Analysis
-
max time kernel
862s -
max time network
866s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
04-11-2024 18:21
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Client-built.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Client-built.exe
Resource
win10ltsc2021-20241023-en
General
-
Target
Client-built.exe
-
Size
3.1MB
-
MD5
52b81162360c34724757c2075a60e5af
-
SHA1
3fceb5947678c56b962a63853d20749f274b6db0
-
SHA256
a3ef678bd307c07f299a4b4c96d414ddba54e3f00e7e81a5ed5bc949cd65e682
-
SHA512
ea3e4b4218f5cca06102c97d85306fbd7f1697efd1546ecb3a9cf5f66a68c6354b176545c059aa78757bd7a2f9abbed2c16a16a2d1fbcee1506c9b21400c1f47
-
SSDEEP
49152:uv2I22SsaNYfdPBldt698dBcjHUiO10mzfioGdKiTHHB72eh2NT:uvb22SsaNYfdPBldt6+dBcjHbO1g
Malware Config
Extracted
quasar
1.4.1
Office04
Inversin-43597.portmap.host:43597
80329fd2-f063-4b06-9c7e-8dbc6278c2a3
-
encryption_key
744EA1A385FEBC6DA96387411B7000D77E66B075
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
java updater
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral4/memory/1280-1-0x0000000000480000-0x00000000007A4000-memory.dmp family_quasar behavioral4/files/0x001b00000002aa74-5.dat family_quasar -
Executes dropped EXE 64 IoCs
pid Process 764 Client.exe 4584 Client.exe 568 Client.exe 3892 Client.exe 4844 Client.exe 2556 Client.exe 1448 Client.exe 2152 Client.exe 4492 Client.exe 1228 Client.exe 3220 Client.exe 2692 Client.exe 752 Client.exe 1092 Client.exe 2588 Client.exe 3572 Client.exe 2988 Client.exe 3200 Client.exe 3380 Client.exe 4080 Client.exe 72 Client.exe 3944 Client.exe 396 Client.exe 1700 Client.exe 244 Client.exe 4736 Client.exe 468 Client.exe 3532 Client.exe 1620 Client.exe 2932 Client.exe 4612 Client.exe 4044 Client.exe 4228 Client.exe 1028 Client.exe 1900 Client.exe 3284 Client.exe 2224 Client.exe 2636 Client.exe 2700 Client.exe 1084 Client.exe 4252 Client.exe 2360 Client.exe 4200 Client.exe 2280 Client.exe 4416 Client.exe 3488 Client.exe 1668 Client.exe 788 Client.exe 4352 Client.exe 2876 Client.exe 3132 Client.exe 4148 Client.exe 2380 Client.exe 1396 Client.exe 464 Client.exe 2512 Client.exe 440 Client.exe 3052 Client.exe 3148 Client.exe 4444 Client.exe 4424 Client.exe 4896 Client.exe 3952 Client.exe 1708 Client.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 64 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4444 PING.EXE 428 PING.EXE 3048 PING.EXE 728 PING.EXE 3608 PING.EXE 1832 PING.EXE 4072 PING.EXE 336 PING.EXE 784 PING.EXE 1436 PING.EXE 4636 PING.EXE 4120 PING.EXE 1852 PING.EXE 1328 PING.EXE 2984 PING.EXE 4192 PING.EXE 1344 PING.EXE 2560 PING.EXE 3676 PING.EXE 4112 PING.EXE 3792 PING.EXE 2872 PING.EXE 4652 PING.EXE 4132 PING.EXE 5028 PING.EXE 4272 PING.EXE 1600 PING.EXE 1220 PING.EXE 2880 PING.EXE 3180 PING.EXE 2304 PING.EXE 2808 PING.EXE 2808 PING.EXE 4484 PING.EXE 4228 PING.EXE 472 PING.EXE 4468 PING.EXE 4128 PING.EXE 2736 PING.EXE 3244 PING.EXE 852 PING.EXE 4132 PING.EXE 1148 PING.EXE 1716 PING.EXE 2320 PING.EXE 4232 PING.EXE 32 PING.EXE 5032 PING.EXE 4084 PING.EXE 3784 PING.EXE 2172 PING.EXE 3948 PING.EXE 3832 PING.EXE 4000 PING.EXE 1804 PING.EXE 2456 PING.EXE 696 PING.EXE 3940 PING.EXE 492 PING.EXE 968 PING.EXE 1784 PING.EXE 4484 PING.EXE 336 PING.EXE 2944 PING.EXE -
Runs ping.exe 1 TTPs 64 IoCs
pid Process 772 PING.EXE 1716 PING.EXE 4000 PING.EXE 32 PING.EXE 3608 PING.EXE 3676 PING.EXE 968 PING.EXE 2944 PING.EXE 2896 PING.EXE 3784 PING.EXE 4636 PING.EXE 2304 PING.EXE 3832 PING.EXE 2808 PING.EXE 1160 PING.EXE 1832 PING.EXE 2736 PING.EXE 788 PING.EXE 3180 PING.EXE 3244 PING.EXE 852 PING.EXE 2972 PING.EXE 336 PING.EXE 4128 PING.EXE 1784 PING.EXE 2172 PING.EXE 472 PING.EXE 2880 PING.EXE 1852 PING.EXE 1828 PING.EXE 336 PING.EXE 1328 PING.EXE 728 PING.EXE 2348 PING.EXE 696 PING.EXE 1220 PING.EXE 784 PING.EXE 1804 PING.EXE 4468 PING.EXE 3416 PING.EXE 4228 PING.EXE 3048 PING.EXE 4132 PING.EXE 2536 PING.EXE 2448 PING.EXE 4468 PING.EXE 4484 PING.EXE 2320 PING.EXE 3940 PING.EXE 2808 PING.EXE 1148 PING.EXE 3976 PING.EXE 2984 PING.EXE 3540 PING.EXE 4232 PING.EXE 4444 PING.EXE 3480 PING.EXE 1596 PING.EXE 2096 PING.EXE 4120 PING.EXE 3168 PING.EXE 3256 PING.EXE 4132 PING.EXE 4112 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 64 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 936 schtasks.exe 8 schtasks.exe 124 schtasks.exe 4620 schtasks.exe 1940 schtasks.exe 776 schtasks.exe 3248 schtasks.exe 912 schtasks.exe 848 schtasks.exe 1064 schtasks.exe 1568 schtasks.exe 2904 schtasks.exe 1004 schtasks.exe 1296 schtasks.exe 4112 schtasks.exe 936 schtasks.exe 4456 schtasks.exe 2800 schtasks.exe 2420 schtasks.exe 1336 schtasks.exe 3900 schtasks.exe 3400 schtasks.exe 660 schtasks.exe 1016 schtasks.exe 3816 schtasks.exe 2940 schtasks.exe 4300 schtasks.exe 2288 schtasks.exe 3136 schtasks.exe 752 schtasks.exe 2692 schtasks.exe 4756 schtasks.exe 364 schtasks.exe 3408 schtasks.exe 3296 schtasks.exe 3712 schtasks.exe 2884 schtasks.exe 2076 schtasks.exe 2812 schtasks.exe 1456 schtasks.exe 1568 schtasks.exe 3884 schtasks.exe 3216 schtasks.exe 1956 schtasks.exe 1368 schtasks.exe 1252 schtasks.exe 4444 schtasks.exe 2812 schtasks.exe 4860 schtasks.exe 1784 schtasks.exe 2360 schtasks.exe 3612 schtasks.exe 1840 schtasks.exe 4088 schtasks.exe 492 schtasks.exe 3752 schtasks.exe 220 schtasks.exe 4212 schtasks.exe 3756 schtasks.exe 4492 schtasks.exe 3840 schtasks.exe 4984 schtasks.exe 4644 schtasks.exe 3548 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1280 Client-built.exe Token: SeDebugPrivilege 764 Client.exe Token: SeDebugPrivilege 4584 Client.exe Token: SeDebugPrivilege 568 Client.exe Token: SeDebugPrivilege 3892 Client.exe Token: SeDebugPrivilege 4844 Client.exe Token: SeDebugPrivilege 2556 Client.exe Token: SeDebugPrivilege 1448 Client.exe Token: SeDebugPrivilege 2152 Client.exe Token: SeDebugPrivilege 4492 Client.exe Token: SeDebugPrivilege 1228 Client.exe Token: SeDebugPrivilege 3220 Client.exe Token: SeDebugPrivilege 2692 Client.exe Token: SeDebugPrivilege 752 Client.exe Token: SeDebugPrivilege 1092 Client.exe Token: SeDebugPrivilege 2588 Client.exe Token: SeDebugPrivilege 3572 Client.exe Token: SeDebugPrivilege 2988 Client.exe Token: SeDebugPrivilege 3200 Client.exe Token: SeDebugPrivilege 3380 Client.exe Token: SeDebugPrivilege 4080 Client.exe Token: SeDebugPrivilege 72 Client.exe Token: SeDebugPrivilege 3944 Client.exe Token: SeDebugPrivilege 396 Client.exe Token: SeDebugPrivilege 1700 Client.exe Token: SeDebugPrivilege 244 Client.exe Token: SeDebugPrivilege 4736 Client.exe Token: SeDebugPrivilege 468 Client.exe Token: SeDebugPrivilege 3532 Client.exe Token: SeDebugPrivilege 1620 Client.exe Token: SeDebugPrivilege 2932 Client.exe Token: SeDebugPrivilege 4612 Client.exe Token: SeDebugPrivilege 4044 Client.exe Token: SeDebugPrivilege 4228 Client.exe Token: SeDebugPrivilege 1028 Client.exe Token: SeDebugPrivilege 1900 Client.exe Token: SeDebugPrivilege 3284 Client.exe Token: SeDebugPrivilege 2224 Client.exe Token: SeDebugPrivilege 2636 Client.exe Token: SeDebugPrivilege 2700 Client.exe Token: SeDebugPrivilege 1084 Client.exe Token: SeDebugPrivilege 4252 Client.exe Token: SeDebugPrivilege 2360 Client.exe Token: SeDebugPrivilege 4200 Client.exe Token: SeDebugPrivilege 2280 Client.exe Token: SeDebugPrivilege 4416 Client.exe Token: SeDebugPrivilege 3488 Client.exe Token: SeDebugPrivilege 1668 Client.exe Token: SeDebugPrivilege 788 Client.exe Token: SeDebugPrivilege 4352 Client.exe Token: SeDebugPrivilege 2876 Client.exe Token: SeDebugPrivilege 3132 Client.exe Token: SeDebugPrivilege 4148 Client.exe Token: SeDebugPrivilege 2380 Client.exe Token: SeDebugPrivilege 1396 Client.exe Token: SeDebugPrivilege 464 Client.exe Token: SeDebugPrivilege 2512 Client.exe Token: SeDebugPrivilege 440 Client.exe Token: SeDebugPrivilege 3052 Client.exe Token: SeDebugPrivilege 3148 Client.exe Token: SeDebugPrivilege 4444 Client.exe Token: SeDebugPrivilege 4424 Client.exe Token: SeDebugPrivilege 4896 Client.exe Token: SeDebugPrivilege 3952 Client.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 764 Client.exe 4584 Client.exe 568 Client.exe 3892 Client.exe 4844 Client.exe 2556 Client.exe 1448 Client.exe 2152 Client.exe 4492 Client.exe 1228 Client.exe 3220 Client.exe 2692 Client.exe 752 Client.exe 1092 Client.exe 2588 Client.exe 3572 Client.exe 2988 Client.exe 3200 Client.exe 3380 Client.exe 4080 Client.exe 72 Client.exe 3944 Client.exe 396 Client.exe 1700 Client.exe 244 Client.exe 4736 Client.exe 468 Client.exe 3532 Client.exe 1620 Client.exe 2932 Client.exe 4612 Client.exe 4044 Client.exe 4228 Client.exe 1028 Client.exe 1900 Client.exe 3284 Client.exe 2224 Client.exe 2636 Client.exe 2700 Client.exe 1084 Client.exe 4252 Client.exe 2360 Client.exe 4200 Client.exe 2280 Client.exe 4416 Client.exe 3488 Client.exe 1668 Client.exe 788 Client.exe 4352 Client.exe 2876 Client.exe 3132 Client.exe 4148 Client.exe 2380 Client.exe 1396 Client.exe 464 Client.exe 2512 Client.exe 440 Client.exe 3052 Client.exe 3148 Client.exe 4444 Client.exe 4424 Client.exe 4896 Client.exe 3952 Client.exe 1708 Client.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 764 Client.exe 4584 Client.exe 568 Client.exe 3892 Client.exe 4844 Client.exe 2556 Client.exe 1448 Client.exe 2152 Client.exe 4492 Client.exe 1228 Client.exe 3220 Client.exe 2692 Client.exe 752 Client.exe 1092 Client.exe 2588 Client.exe 3572 Client.exe 2988 Client.exe 3200 Client.exe 3380 Client.exe 4080 Client.exe 72 Client.exe 3944 Client.exe 396 Client.exe 1700 Client.exe 244 Client.exe 4736 Client.exe 468 Client.exe 3532 Client.exe 1620 Client.exe 2932 Client.exe 4612 Client.exe 4044 Client.exe 4228 Client.exe 1028 Client.exe 1900 Client.exe 3284 Client.exe 2224 Client.exe 2636 Client.exe 2700 Client.exe 1084 Client.exe 4252 Client.exe 2360 Client.exe 4200 Client.exe 2280 Client.exe 4416 Client.exe 3488 Client.exe 1668 Client.exe 788 Client.exe 4352 Client.exe 2876 Client.exe 3132 Client.exe 4148 Client.exe 2380 Client.exe 1396 Client.exe 464 Client.exe 2512 Client.exe 440 Client.exe 3052 Client.exe 3148 Client.exe 4444 Client.exe 4424 Client.exe 4896 Client.exe 3952 Client.exe 1708 Client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1280 wrote to memory of 4764 1280 Client-built.exe 81 PID 1280 wrote to memory of 4764 1280 Client-built.exe 81 PID 1280 wrote to memory of 764 1280 Client-built.exe 83 PID 1280 wrote to memory of 764 1280 Client-built.exe 83 PID 764 wrote to memory of 4492 764 Client.exe 84 PID 764 wrote to memory of 4492 764 Client.exe 84 PID 764 wrote to memory of 2788 764 Client.exe 86 PID 764 wrote to memory of 2788 764 Client.exe 86 PID 2788 wrote to memory of 1860 2788 cmd.exe 88 PID 2788 wrote to memory of 1860 2788 cmd.exe 88 PID 2788 wrote to memory of 4128 2788 cmd.exe 89 PID 2788 wrote to memory of 4128 2788 cmd.exe 89 PID 2788 wrote to memory of 4584 2788 cmd.exe 90 PID 2788 wrote to memory of 4584 2788 cmd.exe 90 PID 4584 wrote to memory of 1344 4584 Client.exe 91 PID 4584 wrote to memory of 1344 4584 Client.exe 91 PID 4584 wrote to memory of 3596 4584 Client.exe 93 PID 4584 wrote to memory of 3596 4584 Client.exe 93 PID 3596 wrote to memory of 1144 3596 cmd.exe 95 PID 3596 wrote to memory of 1144 3596 cmd.exe 95 PID 3596 wrote to memory of 1220 3596 cmd.exe 96 PID 3596 wrote to memory of 1220 3596 cmd.exe 96 PID 3596 wrote to memory of 568 3596 cmd.exe 97 PID 3596 wrote to memory of 568 3596 cmd.exe 97 PID 568 wrote to memory of 752 568 Client.exe 98 PID 568 wrote to memory of 752 568 Client.exe 98 PID 568 wrote to memory of 2620 568 Client.exe 100 PID 568 wrote to memory of 2620 568 Client.exe 100 PID 2620 wrote to memory of 2948 2620 cmd.exe 102 PID 2620 wrote to memory of 2948 2620 cmd.exe 102 PID 2620 wrote to memory of 3940 2620 cmd.exe 103 PID 2620 wrote to memory of 3940 2620 cmd.exe 103 PID 2620 wrote to memory of 3892 2620 cmd.exe 104 PID 2620 wrote to memory of 3892 2620 cmd.exe 104 PID 3892 wrote to memory of 364 3892 Client.exe 106 PID 3892 wrote to memory of 364 3892 Client.exe 106 PID 3892 wrote to memory of 1952 3892 Client.exe 108 PID 3892 wrote to memory of 1952 3892 Client.exe 108 PID 1952 wrote to memory of 1372 1952 cmd.exe 110 PID 1952 wrote to memory of 1372 1952 cmd.exe 110 PID 1952 wrote to memory of 4444 1952 cmd.exe 111 PID 1952 wrote to memory of 4444 1952 cmd.exe 111 PID 1952 wrote to memory of 4844 1952 cmd.exe 118 PID 1952 wrote to memory of 4844 1952 cmd.exe 118 PID 4844 wrote to memory of 3400 4844 Client.exe 119 PID 4844 wrote to memory of 3400 4844 Client.exe 119 PID 4844 wrote to memory of 4812 4844 Client.exe 121 PID 4844 wrote to memory of 4812 4844 Client.exe 121 PID 4812 wrote to memory of 3632 4812 cmd.exe 123 PID 4812 wrote to memory of 3632 4812 cmd.exe 123 PID 4812 wrote to memory of 1852 4812 cmd.exe 124 PID 4812 wrote to memory of 1852 4812 cmd.exe 124 PID 4812 wrote to memory of 2556 4812 cmd.exe 125 PID 4812 wrote to memory of 2556 4812 cmd.exe 125 PID 2556 wrote to memory of 2692 2556 Client.exe 126 PID 2556 wrote to memory of 2692 2556 Client.exe 126 PID 2556 wrote to memory of 492 2556 Client.exe 128 PID 2556 wrote to memory of 492 2556 Client.exe 128 PID 492 wrote to memory of 756 492 cmd.exe 130 PID 492 wrote to memory of 756 492 cmd.exe 130 PID 492 wrote to memory of 2880 492 cmd.exe 131 PID 492 wrote to memory of 2880 492 cmd.exe 131 PID 492 wrote to memory of 1448 492 cmd.exe 132 PID 492 wrote to memory of 1448 492 cmd.exe 132 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f2⤵PID:4764
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:4492
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FTWIq22BOL6c.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\system32\chcp.comchcp 650014⤵PID:1860
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost4⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4128
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f5⤵PID:1344
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\2IziQ8qAL4Rh.bat" "5⤵
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Windows\system32\chcp.comchcp 650016⤵PID:1144
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1220
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f7⤵
- Scheduled Task/Job: Scheduled Task
PID:752
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ATRu3E0PKX1P.bat" "7⤵
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\system32\chcp.comchcp 650018⤵PID:2948
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost8⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3940
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f9⤵
- Scheduled Task/Job: Scheduled Task
PID:364
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\VsZ7Bi3y6nFQ.bat" "9⤵
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\system32\chcp.comchcp 6500110⤵PID:1372
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost10⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4444
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"10⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f11⤵
- Scheduled Task/Job: Scheduled Task
PID:3400
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Ci2bsA725PU1.bat" "11⤵
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\system32\chcp.comchcp 6500112⤵PID:3632
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1852
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"12⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f13⤵
- Scheduled Task/Job: Scheduled Task
PID:2692
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Px6oJEKDALkX.bat" "13⤵
- Suspicious use of WriteProcessMemory
PID:492 -
C:\Windows\system32\chcp.comchcp 6500114⤵PID:756
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2880
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"14⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1448 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f15⤵
- Scheduled Task/Job: Scheduled Task
PID:3884
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\rGFw4aH1qDGc.bat" "15⤵PID:1776
-
C:\Windows\system32\chcp.comchcp 6500116⤵PID:364
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost16⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:428
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"16⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2152 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f17⤵
- Scheduled Task/Job: Scheduled Task
PID:4088
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4rcXftlPkHFk.bat" "17⤵PID:4764
-
C:\Windows\system32\chcp.comchcp 6500118⤵PID:4112
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost18⤵
- Runs ping.exe
PID:2536
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"18⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4492 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f19⤵PID:1400
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3AKnr6l5C4Jk.bat" "19⤵PID:4948
-
C:\Windows\system32\chcp.comchcp 6500120⤵PID:1328
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost20⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2944
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"20⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1228 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f21⤵
- Scheduled Task/Job: Scheduled Task
PID:1784
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\HuOyQmehPjbP.bat" "21⤵PID:244
-
C:\Windows\system32\chcp.comchcp 6500122⤵PID:2788
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost22⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4484
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"22⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3220 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f23⤵
- Scheduled Task/Job: Scheduled Task
PID:3408
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\nqjgcI9U0eI3.bat" "23⤵PID:4668
-
C:\Windows\system32\chcp.comchcp 6500124⤵PID:128
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost24⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1832
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"24⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2692 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f25⤵PID:4652
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DKlyeShiMlEa.bat" "25⤵PID:2928
-
C:\Windows\system32\chcp.comchcp 6500126⤵PID:1516
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost26⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2872
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"26⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:752 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f27⤵
- Scheduled Task/Job: Scheduled Task
PID:492
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5vM3eYrCXihr.bat" "27⤵PID:4836
-
C:\Windows\system32\chcp.comchcp 6500128⤵PID:3968
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost28⤵
- Runs ping.exe
PID:1828
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"28⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1092 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f29⤵
- Scheduled Task/Job: Scheduled Task
PID:3752
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\lh98GbRp3Daw.bat" "29⤵PID:4520
-
C:\Windows\system32\chcp.comchcp 6500130⤵PID:1588
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost30⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2984
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"30⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2588 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f31⤵
- Scheduled Task/Job: Scheduled Task
PID:1064
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\q7e1s90vO1HC.bat" "31⤵PID:4976
-
C:\Windows\system32\chcp.comchcp 6500132⤵PID:2356
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost32⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2736
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"32⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3572 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f33⤵
- Scheduled Task/Job: Scheduled Task
PID:3840
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\6kDm6a0V8nSk.bat" "33⤵PID:4664
-
C:\Windows\system32\chcp.comchcp 6500134⤵PID:4672
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost34⤵
- Runs ping.exe
PID:2896
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"34⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2988 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f35⤵
- Scheduled Task/Job: Scheduled Task
PID:660
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\VEtewKibbBcO.bat" "35⤵PID:2220
-
C:\Windows\system32\chcp.comchcp 6500136⤵PID:2172
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost36⤵
- Runs ping.exe
PID:772
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"36⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3200 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f37⤵
- Scheduled Task/Job: Scheduled Task
PID:4984
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Z5oGu8CwSwxi.bat" "37⤵PID:3756
-
C:\Windows\system32\chcp.comchcp 6500138⤵PID:2140
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost38⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4652
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"38⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3380 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f39⤵PID:3652
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ZqV3ZXSp0s70.bat" "39⤵PID:3456
-
C:\Windows\system32\chcp.comchcp 6500140⤵PID:3288
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost40⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:492
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"40⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4080 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f41⤵
- Scheduled Task/Job: Scheduled Task
PID:4756
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\qLSsxlMK9cpx.bat" "41⤵PID:4688
-
C:\Windows\system32\chcp.comchcp 6500142⤵PID:3532
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost42⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4192
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"42⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:72 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f43⤵PID:428
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ntUCsADSG1qu.bat" "43⤵PID:4088
-
C:\Windows\system32\chcp.comchcp 6500144⤵PID:2860
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost44⤵
- Runs ping.exe
PID:788
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"44⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3944 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f45⤵
- Scheduled Task/Job: Scheduled Task
PID:776
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\j37AjJUg1E69.bat" "45⤵PID:3820
-
C:\Windows\system32\chcp.comchcp 6500146⤵PID:4300
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost46⤵
- Runs ping.exe
PID:3168
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"46⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:396 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f47⤵
- Scheduled Task/Job: Scheduled Task
PID:3296
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1LlLNWrD7cym.bat" "47⤵PID:2320
-
C:\Windows\system32\chcp.comchcp 6500148⤵PID:5088
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost48⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4132
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"48⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1700 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f49⤵
- Scheduled Task/Job: Scheduled Task
PID:1016
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\pnPqCzy8FvC7.bat" "49⤵PID:2696
-
C:\Windows\system32\chcp.comchcp 6500150⤵PID:4564
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost50⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4228
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"50⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:244 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f51⤵
- Scheduled Task/Job: Scheduled Task
PID:2360
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7HQK7o711Gug.bat" "51⤵PID:2328
-
C:\Windows\system32\chcp.comchcp 6500152⤵PID:1220
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost52⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:5028
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"52⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4736 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f53⤵
- Scheduled Task/Job: Scheduled Task
PID:3712
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7URo1LDfH81o.bat" "53⤵PID:5100
-
C:\Windows\system32\chcp.comchcp 6500154⤵PID:2872
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost54⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3180
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"54⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:468 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f55⤵
- Scheduled Task/Job: Scheduled Task
PID:220
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\q1CTD3bgmVB3.bat" "55⤵PID:4628
-
C:\Windows\system32\chcp.comchcp 6500156⤵PID:3284
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost56⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4072
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"56⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3532 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f57⤵
- Scheduled Task/Job: Scheduled Task
PID:936
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\xMv2GZ6In2DS.bat" "57⤵PID:1584
-
C:\Windows\system32\chcp.comchcp 6500158⤵PID:4868
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost58⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3244
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"58⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1620 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f59⤵
- Scheduled Task/Job: Scheduled Task
PID:4644
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\93OC3IJvOt39.bat" "59⤵PID:4432
-
C:\Windows\system32\chcp.comchcp 6500160⤵PID:1836
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost60⤵PID:3908
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"60⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2932 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f61⤵
- Scheduled Task/Job: Scheduled Task
PID:2884
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\GlMNKGJpsOQY.bat" "61⤵PID:3876
-
C:\Windows\system32\chcp.comchcp 6500162⤵PID:2024
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost62⤵
- Runs ping.exe
PID:3480
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"62⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4612 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f63⤵
- Scheduled Task/Job: Scheduled Task
PID:3548
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\voz7zqVGzkdl.bat" "63⤵PID:3296
-
C:\Windows\system32\chcp.comchcp 6500164⤵PID:3052
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost64⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4084
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"64⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4044 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f65⤵
- Scheduled Task/Job: Scheduled Task
PID:3216
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\N3WaP5XdEWPd.bat" "65⤵PID:1296
-
C:\Windows\system32\chcp.comchcp 6500166⤵PID:4516
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost66⤵
- Runs ping.exe
PID:2448
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"66⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4228 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f67⤵
- Scheduled Task/Job: Scheduled Task
PID:4444
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1y1eswEEsAka.bat" "67⤵PID:3004
-
C:\Windows\system32\chcp.comchcp 6500168⤵PID:3596
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost68⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1344
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"68⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1028 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f69⤵
- Scheduled Task/Job: Scheduled Task
PID:1568
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\UDmCpM5X7p7e.bat" "69⤵PID:2140
-
C:\Windows\system32\chcp.comchcp 6500170⤵PID:3016
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost70⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3048
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"70⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1900 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f71⤵PID:2800
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\LYtwMYJNbKuv.bat" "71⤵PID:3924
-
C:\Windows\system32\chcp.comchcp 6500172⤵PID:4808
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost72⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:336
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"72⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3284 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f73⤵PID:4212
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\na3mzrKjhClF.bat" "73⤵PID:4756
-
C:\Windows\system32\chcp.comchcp 6500174⤵PID:1332
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost74⤵
- Runs ping.exe
PID:3256
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"74⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2224 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f75⤵
- Scheduled Task/Job: Scheduled Task
PID:2904
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\KMMqHlrgZJLy.bat" "75⤵PID:4632
-
C:\Windows\system32\chcp.comchcp 6500176⤵PID:3252
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost76⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3784
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"76⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2636 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f77⤵
- Scheduled Task/Job: Scheduled Task
PID:2076
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ykbSOGI3Pv1r.bat" "77⤵PID:3420
-
C:\Windows\system32\chcp.comchcp 6500178⤵PID:1800
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost78⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:784
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"78⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2700 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f79⤵
- Scheduled Task/Job: Scheduled Task
PID:3248
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5siPIFifiPlk.bat" "79⤵PID:1596
-
C:\Windows\system32\chcp.comchcp 6500180⤵PID:4680
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost80⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1716
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"80⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1084 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f81⤵
- Scheduled Task/Job: Scheduled Task
PID:3816
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3oyC1BrzIdje.bat" "81⤵PID:916
-
C:\Windows\system32\chcp.comchcp 6500182⤵PID:1572
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost82⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4272
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"82⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4252 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f83⤵PID:3188
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\wjJxfzNz04Td.bat" "83⤵PID:5092
-
C:\Windows\system32\chcp.comchcp 6500184⤵PID:1548
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost84⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2172
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"84⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2360 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f85⤵
- Scheduled Task/Job: Scheduled Task
PID:2940
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\KTqvAmO7pl6B.bat" "85⤵PID:1060
-
C:\Windows\system32\chcp.comchcp 6500186⤵PID:3004
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost86⤵
- Runs ping.exe
PID:3540
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"86⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4200 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f87⤵
- Scheduled Task/Job: Scheduled Task
PID:1956
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Mlnfoyfd86kG.bat" "87⤵PID:4312
-
C:\Windows\system32\chcp.comchcp 6500188⤵PID:1064
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost88⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:3948
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"88⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2280 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f89⤵
- Scheduled Task/Job: Scheduled Task
PID:3612
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\yFGZYUHXCzaX.bat" "89⤵PID:1396
-
C:\Windows\system32\chcp.comchcp 6500190⤵PID:3600
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost90⤵PID:2044
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"90⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4416 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f91⤵
- Scheduled Task/Job: Scheduled Task
PID:4212
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\yR5JFq7xGr6B.bat" "91⤵PID:2348
-
C:\Windows\system32\chcp.comchcp 6500192⤵PID:1688
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost92⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1436
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"92⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3488 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f93⤵
- Scheduled Task/Job: Scheduled Task
PID:912
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\38WyZwPSI6tq.bat" "93⤵PID:2924
-
C:\Windows\system32\chcp.comchcp 6500194⤵PID:576
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost94⤵
- Runs ping.exe
PID:3976
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"94⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1668 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f95⤵
- Scheduled Task/Job: Scheduled Task
PID:8
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\89cOQoHTsjsb.bat" "95⤵PID:2264
-
C:\Windows\system32\chcp.comchcp 6500196⤵PID:2056
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost96⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4636
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"96⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:788 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f97⤵
- Scheduled Task/Job: Scheduled Task
PID:1004
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JonEqMXDM2UR.bat" "97⤵PID:3396
-
C:\Windows\system32\chcp.comchcp 6500198⤵PID:4056
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost98⤵
- Runs ping.exe
PID:1596
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"98⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4352 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f99⤵
- Scheduled Task/Job: Scheduled Task
PID:4300
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\otIU1WvKuAnw.bat" "99⤵PID:1572
-
C:\Windows\system32\chcp.comchcp 65001100⤵PID:2432
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost100⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1328
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"100⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2876 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f101⤵
- Scheduled Task/Job: Scheduled Task
PID:2812
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\rf6gm5Zdpknt.bat" "101⤵PID:4976
-
C:\Windows\system32\chcp.comchcp 65001102⤵PID:4016
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost102⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2304
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"102⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3132 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f103⤵
- Scheduled Task/Job: Scheduled Task
PID:1296
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\SokRtsVr2e2c.bat" "103⤵PID:1196
-
C:\Windows\system32\chcp.comchcp 65001104⤵PID:3980
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost104⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3832
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"104⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4148 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f105⤵
- Scheduled Task/Job: Scheduled Task
PID:3756
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ayH1WtFa08jR.bat" "105⤵PID:1612
-
C:\Windows\system32\chcp.comchcp 65001106⤵PID:1216
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost106⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:728
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"106⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2380 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f107⤵
- Scheduled Task/Job: Scheduled Task
PID:1840
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\85KZtY5hiR4Y.bat" "107⤵PID:492
-
C:\Windows\system32\chcp.comchcp 65001108⤵PID:3600
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost108⤵
- Runs ping.exe
PID:4468
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"108⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1396 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f109⤵PID:408
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\fcewmHuwB7KM.bat" "109⤵PID:1460
-
C:\Windows\system32\chcp.comchcp 65001110⤵PID:1780
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost110⤵
- Runs ping.exe
PID:2348
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"110⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:464 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f111⤵
- Scheduled Task/Job: Scheduled Task
PID:1368
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\QbiX4QRD6hMB.bat" "111⤵PID:1536
-
C:\Windows\system32\chcp.comchcp 65001112⤵PID:5108
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost112⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4000
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"112⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2512 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f113⤵
- Scheduled Task/Job: Scheduled Task
PID:4112
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\r31m7SL3W43H.bat" "113⤵PID:1188
-
C:\Windows\system32\chcp.comchcp 65001114⤵PID:1100
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost114⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2808
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"114⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:440 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f115⤵PID:4764
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Om1tMn634S5A.bat" "115⤵PID:3480
-
C:\Windows\system32\chcp.comchcp 65001116⤵PID:4520
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost116⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1600
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"116⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3052 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f117⤵
- Scheduled Task/Job: Scheduled Task
PID:4860
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\J4IObizz5NgI.bat" "117⤵PID:4964
-
C:\Windows\system32\chcp.comchcp 65001118⤵PID:4832
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost118⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:852
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"118⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3148 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f119⤵
- Scheduled Task/Job: Scheduled Task
PID:2812
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\nuWZlN2GKn8w.bat" "119⤵PID:2304
-
C:\Windows\system32\chcp.comchcp 65001120⤵PID:2200
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost120⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:32
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"120⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4444 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f121⤵
- Scheduled Task/Job: Scheduled Task
PID:2420
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RZ12ePyQ9GaS.bat" "121⤵PID:344
-
C:\Windows\system32\chcp.comchcp 65001122⤵PID:3912
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-