Analysis
-
max time kernel
930s -
max time network
912s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
04-11-2024 18:21
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Client-built.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Client-built.exe
Resource
win10ltsc2021-20241023-en
General
-
Target
Client-built.exe
-
Size
3.1MB
-
MD5
52b81162360c34724757c2075a60e5af
-
SHA1
3fceb5947678c56b962a63853d20749f274b6db0
-
SHA256
a3ef678bd307c07f299a4b4c96d414ddba54e3f00e7e81a5ed5bc949cd65e682
-
SHA512
ea3e4b4218f5cca06102c97d85306fbd7f1697efd1546ecb3a9cf5f66a68c6354b176545c059aa78757bd7a2f9abbed2c16a16a2d1fbcee1506c9b21400c1f47
-
SSDEEP
49152:uv2I22SsaNYfdPBldt698dBcjHUiO10mzfioGdKiTHHB72eh2NT:uvb22SsaNYfdPBldt6+dBcjHbO1g
Malware Config
Extracted
quasar
1.4.1
Office04
Inversin-43597.portmap.host:43597
80329fd2-f063-4b06-9c7e-8dbc6278c2a3
-
encryption_key
744EA1A385FEBC6DA96387411B7000D77E66B075
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
java updater
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 52 IoCs
resource yara_rule behavioral1/memory/2172-1-0x0000000001020000-0x0000000001344000-memory.dmp family_quasar behavioral1/files/0x0014000000016fc9-5.dat family_quasar behavioral1/memory/3008-8-0x0000000001160000-0x0000000001484000-memory.dmp family_quasar behavioral1/memory/2248-22-0x0000000000230000-0x0000000000554000-memory.dmp family_quasar behavioral1/memory/3036-34-0x00000000009A0000-0x0000000000CC4000-memory.dmp family_quasar behavioral1/memory/824-57-0x0000000000A40000-0x0000000000D64000-memory.dmp family_quasar behavioral1/memory/1008-68-0x00000000002F0000-0x0000000000614000-memory.dmp family_quasar behavioral1/memory/2660-79-0x0000000000110000-0x0000000000434000-memory.dmp family_quasar behavioral1/memory/2744-92-0x0000000000340000-0x0000000000664000-memory.dmp family_quasar behavioral1/memory/1736-103-0x00000000000B0000-0x00000000003D4000-memory.dmp family_quasar behavioral1/memory/1792-115-0x00000000013C0000-0x00000000016E4000-memory.dmp family_quasar behavioral1/memory/2604-126-0x0000000000290000-0x00000000005B4000-memory.dmp family_quasar behavioral1/memory/2012-147-0x0000000000140000-0x0000000000464000-memory.dmp family_quasar behavioral1/memory/2296-158-0x0000000001360000-0x0000000001684000-memory.dmp family_quasar behavioral1/memory/2244-200-0x00000000001B0000-0x00000000004D4000-memory.dmp family_quasar behavioral1/memory/1916-210-0x0000000000FD0000-0x00000000012F4000-memory.dmp family_quasar behavioral1/memory/2260-219-0x00000000010B0000-0x00000000013D4000-memory.dmp family_quasar behavioral1/memory/2420-228-0x0000000000150000-0x0000000000474000-memory.dmp family_quasar behavioral1/memory/3004-237-0x00000000011D0000-0x00000000014F4000-memory.dmp family_quasar behavioral1/memory/2044-270-0x00000000002C0000-0x00000000005E4000-memory.dmp family_quasar behavioral1/memory/2984-279-0x00000000002A0000-0x00000000005C4000-memory.dmp family_quasar behavioral1/memory/568-288-0x00000000008B0000-0x0000000000BD4000-memory.dmp family_quasar behavioral1/memory/2816-297-0x00000000001C0000-0x00000000004E4000-memory.dmp family_quasar behavioral1/memory/1676-306-0x0000000000FB0000-0x00000000012D4000-memory.dmp family_quasar behavioral1/memory/1712-315-0x00000000013A0000-0x00000000016C4000-memory.dmp family_quasar behavioral1/memory/2596-364-0x0000000000A70000-0x0000000000D94000-memory.dmp family_quasar behavioral1/memory/1784-373-0x0000000000BE0000-0x0000000000F04000-memory.dmp family_quasar behavioral1/memory/2940-398-0x0000000001210000-0x0000000001534000-memory.dmp family_quasar behavioral1/memory/1748-447-0x0000000001350000-0x0000000001674000-memory.dmp family_quasar behavioral1/memory/1956-464-0x00000000000C0000-0x00000000003E4000-memory.dmp family_quasar behavioral1/memory/1288-473-0x00000000001D0000-0x00000000004F4000-memory.dmp family_quasar behavioral1/memory/2804-482-0x0000000000F20000-0x0000000001244000-memory.dmp family_quasar behavioral1/memory/1188-491-0x0000000000160000-0x0000000000484000-memory.dmp family_quasar behavioral1/memory/1028-500-0x0000000000BB0000-0x0000000000ED4000-memory.dmp family_quasar behavioral1/memory/2224-509-0x00000000002B0000-0x00000000005D4000-memory.dmp family_quasar behavioral1/memory/956-518-0x0000000001240000-0x0000000001564000-memory.dmp family_quasar behavioral1/memory/1972-527-0x00000000003D0000-0x00000000006F4000-memory.dmp family_quasar behavioral1/memory/2536-536-0x00000000012C0000-0x00000000015E4000-memory.dmp family_quasar behavioral1/memory/2168-553-0x0000000000070000-0x0000000000394000-memory.dmp family_quasar behavioral1/memory/632-562-0x0000000000EA0000-0x00000000011C4000-memory.dmp family_quasar behavioral1/memory/3020-579-0x0000000000ED0000-0x00000000011F4000-memory.dmp family_quasar behavioral1/memory/764-604-0x0000000001320000-0x0000000001644000-memory.dmp family_quasar behavioral1/memory/1512-613-0x0000000000170000-0x0000000000494000-memory.dmp family_quasar behavioral1/memory/2640-622-0x0000000000D20000-0x0000000001044000-memory.dmp family_quasar behavioral1/memory/2728-631-0x00000000000A0000-0x00000000003C4000-memory.dmp family_quasar behavioral1/memory/2060-640-0x0000000000CD0000-0x0000000000FF4000-memory.dmp family_quasar behavioral1/memory/2856-649-0x0000000000370000-0x0000000000694000-memory.dmp family_quasar behavioral1/memory/1620-658-0x0000000000E50000-0x0000000001174000-memory.dmp family_quasar behavioral1/memory/2612-667-0x00000000011A0000-0x00000000014C4000-memory.dmp family_quasar behavioral1/memory/1532-692-0x0000000000260000-0x0000000000584000-memory.dmp family_quasar behavioral1/memory/1800-701-0x0000000000830000-0x0000000000B54000-memory.dmp family_quasar behavioral1/memory/2896-710-0x0000000001290000-0x00000000015B4000-memory.dmp family_quasar -
Executes dropped EXE 64 IoCs
pid Process 3008 Client.exe 2248 Client.exe 3036 Client.exe 2196 Client.exe 824 Client.exe 1008 Client.exe 2660 Client.exe 2744 Client.exe 1736 Client.exe 1792 Client.exe 2604 Client.exe 600 Client.exe 2012 Client.exe 2296 Client.exe 2768 Client.exe 1252 Client.exe 1796 Client.exe 2244 Client.exe 1916 Client.exe 2260 Client.exe 2420 Client.exe 3004 Client.exe 2932 Client.exe 836 Client.exe 316 Client.exe 2044 Client.exe 2984 Client.exe 568 Client.exe 2816 Client.exe 1676 Client.exe 1712 Client.exe 1656 Client.exe 1572 Client.exe 1528 Client.exe 2100 Client.exe 2280 Client.exe 2596 Client.exe 1784 Client.exe 1536 Client.exe 2812 Client.exe 2940 Client.exe 3016 Client.exe 560 Client.exe 1872 Client.exe 912 Client.exe 1308 Client.exe 1748 Client.exe 840 Client.exe 1956 Client.exe 1288 Client.exe 2804 Client.exe 1188 Client.exe 1028 Client.exe 2224 Client.exe 956 Client.exe 1972 Client.exe 2536 Client.exe 1128 Client.exe 2168 Client.exe 632 Client.exe 2636 Client.exe 3020 Client.exe 3052 Client.exe 1980 Client.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 64 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 856 PING.EXE 1392 PING.EXE 1688 PING.EXE 2972 PING.EXE 3060 PING.EXE 2364 PING.EXE 1128 PING.EXE 1808 PING.EXE 3068 PING.EXE 2336 PING.EXE 2228 PING.EXE 1808 PING.EXE 2508 PING.EXE 520 PING.EXE 2952 PING.EXE 1480 PING.EXE 2864 PING.EXE 1336 PING.EXE 1504 PING.EXE 1800 PING.EXE 2268 PING.EXE 2152 PING.EXE 1812 PING.EXE 1044 PING.EXE 692 PING.EXE 540 PING.EXE 820 PING.EXE 268 PING.EXE 2188 PING.EXE 2404 PING.EXE 1652 PING.EXE 1832 PING.EXE 2624 PING.EXE 2396 PING.EXE 2668 PING.EXE 2884 PING.EXE 1812 PING.EXE 2144 PING.EXE 264 PING.EXE 552 PING.EXE 2832 PING.EXE 1476 PING.EXE 820 PING.EXE 2496 PING.EXE 1240 PING.EXE 1576 PING.EXE 964 PING.EXE 2348 PING.EXE 2944 PING.EXE 308 PING.EXE 540 PING.EXE 2568 PING.EXE 2236 PING.EXE 2656 PING.EXE 3068 PING.EXE 328 PING.EXE 1548 PING.EXE 2312 PING.EXE 1648 PING.EXE 2876 PING.EXE 2812 PING.EXE 2280 PING.EXE 1012 PING.EXE 3068 PING.EXE -
Runs ping.exe 1 TTPs 64 IoCs
pid Process 2972 PING.EXE 3048 PING.EXE 540 PING.EXE 1652 PING.EXE 2444 PING.EXE 1528 PING.EXE 1696 PING.EXE 820 PING.EXE 308 PING.EXE 1240 PING.EXE 1128 PING.EXE 1808 PING.EXE 1476 PING.EXE 1688 PING.EXE 1044 PING.EXE 1548 PING.EXE 3068 PING.EXE 2876 PING.EXE 2316 PING.EXE 2092 PING.EXE 2152 PING.EXE 2336 PING.EXE 328 PING.EXE 264 PING.EXE 1564 PING.EXE 1812 PING.EXE 2812 PING.EXE 2656 PING.EXE 2348 PING.EXE 2832 PING.EXE 1808 PING.EXE 2228 PING.EXE 2568 PING.EXE 856 PING.EXE 2076 PING.EXE 2884 PING.EXE 2236 PING.EXE 2268 PING.EXE 964 PING.EXE 2864 PING.EXE 552 PING.EXE 2668 PING.EXE 2188 PING.EXE 2364 PING.EXE 1652 PING.EXE 2780 PING.EXE 1812 PING.EXE 1576 PING.EXE 2312 PING.EXE 1832 PING.EXE 2624 PING.EXE 820 PING.EXE 1756 PING.EXE 520 PING.EXE 2404 PING.EXE 3068 PING.EXE 1504 PING.EXE 2496 PING.EXE 2952 PING.EXE 2280 PING.EXE 1480 PING.EXE 1336 PING.EXE 268 PING.EXE 2384 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 64 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2716 schtasks.exe 2296 schtasks.exe 1048 schtasks.exe 1620 schtasks.exe 2068 schtasks.exe 856 schtasks.exe 1148 schtasks.exe 1308 schtasks.exe 1584 schtasks.exe 2668 schtasks.exe 1076 schtasks.exe 2564 schtasks.exe 2720 schtasks.exe 2208 schtasks.exe 1036 schtasks.exe 1724 schtasks.exe 2948 schtasks.exe 1864 schtasks.exe 3048 schtasks.exe 2396 schtasks.exe 540 schtasks.exe 2900 schtasks.exe 1336 schtasks.exe 2416 schtasks.exe 2756 schtasks.exe 2440 schtasks.exe 1728 schtasks.exe 1528 schtasks.exe 1680 schtasks.exe 2084 schtasks.exe 432 schtasks.exe 2448 schtasks.exe 3028 schtasks.exe 3048 schtasks.exe 2440 schtasks.exe 2804 schtasks.exe 1300 schtasks.exe 1672 schtasks.exe 1028 schtasks.exe 904 schtasks.exe 2948 schtasks.exe 1740 schtasks.exe 2648 schtasks.exe 2844 schtasks.exe 2368 schtasks.exe 2648 schtasks.exe 828 schtasks.exe 2616 schtasks.exe 1788 schtasks.exe 2348 schtasks.exe 2204 schtasks.exe 2116 schtasks.exe 1048 schtasks.exe 872 schtasks.exe 2408 schtasks.exe 2720 schtasks.exe 2416 schtasks.exe 2208 schtasks.exe 2680 schtasks.exe 2116 schtasks.exe 1564 schtasks.exe 2972 schtasks.exe 1076 schtasks.exe 2080 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2172 Client-built.exe Token: SeDebugPrivilege 3008 Client.exe Token: SeDebugPrivilege 2248 Client.exe Token: SeDebugPrivilege 3036 Client.exe Token: SeDebugPrivilege 2196 Client.exe Token: SeDebugPrivilege 824 Client.exe Token: SeDebugPrivilege 1008 Client.exe Token: SeDebugPrivilege 2660 Client.exe Token: SeDebugPrivilege 2744 Client.exe Token: SeDebugPrivilege 1736 Client.exe Token: SeDebugPrivilege 1792 Client.exe Token: SeDebugPrivilege 2604 Client.exe Token: SeDebugPrivilege 600 Client.exe Token: SeDebugPrivilege 2012 Client.exe Token: SeDebugPrivilege 2296 Client.exe Token: SeDebugPrivilege 2768 Client.exe Token: SeDebugPrivilege 1252 Client.exe Token: SeDebugPrivilege 1796 Client.exe Token: SeDebugPrivilege 2244 Client.exe Token: SeDebugPrivilege 1916 Client.exe Token: SeDebugPrivilege 2260 Client.exe Token: SeDebugPrivilege 2420 Client.exe Token: SeDebugPrivilege 3004 Client.exe Token: SeDebugPrivilege 2932 Client.exe Token: SeDebugPrivilege 836 Client.exe Token: SeDebugPrivilege 316 Client.exe Token: SeDebugPrivilege 2044 Client.exe Token: SeDebugPrivilege 2984 Client.exe Token: SeDebugPrivilege 568 Client.exe Token: SeDebugPrivilege 2816 Client.exe Token: SeDebugPrivilege 1676 Client.exe Token: SeDebugPrivilege 1712 Client.exe Token: SeDebugPrivilege 1656 Client.exe Token: SeDebugPrivilege 1572 Client.exe Token: SeDebugPrivilege 1528 Client.exe Token: SeDebugPrivilege 2100 Client.exe Token: SeDebugPrivilege 2280 Client.exe Token: SeDebugPrivilege 2596 Client.exe Token: SeDebugPrivilege 1784 Client.exe Token: SeDebugPrivilege 1536 Client.exe Token: SeDebugPrivilege 2812 Client.exe Token: SeDebugPrivilege 2940 Client.exe Token: SeDebugPrivilege 3016 Client.exe Token: SeDebugPrivilege 560 Client.exe Token: SeDebugPrivilege 1872 Client.exe Token: SeDebugPrivilege 912 Client.exe Token: SeDebugPrivilege 1308 Client.exe Token: SeDebugPrivilege 1748 Client.exe Token: SeDebugPrivilege 840 Client.exe Token: SeDebugPrivilege 1956 Client.exe Token: SeDebugPrivilege 1288 Client.exe Token: SeDebugPrivilege 2804 Client.exe Token: SeDebugPrivilege 1188 Client.exe Token: SeDebugPrivilege 1028 Client.exe Token: SeDebugPrivilege 2224 Client.exe Token: SeDebugPrivilege 956 Client.exe Token: SeDebugPrivilege 1972 Client.exe Token: SeDebugPrivilege 2536 Client.exe Token: SeDebugPrivilege 1128 Client.exe Token: SeDebugPrivilege 2168 Client.exe Token: SeDebugPrivilege 632 Client.exe Token: SeDebugPrivilege 2636 Client.exe Token: SeDebugPrivilege 3020 Client.exe Token: SeDebugPrivilege 3052 Client.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3008 Client.exe 2248 Client.exe 3036 Client.exe 2196 Client.exe 824 Client.exe 1008 Client.exe 2660 Client.exe 2744 Client.exe 1736 Client.exe 1792 Client.exe 2604 Client.exe 600 Client.exe 2012 Client.exe 2296 Client.exe 2768 Client.exe 1252 Client.exe 1796 Client.exe 2244 Client.exe 1916 Client.exe 2260 Client.exe 2420 Client.exe 3004 Client.exe 2932 Client.exe 836 Client.exe 316 Client.exe 2044 Client.exe 2984 Client.exe 568 Client.exe 2816 Client.exe 1676 Client.exe 1712 Client.exe 1656 Client.exe 1572 Client.exe 1528 Client.exe 2100 Client.exe 2280 Client.exe 2596 Client.exe 1784 Client.exe 1536 Client.exe 2812 Client.exe 2940 Client.exe 3016 Client.exe 560 Client.exe 1872 Client.exe 912 Client.exe 1308 Client.exe 1748 Client.exe 840 Client.exe 1956 Client.exe 1288 Client.exe 2804 Client.exe 1188 Client.exe 1028 Client.exe 2224 Client.exe 956 Client.exe 1972 Client.exe 2536 Client.exe 1128 Client.exe 2168 Client.exe 632 Client.exe 2636 Client.exe 3020 Client.exe 3052 Client.exe 1980 Client.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3008 Client.exe 2248 Client.exe 3036 Client.exe 2196 Client.exe 824 Client.exe 1008 Client.exe 2660 Client.exe 2744 Client.exe 1736 Client.exe 1792 Client.exe 2604 Client.exe 600 Client.exe 2012 Client.exe 2296 Client.exe 2768 Client.exe 1252 Client.exe 1796 Client.exe 2244 Client.exe 1916 Client.exe 2260 Client.exe 2420 Client.exe 3004 Client.exe 2932 Client.exe 836 Client.exe 316 Client.exe 2044 Client.exe 2984 Client.exe 568 Client.exe 2816 Client.exe 1676 Client.exe 1712 Client.exe 1656 Client.exe 1572 Client.exe 1528 Client.exe 2100 Client.exe 2280 Client.exe 2596 Client.exe 1784 Client.exe 1536 Client.exe 2812 Client.exe 2940 Client.exe 3016 Client.exe 560 Client.exe 1872 Client.exe 912 Client.exe 1308 Client.exe 1748 Client.exe 840 Client.exe 1956 Client.exe 1288 Client.exe 2804 Client.exe 1188 Client.exe 1028 Client.exe 2224 Client.exe 956 Client.exe 1972 Client.exe 2536 Client.exe 1128 Client.exe 2168 Client.exe 632 Client.exe 2636 Client.exe 3020 Client.exe 3052 Client.exe 1980 Client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2864 2172 Client-built.exe 29 PID 2172 wrote to memory of 2864 2172 Client-built.exe 29 PID 2172 wrote to memory of 2864 2172 Client-built.exe 29 PID 2172 wrote to memory of 3008 2172 Client-built.exe 31 PID 2172 wrote to memory of 3008 2172 Client-built.exe 31 PID 2172 wrote to memory of 3008 2172 Client-built.exe 31 PID 3008 wrote to memory of 2832 3008 Client.exe 32 PID 3008 wrote to memory of 2832 3008 Client.exe 32 PID 3008 wrote to memory of 2832 3008 Client.exe 32 PID 3008 wrote to memory of 3004 3008 Client.exe 34 PID 3008 wrote to memory of 3004 3008 Client.exe 34 PID 3008 wrote to memory of 3004 3008 Client.exe 34 PID 3004 wrote to memory of 2736 3004 cmd.exe 36 PID 3004 wrote to memory of 2736 3004 cmd.exe 36 PID 3004 wrote to memory of 2736 3004 cmd.exe 36 PID 3004 wrote to memory of 2780 3004 cmd.exe 37 PID 3004 wrote to memory of 2780 3004 cmd.exe 37 PID 3004 wrote to memory of 2780 3004 cmd.exe 37 PID 3004 wrote to memory of 2248 3004 cmd.exe 38 PID 3004 wrote to memory of 2248 3004 cmd.exe 38 PID 3004 wrote to memory of 2248 3004 cmd.exe 38 PID 2248 wrote to memory of 3048 2248 Client.exe 39 PID 2248 wrote to memory of 3048 2248 Client.exe 39 PID 2248 wrote to memory of 3048 2248 Client.exe 39 PID 2248 wrote to memory of 968 2248 Client.exe 41 PID 2248 wrote to memory of 968 2248 Client.exe 41 PID 2248 wrote to memory of 968 2248 Client.exe 41 PID 968 wrote to memory of 2816 968 cmd.exe 43 PID 968 wrote to memory of 2816 968 cmd.exe 43 PID 968 wrote to memory of 2816 968 cmd.exe 43 PID 968 wrote to memory of 2496 968 cmd.exe 44 PID 968 wrote to memory of 2496 968 cmd.exe 44 PID 968 wrote to memory of 2496 968 cmd.exe 44 PID 968 wrote to memory of 3036 968 cmd.exe 45 PID 968 wrote to memory of 3036 968 cmd.exe 45 PID 968 wrote to memory of 3036 968 cmd.exe 45 PID 3036 wrote to memory of 2416 3036 Client.exe 46 PID 3036 wrote to memory of 2416 3036 Client.exe 46 PID 3036 wrote to memory of 2416 3036 Client.exe 46 PID 3036 wrote to memory of 1248 3036 Client.exe 48 PID 3036 wrote to memory of 1248 3036 Client.exe 48 PID 3036 wrote to memory of 1248 3036 Client.exe 48 PID 1248 wrote to memory of 836 1248 cmd.exe 50 PID 1248 wrote to memory of 836 1248 cmd.exe 50 PID 1248 wrote to memory of 836 1248 cmd.exe 50 PID 1248 wrote to memory of 1240 1248 cmd.exe 51 PID 1248 wrote to memory of 1240 1248 cmd.exe 51 PID 1248 wrote to memory of 1240 1248 cmd.exe 51 PID 1248 wrote to memory of 2196 1248 cmd.exe 52 PID 1248 wrote to memory of 2196 1248 cmd.exe 52 PID 1248 wrote to memory of 2196 1248 cmd.exe 52 PID 2196 wrote to memory of 2440 2196 Client.exe 53 PID 2196 wrote to memory of 2440 2196 Client.exe 53 PID 2196 wrote to memory of 2440 2196 Client.exe 53 PID 2196 wrote to memory of 2408 2196 Client.exe 55 PID 2196 wrote to memory of 2408 2196 Client.exe 55 PID 2196 wrote to memory of 2408 2196 Client.exe 55 PID 2408 wrote to memory of 560 2408 cmd.exe 57 PID 2408 wrote to memory of 560 2408 cmd.exe 57 PID 2408 wrote to memory of 560 2408 cmd.exe 57 PID 2408 wrote to memory of 268 2408 cmd.exe 58 PID 2408 wrote to memory of 268 2408 cmd.exe 58 PID 2408 wrote to memory of 268 2408 cmd.exe 58 PID 2408 wrote to memory of 824 2408 cmd.exe 59 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f2⤵PID:2864
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵PID:2832
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\HSV1w8xKmDFy.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\system32\chcp.comchcp 650014⤵PID:2736
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
PID:2780
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:3048
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\nsfOcq3AewLm.bat" "5⤵
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Windows\system32\chcp.comchcp 650016⤵PID:2816
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2496
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f7⤵
- Scheduled Task/Job: Scheduled Task
PID:2416
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\eQWJ6r3IgrIM.bat" "7⤵
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\system32\chcp.comchcp 650018⤵PID:836
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost8⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1240
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f9⤵
- Scheduled Task/Job: Scheduled Task
PID:2440
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\oZq0pGwu0okr.bat" "9⤵
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\system32\chcp.comchcp 6500110⤵PID:560
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost10⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:268
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"10⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:824 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f11⤵
- Scheduled Task/Job: Scheduled Task
PID:1148
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\kMI7FyInUXXm.bat" "11⤵PID:1548
-
C:\Windows\system32\chcp.comchcp 6500112⤵PID:2016
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:552
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"12⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1008 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f13⤵
- Scheduled Task/Job: Scheduled Task
PID:2648
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\CTyO0HYOnVZC.bat" "13⤵PID:692
-
C:\Windows\system32\chcp.comchcp 6500114⤵PID:2592
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:520
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"14⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2660 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f15⤵
- Scheduled Task/Job: Scheduled Task
PID:2296
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\OhiATnsfryGO.bat" "15⤵PID:2868
-
C:\Windows\system32\chcp.comchcp 6500116⤵PID:2284
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost16⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2876
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"16⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2744 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f17⤵
- Scheduled Task/Job: Scheduled Task
PID:3028
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\CYaPV85OHraF.bat" "17⤵PID:2792
-
C:\Windows\system32\chcp.comchcp 6500118⤵PID:2720
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost18⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1128
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"18⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1736 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f19⤵
- Scheduled Task/Job: Scheduled Task
PID:2564
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\jbKaEgaI2V6Y.bat" "19⤵PID:2924
-
C:\Windows\system32\chcp.comchcp 6500120⤵PID:2932
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost20⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:856
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"20⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1792 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f21⤵
- Scheduled Task/Job: Scheduled Task
PID:2396
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\PJoaHH5y2jAl.bat" "21⤵PID:1084
-
C:\Windows\system32\chcp.comchcp 6500122⤵PID:840
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost22⤵
- Runs ping.exe
PID:2076
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"22⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2604 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f23⤵
- Scheduled Task/Job: Scheduled Task
PID:2084
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\C5a271jHgDSL.bat" "23⤵PID:900
-
C:\Windows\system32\chcp.comchcp 6500124⤵PID:1272
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost24⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1808
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"24⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:600 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f25⤵PID:1916
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\kllXSaEJTofi.bat" "25⤵PID:1660
-
C:\Windows\system32\chcp.comchcp 6500126⤵PID:1816
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost26⤵
- Runs ping.exe
PID:2444
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"26⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2012 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f27⤵
- Scheduled Task/Job: Scheduled Task
PID:1048
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\G230EW0227Wo.bat" "27⤵PID:1476
-
C:\Windows\system32\chcp.comchcp 6500128⤵PID:2380
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost28⤵PID:2640
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"28⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2296 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f29⤵
- Scheduled Task/Job: Scheduled Task
PID:1672
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\Sz10p1QMiWGT.bat" "29⤵PID:2264
-
C:\Windows\system32\chcp.comchcp 6500130⤵PID:2872
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost30⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2832
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"30⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2768 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f31⤵
- Scheduled Task/Job: Scheduled Task
PID:2116
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\3YHUHFVEm3kb.bat" "31⤵PID:752
-
C:\Windows\system32\chcp.comchcp 6500132⤵PID:2836
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost32⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2884
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"32⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1252 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f33⤵
- Scheduled Task/Job: Scheduled Task
PID:3048
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\gqPFbUsS3lMO.bat" "33⤵PID:2488
-
C:\Windows\system32\chcp.comchcp 6500134⤵PID:2924
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost34⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2568
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"34⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1796 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f35⤵
- Scheduled Task/Job: Scheduled Task
PID:1028
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\WV86iN4atZ0o.bat" "35⤵PID:1732
-
C:\Windows\system32\chcp.comchcp 6500136⤵PID:1240
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost36⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1812
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"36⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2244 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f37⤵PID:580
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\eJTajTfxT46O.bat" "37⤵PID:2468
-
C:\Windows\system32\chcp.comchcp 6500138⤵PID:976
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost38⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2404
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"38⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1916 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f39⤵
- Scheduled Task/Job: Scheduled Task
PID:1728
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tNuRV1NNJ0Wq.bat" "39⤵PID:1936
-
C:\Windows\system32\chcp.comchcp 6500140⤵PID:2044
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost40⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1800
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"40⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2260 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f41⤵
- Scheduled Task/Job: Scheduled Task
PID:540
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\jE5lpq5nWkl4.bat" "41⤵PID:1564
-
C:\Windows\system32\chcp.comchcp 6500142⤵PID:2796
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost42⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2236
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"42⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2420 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f43⤵
- Scheduled Task/Job: Scheduled Task
PID:1528
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\03kmUjqaVdIe.bat" "43⤵PID:2552
-
C:\Windows\system32\chcp.comchcp 6500144⤵PID:568
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost44⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2812
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"44⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3004 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f45⤵PID:1616
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\0zoQ5KTnvR1Z.bat" "45⤵PID:1580
-
C:\Windows\system32\chcp.comchcp 6500146⤵PID:2628
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost46⤵
- Runs ping.exe
PID:2092
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"46⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2932 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f47⤵
- Scheduled Task/Job: Scheduled Task
PID:2900
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\zyP4viQGFhNr.bat" "47⤵PID:2508
-
C:\Windows\system32\chcp.comchcp 6500148⤵PID:2060
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost48⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2952
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"48⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:836 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f49⤵
- Scheduled Task/Job: Scheduled Task
PID:2616
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\Q9Lf0NtsBmVo.bat" "49⤵PID:2024
-
C:\Windows\system32\chcp.comchcp 6500150⤵PID:1432
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost50⤵
- Runs ping.exe
PID:2384
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"50⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:316 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f51⤵
- Scheduled Task/Job: Scheduled Task
PID:1336
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\FjYajP6ViG6H.bat" "51⤵PID:1364
-
C:\Windows\system32\chcp.comchcp 6500152⤵PID:1044
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost52⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2656
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"52⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2044 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f53⤵
- Scheduled Task/Job: Scheduled Task
PID:1724
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\3cj6rSu1e6ql.bat" "53⤵PID:2348
-
C:\Windows\system32\chcp.comchcp 6500154⤵PID:544
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost54⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1476
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"54⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2984 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f55⤵
- Scheduled Task/Job: Scheduled Task
PID:2680
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\0JNf6mY52QPy.bat" "55⤵PID:2576
-
C:\Windows\system32\chcp.comchcp 6500156⤵PID:2268
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost56⤵
- Runs ping.exe
PID:1528
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"56⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:568 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f57⤵
- Scheduled Task/Job: Scheduled Task
PID:1308
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\lXO4l69Svzgq.bat" "57⤵PID:1748
-
C:\Windows\system32\chcp.comchcp 6500158⤵PID:2712
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost58⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2312
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"58⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2816 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f59⤵PID:1788
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\dtbYV2zS3NvN.bat" "59⤵PID:2292
-
C:\Windows\system32\chcp.comchcp 6500160⤵PID:1756
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost60⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2280
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"60⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1676 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f61⤵
- Scheduled Task/Job: Scheduled Task
PID:904
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\ZGynCbZbhxQ8.bat" "61⤵PID:2616
-
C:\Windows\system32\chcp.comchcp 6500162⤵PID:1240
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost62⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1392
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"62⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1712 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f63⤵
- Scheduled Task/Job: Scheduled Task
PID:1620
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\P2DnwCNEN2Cf.bat" "63⤵PID:964
-
C:\Windows\system32\chcp.comchcp 6500164⤵PID:900
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost64⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1652
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"64⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1656 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f65⤵
- Scheduled Task/Job: Scheduled Task
PID:1680
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\U0zOihV8L34S.bat" "65⤵PID:2980
-
C:\Windows\system32\chcp.comchcp 6500166⤵PID:264
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost66⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1012
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"66⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1572 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f67⤵PID:2188
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\QnG4wPU7bSqL.bat" "67⤵PID:2264
-
C:\Windows\system32\chcp.comchcp 6500168⤵PID:1968
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost68⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2268
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"68⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1528 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f69⤵
- Scheduled Task/Job: Scheduled Task
PID:2844
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\K7kRlqYDwouI.bat" "69⤵PID:1720
-
C:\Windows\system32\chcp.comchcp 6500170⤵PID:1616
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost70⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3068
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"70⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2100 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f71⤵
- Scheduled Task/Job: Scheduled Task
PID:2948
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\vNw4EM27EP7b.bat" "71⤵PID:2676
-
C:\Windows\system32\chcp.comchcp 6500172⤵PID:3040
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost72⤵
- Runs ping.exe
PID:1756
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"72⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2280 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f73⤵
- Scheduled Task/Job: Scheduled Task
PID:2440
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\L1pRPoYgDzD8.bat" "73⤵PID:2144
-
C:\Windows\system32\chcp.comchcp 6500174⤵PID:2944
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost74⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1480
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"74⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2596 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f75⤵PID:1548
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\2aoDQNfJahBH.bat" "75⤵PID:2056
-
C:\Windows\system32\chcp.comchcp 6500176⤵PID:956
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost76⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1832
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"76⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1784 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f77⤵
- Scheduled Task/Job: Scheduled Task
PID:2368
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\q0Gkgae4thns.bat" "77⤵PID:1660
-
C:\Windows\system32\chcp.comchcp 6500178⤵PID:1048
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost78⤵
- Runs ping.exe
PID:1696
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"78⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1536 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f79⤵PID:2560
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\10YXOmcCT8MR.bat" "79⤵PID:2896
-
C:\Windows\system32\chcp.comchcp 6500180⤵PID:2364
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost80⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2152
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"80⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2812 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f81⤵
- Scheduled Task/Job: Scheduled Task
PID:2116
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\Ojj6DD1e9Wsu.bat" "81⤵PID:2040
-
C:\Windows\system32\chcp.comchcp 6500182⤵PID:2884
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost82⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1648
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"82⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2940 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f83⤵
- Scheduled Task/Job: Scheduled Task
PID:2948
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\S6exPZTg1KD2.bat" "83⤵PID:1272
-
C:\Windows\system32\chcp.comchcp 6500184⤵PID:2568
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost84⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1688
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"84⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3016 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f85⤵PID:2856
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\OZ9aHEvTcbwn.bat" "85⤵PID:904
-
C:\Windows\system32\chcp.comchcp 6500186⤵PID:2540
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost86⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1812
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"86⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:560 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f87⤵PID:1808
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\2DlwWNTA46jR.bat" "87⤵PID:2384
-
C:\Windows\system32\chcp.comchcp 6500188⤵PID:1428
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost88⤵
- Runs ping.exe
PID:1652
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"88⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1872 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f89⤵
- Scheduled Task/Job: Scheduled Task
PID:2068
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\audKiIORmRtL.bat" "89⤵PID:2392
-
C:\Windows\system32\chcp.comchcp 6500190⤵PID:2840
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost90⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2624
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"90⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:912 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f91⤵
- Scheduled Task/Job: Scheduled Task
PID:2804
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\IGHkIAOjENom.bat" "91⤵PID:2680
-
C:\Windows\system32\chcp.comchcp 6500192⤵PID:2284
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost92⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1576
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"92⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1308 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f93⤵
- Scheduled Task/Job: Scheduled Task
PID:2720
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\IQvFn5W6HazL.bat" "93⤵PID:2836
-
C:\Windows\system32\chcp.comchcp 6500194⤵PID:2240
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost94⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:3068
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"94⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1748 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f95⤵
- Scheduled Task/Job: Scheduled Task
PID:2208
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\Bzujm76rp3Rl.bat" "95⤵PID:2568
-
C:\Windows\system32\chcp.comchcp 6500196⤵PID:2324
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost96⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2336
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"96⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:840 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f97⤵
- Scheduled Task/Job: Scheduled Task
PID:1584
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\RjkqdBNV9tiK.bat" "97⤵PID:2508
-
C:\Windows\system32\chcp.comchcp 6500198⤵PID:2668
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost98⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2144
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"98⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1956 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f99⤵
- Scheduled Task/Job: Scheduled Task
PID:1300
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\55qrGwBrD9S6.bat" "99⤵PID:1768
-
C:\Windows\system32\chcp.comchcp 65001100⤵PID:2408
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost100⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1044
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"100⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1288 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f101⤵
- Scheduled Task/Job: Scheduled Task
PID:1048
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\15YYWekhrhS8.bat" "101⤵PID:544
-
C:\Windows\system32\chcp.comchcp 65001102⤵PID:2008
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost102⤵PID:1012
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"102⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2804 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f103⤵
- Scheduled Task/Job: Scheduled Task
PID:1564
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\lyQSfGV6dn7G.bat" "103⤵PID:2732
-
C:\Windows\system32\chcp.comchcp 65001104⤵PID:2892
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost104⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:328
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"104⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1188 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f105⤵
- Scheduled Task/Job: Scheduled Task
PID:872
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\ggeZdSogkivo.bat" "105⤵PID:2704
-
C:\Windows\system32\chcp.comchcp 65001106⤵PID:916
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost106⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:820
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"106⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1028 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f107⤵
- Scheduled Task/Job: Scheduled Task
PID:1788
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\1JLcTh8txKRn.bat" "107⤵PID:2356
-
C:\Windows\system32\chcp.comchcp 65001108⤵PID:1980
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost108⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2396
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"108⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2224 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f109⤵
- Scheduled Task/Job: Scheduled Task
PID:2668
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\HMRNPctbuV2J.bat" "109⤵PID:1480
-
C:\Windows\system32\chcp.comchcp 65001110⤵PID:1600
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost110⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1548
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"110⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:956 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f111⤵PID:2408
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\H2QjRAw6hSuC.bat" "111⤵PID:1800
-
C:\Windows\system32\chcp.comchcp 65001112⤵PID:520
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost112⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:264
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"112⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1972 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f113⤵PID:2348
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\jSljNvqpNDdJ.bat" "113⤵PID:2284
-
C:\Windows\system32\chcp.comchcp 65001114⤵PID:2608
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost114⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:692
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"114⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2536 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f115⤵
- Scheduled Task/Job: Scheduled Task
PID:1740
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\rz40zAcoEPHF.bat" "115⤵PID:2936
-
C:\Windows\system32\chcp.comchcp 65001116⤵PID:2088
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost116⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3068
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"116⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1128 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f117⤵
- Scheduled Task/Job: Scheduled Task
PID:2208
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\puOpNsN8bPjd.bat" "117⤵PID:2452
-
C:\Windows\system32\chcp.comchcp 65001118⤵PID:1788
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost118⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2972
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"118⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2168 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f119⤵PID:796
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\pB31IlKixkwR.bat" "119⤵PID:1076
-
C:\Windows\system32\chcp.comchcp 65001120⤵PID:2508
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost120⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1336
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"120⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:632 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f121⤵
- Scheduled Task/Job: Scheduled Task
PID:1864
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\rK1GRq4ZHyjE.bat" "121⤵PID:1044
-
C:\Windows\system32\chcp.comchcp 65001122⤵PID:2656
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-