Analysis

  • max time kernel
    600s
  • max time network
    599s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    30-10-2024 13:59

General

  • Target

    New Client.exe

  • Size

    65KB

  • MD5

    1bcb0ce08d34ba620819df0268e04011

  • SHA1

    296765a47aa584a24bf66ddc9e67356e3203fac8

  • SHA256

    ba67f398fb2c5f91c1c227725fec68eba38a9f6c81a425450baf1b94037fe77e

  • SHA512

    f3409246d7cf16d9902d3420f6e5048e87859484e85a25eebc4559ddc6d26e9b40843b78b3a056c24e1bd9efc13d609f1a9ef37387789cb6994b84c7e4bd0145

  • SSDEEP

    1536:MKqK4Tm4BoN36t4QviFw1AjHkBnvAffLteF3nLrB9z3nIaF9bXS9vM:MKqK4C4BoN36t4QviFC8EBnYfWl9zYab

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Event Triggered Execution: AppInit DLLs 1 TTPs

    Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 64 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 47 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 11 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 64 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\New Client.exe
    "C:\Users\Admin\AppData\Local\Temp\New Client.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3544
    • C:\Users\Admin\AppData\Local\Temp\svhost.exe
      "C:\Users\Admin\AppData\Local\Temp\svhost.exe"
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4784
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f im Wireshark.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        PID:3288
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2880
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\Users\Admin\AppData\Local\Temp\svhost.exe
        3⤵
        • System Location Discovery: System Language Discovery
        PID:864
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f im Wireshark.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        PID:3248
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1048
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\Users\Admin\AppData\Local\Temp\svhost.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:3016
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f im Wireshark.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        PID:3000
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4876
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\Users\Admin\AppData\Local\Temp\svhost.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:2908
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f im Wireshark.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        PID:3636
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3272
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\Users\Admin\AppData\Local\Temp\svhost.exe
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4012
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Client.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Client.exe"
        3⤵
        • Modifies WinLogon for persistence
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1896
        • C:\Windows\SYSTEM32\CMD.exe
          "CMD" /C SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "Microsoft Publisher" /tr "C:\Program Files\discord.exe" & exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4700
          • C:\Windows\system32\schtasks.exe
            SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "Microsoft Publisher" /tr "C:\Program Files\discord.exe"
            5⤵
            • Scheduled Task/Job: Scheduled Task
            PID:1412
        • C:\Windows\SYSTEM32\CMD.exe
          "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST & exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2020
          • C:\Windows\system32\schtasks.exe
            SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST
            5⤵
            • Scheduled Task/Job: Scheduled Task
            PID:3744
        • C:\Windows\SYSTEM32\CMD.exe
          "CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST & exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:5000
          • C:\Windows\system32\schtasks.exe
            SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST
            5⤵
            • Scheduled Task/Job: Scheduled Task
            PID:1292
        • C:\Windows\SYSTEM32\CMD.exe
          "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST & exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2028
          • C:\Windows\system32\schtasks.exe
            SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST
            5⤵
            • Scheduled Task/Job: Scheduled Task
            PID:3836
        • C:\Windows\SYSTEM32\CMD.exe
          "CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST & exit
          4⤵
            PID:840
            • C:\Windows\system32\schtasks.exe
              SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST
              5⤵
              • Scheduled Task/Job: Scheduled Task
              PID:4948
          • C:\Windows\SYSTEM32\CMD.exe
            "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST & exit
            4⤵
              PID:2608
              • C:\Windows\system32\schtasks.exe
                SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST
                5⤵
                  PID:3800
              • C:\Windows\SYSTEM32\CMD.exe
                "CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST & exit
                4⤵
                  PID:1864
                  • C:\Windows\system32\schtasks.exe
                    SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST
                    5⤵
                      PID:1792
                  • C:\Windows\SYSTEM32\CMD.exe
                    "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST & exit
                    4⤵
                      PID:3664
                      • C:\Windows\system32\schtasks.exe
                        SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST
                        5⤵
                          PID:4532
                      • C:\Windows\SYSTEM32\CMD.exe
                        "CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST & exit
                        4⤵
                          PID:964
                          • C:\Windows\system32\schtasks.exe
                            SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST
                            5⤵
                              PID:1284
                          • C:\Windows\SYSTEM32\CMD.exe
                            "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST & exit
                            4⤵
                              PID:1136
                              • C:\Windows\system32\schtasks.exe
                                SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST
                                5⤵
                                • Scheduled Task/Job: Scheduled Task
                                PID:4668
                            • C:\Windows\SYSTEM32\CMD.exe
                              "CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST & exit
                              4⤵
                                PID:2920
                                • C:\Windows\system32\schtasks.exe
                                  SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST
                                  5⤵
                                    PID:2044
                                • C:\Windows\SYSTEM32\CMD.exe
                                  "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST & exit
                                  4⤵
                                    PID:3892
                                    • C:\Windows\system32\schtasks.exe
                                      SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST
                                      5⤵
                                        PID:4060
                                    • C:\Windows\SYSTEM32\CMD.exe
                                      "CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST & exit
                                      4⤵
                                        PID:4708
                                        • C:\Windows\system32\schtasks.exe
                                          SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST
                                          5⤵
                                            PID:2012
                                        • C:\Windows\SYSTEM32\CMD.exe
                                          "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST & exit
                                          4⤵
                                            PID:3232
                                            • C:\Windows\system32\schtasks.exe
                                              SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST
                                              5⤵
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:4048
                                          • C:\Windows\SYSTEM32\CMD.exe
                                            "CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST & exit
                                            4⤵
                                              PID:2300
                                              • C:\Windows\system32\schtasks.exe
                                                SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST
                                                5⤵
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:3696
                                            • C:\Windows\SYSTEM32\CMD.exe
                                              "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST & exit
                                              4⤵
                                                PID:556
                                                • C:\Windows\system32\schtasks.exe
                                                  SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST
                                                  5⤵
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:1288
                                              • C:\Windows\SYSTEM32\CMD.exe
                                                "CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST & exit
                                                4⤵
                                                  PID:1792
                                                  • C:\Windows\system32\schtasks.exe
                                                    SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST
                                                    5⤵
                                                      PID:644
                                                  • C:\Windows\SYSTEM32\CMD.exe
                                                    "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST & exit
                                                    4⤵
                                                      PID:4772
                                                      • C:\Windows\system32\schtasks.exe
                                                        SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST
                                                        5⤵
                                                          PID:572
                                                      • C:\Windows\SYSTEM32\CMD.exe
                                                        "CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST & exit
                                                        4⤵
                                                          PID:2124
                                                          • C:\Windows\system32\schtasks.exe
                                                            SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST
                                                            5⤵
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:660
                                                        • C:\Windows\SYSTEM32\CMD.exe
                                                          "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST & exit
                                                          4⤵
                                                            PID:2404
                                                            • C:\Windows\system32\schtasks.exe
                                                              SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST
                                                              5⤵
                                                              • Scheduled Task/Job: Scheduled Task
                                                              PID:5116
                                                          • C:\Windows\SYSTEM32\CMD.exe
                                                            "CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST & exit
                                                            4⤵
                                                              PID:1072
                                                              • C:\Windows\system32\schtasks.exe
                                                                SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST
                                                                5⤵
                                                                  PID:2920
                                                              • C:\Windows\SYSTEM32\CMD.exe
                                                                "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST & exit
                                                                4⤵
                                                                  PID:3152
                                                                  • C:\Windows\system32\schtasks.exe
                                                                    SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST
                                                                    5⤵
                                                                    • Scheduled Task/Job: Scheduled Task
                                                                    PID:896
                                                                • C:\Windows\SYSTEM32\CMD.exe
                                                                  "CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST & exit
                                                                  4⤵
                                                                    PID:4628
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST
                                                                      5⤵
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:4388
                                                                  • C:\Windows\SYSTEM32\CMD.exe
                                                                    "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST & exit
                                                                    4⤵
                                                                      PID:4504
                                                                      • C:\Windows\system32\schtasks.exe
                                                                        SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST
                                                                        5⤵
                                                                          PID:3736
                                                                      • C:\Windows\SYSTEM32\CMD.exe
                                                                        "CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST & exit
                                                                        4⤵
                                                                          PID:1904
                                                                          • C:\Windows\system32\schtasks.exe
                                                                            SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST
                                                                            5⤵
                                                                              PID:5008
                                                                          • C:\Windows\SYSTEM32\CMD.exe
                                                                            "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST & exit
                                                                            4⤵
                                                                              PID:4064
                                                                              • C:\Windows\system32\schtasks.exe
                                                                                SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST
                                                                                5⤵
                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                PID:3796
                                                                            • C:\Windows\SYSTEM32\CMD.exe
                                                                              "CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST & exit
                                                                              4⤵
                                                                                PID:1240
                                                                                • C:\Windows\system32\schtasks.exe
                                                                                  SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST
                                                                                  5⤵
                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                  PID:3616
                                                                              • C:\Windows\SYSTEM32\CMD.exe
                                                                                "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST & exit
                                                                                4⤵
                                                                                  PID:556
                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                    SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST
                                                                                    5⤵
                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                    PID:3568
                                                                                • C:\Windows\SYSTEM32\CMD.exe
                                                                                  "CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST & exit
                                                                                  4⤵
                                                                                    PID:4280
                                                                                    • C:\Windows\system32\schtasks.exe
                                                                                      SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST
                                                                                      5⤵
                                                                                        PID:4936
                                                                                    • C:\Windows\SYSTEM32\CMD.exe
                                                                                      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST & exit
                                                                                      4⤵
                                                                                        PID:1916
                                                                                        • C:\Windows\system32\schtasks.exe
                                                                                          SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST
                                                                                          5⤵
                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                          PID:3964
                                                                                      • C:\Windows\SYSTEM32\CMD.exe
                                                                                        "CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST & exit
                                                                                        4⤵
                                                                                          PID:572
                                                                                          • C:\Windows\system32\schtasks.exe
                                                                                            SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST
                                                                                            5⤵
                                                                                            • Scheduled Task/Job: Scheduled Task
                                                                                            PID:4532
                                                                                        • C:\Windows\SYSTEM32\CMD.exe
                                                                                          "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST & exit
                                                                                          4⤵
                                                                                            PID:3732
                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                              SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST
                                                                                              5⤵
                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                              PID:3768
                                                                                          • C:\Windows\SYSTEM32\CMD.exe
                                                                                            "CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST & exit
                                                                                            4⤵
                                                                                              PID:1136
                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST
                                                                                                5⤵
                                                                                                  PID:4192
                                                                                              • C:\Windows\SYSTEM32\CMD.exe
                                                                                                "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST & exit
                                                                                                4⤵
                                                                                                  PID:1980
                                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                                    SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST
                                                                                                    5⤵
                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                    PID:1880
                                                                                                • C:\Windows\SYSTEM32\CMD.exe
                                                                                                  "CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST & exit
                                                                                                  4⤵
                                                                                                    PID:3892
                                                                                                    • C:\Windows\system32\schtasks.exe
                                                                                                      SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST
                                                                                                      5⤵
                                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                                      PID:2272
                                                                                                  • C:\Windows\SYSTEM32\CMD.exe
                                                                                                    "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST & exit
                                                                                                    4⤵
                                                                                                      PID:2340
                                                                                                      • C:\Windows\system32\schtasks.exe
                                                                                                        SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST
                                                                                                        5⤵
                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                        PID:2156
                                                                                                    • C:\Windows\SYSTEM32\CMD.exe
                                                                                                      "CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST & exit
                                                                                                      4⤵
                                                                                                        PID:1428
                                                                                                        • C:\Windows\system32\schtasks.exe
                                                                                                          SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST
                                                                                                          5⤵
                                                                                                            PID:924
                                                                                                        • C:\Windows\SYSTEM32\CMD.exe
                                                                                                          "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST & exit
                                                                                                          4⤵
                                                                                                            PID:1400
                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                              SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST
                                                                                                              5⤵
                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                              PID:4500
                                                                                                          • C:\Windows\SYSTEM32\CMD.exe
                                                                                                            "CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST & exit
                                                                                                            4⤵
                                                                                                              PID:3156
                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST
                                                                                                                5⤵
                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                PID:2608
                                                                                                            • C:\Windows\SYSTEM32\CMD.exe
                                                                                                              "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST & exit
                                                                                                              4⤵
                                                                                                                PID:2628
                                                                                                                • C:\Windows\system32\schtasks.exe
                                                                                                                  SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST
                                                                                                                  5⤵
                                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                                  PID:3360
                                                                                                              • C:\Windows\SYSTEM32\CMD.exe
                                                                                                                "CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST & exit
                                                                                                                4⤵
                                                                                                                  PID:1716
                                                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                                                    SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST
                                                                                                                    5⤵
                                                                                                                      PID:760
                                                                                                                  • C:\Windows\SYSTEM32\CMD.exe
                                                                                                                    "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST & exit
                                                                                                                    4⤵
                                                                                                                      PID:4532
                                                                                                                      • C:\Windows\system32\schtasks.exe
                                                                                                                        SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST
                                                                                                                        5⤵
                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                        PID:3592
                                                                                                                    • C:\Windows\SYSTEM32\CMD.exe
                                                                                                                      "CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST & exit
                                                                                                                      4⤵
                                                                                                                        PID:524
                                                                                                                        • C:\Windows\system32\schtasks.exe
                                                                                                                          SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST
                                                                                                                          5⤵
                                                                                                                            PID:1104
                                                                                                                        • C:\Windows\SYSTEM32\CMD.exe
                                                                                                                          "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST & exit
                                                                                                                          4⤵
                                                                                                                            PID:2388
                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                              SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST
                                                                                                                              5⤵
                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                              PID:1980
                                                                                                                          • C:\Windows\SYSTEM32\CMD.exe
                                                                                                                            "CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST & exit
                                                                                                                            4⤵
                                                                                                                              PID:3840
                                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                                SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST
                                                                                                                                5⤵
                                                                                                                                  PID:1860
                                                                                                                              • C:\Windows\SYSTEM32\CMD.exe
                                                                                                                                "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST & exit
                                                                                                                                4⤵
                                                                                                                                  PID:3356
                                                                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                                                                    SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST
                                                                                                                                    5⤵
                                                                                                                                      PID:3420
                                                                                                                                  • C:\Windows\SYSTEM32\CMD.exe
                                                                                                                                    "CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST & exit
                                                                                                                                    4⤵
                                                                                                                                      PID:4440
                                                                                                                                      • C:\Windows\system32\schtasks.exe
                                                                                                                                        SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST
                                                                                                                                        5⤵
                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                        PID:1904
                                                                                                                                    • C:\Windows\SYSTEM32\CMD.exe
                                                                                                                                      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST & exit
                                                                                                                                      4⤵
                                                                                                                                        PID:1740
                                                                                                                                        • C:\Windows\system32\schtasks.exe
                                                                                                                                          SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST
                                                                                                                                          5⤵
                                                                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                                                                          PID:4960
                                                                                                                                      • C:\Windows\SYSTEM32\CMD.exe
                                                                                                                                        "CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST & exit
                                                                                                                                        4⤵
                                                                                                                                          PID:3796
                                                                                                                                          • C:\Windows\system32\schtasks.exe
                                                                                                                                            SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST
                                                                                                                                            5⤵
                                                                                                                                            • Scheduled Task/Job: Scheduled Task
                                                                                                                                            PID:2740
                                                                                                                                        • C:\Windows\SYSTEM32\CMD.exe
                                                                                                                                          "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST & exit
                                                                                                                                          4⤵
                                                                                                                                            PID:5088
                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                              SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST
                                                                                                                                              5⤵
                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                              PID:892
                                                                                                                                          • C:\Windows\SYSTEM32\CMD.exe
                                                                                                                                            "CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST & exit
                                                                                                                                            4⤵
                                                                                                                                              PID:1864
                                                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                                                SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST
                                                                                                                                                5⤵
                                                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                                                PID:4680
                                                                                                                                            • C:\Windows\SYSTEM32\CMD.exe
                                                                                                                                              "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST & exit
                                                                                                                                              4⤵
                                                                                                                                                PID:3652
                                                                                                                                                • C:\Windows\system32\schtasks.exe
                                                                                                                                                  SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST
                                                                                                                                                  5⤵
                                                                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                                                                  PID:3992
                                                                                                                                              • C:\Windows\SYSTEM32\CMD.exe
                                                                                                                                                "CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST & exit
                                                                                                                                                4⤵
                                                                                                                                                  PID:1460
                                                                                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                                                                                    SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST
                                                                                                                                                    5⤵
                                                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                                                    PID:1716
                                                                                                                                                • C:\Windows\SYSTEM32\CMD.exe
                                                                                                                                                  "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST & exit
                                                                                                                                                  4⤵
                                                                                                                                                    PID:4544
                                                                                                                                                    • C:\Windows\system32\schtasks.exe
                                                                                                                                                      SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST
                                                                                                                                                      5⤵
                                                                                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                                                                                      PID:572
                                                                                                                                                  • C:\Windows\SYSTEM32\CMD.exe
                                                                                                                                                    "CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST & exit
                                                                                                                                                    4⤵
                                                                                                                                                      PID:1576
                                                                                                                                                      • C:\Windows\system32\schtasks.exe
                                                                                                                                                        SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST
                                                                                                                                                        5⤵
                                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                                        PID:1104
                                                                                                                                                    • C:\Windows\SYSTEM32\CMD.exe
                                                                                                                                                      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST & exit
                                                                                                                                                      4⤵
                                                                                                                                                        PID:772
                                                                                                                                                        • C:\Windows\system32\schtasks.exe
                                                                                                                                                          SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST
                                                                                                                                                          5⤵
                                                                                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                                                                                          PID:4920
                                                                                                                                                      • C:\Windows\SYSTEM32\CMD.exe
                                                                                                                                                        "CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST & exit
                                                                                                                                                        4⤵
                                                                                                                                                          PID:4068
                                                                                                                                                          • C:\Windows\system32\schtasks.exe
                                                                                                                                                            SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST
                                                                                                                                                            5⤵
                                                                                                                                                            • Scheduled Task/Job: Scheduled Task
                                                                                                                                                            PID:3980
                                                                                                                                                        • C:\Windows\SYSTEM32\CMD.exe
                                                                                                                                                          "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST & exit
                                                                                                                                                          4⤵
                                                                                                                                                            PID:2892
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST
                                                                                                                                                              5⤵
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:1040
                                                                                                                                                          • C:\Windows\SYSTEM32\CMD.exe
                                                                                                                                                            "CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST & exit
                                                                                                                                                            4⤵
                                                                                                                                                              PID:2452
                                                                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                                                                SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST
                                                                                                                                                                5⤵
                                                                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                PID:2020
                                                                                                                                                            • C:\Windows\SYSTEM32\CMD.exe
                                                                                                                                                              "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST & exit
                                                                                                                                                              4⤵
                                                                                                                                                                PID:3420
                                                                                                                                                                • C:\Windows\system32\schtasks.exe
                                                                                                                                                                  SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST
                                                                                                                                                                  5⤵
                                                                                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                  PID:4948
                                                                                                                                                              • C:\Windows\SYSTEM32\CMD.exe
                                                                                                                                                                "CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST & exit
                                                                                                                                                                4⤵
                                                                                                                                                                  PID:2788
                                                                                                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                                                                                                    SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST
                                                                                                                                                                    5⤵
                                                                                                                                                                      PID:2612
                                                                                                                                                                  • C:\Windows\SYSTEM32\CMD.exe
                                                                                                                                                                    "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST & exit
                                                                                                                                                                    4⤵
                                                                                                                                                                      PID:2684
                                                                                                                                                                      • C:\Windows\system32\schtasks.exe
                                                                                                                                                                        SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST
                                                                                                                                                                        5⤵
                                                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                        PID:1740
                                                                                                                                                                    • C:\Windows\SYSTEM32\CMD.exe
                                                                                                                                                                      "CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST & exit
                                                                                                                                                                      4⤵
                                                                                                                                                                        PID:3024
                                                                                                                                                                        • C:\Windows\system32\schtasks.exe
                                                                                                                                                                          SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST
                                                                                                                                                                          5⤵
                                                                                                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                          PID:1400
                                                                                                                                                                      • C:\Windows\SYSTEM32\CMD.exe
                                                                                                                                                                        "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST & exit
                                                                                                                                                                        4⤵
                                                                                                                                                                          PID:4424
                                                                                                                                                                          • C:\Windows\system32\schtasks.exe
                                                                                                                                                                            SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST
                                                                                                                                                                            5⤵
                                                                                                                                                                              PID:4036
                                                                                                                                                                          • C:\Windows\SYSTEM32\CMD.exe
                                                                                                                                                                            "CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST & exit
                                                                                                                                                                            4⤵
                                                                                                                                                                              PID:1092
                                                                                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST
                                                                                                                                                                                5⤵
                                                                                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                PID:640
                                                                                                                                                                            • C:\Windows\SYSTEM32\CMD.exe
                                                                                                                                                                              "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST & exit
                                                                                                                                                                              4⤵
                                                                                                                                                                                PID:4100
                                                                                                                                                                                • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                  SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST
                                                                                                                                                                                  5⤵
                                                                                                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                  PID:2108
                                                                                                                                                                              • C:\Windows\SYSTEM32\CMD.exe
                                                                                                                                                                                "CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST & exit
                                                                                                                                                                                4⤵
                                                                                                                                                                                  PID:2536
                                                                                                                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                    SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST
                                                                                                                                                                                    5⤵
                                                                                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                    PID:2316
                                                                                                                                                                                • C:\Windows\SYSTEM32\CMD.exe
                                                                                                                                                                                  "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST & exit
                                                                                                                                                                                  4⤵
                                                                                                                                                                                    PID:572
                                                                                                                                                                                    • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                      SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST
                                                                                                                                                                                      5⤵
                                                                                                                                                                                        PID:1576
                                                                                                                                                                                    • C:\Windows\SYSTEM32\CMD.exe
                                                                                                                                                                                      "CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST & exit
                                                                                                                                                                                      4⤵
                                                                                                                                                                                        PID:1536
                                                                                                                                                                                        • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                          SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST
                                                                                                                                                                                          5⤵
                                                                                                                                                                                            PID:968
                                                                                                                                                                                        • C:\Windows\SYSTEM32\CMD.exe
                                                                                                                                                                                          "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST & exit
                                                                                                                                                                                          4⤵
                                                                                                                                                                                            PID:2088
                                                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                              SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST
                                                                                                                                                                                              5⤵
                                                                                                                                                                                                PID:3744
                                                                                                                                                                                            • C:\Windows\SYSTEM32\CMD.exe
                                                                                                                                                                                              "CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST & exit
                                                                                                                                                                                              4⤵
                                                                                                                                                                                                PID:4068
                                                                                                                                                                                                • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                  SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST
                                                                                                                                                                                                  5⤵
                                                                                                                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                  PID:3044
                                                                                                                                                                                              • C:\Windows\SYSTEM32\CMD.exe
                                                                                                                                                                                                "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST & exit
                                                                                                                                                                                                4⤵
                                                                                                                                                                                                  PID:2272
                                                                                                                                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                    SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST
                                                                                                                                                                                                    5⤵
                                                                                                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                    PID:2892
                                                                                                                                                                                                • C:\Windows\SYSTEM32\CMD.exe
                                                                                                                                                                                                  "CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST & exit
                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                    PID:2020
                                                                                                                                                                                                    • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                      SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST
                                                                                                                                                                                                      5⤵
                                                                                                                                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                      PID:2956
                                                                                                                                                                                                  • C:\Windows\SYSTEM32\CMD.exe
                                                                                                                                                                                                    "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST & exit
                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                      PID:4856
                                                                                                                                                                                                      • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                        SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST
                                                                                                                                                                                                        5⤵
                                                                                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                        PID:4504
                                                                                                                                                                                                    • C:\Windows\SYSTEM32\CMD.exe
                                                                                                                                                                                                      "CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST & exit
                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                        PID:5068
                                                                                                                                                                                                        • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                          SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST
                                                                                                                                                                                                          5⤵
                                                                                                                                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                          PID:2504
                                                                                                                                                                                                      • C:\Windows\SYSTEM32\CMD.exe
                                                                                                                                                                                                        "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST & exit
                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                          PID:2740
                                                                                                                                                                                                          • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                            SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST
                                                                                                                                                                                                            5⤵
                                                                                                                                                                                                            • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                            PID:1532
                                                                                                                                                                                                        • C:\Windows\SYSTEM32\CMD.exe
                                                                                                                                                                                                          "CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST & exit
                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                            PID:1204
                                                                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                              SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST
                                                                                                                                                                                                              5⤵
                                                                                                                                                                                                                PID:4724
                                                                                                                                                                                                            • C:\Windows\SYSTEM32\CMD.exe
                                                                                                                                                                                                              "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST & exit
                                                                                                                                                                                                              4⤵
                                                                                                                                                                                                                PID:644
                                                                                                                                                                                                                • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                                  SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST
                                                                                                                                                                                                                  5⤵
                                                                                                                                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                  PID:640
                                                                                                                                                                                                              • C:\Windows\SYSTEM32\CMD.exe
                                                                                                                                                                                                                "CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST & exit
                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                  PID:556
                                                                                                                                                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                                    SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST
                                                                                                                                                                                                                    5⤵
                                                                                                                                                                                                                      PID:4272
                                                                                                                                                                                                                  • C:\Windows\SYSTEM32\CMD.exe
                                                                                                                                                                                                                    "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST & exit
                                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                                      PID:3652
                                                                                                                                                                                                                      • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                                        SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST
                                                                                                                                                                                                                        5⤵
                                                                                                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                        PID:760
                                                                                                                                                                                                                    • C:\Windows\SYSTEM32\CMD.exe
                                                                                                                                                                                                                      "CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST & exit
                                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                                        PID:964
                                                                                                                                                                                                                        • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                                          SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST
                                                                                                                                                                                                                          5⤵
                                                                                                                                                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                          PID:3544
                                                                                                                                                                                                                      • C:\Windows\SYSTEM32\CMD.exe
                                                                                                                                                                                                                        "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST & exit
                                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                                          PID:3820
                                                                                                                                                                                                                          • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                                            SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST
                                                                                                                                                                                                                            5⤵
                                                                                                                                                                                                                              PID:3380
                                                                                                                                                                                                                          • C:\Windows\SYSTEM32\CMD.exe
                                                                                                                                                                                                                            "CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST & exit
                                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                                              PID:3624
                                                                                                                                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                                                SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST
                                                                                                                                                                                                                                5⤵
                                                                                                                                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                                PID:3028
                                                                                                                                                                                                                            • C:\Windows\SYSTEM32\CMD.exe
                                                                                                                                                                                                                              "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST & exit
                                                                                                                                                                                                                              4⤵
                                                                                                                                                                                                                                PID:3612
                                                                                                                                                                                                                                • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                                                  SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST
                                                                                                                                                                                                                                  5⤵
                                                                                                                                                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                                  PID:2100
                                                                                                                                                                                                                              • C:\Windows\SYSTEM32\CMD.exe
                                                                                                                                                                                                                                "CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST & exit
                                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                                  PID:1240
                                                                                                                                                                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                                                    SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST
                                                                                                                                                                                                                                    5⤵
                                                                                                                                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                                    PID:2008
                                                                                                                                                                                                                                • C:\Windows\SYSTEM32\CMD.exe
                                                                                                                                                                                                                                  "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST & exit
                                                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                                                    PID:1860
                                                                                                                                                                                                                                    • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                                                      SchTaSKs /create /f /sc minute /mo -1 /tn "Windows Update" /tr "C:\Program Files\discord.exe" /RL HIGHEST
                                                                                                                                                                                                                                      5⤵
                                                                                                                                                                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                                      PID:4236
                                                                                                                                                                                                                                  • C:\Windows\SYSTEM32\CMD.exe
                                                                                                                                                                                                                                    "CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST & exit
                                                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                                                      PID:940
                                                                                                                                                                                                                                      • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                                                        SchTaSKs /create /f /sc minute /mo 5 /tn "Windows Update " /tr "C:\Users\Admin\Documents\SU.exe" /RL HIGHEST
                                                                                                                                                                                                                                        5⤵
                                                                                                                                                                                                                                          PID:4932
                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                                                      taskkill /f im Wireshark.exe
                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                      • Kills process with taskkill
                                                                                                                                                                                                                                      PID:4964
                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                      schtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f
                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                      PID:5024
                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                      schtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\Users\Admin\AppData\Local\Temp\svhost.exe
                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                                      PID:1440
                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                                                      taskkill /f im Wireshark.exe
                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                      • Kills process with taskkill
                                                                                                                                                                                                                                      PID:3116
                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                      schtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f
                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                      PID:1736
                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                      schtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\Users\Admin\AppData\Local\Temp\svhost.exe
                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                      PID:4860
                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                                                      taskkill /f im Wireshark.exe
                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                      • Kills process with taskkill
                                                                                                                                                                                                                                      PID:1032
                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                      schtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f
                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                      PID:4676
                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                      schtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\Users\Admin\AppData\Local\Temp\svhost.exe
                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                      PID:2188
                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                                                      taskkill /f im Wireshark.exe
                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                      • Kills process with taskkill
                                                                                                                                                                                                                                      PID:4024
                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                      schtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f
                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                      PID:3824
                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                      schtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\Users\Admin\AppData\Local\Temp\svhost.exe
                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                                      PID:3784
                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                                                      taskkill /f im Wireshark.exe
                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                      • Kills process with taskkill
                                                                                                                                                                                                                                      PID:1264
                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                      schtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f
                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                      PID:2492
                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                      schtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\Users\Admin\AppData\Local\Temp\svhost.exe
                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                                      PID:1456
                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                                                      taskkill /f im Wireshark.exe
                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                      • Kills process with taskkill
                                                                                                                                                                                                                                      PID:2708
                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                      schtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f
                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                      PID:1288
                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                      schtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\Users\Admin\AppData\Local\Temp\svhost.exe
                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                      PID:2076
                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                                                      taskkill /f im Wireshark.exe
                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                      • Kills process with taskkill
                                                                                                                                                                                                                                      PID:2356
                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                      schtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f
                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                      PID:1612
                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                      schtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\Users\Admin\AppData\Local\Temp\svhost.exe
                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                      PID:1976
                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                    "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 5 & Del "C:\Users\Admin\AppData\Local\Temp\New Client.exe"
                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                    • Suspicious use of WriteProcessMemory
                                                                                                                                                                                                                                    PID:4144
                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\choice.exe
                                                                                                                                                                                                                                      choice /C Y /N /D Y /T 5
                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                      PID:3592
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\svhost.exe
                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\svhost.exe"
                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                  PID:3156
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\svhost.exe
                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\svhost.exe"
                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                  PID:1016
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\svhost.exe
                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\svhost.exe"
                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                  PID:4608
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\svhost.exe
                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\svhost.exe"
                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                  PID:1224
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\svhost.exe
                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\svhost.exe"
                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                  PID:3160
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\svhost.exe
                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\svhost.exe"
                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                  PID:3568
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\svhost.exe
                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\svhost.exe"
                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                  PID:1420
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\svhost.exe
                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\svhost.exe"
                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                  PID:572
                                                                                                                                                                                                                                • C:\Windows\system32\wbem\WmiApSrv.exe
                                                                                                                                                                                                                                  C:\Windows\system32\wbem\WmiApSrv.exe
                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                  • Loads dropped DLL
                                                                                                                                                                                                                                  PID:888
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\svhost.exe
                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\svhost.exe"
                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                  PID:4356
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\svhost.exe
                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\svhost.exe"
                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                  PID:4180

                                                                                                                                                                                                                                Network

                                                                                                                                                                                                                                MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                                Replay Monitor

                                                                                                                                                                                                                                Loading Replay Monitor...

                                                                                                                                                                                                                                Downloads

                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\svhost.exe.log

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  319B

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  cdab7719c71b2844a3e7ff9e41894b8a

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  8e6e0e55695e468eb3c237f21340c9d30cab922c

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  e84a57ed5465aaca393476f6271a2413dddad154cbae40827c4639bfc0b3e3eb

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  ec92e8fc3ce02336eea401f9db823ac0a2ad87bb41130f493e72f3c5ca100a461d6296a710afcc93e1fe1fc8630c5e0029e17f58583520077a3c80ad794d9dc9

                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\svhost.exe

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  65KB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  1bcb0ce08d34ba620819df0268e04011

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  296765a47aa584a24bf66ddc9e67356e3203fac8

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  ba67f398fb2c5f91c1c227725fec68eba38a9f6c81a425450baf1b94037fe77e

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  f3409246d7cf16d9902d3420f6e5048e87859484e85a25eebc4559ddc6d26e9b40843b78b3a056c24e1bd9efc13d609f1a9ef37387789cb6994b84c7e4bd0145

                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Client.exe

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  558KB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  64d37a6853cdcff6a20e6dca51d7e1bd

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  d04853d30c2e34a984ded4d86262279e09f461a0

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  12958a9be57b2152337892bdfbd8ff878eb02e235f492de5237e0ffc359ff38a

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  b73c5350ea3036ee322d055da68e923eeb248cb8e7b1a6744be16ebafc86a0e3d3a53a45047d3cc01ba458084b24c2c70b33d0d7bb3de4cb5c23648b151c3f6b

                                                                                                                                                                                                                                • C:\Windows\xdwd.dll

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  136KB

                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                  16e5a492c9c6ae34c59683be9c51fa31

                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                  97031b41f5c56f371c28ae0d62a2df7d585adaba

                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                  35c8d022e1d917f1aabdceae98097ccc072161b302f84c768ca63e4b32ac2b66

                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                  20fd369172ef5e3e2fde388666b42e8fe5f0c2bfa338c0345f45e98af6561a249ba3ecc48c3f16efcc73f02ecb67b3ddb1e2e8f0e77d18fa00ac34e6379e50b6

                                                                                                                                                                                                                                • memory/1896-326-0x000000001C170000-0x000000001C317000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  1.7MB

                                                                                                                                                                                                                                • memory/1896-686-0x000000001C170000-0x000000001C317000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  1.7MB

                                                                                                                                                                                                                                • memory/1896-1186-0x000000001C170000-0x000000001C317000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  1.7MB

                                                                                                                                                                                                                                • memory/1896-1107-0x000000001C170000-0x000000001C317000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  1.7MB

                                                                                                                                                                                                                                • memory/1896-1028-0x000000001C170000-0x000000001C317000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  1.7MB

                                                                                                                                                                                                                                • memory/1896-949-0x000000001C170000-0x000000001C317000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  1.7MB

                                                                                                                                                                                                                                • memory/1896-844-0x000000001C170000-0x000000001C317000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  1.7MB

                                                                                                                                                                                                                                • memory/1896-765-0x000000001C170000-0x000000001C317000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  1.7MB

                                                                                                                                                                                                                                • memory/1896-607-0x000000001C170000-0x000000001C317000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  1.7MB

                                                                                                                                                                                                                                • memory/1896-325-0x000000001BFB0000-0x000000001BFCE000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  120KB

                                                                                                                                                                                                                                • memory/1896-47-0x0000000000B40000-0x0000000000BD2000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  584KB

                                                                                                                                                                                                                                • memory/1896-324-0x0000000002D50000-0x0000000002D5C000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  48KB

                                                                                                                                                                                                                                • memory/1896-141-0x000000001C170000-0x000000001C317000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  1.7MB

                                                                                                                                                                                                                                • memory/1896-235-0x000000001C170000-0x000000001C317000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  1.7MB

                                                                                                                                                                                                                                • memory/1896-323-0x000000001CC70000-0x000000001CCE6000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  472KB

                                                                                                                                                                                                                                • memory/3544-1-0x0000000074CF0000-0x00000000752A1000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  5.7MB

                                                                                                                                                                                                                                • memory/3544-2-0x0000000074CF0000-0x00000000752A1000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  5.7MB

                                                                                                                                                                                                                                • memory/3544-0-0x0000000074CF2000-0x0000000074CF3000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  4KB

                                                                                                                                                                                                                                • memory/3544-16-0x0000000074CF2000-0x0000000074CF3000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  4KB

                                                                                                                                                                                                                                • memory/3544-20-0x0000000074CF0000-0x00000000752A1000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  5.7MB

                                                                                                                                                                                                                                • memory/3544-18-0x0000000074CF0000-0x00000000752A1000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  5.7MB

                                                                                                                                                                                                                                • memory/4784-14-0x0000000074CF0000-0x00000000752A1000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  5.7MB

                                                                                                                                                                                                                                • memory/4784-22-0x0000000074CF0000-0x00000000752A1000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  5.7MB

                                                                                                                                                                                                                                • memory/4784-21-0x0000000074CF0000-0x00000000752A1000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  5.7MB

                                                                                                                                                                                                                                • memory/4784-15-0x0000000074CF0000-0x00000000752A1000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  5.7MB

                                                                                                                                                                                                                                • memory/4784-17-0x0000000074CF0000-0x00000000752A1000-memory.dmp

                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                  5.7MB