /del3⤵
- Executes dropped EXE
PID:5036
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user ken /del3⤵
- Executes dropped EXE
PID:4528
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user dtwwd$ /del3⤵PID:2560
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user edmin /del3⤵PID:4024
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user guestss /del3⤵PID:1900
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user hejianhack$ /del3⤵PID:4432
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user nicam0706 /del3⤵PID:4320
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user cbooth /del3⤵PID:4324
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user kmeyer /del3⤵PID:2556
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user phillips /del3⤵PID:4728
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user spitech /del3⤵PID:4448
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user support /del3⤵PID:4084
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user yuiop /del3⤵PID:4280
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user guest$ /del3⤵PID:2120
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user system$ /del3⤵PID:3844
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user iisadmin /del3⤵PID:220
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user ts /del3⤵PID:2984
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user admin /del3⤵PID:1456
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user user /del3⤵PID:2264
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user net2$ /del3⤵PID:1016
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user 123 /del3⤵PID:1876
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user 123$ /del3⤵PID:1924
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user guests$ /del3⤵PID:3200
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user smokin$ /del3⤵PID:4288
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user new1 /del3⤵PID:1708
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user hao$ /del3⤵PID:2580
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user yi$ /del3⤵PID:5104
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user James /del3⤵PID:1872
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user qq /del3⤵PID:3440
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user qq$ /del3⤵PID:4492
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user admin$ /del3⤵PID:848
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user admin /del3⤵PID:4176
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user administrator$ /del3⤵PID:1508
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user Jenny /del3⤵PID:1776
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user kevin /del3⤵PID:4404
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user krbtgt /del3⤵PID:3864
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user yyse /del3⤵PID:3760
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user yyse$ /del3⤵PID:1780
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user sorry /del3⤵PID:816
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user hello /del3⤵PID:1804
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user fofo /del3⤵PID:1172
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user aaa /del3⤵PID:2376
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\del.bat2⤵
- System Location Discovery: System Language Discovery
PID:1984 -
C:\Windows\SysWOW64\attrib.exeattrib +s +h iniuser1.exe3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2872
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h iniftp.exe3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2900
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h log.exe3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3596
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Windows\system32\iniuser1.exe3⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1372
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Windows\system32\iniftp.exe3⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3712
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Windows\system32\log.exe3⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3164
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user pywl$ /del3⤵PID:4292
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user SQL$ /del3⤵PID:460
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user uiop /del3⤵PID:2224
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user h8894526$ /del3⤵PID:2672
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user qqadmin$ /del3⤵PID:2324
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user zhu$ /del3⤵PID:2192
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user mari /del3⤵PID:1584
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user madmin$ /del3⤵PID:2052
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user mike /del3⤵PID:4904
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user radmin$ /del3⤵PID:2212
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user james /del3⤵PID:3468
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user ken /del3⤵PID:2016
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user dtwwd$ /del3⤵PID:1580
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user edmin /del3⤵PID:4304
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user guestss /del3⤵PID:3988
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user hejianhack$ /del3⤵PID:4796
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user nicam0706 /del3⤵PID:2316
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user cbooth /del3⤵PID:1408
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user kmeyer /del3⤵PID:4728
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user phillips /del3⤵PID:3716
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user spitech /del3⤵PID:1336
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user support /del3⤵PID:3548
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user yuiop /del3⤵PID:2120
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user guest$ /del3⤵PID:4504
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user system$ /del3⤵PID:2984
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user iisadmin /del3⤵PID:1380
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user ts /del3⤵PID:2264
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user admin /del3⤵PID:3704
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user user /del3⤵PID:3992
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user net2$ /del3⤵PID:5056
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user 123 /del3⤵PID:3824
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user 123$ /del3⤵PID:4288
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user guests$ /del3⤵PID:1924
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user smokin$ /del3⤵PID:3868
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user new1 /del3⤵PID:5104
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user hao$ /del3⤵PID:3644
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user yi$ /del3⤵PID:4440
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user James /del3⤵PID:3576
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user qq /del3⤵PID:848
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user qq$ /del3⤵PID:4176
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user admin$ /del3⤵PID:3140
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user admin /del3⤵PID:2056
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user administrator$ /del3⤵PID:1776
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user Jenny /del3⤵PID:2996
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user kevin /del3⤵PID:4552
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user krbtgt /del3⤵PID:3972
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user yyse /del3⤵PID:5068
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user yyse$ /del3⤵PID:1596
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user sorry /del3⤵PID:1172
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user hello /del3⤵PID:2376
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user fofo /del3⤵PID:3028
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user aaa /del3⤵PID:2528
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\del.bat2⤵
- System Location Discovery: System Language Discovery
PID:3244 -
C:\Windows\SysWOW64\attrib.exeattrib +s +h iniuser1.exe3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3188
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h iniftp.exe3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3496
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h log.exe3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2512
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Windows\system32\iniuser1.exe3⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3596
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Windows\system32\iniftp.exe3⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4900
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Windows\system32\log.exe3⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4668
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user pywl$ /del3⤵PID:3772
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user SQL$ /del3⤵PID:4284
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user uiop /del3⤵PID:1328
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user h8894526$ /del3⤵PID:4764
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user qqadmin$ /del3⤵PID:584
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user zhu$ /del3⤵PID:3344
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user mari /del3⤵PID:4792
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user madmin$ /del3⤵PID:2632
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user mike /del3⤵PID:3320
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user radmin$ /del3⤵PID:4528
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user james /del3⤵PID:4524
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user ken /del3⤵PID:1084
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user dtwwd$ /del3⤵PID:4332
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user edmin /del3⤵PID:2924
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user guestss /del3⤵PID:2248
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user hejianhack$ /del3⤵PID:1384
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user nicam0706 /del3⤵PID:2044
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user cbooth /del3⤵PID:1152
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user kmeyer /del3⤵PID:4796
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user phillips /del3⤵PID:4728
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user spitech /del3⤵PID:3716
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user support /del3⤵PID:1336
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user yuiop /del3⤵PID:228
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user guest$ /del3⤵PID:2028
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user system$ /del3⤵PID:3548
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user iisadmin /del3⤵PID:4888
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user ts /del3⤵PID:4028
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user admin /del3⤵PID:1864
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user user /del3⤵PID:1380
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user net2$ /del3⤵PID:3312
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user 123 /del3⤵PID:2492
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user 123$ /del3⤵PID:4800
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user guests$ /del3⤵PID:3152
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user smokin$ /del3⤵PID:3480
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user new1 /del3⤵PID:1924
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user hao$ /del3⤵PID:1032
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user yi$ /del3⤵PID:3440
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user James /del3⤵PID:1548
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user qq /del3⤵PID:3644
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user qq$ /del3⤵PID:2296
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user admin$ /del3⤵PID:4176
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user admin /del3⤵PID:3140
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user administrator$ /del3⤵PID:2056
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user Jenny /del3⤵PID:3536
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user kevin /del3⤵PID:3964
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user krbtgt /del3⤵PID:4552
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user yyse /del3⤵PID:2996
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user yyse$ /del3⤵PID:1780
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user sorry /del3⤵PID:3388
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user hello /del3⤵PID:3448
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user fofo /del3⤵PID:5072
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user aaa /del3⤵PID:2868
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\del.bat2⤵
- System Location Discovery: System Language Discovery
PID:4440 -
C:\Windows\SysWOW64\attrib.exeattrib +s +h iniuser1.exe3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3456
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h iniftp.exe3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4176
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h log.exe3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3864
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Windows\system32\iniuser1.exe3⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4716
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Windows\system32\iniftp.exe3⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2020
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Windows\system32\log.exe3⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:816
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user pywl$ /del3⤵PID:1804
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user SQL$ /del3⤵PID:1596
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user uiop /del3⤵PID:1172
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user h8894526$ /del3⤵PID:1780
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user qqadmin$ /del3⤵PID:4428
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user zhu$ /del3⤵PID:2004
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user mari /del3⤵PID:3244
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user madmin$ /del3⤵PID:4068
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user mike /del3⤵PID:2752
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user radmin$ /del3⤵PID:2776
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user james /del3⤵PID:1528
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user ken /del3⤵PID:3752
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user dtwwd$ /del3⤵PID:1088
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user edmin /del3⤵PID:1348
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user guestss /del3⤵PID:2672
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user hejianhack$ /del3⤵PID:744
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user nicam0706 /del3⤵PID:5100
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user cbooth /del3⤵PID:4668
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user kmeyer /del3⤵PID:4788
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user phillips /del3⤵PID:3476
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user spitech /del3⤵PID:3584
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user support /del3⤵PID:912
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user yuiop /del3⤵PID:4872
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user guest$ /del3⤵PID:2408
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user system$ /del3⤵PID:4684
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user iisadmin /del3⤵PID:4392
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user ts /del3⤵PID:2616
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user admin /del3⤵PID:424
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user user /del3⤵PID:2336
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user net2$ /del3⤵PID:924
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user 123 /del3⤵PID:4832
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user 123$ /del3⤵PID:5064
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user guests$ /del3⤵PID:3872
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user smokin$ /del3⤵PID:4688
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user new1 /del3⤵PID:1412
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user hao$ /del3⤵PID:3320
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user yi$ /del3⤵PID:2016
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user James /del3⤵PID:1584
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user qq /del3⤵PID:2052
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user qq$ /del3⤵PID:4524
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user admin$ /del3⤵PID:2628
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user admin /del3⤵PID:2028
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user administrator$ /del3⤵PID:228
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user Jenny /del3⤵PID:3716
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user kevin /del3⤵PID:3844
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user krbtgt /del3⤵PID:1456
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user yyse /del3⤵PID:1716
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user yyse$ /del3⤵PID:1712
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user sorry /del3⤵PID:1876
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user hello /del3⤵PID:4028
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user fofo /del3⤵PID:1468
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user aaa /del3⤵PID:4288
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\del.bat2⤵
- System Location Discovery: System Language Discovery
PID:4800 -
C:\Windows\SysWOW64\attrib.exeattrib +s +h iniuser1.exe3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4084
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h iniftp.exe3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4796
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h log.exe3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3688
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Windows\system32\iniuser1.exe3⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1268
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Windows\system32\iniftp.exe3⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:848
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Windows\system32\log.exe3⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3140
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user pywl$ /del3⤵PID:408
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user SQL$ /del3⤵PID:2516
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user uiop /del3⤵PID:3972
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user h8894526$ /del3⤵PID:3536
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user qqadmin$ /del3⤵PID:5000
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user zhu$ /del3⤵PID:3212
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user mari /del3⤵PID:2376
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user madmin$ /del3⤵PID:1036
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user mike /del3⤵PID:4428
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user radmin$ /del3⤵PID:2348
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user james /del3⤵PID:232
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user ken /del3⤵PID:2004
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user dtwwd$ /del3⤵PID:2752
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user edmin /del3⤵PID:3804
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user guestss /del3⤵PID:4900
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user hejianhack$ /del3⤵PID:3164
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user nicam0706 /del3⤵PID:1088
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user cbooth /del3⤵PID:1348
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user kmeyer /del3⤵PID:2672
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user phillips /del3⤵PID:2224
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user spitech /del3⤵PID:5100
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user support /del3⤵PID:2068
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user yuiop /del3⤵PID:4668
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user guest$ /del3⤵PID:4208
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user system$ /del3⤵PID:1196
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user iisadmin /del3⤵PID:3476
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user ts /del3⤵PID:1664
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user admin /del3⤵PID:4348
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user user /del3⤵PID:2612
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user net2$ /del3⤵PID:3560
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user 123 /del3⤵PID:2916
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user 123$ /del3⤵PID:2044
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user guests$ /del3⤵PID:2616
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user smokin$ /del3⤵PID:2184
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user new1 /del3⤵PID:2908
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user hao$ /del3⤵PID:3960
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user yi$ /del3⤵PID:5036
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user James /del3⤵PID:2560
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user qq /del3⤵PID:4768
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user qq$ /del3⤵PID:4528
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user admin$ /del3⤵PID:4024
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user admin /del3⤵PID:2924
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user administrator$ /del3⤵PID:4280
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user Jenny /del3⤵PID:1584
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user kevin /del3⤵PID:5008
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user krbtgt /del3⤵PID:228
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user yyse /del3⤵PID:4924
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user yyse$ /del3⤵PID:4888
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user sorry /del3⤵PID:3724
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user hello /del3⤵PID:4996
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user fofo /del3⤵PID:3844
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user aaa /del3⤵PID:1712
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\del.bat2⤵
- System Location Discovery: System Language Discovery
PID:2476 -
C:\Windows\SysWOW64\attrib.exeattrib +s +h iniuser1.exe3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4084
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h iniftp.exe3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3688
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h log.exe3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1776
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Windows\system32\iniuser1.exe3⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3964
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Windows\system32\iniftp.exe3⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3972
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Windows\system32\log.exe3⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4036
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user pywl$ /del3⤵PID:5072
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user SQL$ /del3⤵PID:4564
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user uiop /del3⤵PID:4428
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user h8894526$ /del3⤵PID:404
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user qqadmin$ /del3⤵PID:4772
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user zhu$ /del3⤵PID:4840
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user mari /del3⤵PID:4284
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user madmin$ /del3⤵PID:5076
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user mike /del3⤵PID:5044
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user radmin$ /del3⤵PID:2068
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user james /del3⤵PID:2224
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user ken /del3⤵PID:2500
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user dtwwd$ /del3⤵PID:4876
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user edmin /del3⤵PID:3476
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user guestss /del3⤵PID:3616
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user hejianhack$ /del3⤵PID:2916
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user nicam0706 /del3⤵PID:424
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user cbooth /del3⤵PID:5064
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user kmeyer /del3⤵PID:2044
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user phillips /del3⤵PID:4316
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user spitech /del3⤵PID:1580
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user support /del3⤵PID:584
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user yuiop /del3⤵PID:2192
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user guest$ /del3⤵PID:4504
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user system$ /del3⤵PID:4532
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user iisadmin /del3⤵PID:1380
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user ts /del3⤵PID:4888
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user admin /del3⤵PID:2756
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user user /del3⤵PID:3480
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user net2$ /del3⤵PID:4820
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user 123 /del3⤵PID:1212
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user 123$ /del3⤵PID:3912
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user guests$ /del3⤵PID:2580
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user smokin$ /del3⤵PID:3152
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user new1 /del3⤵PID:2296
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user hao$ /del3⤵PID:1548
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user yi$ /del3⤵PID:4404
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user James /del3⤵PID:4060
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user qq /del3⤵PID:2996
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user qq$ /del3⤵PID:2884
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user admin$ /del3⤵PID:4756
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user admin /del3⤵PID:1204
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user administrator$ /del3⤵PID:2868
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user Jenny /del3⤵PID:3952
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user kevin /del3⤵PID:3264
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user krbtgt /del3⤵PID:1244
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user yyse /del3⤵PID:4044
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user yyse$ /del3⤵PID:1328
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user sorry /del3⤵PID:1088
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user hello /del3⤵PID:4920
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user fofo /del3⤵PID:4668
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user aaa /del3⤵PID:5100
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\del.bat2⤵
- System Location Discovery: System Language Discovery
PID:3644 -
C:\Windows\SysWOW64\attrib.exeattrib +s +h iniuser1.exe3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4796
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h iniftp.exe3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:660
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h log.exe3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4176
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Windows\system32\iniuser1.exe3⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3760
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Windows\system32\iniftp.exe3⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:816
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Windows\system32\log.exe3⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:5000
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user pywl$ /del3⤵PID:2284
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user SQL$ /del3⤵PID:3952
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user uiop /del3⤵PID:3264
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user h8894526$ /del3⤵PID:1244
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user qqadmin$ /del3⤵PID:2776
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user zhu$ /del3⤵PID:4900
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user mari /del3⤵PID:4164
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user madmin$ /del3⤵PID:2528
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user mike /del3⤵PID:4788
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user radmin$ /del3⤵PID:4448
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user james /del3⤵PID:820
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user ken /del3⤵PID:2900
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user dtwwd$ /del3⤵PID:1224
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user edmin /del3⤵PID:2408
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user guestss /del3⤵PID:4980
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user hejianhack$ /del3⤵PID:924
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user nicam0706 /del3⤵PID:4848
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user cbooth /del3⤵PID:2184
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user kmeyer /del3⤵PID:3960
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user phillips /del3⤵PID:2560
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user spitech /del3⤵PID:2632
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user support /del3⤵PID:4024
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user yuiop /del3⤵PID:4280
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user guest$ /del3⤵PID:1336
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user system$ /del3⤵PID:2000
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user iisadmin /del3⤵PID:5056
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user ts /del3⤵PID:2264
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user admin /del3⤵PID:788
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user user /del3⤵PID:4000
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user net2$ /del3⤵PID:4028
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user 123 /del3⤵PID:2328
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user 123$ /del3⤵PID:116
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user guests$ /del3⤵PID:4556
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user smokin$ /del3⤵PID:2072
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user new1 /del3⤵PID:3052
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user hao$ /del3⤵PID:4796
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user yi$ /del3⤵PID:3456
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user James /del3⤵PID:3568
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user qq /del3⤵PID:2516
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user qq$ /del3⤵PID:408
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user admin$ /del3⤵PID:3212
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user admin /del3⤵PID:1780
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user administrator$ /del3⤵PID:2284
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user Jenny /del3⤵PID:4564
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user kevin /del3⤵PID:2004
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user krbtgt /del3⤵PID:2512
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user yyse /del3⤵PID:3752
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user yyse$ /del3⤵PID:4840
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user sorry /del3⤵PID:4292
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user hello /del3⤵PID:1348
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user fofo /del3⤵PID:5044
-
-
C:\Users\Admin\AppData\Local\Temp\iniuser1.exeiniuser1 user aaa /del3⤵PID:2436
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\kill.bat""2⤵
- System Location Discovery: System Language Discovery
PID:3052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5a9f2b97a2df10c496dfc6e703b9f5734
SHA11a79c949cfb648b78cbd8723a99895c11064f497
SHA256be677274a8698d5d636b7fcf3f00fa61e0d0a3495ff68e6731ba2802d4e0999a
SHA51245efc59f156b5bbc4fb7157e5ce432187dd2b9290bab1e968ff635f0948f773d81c55b0bf8714bfe8e91a3f97922ef5c61d8324eda75d79963f66cb007f08bfd
-
Filesize
38KB
MD56ac1283f150e8d3c0720f0a32c1194ac
SHA1ba3a75ac20ebf71762ab8b54ef88a0cef448836b
SHA256813ed2c50b11cc7e0af87d07d6cd2475409da7db6e65b8994585ebd8f3fc01d0
SHA5126be7b25f0f98e6a98e06d6478b7871c81ccd41cbc5129a1a6ab330e75c6e80596b3f65b52daf4df54aca61569578a374b9ff3d18cb5b750008e301e42dd1853e
-
Filesize
121KB
MD56a07794dcc374ada19aba9eab740c157
SHA1887357ce7a0155db9c238bb4bedb78100fc61b8a
SHA2565a50cd918f66cfb223cd4025e1681aed7799a9a6ed26363df3febebeeb2414ed
SHA512aaa708bea94d43cdebf5520745c87f8860337f11968d4902bd7eab22114c0ff08820a79035246da0b89a2753fc0ff0dd26d6936a3bf4e29960fabafdc6f2da2d
-
Filesize
84KB
MD51fcc8557632070508932b67fcab6050b
SHA12c8b53d9b7624c8a95a81125e85bfedaa428144a
SHA256a17e317bdfb14cd3b4ba6cc923770c6604b155d0eebe0c2bfac4dd18b7e3f548
SHA5125f683eed854b0b8f10402ba118d8d71ffd69f1f4a4b0da6ea6fc41fc1211472feece6affb8d2f6f8adcd3bc10e321bc1e0aa23b4dbe9fd5ff80c0c76c566a777