Overview
overview
7Static
static
3da9aa96c96...18.exe
windows7-x64
7da9aa96c96...18.exe
windows10-2004-x64
7$PLUGINSDI...RL.dll
windows7-x64
3$PLUGINSDI...RL.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ps.dll
windows7-x64
3$PLUGINSDI...ps.dll
windows10-2004-x64
31314.exe
windows7-x64
31314.exe
windows10-2004-x64
3$PROGRAM_F...rX.dll
windows7-x64
7$PROGRAM_F...rX.dll
windows10-2004-x64
7$PROGRAM_F...ce.exe
windows7-x64
3$PROGRAM_F...ce.exe
windows10-2004-x64
3gpupdate.exe
windows7-x64
3gpupdate.exe
windows10-2004-x64
3ipseccmd.exe
windows7-x64
3ipseccmd.exe
windows10-2004-x64
3polstore.dll
windows7-x64
3polstore.dll
windows10-2004-x64
3uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3winipsec.dll
windows7-x64
3winipsec.dll
windows10-2004-x64
3ܾ�...��.bat
windows7-x64
3ܾ�...��.bat
windows10-2004-x64
3Analysis
-
max time kernel
104s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 15:02
Static task
static1
Behavioral task
behavioral1
Sample
da9aa96c9630ec4e6d3afac19baac2f0_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
da9aa96c9630ec4e6d3afac19baac2f0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/BrandingURL.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/BrandingURL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/ToolTips.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/ToolTips.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
1314.exe
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
1314.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$PROGRAM_FILES/Baidu/Toolbar/BaiduBarX_Tmp/BaiduBarX.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
$PROGRAM_FILES/Baidu/Toolbar/BaiduBarX_Tmp/BaiduBarX.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
$PROGRAM_FILES/Baidu/Toolbar/BaiduBarX_Tmp/BaiduService.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
$PROGRAM_FILES/Baidu/Toolbar/BaiduBarX_Tmp/BaiduService.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
gpupdate.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
gpupdate.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
ipseccmd.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
ipseccmd.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
polstore.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
polstore.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
uninst.exe
Resource
win7-20240729-en
Behavioral task
behavioral26
Sample
uninst.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
winipsec.dll
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
winipsec.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
ܾ˿˲.bat
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
ܾ˿˲.bat
Resource
win10v2004-20240802-en
General
-
Target
ܾ˿˲.bat
-
Size
47KB
-
MD5
25aa3b4fe6817cad8ab174d6fbbf89c5
-
SHA1
2f991387bab6ae8bb8d6e329fe9f8e5ca037aaa9
-
SHA256
6ebfd09383073c4e4699fa90de19d47a0e2778ec6c363534af7840a85ea2939e
-
SHA512
35d19b1ec89019dccf097f2c7694c7b1f2326809a65895cda65446bfff13f9175a0b28ad3c74c73d0b2585b6b992097c587f3060b30cc63f9cb4e145df36a083
-
SSDEEP
768:+2Tbv2+ZWnrUeVRrSv1CP7V3+6acRGhujJ3TDkYTByayPEapZwB9D1X3YqSlNFSI:+2Tbv2+ZWnrUeVRrSv1CP7V3+6acRGhj
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe -
Runs .reg file with regedit 1 IoCs
pid Process 2932 regedit.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 64 IoCs
pid Process 3052 gpupdate.exe 2372 ipseccmd.exe 2332 ipseccmd.exe 2212 ipseccmd.exe 420 ipseccmd.exe 2820 ipseccmd.exe 2916 ipseccmd.exe 2896 ipseccmd.exe 2944 ipseccmd.exe 2824 ipseccmd.exe 2780 ipseccmd.exe 2816 ipseccmd.exe 2676 ipseccmd.exe 3064 ipseccmd.exe 2788 ipseccmd.exe 2872 ipseccmd.exe 2876 ipseccmd.exe 2968 ipseccmd.exe 3004 ipseccmd.exe 2692 ipseccmd.exe 2868 ipseccmd.exe 2808 ipseccmd.exe 2716 ipseccmd.exe 2856 ipseccmd.exe 2664 ipseccmd.exe 2688 ipseccmd.exe 2720 ipseccmd.exe 2740 ipseccmd.exe 1968 ipseccmd.exe 1944 ipseccmd.exe 2536 ipseccmd.exe 2652 ipseccmd.exe 340 ipseccmd.exe 968 ipseccmd.exe 1576 ipseccmd.exe 2412 ipseccmd.exe 1652 ipseccmd.exe 2516 ipseccmd.exe 2532 ipseccmd.exe 564 ipseccmd.exe 2616 ipseccmd.exe 1436 ipseccmd.exe 2988 ipseccmd.exe 2756 ipseccmd.exe 652 ipseccmd.exe 2656 ipseccmd.exe 2972 ipseccmd.exe 2992 ipseccmd.exe 3024 ipseccmd.exe 2976 ipseccmd.exe 1996 ipseccmd.exe 2028 ipseccmd.exe 2928 ipseccmd.exe 1732 ipseccmd.exe 3048 ipseccmd.exe 2204 ipseccmd.exe 2380 ipseccmd.exe 2108 ipseccmd.exe 2644 ipseccmd.exe 1084 ipseccmd.exe 1096 ipseccmd.exe 1684 ipseccmd.exe 2164 ipseccmd.exe 1460 ipseccmd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2300 wrote to memory of 3052 2300 cmd.exe 31 PID 2300 wrote to memory of 3052 2300 cmd.exe 31 PID 2300 wrote to memory of 3052 2300 cmd.exe 31 PID 2300 wrote to memory of 3052 2300 cmd.exe 31 PID 2300 wrote to memory of 3052 2300 cmd.exe 31 PID 2300 wrote to memory of 3052 2300 cmd.exe 31 PID 2300 wrote to memory of 3052 2300 cmd.exe 31 PID 2300 wrote to memory of 2372 2300 cmd.exe 32 PID 2300 wrote to memory of 2372 2300 cmd.exe 32 PID 2300 wrote to memory of 2372 2300 cmd.exe 32 PID 2300 wrote to memory of 2372 2300 cmd.exe 32 PID 2300 wrote to memory of 2332 2300 cmd.exe 33 PID 2300 wrote to memory of 2332 2300 cmd.exe 33 PID 2300 wrote to memory of 2332 2300 cmd.exe 33 PID 2300 wrote to memory of 2332 2300 cmd.exe 33 PID 2300 wrote to memory of 2212 2300 cmd.exe 34 PID 2300 wrote to memory of 2212 2300 cmd.exe 34 PID 2300 wrote to memory of 2212 2300 cmd.exe 34 PID 2300 wrote to memory of 2212 2300 cmd.exe 34 PID 2300 wrote to memory of 420 2300 cmd.exe 35 PID 2300 wrote to memory of 420 2300 cmd.exe 35 PID 2300 wrote to memory of 420 2300 cmd.exe 35 PID 2300 wrote to memory of 420 2300 cmd.exe 35 PID 2300 wrote to memory of 2820 2300 cmd.exe 36 PID 2300 wrote to memory of 2820 2300 cmd.exe 36 PID 2300 wrote to memory of 2820 2300 cmd.exe 36 PID 2300 wrote to memory of 2820 2300 cmd.exe 36 PID 2300 wrote to memory of 2916 2300 cmd.exe 37 PID 2300 wrote to memory of 2916 2300 cmd.exe 37 PID 2300 wrote to memory of 2916 2300 cmd.exe 37 PID 2300 wrote to memory of 2916 2300 cmd.exe 37 PID 2300 wrote to memory of 2896 2300 cmd.exe 38 PID 2300 wrote to memory of 2896 2300 cmd.exe 38 PID 2300 wrote to memory of 2896 2300 cmd.exe 38 PID 2300 wrote to memory of 2896 2300 cmd.exe 38 PID 2300 wrote to memory of 2944 2300 cmd.exe 39 PID 2300 wrote to memory of 2944 2300 cmd.exe 39 PID 2300 wrote to memory of 2944 2300 cmd.exe 39 PID 2300 wrote to memory of 2944 2300 cmd.exe 39 PID 2300 wrote to memory of 2824 2300 cmd.exe 40 PID 2300 wrote to memory of 2824 2300 cmd.exe 40 PID 2300 wrote to memory of 2824 2300 cmd.exe 40 PID 2300 wrote to memory of 2824 2300 cmd.exe 40 PID 2300 wrote to memory of 2780 2300 cmd.exe 41 PID 2300 wrote to memory of 2780 2300 cmd.exe 41 PID 2300 wrote to memory of 2780 2300 cmd.exe 41 PID 2300 wrote to memory of 2780 2300 cmd.exe 41 PID 2300 wrote to memory of 2816 2300 cmd.exe 42 PID 2300 wrote to memory of 2816 2300 cmd.exe 42 PID 2300 wrote to memory of 2816 2300 cmd.exe 42 PID 2300 wrote to memory of 2816 2300 cmd.exe 42 PID 2300 wrote to memory of 2676 2300 cmd.exe 43 PID 2300 wrote to memory of 2676 2300 cmd.exe 43 PID 2300 wrote to memory of 2676 2300 cmd.exe 43 PID 2300 wrote to memory of 2676 2300 cmd.exe 43 PID 2300 wrote to memory of 3064 2300 cmd.exe 44 PID 2300 wrote to memory of 3064 2300 cmd.exe 44 PID 2300 wrote to memory of 3064 2300 cmd.exe 44 PID 2300 wrote to memory of 3064 2300 cmd.exe 44 PID 2300 wrote to memory of 2788 2300 cmd.exe 45 PID 2300 wrote to memory of 2788 2300 cmd.exe 45 PID 2300 wrote to memory of 2788 2300 cmd.exe 45 PID 2300 wrote to memory of 2788 2300 cmd.exe 45 PID 2300 wrote to memory of 2872 2300 cmd.exe 46
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ܾ˿˲.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\gpupdate.exegpupdate2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:3052
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -o -x2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2372
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -x2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2332
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/135" -f *+0:135:TCP -n BLOCK -x2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2212
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block UDP/135" -f *+0:135:UDP -n BLOCK -x2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:420
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/445" -f *+0:445:TCP -n BLOCK -x2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2820
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block UDP/445" -f *+0:445:UDP -n BLOCK -x2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2916
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/1025" -f *+0:1025:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2896
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block UDP/139" -f *+0:139:UDP -n BLOCK -x2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2944
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/1068" -f *+0:1068:TCP -n BLOCK -x2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2824
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/5554" -f *+0:5554:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2780
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/9995" -f *+0:9995:TCP -n BLOCK -x2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2816
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/9996" -f *+0:9996:TCP -n BLOCK -x2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2676
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/6129" -f *+0:6129:TCP -n BLOCK -x2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:3064
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block ICMP/255" -f *+0:255:ICMP -n BLOCK -x2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2788
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/43958" -f *+0:43958:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2872
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/20034" -f *+0:20034:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2876
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/1092" -f *+0:1092:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2968
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/3996" -f *+0:3996:TCP -n BLOCK -x2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:3004
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/4060" -f *+0:4060:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2692
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/4590" -f *+0:4590:TCP -n BLOCK -x2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2868
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/1080" -f *+0:1080:TCP -n BLOCK -x2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2808
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/113" -f *+0:113:TCP -n BLOCK -x2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2716
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/79" -f *+0:79:TCP -n BLOCK -x2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2856
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block UDP/53" -f *+0:53:UDP -n BLOCK -x2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2664
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/53" -f *+0:53:TCP -n BLOCK -x2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2688
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/707" -f *+0:707:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2720
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/808" -f *+0:808:TCP -n BLOCK -x2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2740
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/23" -f *+0:23:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1968
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/520" -f *+0:520:TCP -n BLOCK -x2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1944
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/1999" -f *+0:1999:TCP -n BLOCK -x2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2536
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/2001" -f *+0:2001:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2652
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/2023" -f *+0:2023:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:340
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/2583" -f *+0:2583:TCP -n BLOCK -x2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:968
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/3389" -f *+0:3389:TCP -n BLOCK -x2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1576
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/4444" -f *+0:4444:TCP -n BLOCK -x2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2412
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/4899" -f *+0:4899:TCP -n BLOCK -x2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1652
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/5800" -f *+0:5800:TCP -n BLOCK -x2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2516
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/5900" -f *+0:5900:TCP -n BLOCK -x2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2532
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/8888" -f *+0:8888:TCP -n BLOCK -x2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:564
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/6129" -f *+0:6129:TCP -n BLOCK -x2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2616
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/6267" -f *+0:6267:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1436
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/660" -f *+0:660:TCP -n BLOCK -x2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2988
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/6671" -f *+0:6671:TCP -n BLOCK -x2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2756
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/6939" -f *+0:6939:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:652
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/7306" -f *+0:7306:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2656
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/7511" -f *+0:7511:TCP -n BLOCK -x2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2972
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/7626" -f *+0:7626:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2992
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/8011" -f *+0:8011:TCP -n BLOCK -x2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:3024
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/9989" -f *+0:9989:TCP -n BLOCK -x2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2976
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/19191" -f *+0:19191:TCP -n BLOCK -x2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1996
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/1029" -f *+0:1029:TCP -n BLOCK -x2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2028
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/20168" -f *+0:20168:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2928
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/23444" -f *+0:23444:TCP -n BLOCK -x2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1732
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/27374" -f *+0:27374:TCP -n BLOCK -x2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:3048
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/30100" -f *+0:30100:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2204
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/31337" -f *+0:31337:TCP -n BLOCK -x2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2380
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/45576" -f *+0:45576:TCP -n BLOCK -x2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2108
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/50766" -f *+0:50766:TCP -n BLOCK -x2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2644
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/61466" -f *+0:61466:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1084
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/31338" -f *+0:31338:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1096
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/8102" -f *+0:8102:TCP -n BLOCK -x2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1684
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/2000" -f *+0:2000:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2164
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/31339" -f *+0:31339:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1460
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/2001" -f *+0:2001:TCP -n BLOCK -x2⤵PID:2848
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/31666" -f *+0:31666:TCP -n BLOCK -x2⤵PID:1144
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/34324" -f *+0:34324:TCP -n BLOCK -x2⤵PID:2540
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/7306" -f *+0:7306:TCP -n BLOCK -x2⤵PID:2096
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/40412" -f *+0:40412:TCP -n BLOCK -x2⤵PID:2352
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/40421" -f *+0:40421:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:1976
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/8011" -f *+0:8011:TCP -n BLOCK -x2⤵PID:2128
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/40422" -f *+0:40422:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:2144
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/23444" -f *+0:23444:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:2200
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/40423" -f *+0:40423:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:2356
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/23445" -f *+0:23445:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:2388
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/40426" -f *+0:40426:TCP -n BLOCK -x2⤵PID:2148
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/50505" -f *+0:50505:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:472
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/27374" -f *+0:27374:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:2172
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/50766" -f *+0:50766:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:936
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/53001" -f *+0:53001:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:1152
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/61466" -f *+0:61466:TCP -n BLOCK -x2⤵PID:1204
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/121" -f *+0:121:TCP -n BLOCK -x2⤵PID:1608
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/666" -f *+0:666:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:1864
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/65000" -f *+0:65000:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:888
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/1001" -f *+0:1001:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:948
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/6400" -f *+0:6400:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:2440
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/1600" -f *+0:1600:TCP -n BLOCK -x2⤵PID:752
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/12346" -f *+0:12346:TCP -n BLOCK -x2⤵PID:2060
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/1807" -f *+0:1807:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:1824
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/20034" -f *+0:20034:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:2156
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/1981" -f *+0:1981:TCP -n BLOCK -x2⤵PID:792
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/1243" -f *+0:1243:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:2208
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/1001" -f *+0:1001:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:2340
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/30100" -f *+0:30100:TCP -n BLOCK -x2⤵PID:1776
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/1011" -f *+0:1011:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:1516
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/1001" -f *+0:1001:TCP -n BLOCK -x2⤵PID:2468
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/1170" -f *+0:1170:TCP -n BLOCK -x2⤵PID:1992
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/20000" -f *+0:20000:TCP -n BLOCK -x2⤵PID:2008
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/1234" -f *+0:1234:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:1828
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/65000" -f *+0:65000:TCP -n BLOCK -x2⤵PID:800
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/1245" -f *+0:1245:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:1288
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/7306" -f *+0:7306:TCP -n BLOCK -x2⤵PID:1940
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/1492" -f *+0:1492:TCP -n BLOCK -x2⤵PID:2964
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/1170" -f *+0:1170:TCP -n BLOCK -x2⤵PID:1952
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/1999" -f *+0:1999:TCP -n BLOCK -x2⤵PID:1592
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/30303" -f *+0:30303:TCP -n BLOCK -x2⤵PID:2244
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/2001" -f *+0:2001:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:2640
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/6969" -f *+0:6969:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:844
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/2023" -f *+0:2023:TCP -n BLOCK -x2⤵PID:548
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/61466" -f *+0:61466:TCP -n BLOCK -x2⤵PID:2556
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/2115" -f *+0:2115:TCP -n BLOCK -x2⤵PID:1912
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/12076" -f *+0:12076:TCP -n BLOCK -x2⤵PID:2484
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/2140" -f *+0:2140:TCP -n BLOCK -x2⤵PID:1548
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/4950" -f *+0:4950:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:1760
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/2140" -f *+0:2140:TCP -n BLOCK -x2⤵PID:1224
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/16969" -f *+0:16969:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:1720
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/2801" -f *+0:2801:TCP -n BLOCK -x2⤵PID:884
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/1245" -f *+0:1245:TCP -n BLOCK -x2⤵PID:572
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/30129" -f *+0:30129:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:2584
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/5742" -f *+0:5742:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:2304
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/3700" -f *+0:3700:TCP -n BLOCK -x2⤵PID:1560
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/2583" -f *+0:2583:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:1568
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/4092" -f *+0:4092:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:3056
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/1033" -f *+0:1033:TCP -n BLOCK -x2⤵PID:436
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/4590" -f *+0:4590:TCP -n BLOCK -x2⤵PID:2372
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/1981" -f *+0:1981:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:1496
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/5000" -f *+0:5000:TCP -n BLOCK -x2⤵PID:2812
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/555" -f *+0:555:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:2752
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/5001" -f *+0:5001:TCP -n BLOCK -x2⤵PID:2820
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/2023" -f *+0:2023:TCP -n BLOCK -x2⤵PID:2916
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/5321" -f *+0:5321:TCP -n BLOCK -x2⤵PID:2896
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/666" -f *+0:666:TCP -n BLOCK -x2⤵PID:2944
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/5400" -f *+0:5400:TCP -n BLOCK -x2⤵PID:2824
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/21554" -f *+0:21554:TCP -n BLOCK -x2⤵PID:2780
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/5401" -f *+0:5401:TCP -n BLOCK -x2⤵PID:2816
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/50766" -f *+0:50766:TCP -n BLOCK -x2⤵PID:2676
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/5402" -f *+0:5402:TCP -n BLOCK -x2⤵PID:2224
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/34324" -f *+0:34324:TCP -n BLOCK -x2⤵PID:2920
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/5569" -f *+0:5569:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:3012
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/30999" -f *+0:30999:TCP -n BLOCK -x2⤵PID:2696
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/6670" -f *+0:6670:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:3020
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/11000" -f *+0:11000:TCP -n BLOCK -x2⤵PID:2336
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/6771" -f *+0:6771:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:2836
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/23456" -f *+0:23456:TCP -n BLOCK -x2⤵PID:2564
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/6969" -f *+0:6969:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:2724
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/555" -f *+0:555:TCP -n BLOCK -x2⤵PID:2672
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/6969" -f *+0:6969:TCP -n BLOCK -x2⤵PID:2684
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/5400" -f *+0:5400:TCP -n BLOCK -x2⤵PID:2700
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/7000" -f *+0:7000:TCP -n BLOCK -x2⤵PID:2732
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/4950" -f *+0:4950:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:2744
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/7300" -f *+0:7300:TCP -n BLOCK -x2⤵PID:2256
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/9989" -f *+0:9989:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:2884
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/7301" -f *+0:7301:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:1304
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/9872" -f *+0:9872:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:2648
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/7306" -f *+0:7306:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:2984
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/11223" -f *+0:11223:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:1312
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/7307" -f *+0:7307:TCP -n BLOCK -x2⤵PID:2056
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/22222" -f *+0:22222:TCP -n BLOCK -x2⤵PID:2404
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/7308" -f *+0:7308:TCP -n BLOCK -x2⤵PID:1052
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/53001" -f *+0:53001:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:2288
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/7789" -f *+0:7789:TCP -n BLOCK -x2⤵PID:2532
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/5569" -f *+0:5569:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:564
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/9872" -f *+0:9872:TCP -n BLOCK -x2⤵PID:2616
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -x2⤵
- System Location Discovery: System Language Discovery
PID:1436
-
-
C:\Users\Admin\AppData\Local\Temp\gpupdate.exegpupdate2⤵PID:2988
-
-
C:\Windows\regedit.exeregedit /s C:\Users\Admin\AppData\Local\Temp\ipfilter.reg2⤵
- Runs .reg file with regedit
PID:2932
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
720B
MD52ec848b74381cf126093f24c07d38a12
SHA1714b70211dabef834fb9663ca9f25acb09b3370c
SHA256eea0d7b49bd2d82a47817ca7ddd4934d8d818f7cea06ba2833978b1ab58b835b
SHA51250a7d62330ff5edf43dbee44456311afb83dcf974e08c50f04a958f709936330b1f89f626ef03906542cc7d9acc3dc2d33fda84166cc30a3b3478b96b2803a2c