Resubmissions
28-11-2024 19:40
241128-ydqnfaxqgy 1020-11-2024 16:31
241120-t1tw6azjfy 1020-11-2024 06:05
241120-gtdv5ssnes 1020-11-2024 06:00
241120-gqchxascje 1020-11-2024 05:52
241120-gk2kvaxkgn 1018-11-2024 21:54
241118-1sd93a1lfr 1017-11-2024 11:03
241117-m55qwsyemr 316-11-2024 19:06
241116-xsbmdssbkd 1016-11-2024 18:38
241116-w913ya1jcy 1016-11-2024 18:16
241116-wwkh2a1emm 10Analysis
-
max time kernel
1199s -
max time network
1202s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
28-11-2024 19:40
Static task
static1
Behavioral task
behavioral1
Sample
4363463463464363463463463.exe.zip
Resource
win11-20241007-en
General
-
Target
4363463463464363463463463.exe.zip
-
Size
4KB
-
MD5
16d34133af438a73419a49de605576d9
-
SHA1
c3dbcd70359fdad8835091c714a7a275c59bd732
-
SHA256
e4ec3a45621dd556deeea5f953fa05909c82630e9f17baf6b14272a0360d62d1
-
SHA512
59c0272d6faa2682b7a6ce1cd414d53cc39f06035f4f38a2e206965805034bf8012b02d59f428973965136d70c89f87ac3b17b5db9c1b1d49844be182b47a3d7
-
SSDEEP
96:xBf1inGx9SfZ+VCv3wlTDMQ1kyKXyyJNOBIKkNvL5qK+7zHf6MlYOQVPGmcEy:xBfwncSf8Cv3w9DZjKXjmBIKEvLs97D5
Malware Config
Extracted
http://37.1.196.35/un2/botui.dat
Extracted
phorphiex
http://185.215.113.66/
http://91.202.233.141/
0xCa90599132C4D88907Bd8E046540284aa468a035
TRuGGXNDM1cavQ1AqMQHG8yfxP4QWVSMN6
qph44jx8r9k5xeq5cuf958krv3ewrnp5vc6hhdjd3r
XryzFMFVpDUvU7famUGf214EXD3xNUSmQf
rsXCXBf9SagxV8JfC12d8Bybk84oPdMNN9
AULzfBuUAPfCGAXoG5Vq14aP9s6fx3AH4Z
LdgchXq1sKbAaAJ1EXAPSRBzLb8jnTZstT
MP8GEm8QpYgQYaMo8oM5NQhRBgDGiLZW5Q
4AtjkCVKbtEC3UEN77SQHuH9i1XkzNiRi5VCbA2XGsJh46nJSXfGQn4GjLuupCqmC57Lo7LvKmFUyRfhtJSvKvuw3h9ReKK
15TssKwtjMtwy4vDLcLsQUZUD2B9f7eDjw85sBNVC5LRPPnC
1BzmrjmKPKSR2hH5BeJySfiVA676E8DYaK
ltc1qt0n3f0t7vz9k0mvcswk477shrxwjhf9sj5ykrp
3PMiLynrGVZ8oEqvoqC4hXD67B1WoALR4pc
3ESHude8zUHksQg1h6hHmzY79BS36L91Yn
DLUzwvyxN1RrwjByUPPzVMdfxNRPGVRMMA
t1J6GCPCiHW1eRdjJgDDu6b1vSVmL5U7Twh
stars125f3mw4xd9htpsq4zj5w5ezm5gags37yxxh6mj
bnb1msyt0djx4ecspfxg5en0ye465kg3kmv9utzml2
bc1ppypcmu3684n648gyj62gjp2rw0xy7w3vwfamatlg29ajp4z52desafa0sr
bc1qc9edl4hzl9jyt8twdad3zjeh2df2znq96tdezd
GBQJMXYXPRIWFMXIFJR35ZB7LRKMB4PHCIUAUFR3TKUL6RDBZVLZEUJ3
bitcoincash:qph44jx8r9k5xeq5cuf958krv3ewrnp5vc6hhdjd3r
-
mutex
753f85d83d
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/128.0.0.0 Safari/537.36
Extracted
phorphiex
http://185.215.113.84
http://185.215.113.66
185.215.113.66
Extracted
quasar
1.4.0
Office04
microsoftsys.ddns.net:4782
67e0653d-eedf-4888-88ab-78e97eb2df27
-
encryption_key
23E5F6D22FEE1750D36544A759A48349B064BC34
-
install_name
PerfWatson1.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
svhost
-
subdirectory
KDOT
Signatures
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Exelastealer family
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Mimikatz family
-
Phorphiex family
-
Phorphiex payload 1 IoCs
Processes:
resource yara_rule behavioral1/files/0x001900000002aacc-58.dat family_phorphiex -
Quasar family
-
Quasar payload 2 IoCs
Processes:
resource yara_rule behavioral1/files/0x0002000000025cce-4142.dat family_quasar behavioral1/memory/1420-4149-0x0000000000230000-0x0000000000554000-memory.dmp family_quasar -
Suspicious use of NtCreateUserProcessOtherParentProcess 14 IoCs
Processes:
PURLOG.exe1622938899.exewinupsecvmgr.exeRestructuring.pifdescription pid Process procid_target PID 4444 created 3332 4444 PURLOG.exe 52 PID 4444 created 3332 4444 PURLOG.exe 52 PID 4444 created 3332 4444 PURLOG.exe 52 PID 4444 created 3332 4444 PURLOG.exe 52 PID 4444 created 3332 4444 PURLOG.exe 52 PID 4444 created 3332 4444 PURLOG.exe 52 PID 4444 created 3332 4444 PURLOG.exe 52 PID 4444 created 3332 4444 PURLOG.exe 52 PID 1372 created 3332 1372 1622938899.exe 52 PID 1372 created 3332 1372 1622938899.exe 52 PID 2028 created 3332 2028 winupsecvmgr.exe 52 PID 2028 created 3332 2028 winupsecvmgr.exe 52 PID 2028 created 3332 2028 winupsecvmgr.exe 52 PID 3488 created 3332 3488 Restructuring.pif 52 -
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
mimikatz is an open source tool to dump credentials on Windows 1 IoCs
Processes:
resource yara_rule behavioral1/files/0x000500000002a3da-4474.dat mimikatz -
Blocklisted process makes network request 12 IoCs
Processes:
powershell.exeflow pid Process 103 3204 powershell.exe 137 3204 powershell.exe 167 3204 powershell.exe 199 3204 powershell.exe 222 3204 powershell.exe 252 3204 powershell.exe 279 3204 powershell.exe 298 3204 powershell.exe 330 3204 powershell.exe 353 3204 powershell.exe 379 3204 powershell.exe 407 3204 powershell.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 2 IoCs
Processes:
netsh.exenetsh.exepid Process 764 netsh.exe 4860 netsh.exe -
Clipboard Data 1 TTPs 2 IoCs
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE 64 IoCs
Processes:
4363463463464363463463463.exeewrvuh.exePURLOG.exem.exetest16.exesysnldcvmr.exeup.exe1809827666.exe2420715866.exe1622938899.exe164314122.exewinupsecvmgr.exe2603430756.exe1888623094.exe1431716774.exepei.exePctOccurred.exebuilt.exe120131490.exePerfWatson1.exeRestructuring.pifPerfWatson1.exetwztl.exePerfWatson1.exebuild11.exestub.exe2641813856.exewin.exePerfWatson1.exesysnldcvmr.exePerfWatson1.exe2755424256.exe1716412561.exePerfWatson1.exeRestructuring.pif386833483.exe1259121635.exePerfWatson1.exe1592010501.exePerfWatson1.exePerfWatson1.exePerfWatson1.exePerfWatson1.exePerfWatson1.exePerfWatson1.exePerfWatson1.exePerfWatson1.exemimikatz.exepyl64.exePerfWatson1.exePerfWatson1.exePerfWatson1.exePerfWatson1.exePerfWatson1.exePerfWatson1.exePerfWatson1.exePerfWatson1.exePerfWatson1.exePerfWatson1.exePerfWatson1.exePerfWatson1.exePerfWatson1.exePerfWatson1.exePerfWatson1.exepid Process 5012 4363463463464363463463463.exe 2936 ewrvuh.exe 4444 PURLOG.exe 2308 m.exe 3344 test16.exe 3476 sysnldcvmr.exe 2776 up.exe 3116 1809827666.exe 2396 2420715866.exe 1372 1622938899.exe 4496 164314122.exe 2028 winupsecvmgr.exe 464 2603430756.exe 652 1888623094.exe 4348 1431716774.exe 5040 pei.exe 1940 PctOccurred.exe 1420 built.exe 4660 120131490.exe 2860 PerfWatson1.exe 3488 Restructuring.pif 5112 PerfWatson1.exe 1868 twztl.exe 1140 PerfWatson1.exe 2992 build11.exe 4824 stub.exe 1140 2641813856.exe 1560 win.exe 3288 PerfWatson1.exe 1064 sysnldcvmr.exe 2012 PerfWatson1.exe 2756 2755424256.exe 4720 1716412561.exe 4304 PerfWatson1.exe 5064 Restructuring.pif 1864 386833483.exe 3936 1259121635.exe 3112 PerfWatson1.exe 1580 1592010501.exe 240 PerfWatson1.exe 5096 PerfWatson1.exe 1964 PerfWatson1.exe 1544 PerfWatson1.exe 1444 PerfWatson1.exe 1540 PerfWatson1.exe 1816 PerfWatson1.exe 1096 PerfWatson1.exe 5028 mimikatz.exe 3828 pyl64.exe 3100 PerfWatson1.exe 976 PerfWatson1.exe 4840 PerfWatson1.exe 2616 PerfWatson1.exe 3372 PerfWatson1.exe 3900 PerfWatson1.exe 2916 PerfWatson1.exe 1376 PerfWatson1.exe 4444 PerfWatson1.exe 4476 PerfWatson1.exe 1036 PerfWatson1.exe 2420 PerfWatson1.exe 2340 PerfWatson1.exe 1116 PerfWatson1.exe 4652 PerfWatson1.exe -
Loads dropped DLL 32 IoCs
Processes:
stub.exepid Process 4824 stub.exe 4824 stub.exe 4824 stub.exe 4824 stub.exe 4824 stub.exe 4824 stub.exe 4824 stub.exe 4824 stub.exe 4824 stub.exe 4824 stub.exe 4824 stub.exe 4824 stub.exe 4824 stub.exe 4824 stub.exe 4824 stub.exe 4824 stub.exe 4824 stub.exe 4824 stub.exe 4824 stub.exe 4824 stub.exe 4824 stub.exe 4824 stub.exe 4824 stub.exe 4824 stub.exe 4824 stub.exe 4824 stub.exe 4824 stub.exe 4824 stub.exe 4824 stub.exe 4824 stub.exe 4824 stub.exe 4824 stub.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
win.exe2641813856.exem.exereg.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000\Software\Microsoft\Windows\CurrentVersion\Run\Administrator = "C:\\ProgramData\\Microsoft\\csrss.exe" win.exe Set value (str) \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Users\\Admin\\sysnldcvmr.exe" 2641813856.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysnldcvmr.exe" m.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Monster Update Service = "C:\\Users\\Admin\\AppData\\Local\\MonsterUpdateService\\Monster.exe" reg.exe -
Processes:
powershell.exepowershell.exepowershell.exepid Process 696 powershell.exe 1980 powershell.exe 3204 powershell.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
Processes:
flow ioc 3 raw.githubusercontent.com 36 raw.githubusercontent.com 57 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 7 ip-api.com -
Processes:
ARP.EXEcmd.exearp.exepid Process 4680 ARP.EXE 4228 cmd.exe 1768 arp.exe -
Enumerates processes with tasklist 1 TTPs 5 IoCs
Processes:
tasklist.exetasklist.exetasklist.exetasklist.exetasklist.exepid Process 1656 tasklist.exe 2904 tasklist.exe 2376 tasklist.exe 2504 tasklist.exe 4240 tasklist.exe -
Hide Artifacts: Hidden Files and Directories 1 TTPs 1 IoCs
-
Suspicious use of SetThreadContext 4 IoCs
Processes:
PURLOG.exewinupsecvmgr.exeRestructuring.pifdescription pid Process procid_target PID 4444 set thread context of 3736 4444 PURLOG.exe 107 PID 2028 set thread context of 2732 2028 winupsecvmgr.exe 121 PID 2028 set thread context of 3176 2028 winupsecvmgr.exe 122 PID 3488 set thread context of 5064 3488 Restructuring.pif 258 -
Drops file in Windows directory 3 IoCs
Processes:
m.exe2641813856.exedescription ioc Process File created C:\Windows\sysnldcvmr.exe m.exe File opened for modification C:\Windows\sysnldcvmr.exe m.exe File created C:\Windows\sysnldcvmr.exe 2641813856.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid Process 1036 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 9 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
Processes:
netsh.exenetsh.exenetsh.exedescription ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Permission Groups Discovery: Local Groups 1 TTPs
Attempt to find local system groups and permission settings.
-
System Location Discovery: System Language Discovery 1 TTPs 35 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
tasklist.exechoice.exe1716412561.exe1592010501.exefindstr.exeRestructuring.pifmimikatz.exeewrvuh.execmd.exetasklist.exe1259121635.exe1431716774.exe2603430756.exefindstr.execmd.exeup.exe1888623094.exePctOccurred.exe120131490.exe4363463463464363463463463.exe164314122.exeroute.exesysnldcvmr.exe2420715866.exe2641813856.exearp.exesysnldcvmr.exe386833483.exem.exefindstr.execmd.exeRestructuring.piftwztl.exewin.exepei.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1716412561.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1592010501.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Restructuring.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mimikatz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ewrvuh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1259121635.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1431716774.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2603430756.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language up.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1888623094.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PctOccurred.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 120131490.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4363463463464363463463463.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 164314122.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language route.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysnldcvmr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2420715866.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2641813856.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysnldcvmr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 386833483.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language m.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Restructuring.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language twztl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language win.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pei.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 64 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid Process 1792 PING.EXE 2672 PING.EXE 560 PING.EXE 2444 PING.EXE 2420 PING.EXE 4736 PING.EXE 540 PING.EXE 2308 PING.EXE 3296 PING.EXE 1420 PING.EXE 1368 PING.EXE 4660 PING.EXE 3604 PING.EXE 1840 PING.EXE 4768 PING.EXE 788 PING.EXE 2912 PING.EXE 1252 PING.EXE 5024 PING.EXE 764 PING.EXE 2428 PING.EXE 4476 PING.EXE 5016 PING.EXE 3484 PING.EXE 4500 PING.EXE 5092 PING.EXE 2244 PING.EXE 3844 PING.EXE 3536 PING.EXE 492 PING.EXE 4644 PING.EXE 3024 PING.EXE 3312 PING.EXE 2156 PING.EXE 2156 PING.EXE 3680 PING.EXE 5016 PING.EXE 2672 PING.EXE 3724 PING.EXE 3988 PING.EXE 4652 PING.EXE 2156 PING.EXE 2304 PING.EXE 1800 PING.EXE 1116 PING.EXE 1784 PING.EXE 1784 PING.EXE 4528 PING.EXE 1692 PING.EXE 2836 PING.EXE 1420 PING.EXE 2584 PING.EXE 3320 PING.EXE 3856 PING.EXE 4016 PING.EXE 3604 PING.EXE 4836 PING.EXE 1284 PING.EXE 4916 PING.EXE 176 PING.EXE 1388 PING.EXE 968 PING.EXE 2968 PING.EXE 4340 PING.EXE -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
-
System Network Connections Discovery 1 TTPs 1 IoCs
Attempt to get a listing of network connections.
-
NSIS installer 1 IoCs
Processes:
resource yara_rule behavioral1/files/0x0003000000000695-4325.dat nsis_installer_2 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
up.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI up.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI up.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI up.exe -
Collects information from the system 1 TTPs 1 IoCs
Uses WMIC.exe to find detailed system information.
-
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exeNETSTAT.EXEpid Process 2360 ipconfig.exe 3536 NETSTAT.EXE -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
-
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid Process 1068 taskkill.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 64 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid Process 4724 PING.EXE 1528 PING.EXE 788 PING.EXE 2304 PING.EXE 4972 PING.EXE 1800 PING.EXE 3596 PING.EXE 540 PING.EXE 4224 PING.EXE 4680 PING.EXE 3180 PING.EXE 2672 PING.EXE 4836 PING.EXE 3004 PING.EXE 3528 PING.EXE 2912 PING.EXE 2968 PING.EXE 764 PING.EXE 4652 PING.EXE 3988 PING.EXE 2428 PING.EXE 3296 PING.EXE 3720 PING.EXE 944 PING.EXE 3856 PING.EXE 4708 PING.EXE 176 PING.EXE 3536 PING.EXE 2584 PING.EXE 3604 PING.EXE 3896 PING.EXE 1692 PING.EXE 2908 PING.EXE 2444 PING.EXE 3312 PING.EXE 968 PING.EXE 5016 PING.EXE 3604 PING.EXE 1784 PING.EXE 1792 PING.EXE 1784 PING.EXE 1388 PING.EXE 2472 PING.EXE 2068 PING.EXE 3844 PING.EXE 3608 PING.EXE 4476 PING.EXE 5092 PING.EXE 1284 PING.EXE 2836 PING.EXE 3156 PING.EXE 5016 PING.EXE 400 PING.EXE 1604 PING.EXE 1420 PING.EXE 3856 PING.EXE 2156 PING.EXE 4916 PING.EXE 4980 PING.EXE 1220 PING.EXE 3008 PING.EXE 4340 PING.EXE 2156 PING.EXE 1816 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 64 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid Process 4240 schtasks.exe 2952 schtasks.exe 5052 schtasks.exe 1692 schtasks.exe 3116 schtasks.exe 1900 schtasks.exe 3892 schtasks.exe 720 schtasks.exe 4144 schtasks.exe 696 schtasks.exe 2836 schtasks.exe 4948 schtasks.exe 1540 schtasks.exe 4124 schtasks.exe 1996 schtasks.exe 2520 schtasks.exe 4404 schtasks.exe 3880 schtasks.exe 240 schtasks.exe 2368 schtasks.exe 4808 schtasks.exe 920 schtasks.exe 1904 schtasks.exe 4692 schtasks.exe 4072 schtasks.exe 4512 schtasks.exe 4288 schtasks.exe 1980 schtasks.exe 1220 schtasks.exe 1416 schtasks.exe 2968 schtasks.exe 1100 schtasks.exe 788 schtasks.exe 2584 schtasks.exe 2384 schtasks.exe 2392 schtasks.exe 4636 schtasks.exe 2016 schtasks.exe 1016 schtasks.exe 1144 schtasks.exe 920 schtasks.exe 232 schtasks.exe 3596 schtasks.exe 2996 schtasks.exe 1096 schtasks.exe 1052 schtasks.exe 2044 schtasks.exe 3160 schtasks.exe 3744 schtasks.exe 3432 schtasks.exe 1876 schtasks.exe 1316 schtasks.exe 1444 schtasks.exe 1244 schtasks.exe 4888 schtasks.exe 896 schtasks.exe 4484 schtasks.exe 4768 schtasks.exe 3512 schtasks.exe 3068 schtasks.exe 2808 schtasks.exe 2160 schtasks.exe 2000 schtasks.exe 4084 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 59 IoCs
Processes:
up.exe1809827666.exePURLOG.exepowershell.exe1622938899.exepowershell.exewinupsecvmgr.exepowershell.exeRestructuring.pifpowershell.exe2755424256.exepyl64.exepowershell.exepid Process 2776 up.exe 2776 up.exe 3116 1809827666.exe 4444 PURLOG.exe 4444 PURLOG.exe 4444 PURLOG.exe 4444 PURLOG.exe 4444 PURLOG.exe 4444 PURLOG.exe 4444 PURLOG.exe 4444 PURLOG.exe 4444 PURLOG.exe 4444 PURLOG.exe 4444 PURLOG.exe 4444 PURLOG.exe 4444 PURLOG.exe 4444 PURLOG.exe 4444 PURLOG.exe 4444 PURLOG.exe 4444 PURLOG.exe 4444 PURLOG.exe 4444 PURLOG.exe 4444 PURLOG.exe 4444 PURLOG.exe 4444 PURLOG.exe 3004 powershell.exe 1372 1622938899.exe 1372 1622938899.exe 696 powershell.exe 3004 powershell.exe 696 powershell.exe 1372 1622938899.exe 1372 1622938899.exe 2028 winupsecvmgr.exe 2028 winupsecvmgr.exe 1980 powershell.exe 1980 powershell.exe 2028 winupsecvmgr.exe 2028 winupsecvmgr.exe 2028 winupsecvmgr.exe 2028 winupsecvmgr.exe 3488 Restructuring.pif 3488 Restructuring.pif 3488 Restructuring.pif 3488 Restructuring.pif 3488 Restructuring.pif 3488 Restructuring.pif 1820 powershell.exe 1820 powershell.exe 1820 powershell.exe 2756 2755424256.exe 2756 2755424256.exe 3488 Restructuring.pif 3488 Restructuring.pif 3488 Restructuring.pif 3488 Restructuring.pif 3828 pyl64.exe 3204 powershell.exe 3204 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid Process 3332 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
7zFM.exe4363463463464363463463463.exePURLOG.exe1809827666.exepowershell.exepowershell.exeInstallUtil.exedescription pid Process Token: SeRestorePrivilege 2708 7zFM.exe Token: 35 2708 7zFM.exe Token: SeSecurityPrivilege 2708 7zFM.exe Token: SeDebugPrivilege 5012 4363463463464363463463463.exe Token: SeDebugPrivilege 4444 PURLOG.exe Token: SeDebugPrivilege 3116 1809827666.exe Token: SeDebugPrivilege 4444 PURLOG.exe Token: SeDebugPrivilege 3004 powershell.exe Token: SeDebugPrivilege 696 powershell.exe Token: SeDebugPrivilege 3736 InstallUtil.exe Token: SeIncreaseQuotaPrivilege 696 powershell.exe Token: SeSecurityPrivilege 696 powershell.exe Token: SeTakeOwnershipPrivilege 696 powershell.exe Token: SeLoadDriverPrivilege 696 powershell.exe Token: SeSystemProfilePrivilege 696 powershell.exe Token: SeSystemtimePrivilege 696 powershell.exe Token: SeProfSingleProcessPrivilege 696 powershell.exe Token: SeIncBasePriorityPrivilege 696 powershell.exe Token: SeCreatePagefilePrivilege 696 powershell.exe Token: SeBackupPrivilege 696 powershell.exe Token: SeRestorePrivilege 696 powershell.exe Token: SeShutdownPrivilege 696 powershell.exe Token: SeDebugPrivilege 696 powershell.exe Token: SeSystemEnvironmentPrivilege 696 powershell.exe Token: SeRemoteShutdownPrivilege 696 powershell.exe Token: SeUndockPrivilege 696 powershell.exe Token: SeManageVolumePrivilege 696 powershell.exe Token: 33 696 powershell.exe Token: 34 696 powershell.exe Token: 35 696 powershell.exe Token: 36 696 powershell.exe Token: SeIncreaseQuotaPrivilege 696 powershell.exe Token: SeSecurityPrivilege 696 powershell.exe Token: SeTakeOwnershipPrivilege 696 powershell.exe Token: SeLoadDriverPrivilege 696 powershell.exe Token: SeSystemProfilePrivilege 696 powershell.exe Token: SeSystemtimePrivilege 696 powershell.exe Token: SeProfSingleProcessPrivilege 696 powershell.exe Token: SeIncBasePriorityPrivilege 696 powershell.exe Token: SeCreatePagefilePrivilege 696 powershell.exe Token: SeBackupPrivilege 696 powershell.exe Token: SeRestorePrivilege 696 powershell.exe Token: SeShutdownPrivilege 696 powershell.exe Token: SeDebugPrivilege 696 powershell.exe Token: SeSystemEnvironmentPrivilege 696 powershell.exe Token: SeRemoteShutdownPrivilege 696 powershell.exe Token: SeUndockPrivilege 696 powershell.exe Token: SeManageVolumePrivilege 696 powershell.exe Token: 33 696 powershell.exe Token: 34 696 powershell.exe Token: 35 696 powershell.exe Token: 36 696 powershell.exe Token: SeIncreaseQuotaPrivilege 696 powershell.exe Token: SeSecurityPrivilege 696 powershell.exe Token: SeTakeOwnershipPrivilege 696 powershell.exe Token: SeLoadDriverPrivilege 696 powershell.exe Token: SeSystemProfilePrivilege 696 powershell.exe Token: SeSystemtimePrivilege 696 powershell.exe Token: SeProfSingleProcessPrivilege 696 powershell.exe Token: SeIncBasePriorityPrivilege 696 powershell.exe Token: SeCreatePagefilePrivilege 696 powershell.exe Token: SeBackupPrivilege 696 powershell.exe Token: SeRestorePrivilege 696 powershell.exe Token: SeShutdownPrivilege 696 powershell.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
7zFM.exedwm.exeRestructuring.pifpid Process 2708 7zFM.exe 2708 7zFM.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3488 Restructuring.pif 3488 Restructuring.pif 3488 Restructuring.pif 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
dwm.exeRestructuring.pifpid Process 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3488 Restructuring.pif 3488 Restructuring.pif 3488 Restructuring.pif 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe 3176 dwm.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
Processes:
m.exeup.exepei.exePctOccurred.exe120131490.exeRestructuring.pifPerfWatson1.exetwztl.exePerfWatson1.exebuild11.exestub.exePerfWatson1.exePerfWatson1.exeRestructuring.pifmimikatz.exePerfWatson1.exepid Process 2308 m.exe 2776 up.exe 2776 up.exe 5040 pei.exe 1940 PctOccurred.exe 4660 120131490.exe 3488 Restructuring.pif 5112 PerfWatson1.exe 1868 twztl.exe 1140 PerfWatson1.exe 2992 build11.exe 4824 stub.exe 3288 PerfWatson1.exe 2012 PerfWatson1.exe 5064 Restructuring.pif 5028 mimikatz.exe 4092 PerfWatson1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
4363463463464363463463463.exem.exesysnldcvmr.exe1809827666.execmd.execmd.exe2420715866.exePURLOG.exewinupsecvmgr.exedescription pid Process procid_target PID 5012 wrote to memory of 2936 5012 4363463463464363463463463.exe 83 PID 5012 wrote to memory of 2936 5012 4363463463464363463463463.exe 83 PID 5012 wrote to memory of 2936 5012 4363463463464363463463463.exe 83 PID 5012 wrote to memory of 4444 5012 4363463463464363463463463.exe 85 PID 5012 wrote to memory of 4444 5012 4363463463464363463463463.exe 85 PID 5012 wrote to memory of 2308 5012 4363463463464363463463463.exe 86 PID 5012 wrote to memory of 2308 5012 4363463463464363463463463.exe 86 PID 5012 wrote to memory of 2308 5012 4363463463464363463463463.exe 86 PID 5012 wrote to memory of 3344 5012 4363463463464363463463463.exe 87 PID 5012 wrote to memory of 3344 5012 4363463463464363463463463.exe 87 PID 2308 wrote to memory of 3476 2308 m.exe 88 PID 2308 wrote to memory of 3476 2308 m.exe 88 PID 2308 wrote to memory of 3476 2308 m.exe 88 PID 5012 wrote to memory of 2776 5012 4363463463464363463463463.exe 89 PID 5012 wrote to memory of 2776 5012 4363463463464363463463463.exe 89 PID 5012 wrote to memory of 2776 5012 4363463463464363463463463.exe 89 PID 3476 wrote to memory of 3116 3476 sysnldcvmr.exe 90 PID 3476 wrote to memory of 3116 3476 sysnldcvmr.exe 90 PID 3116 wrote to memory of 1940 3116 1809827666.exe 91 PID 3116 wrote to memory of 1940 3116 1809827666.exe 91 PID 3116 wrote to memory of 1544 3116 1809827666.exe 93 PID 3116 wrote to memory of 1544 3116 1809827666.exe 93 PID 1940 wrote to memory of 4220 1940 cmd.exe 95 PID 1940 wrote to memory of 4220 1940 cmd.exe 95 PID 1544 wrote to memory of 4060 1544 cmd.exe 96 PID 1544 wrote to memory of 4060 1544 cmd.exe 96 PID 3476 wrote to memory of 2396 3476 sysnldcvmr.exe 97 PID 3476 wrote to memory of 2396 3476 sysnldcvmr.exe 97 PID 3476 wrote to memory of 2396 3476 sysnldcvmr.exe 97 PID 2396 wrote to memory of 1372 2396 2420715866.exe 98 PID 2396 wrote to memory of 1372 2396 2420715866.exe 98 PID 3476 wrote to memory of 4496 3476 sysnldcvmr.exe 99 PID 3476 wrote to memory of 4496 3476 sysnldcvmr.exe 99 PID 3476 wrote to memory of 4496 3476 sysnldcvmr.exe 99 PID 4444 wrote to memory of 3148 4444 PURLOG.exe 100 PID 4444 wrote to memory of 3148 4444 PURLOG.exe 100 PID 4444 wrote to memory of 700 4444 PURLOG.exe 101 PID 4444 wrote to memory of 700 4444 PURLOG.exe 101 PID 4444 wrote to memory of 1676 4444 PURLOG.exe 102 PID 4444 wrote to memory of 1676 4444 PURLOG.exe 102 PID 4444 wrote to memory of 784 4444 PURLOG.exe 103 PID 4444 wrote to memory of 784 4444 PURLOG.exe 103 PID 4444 wrote to memory of 1224 4444 PURLOG.exe 104 PID 4444 wrote to memory of 1224 4444 PURLOG.exe 104 PID 4444 wrote to memory of 2480 4444 PURLOG.exe 105 PID 4444 wrote to memory of 2480 4444 PURLOG.exe 105 PID 4444 wrote to memory of 3368 4444 PURLOG.exe 106 PID 4444 wrote to memory of 3368 4444 PURLOG.exe 106 PID 4444 wrote to memory of 3736 4444 PURLOG.exe 107 PID 4444 wrote to memory of 3736 4444 PURLOG.exe 107 PID 4444 wrote to memory of 3736 4444 PURLOG.exe 107 PID 4444 wrote to memory of 3736 4444 PURLOG.exe 107 PID 4444 wrote to memory of 3736 4444 PURLOG.exe 107 PID 4444 wrote to memory of 3736 4444 PURLOG.exe 107 PID 4444 wrote to memory of 3736 4444 PURLOG.exe 107 PID 4444 wrote to memory of 3004 4444 PURLOG.exe 108 PID 4444 wrote to memory of 3004 4444 PURLOG.exe 108 PID 3476 wrote to memory of 464 3476 sysnldcvmr.exe 117 PID 3476 wrote to memory of 464 3476 sysnldcvmr.exe 117 PID 3476 wrote to memory of 464 3476 sysnldcvmr.exe 117 PID 2028 wrote to memory of 2732 2028 winupsecvmgr.exe 121 PID 2028 wrote to memory of 3176 2028 winupsecvmgr.exe 122 PID 3476 wrote to memory of 652 3476 sysnldcvmr.exe 123 PID 3476 wrote to memory of 652 3476 sysnldcvmr.exe 123 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:3332 -
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe.zip"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2708
-
-
C:\Users\Admin\Desktop\4363463463464363463463463.exe"C:\Users\Admin\Desktop\4363463463464363463463463.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Users\Admin\Desktop\Files\ewrvuh.exe"C:\Users\Admin\Desktop\Files\ewrvuh.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2936
-
-
C:\Users\Admin\Desktop\Files\PURLOG.exe"C:\Users\Admin\Desktop\Files\PURLOG.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" Start-Sleep -Seconds 5; Remove-Item -Path 'C:\Users\Admin\Desktop\Files\PURLOG.exe' -Force4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3004
-
-
-
C:\Users\Admin\Desktop\Files\m.exe"C:\Users\Admin\Desktop\Files\m.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\sysnldcvmr.exeC:\Windows\sysnldcvmr.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Users\Admin\AppData\Local\Temp\1809827666.exeC:\Users\Admin\AppData\Local\Temp\1809827666.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f6⤵
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f7⤵PID:4220
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager"6⤵
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\system32\schtasks.exeschtasks /delete /f /tn "Windows Upgrade Manager"7⤵PID:4060
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2420715866.exeC:\Users\Admin\AppData\Local\Temp\2420715866.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\1622938899.exeC:\Users\Admin\AppData\Local\Temp\1622938899.exe6⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1372
-
-
-
C:\Users\Admin\AppData\Local\Temp\164314122.exeC:\Users\Admin\AppData\Local\Temp\164314122.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4496
-
-
C:\Users\Admin\AppData\Local\Temp\2603430756.exeC:\Users\Admin\AppData\Local\Temp\2603430756.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:464
-
-
C:\Users\Admin\AppData\Local\Temp\1888623094.exeC:\Users\Admin\AppData\Local\Temp\1888623094.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:652 -
C:\Users\Admin\AppData\Local\Temp\1431716774.exeC:\Users\Admin\AppData\Local\Temp\1431716774.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4348
-
-
-
C:\Users\Admin\AppData\Local\Temp\2641813856.exeC:\Users\Admin\AppData\Local\Temp\2641813856.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1140 -
C:\Users\Admin\sysnldcvmr.exeC:\Users\Admin\sysnldcvmr.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\2755424256.exeC:\Users\Admin\AppData\Local\Temp\2755424256.exe7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2756 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f8⤵PID:3368
-
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f9⤵PID:1596
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager"8⤵PID:1900
-
C:\Windows\system32\schtasks.exeschtasks /delete /f /tn "Windows Upgrade Manager"9⤵PID:1532
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1716412561.exeC:\Users\Admin\AppData\Local\Temp\1716412561.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4720
-
-
C:\Users\Admin\AppData\Local\Temp\386833483.exeC:\Users\Admin\AppData\Local\Temp\386833483.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1864
-
-
C:\Users\Admin\AppData\Local\Temp\1259121635.exeC:\Users\Admin\AppData\Local\Temp\1259121635.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3936
-
-
C:\Users\Admin\AppData\Local\Temp\1592010501.exeC:\Users\Admin\AppData\Local\Temp\1592010501.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1580
-
-
-
-
-
-
C:\Users\Admin\Desktop\Files\test16.exe"C:\Users\Admin\Desktop\Files\test16.exe"3⤵
- Executes dropped EXE
PID:3344
-
-
C:\Users\Admin\Desktop\Files\up.exe"C:\Users\Admin\Desktop\Files\up.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2776
-
-
C:\Users\Admin\Desktop\Files\pei.exe"C:\Users\Admin\Desktop\Files\pei.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\120131490.exeC:\Users\Admin\AppData\Local\Temp\120131490.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4660
-
-
-
C:\Users\Admin\Desktop\Files\PctOccurred.exe"C:\Users\Admin\Desktop\Files\PctOccurred.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1940 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k move Powell Powell.cmd & Powell.cmd & exit4⤵
- System Location Discovery: System Language Discovery
PID:2844 -
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
PID:4240
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa.exe opssvc.exe"5⤵
- System Location Discovery: System Language Discovery
PID:4800
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
PID:1656
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui.exe avgui.exe bdservicehost.exe ekrn.exe nswscsvc.exe sophoshealth.exe"5⤵
- System Location Discovery: System Language Discovery
PID:2312
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 1939975⤵
- System Location Discovery: System Language Discovery
PID:4948
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "JulieAppMagneticWhenever" Hist5⤵
- System Location Discovery: System Language Discovery
PID:4968
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Medicines + ..\While + ..\Remained + ..\Bs + ..\Ak + ..\Statistical + ..\Entity + ..\Autumn + ..\Scott + ..\Keyboards y5⤵
- System Location Discovery: System Language Discovery
PID:388
-
-
C:\Users\Admin\AppData\Local\Temp\193997\Restructuring.pifRestructuring.pif y5⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3488
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 55⤵
- System Location Discovery: System Language Discovery
PID:1108
-
-
-
-
C:\Users\Admin\Desktop\Files\built.exe"C:\Users\Admin\Desktop\Files\built.exe"3⤵
- Executes dropped EXE
PID:1420 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\Desktop\Files\built.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:3892
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"4⤵
- Executes dropped EXE
PID:2860 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:1996
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\AFtqGY9CJmsw.bat" "5⤵PID:1676
-
C:\Windows\system32\chcp.comchcp 650016⤵PID:608
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:3724
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5112 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f7⤵PID:400
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\KH8E5zcj0SFv.bat" "7⤵PID:1864
-
C:\Windows\system32\chcp.comchcp 650018⤵PID:1632
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost8⤵
- Runs ping.exe
PID:3156
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1140 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f9⤵PID:1500
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\xFBWy8CFEcYS.bat" "9⤵PID:3080
-
C:\Windows\system32\chcp.comchcp 6500110⤵PID:4832
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost10⤵PID:2300
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3288 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f11⤵
- Scheduled Task/Job: Scheduled Task
PID:4484
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4dCnvsGHvDiU.bat" "11⤵PID:1904
-
C:\Windows\system32\chcp.comchcp 6500112⤵PID:4240
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1420
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"12⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2012 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f13⤵
- Scheduled Task/Job: Scheduled Task
PID:2836
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tL6XnagKaIgV.bat" "13⤵PID:228
-
C:\Windows\system32\chcp.comchcp 6500114⤵PID:232
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost14⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1252
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"14⤵
- Executes dropped EXE
PID:4304 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f15⤵PID:2308
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7BKgyAACbrJA.bat" "15⤵PID:888
-
C:\Windows\system32\chcp.comchcp 6500116⤵PID:2204
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost16⤵
- Runs ping.exe
PID:3008
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"16⤵
- Executes dropped EXE
PID:3112 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f17⤵PID:4900
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\CA5zFxSvwcz3.bat" "17⤵PID:1112
-
C:\Windows\system32\chcp.comchcp 6500118⤵PID:560
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost18⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:5024
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"18⤵
- Executes dropped EXE
PID:240 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f19⤵
- Scheduled Task/Job: Scheduled Task
PID:3160
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\KpJaritWY7Wn.bat" "19⤵PID:1316
-
C:\Windows\system32\chcp.comchcp 6500120⤵PID:4032
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost20⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1388
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"20⤵
- Executes dropped EXE
PID:5096 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f21⤵PID:1772
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Z6r9qEeCxRa3.bat" "21⤵PID:1944
-
C:\Windows\system32\chcp.comchcp 6500122⤵PID:2800
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost22⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3604
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"22⤵
- Executes dropped EXE
PID:1964 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f23⤵
- Scheduled Task/Job: Scheduled Task
PID:4636
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\aViE447TG4FZ.bat" "23⤵PID:3156
-
C:\Windows\system32\chcp.comchcp 6500124⤵PID:3148
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost24⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3844
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"24⤵
- Executes dropped EXE
PID:1544 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f25⤵
- Scheduled Task/Job: Scheduled Task
PID:2808
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\YyhvHPvCwEdk.bat" "25⤵PID:1104
-
C:\Windows\system32\chcp.comchcp 6500126⤵PID:4896
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost26⤵PID:2300
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"26⤵
- Executes dropped EXE
PID:1444 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f27⤵
- Scheduled Task/Job: Scheduled Task
PID:1904
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zewdvRql0rBF.bat" "27⤵PID:1872
-
C:\Windows\system32\chcp.comchcp 6500128⤵PID:3300
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost28⤵
- Runs ping.exe
PID:2908
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"28⤵
- Executes dropped EXE
PID:1540 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f29⤵PID:3704
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\XOkfOCapixH2.bat" "29⤵PID:4836
-
C:\Windows\system32\chcp.comchcp 6500130⤵PID:1376
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost30⤵
- Runs ping.exe
PID:4980
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"30⤵
- Executes dropped EXE
PID:1816 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f31⤵PID:4916
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\XWV5LILmwDkB.bat" "31⤵PID:2252
-
C:\Windows\system32\chcp.comchcp 6500132⤵PID:4288
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost32⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1840
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"32⤵
- Executes dropped EXE
PID:1096 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f33⤵PID:3576
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tqd9bvEpV0ua.bat" "33⤵PID:1292
-
C:\Windows\system32\chcp.comchcp 6500134⤵PID:3908
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost34⤵
- Runs ping.exe
PID:2472
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"34⤵
- Executes dropped EXE
PID:3100 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f35⤵
- Scheduled Task/Job: Scheduled Task
PID:1980
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ftw3mqLVpZtH.bat" "35⤵PID:2676
-
C:\Windows\system32\chcp.comchcp 6500136⤵PID:3164
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost36⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2444
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"36⤵
- Executes dropped EXE
PID:976 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f37⤵
- Scheduled Task/Job: Scheduled Task
PID:1540
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sLyrJp9hZt1l.bat" "37⤵PID:2736
-
C:\Windows\system32\chcp.comchcp 6500138⤵PID:1416
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost38⤵
- Runs ping.exe
PID:3180
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"38⤵
- Executes dropped EXE
PID:4840 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f39⤵PID:1816
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\TvXcYRAMCmLa.bat" "39⤵PID:4972
-
C:\Windows\system32\chcp.comchcp 6500140⤵PID:788
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost40⤵PID:4488
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"40⤵
- Executes dropped EXE
PID:2616 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f41⤵PID:4336
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\v1MqV8zS0keO.bat" "41⤵PID:2780
-
C:\Windows\system32\chcp.comchcp 6500142⤵PID:1704
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost42⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3536
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"42⤵
- Executes dropped EXE
PID:3372 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f43⤵PID:4724
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\WED4FLMtlykw.bat" "43⤵PID:5080
-
C:\Windows\system32\chcp.comchcp 6500144⤵PID:4976
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost44⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4736
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"44⤵
- Executes dropped EXE
PID:3900 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f45⤵PID:920
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\P735ONMHFgAv.bat" "45⤵PID:3300
-
C:\Windows\system32\chcp.comchcp 6500146⤵PID:2324
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost46⤵PID:1860
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"46⤵
- Executes dropped EXE
PID:2916 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f47⤵
- Scheduled Task/Job: Scheduled Task
PID:2996
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\MgWZXJj8dCjb.bat" "47⤵PID:1904
-
C:\Windows\system32\chcp.comchcp 6500148⤵PID:3280
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost48⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1116
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"48⤵
- Executes dropped EXE
PID:1376 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f49⤵
- Scheduled Task/Job: Scheduled Task
PID:1416
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\gNnc9t1MefMS.bat" "49⤵PID:3068
-
C:\Windows\system32\chcp.comchcp 6500150⤵PID:3016
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost50⤵
- Runs ping.exe
PID:1816
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"50⤵
- Executes dropped EXE
PID:4444 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f51⤵PID:788
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\eWdLSNzWVWXx.bat" "51⤵PID:2008
-
C:\Windows\system32\chcp.comchcp 6500152⤵PID:3448
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost52⤵
- Runs ping.exe
PID:4224
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"52⤵
- Executes dropped EXE
PID:4476 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f53⤵PID:228
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ClAP8OY0qr7E.bat" "53⤵PID:3024
-
C:\Windows\system32\chcp.comchcp 6500154⤵PID:2396
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost54⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4016
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"54⤵
- Executes dropped EXE
PID:1036 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f55⤵
- Scheduled Task/Job: Scheduled Task
PID:1096
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\mnB15KcaDiYm.bat" "55⤵PID:3944
-
C:\Windows\system32\chcp.comchcp 6500156⤵PID:1876
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost56⤵PID:2156
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"56⤵
- Executes dropped EXE
PID:2420 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f57⤵PID:196
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Gx59zxdPG3VG.bat" "57⤵PID:3900
-
C:\Windows\system32\chcp.comchcp 6500158⤵PID:1536
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost58⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:540
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"58⤵
- Executes dropped EXE
PID:2340 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f59⤵
- Scheduled Task/Job: Scheduled Task
PID:4512
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\l0sKY7ywAZNP.bat" "59⤵PID:1120
-
C:\Windows\system32\chcp.comchcp 6500160⤵PID:2368
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost60⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1784
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"60⤵
- Executes dropped EXE
PID:1116 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f61⤵
- Scheduled Task/Job: Scheduled Task
PID:3596
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\C0h7HxYaBUBo.bat" "61⤵PID:3328
-
C:\Windows\system32\chcp.comchcp 6500162⤵PID:3528
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost62⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2968
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"62⤵
- Executes dropped EXE
PID:4652 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f63⤵
- Scheduled Task/Job: Scheduled Task
PID:720
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Wx6Kph6nz0Zz.bat" "63⤵PID:3420
-
C:\Windows\system32\chcp.comchcp 6500164⤵PID:2836
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost64⤵PID:1484
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"64⤵PID:4308
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f65⤵PID:856
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\vh0wSPmbBKyc.bat" "65⤵PID:2504
-
C:\Windows\system32\chcp.comchcp 6500166⤵PID:3896
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost66⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4476
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"66⤵PID:3488
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f67⤵
- Scheduled Task/Job: Scheduled Task
PID:1144
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zhedrrgYdTXc.bat" "67⤵PID:684
-
C:\Windows\system32\chcp.comchcp 6500168⤵PID:960
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost68⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2308
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"68⤵PID:4108
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f69⤵
- Scheduled Task/Job: Scheduled Task
PID:1692
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\r1Ny2AwHZby2.bat" "69⤵PID:2112
-
C:\Windows\system32\chcp.comchcp 6500170⤵PID:1980
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost70⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2420
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"70⤵PID:1944
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f71⤵
- Scheduled Task/Job: Scheduled Task
PID:4124
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\d0KT3AhTwW64.bat" "71⤵PID:4276
-
C:\Windows\system32\chcp.comchcp 6500172⤵PID:1420
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost72⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1792
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"72⤵PID:2584
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f73⤵
- Scheduled Task/Job: Scheduled Task
PID:2016
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ccP8MoMSkZZY.bat" "73⤵PID:3280
-
C:\Windows\system32\chcp.comchcp 6500174⤵PID:1388
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost74⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4528
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"74⤵PID:988
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f75⤵
- Scheduled Task/Job: Scheduled Task
PID:3880
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\phQRykera6C2.bat" "75⤵PID:832
-
C:\Windows\system32\chcp.comchcp 6500176⤵PID:1448
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost76⤵
- Runs ping.exe
PID:2068
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"76⤵PID:2092
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f77⤵PID:4284
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\F2sRNGlhbro7.bat" "77⤵PID:2012
-
C:\Windows\system32\chcp.comchcp 6500178⤵PID:3608
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost78⤵PID:5024
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"78⤵PID:828
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f79⤵
- Scheduled Task/Job: Scheduled Task
PID:4144
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\SgiXdtrMxqTA.bat" "79⤵PID:3372
-
C:\Windows\system32\chcp.comchcp 6500180⤵PID:4220
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost80⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:3484
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"80⤵PID:1252
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f81⤵
- Scheduled Task/Job: Scheduled Task
PID:896
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RJf0VG3ZT1TF.bat" "81⤵PID:4780
-
C:\Windows\system32\chcp.comchcp 6500182⤵PID:1968
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost82⤵PID:5080
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"82⤵PID:2560
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f83⤵
- Scheduled Task/Job: Scheduled Task
PID:4692
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\WSrXY5OEpBpo.bat" "83⤵PID:2660
-
C:\Windows\system32\chcp.comchcp 6500184⤵PID:1944
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost84⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1420
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"84⤵PID:1956
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f85⤵PID:2996
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\GSS5rvdHHUg7.bat" "85⤵PID:4768
-
C:\Windows\system32\chcp.comchcp 6500186⤵PID:792
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost86⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2584
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"86⤵PID:1316
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f87⤵PID:1416
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\HOjTmXfky7zS.bat" "87⤵PID:3016
-
C:\Windows\system32\chcp.comchcp 6500188⤵PID:3624
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost88⤵PID:1300
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"88⤵PID:1572
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f89⤵
- Scheduled Task/Job: Scheduled Task
PID:4240
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\P46oJqKvEUuL.bat" "89⤵PID:3632
-
C:\Windows\system32\chcp.comchcp 6500190⤵PID:788
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost90⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3988
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"90⤵PID:2616
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f91⤵PID:1940
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\uM3DIavRGUUm.bat" "91⤵PID:2492
-
C:\Windows\system32\chcp.comchcp 6500192⤵PID:1292
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost92⤵
- Runs ping.exe
PID:4724
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"92⤵PID:4636
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f93⤵
- Scheduled Task/Job: Scheduled Task
PID:2160
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\MTrnWyhLZ4vu.bat" "93⤵PID:1104
-
C:\Windows\system32\chcp.comchcp 6500194⤵PID:1876
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost94⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3604
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"94⤵PID:1496
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f95⤵
- Scheduled Task/Job: Scheduled Task
PID:2952
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\oywZ1RjYJL2A.bat" "95⤵PID:3900
-
C:\Windows\system32\chcp.comchcp 6500196⤵PID:4100
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost96⤵PID:1108
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"96⤵PID:4844
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f97⤵
- Scheduled Task/Job: Scheduled Task
PID:3744
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\lP0orEwl6YvE.bat" "97⤵PID:4244
-
C:\Windows\system32\chcp.comchcp 6500198⤵PID:2100
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost98⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5016
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"98⤵PID:1900
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f99⤵
- Scheduled Task/Job: Scheduled Task
PID:1100
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7MwdS0Tay599.bat" "99⤵PID:3280
-
C:\Windows\system32\chcp.comchcp 65001100⤵PID:1772
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost100⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:764
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"100⤵PID:228
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f101⤵PID:752
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RgeIEF7Q8B77.bat" "101⤵PID:488
-
C:\Windows\system32\chcp.comchcp 65001102⤵PID:4800
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost102⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4652
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"102⤵PID:2516
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f103⤵PID:4336
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\bv2QoIJkJ2lv.bat" "103⤵PID:1320
-
C:\Windows\system32\chcp.comchcp 65001104⤵PID:2868
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost104⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2428
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"104⤵PID:828
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f105⤵
- Scheduled Task/Job: Scheduled Task
PID:4072
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DJLmcAudmnxS.bat" "105⤵PID:1144
-
C:\Windows\system32\chcp.comchcp 65001106⤵PID:4808
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost106⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2672
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"106⤵PID:2480
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f107⤵PID:3892
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\y6JqB1ZW4QlC.bat" "107⤵PID:4484
-
C:\Windows\system32\chcp.comchcp 65001108⤵PID:560
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost108⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4340
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"108⤵PID:2384
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f109⤵PID:652
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\oheNI52vPxpY.bat" "109⤵PID:2660
-
C:\Windows\system32\chcp.comchcp 65001110⤵PID:2296
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost110⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4836
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"110⤵PID:1232
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f111⤵PID:2100
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\engfbP3sWEP9.bat" "111⤵PID:2648
-
C:\Windows\system32\chcp.comchcp 65001112⤵PID:240
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost112⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4768
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"112⤵PID:5116
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f113⤵PID:3680
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4IqHJVBZHywJ.bat" "113⤵PID:3528
-
C:\Windows\system32\chcp.comchcp 65001114⤵PID:752
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost114⤵PID:1000
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"114⤵PID:1084
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f115⤵
- Scheduled Task/Job: Scheduled Task
PID:1052
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\hB4rphTfmte1.bat" "115⤵PID:1840
-
C:\Windows\system32\chcp.comchcp 65001116⤵PID:3152
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost116⤵
- Runs ping.exe
PID:1528
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"116⤵PID:3468
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f117⤵
- Scheduled Task/Job: Scheduled Task
PID:3432
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\6m5RfUXaVESo.bat" "117⤵PID:1212
-
C:\Windows\system32\chcp.comchcp 65001118⤵PID:3844
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost118⤵
- Runs ping.exe
PID:3896
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"118⤵PID:1228
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f119⤵
- Scheduled Task/Job: Scheduled Task
PID:1876
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Is8qQeJEEeAb.bat" "119⤵PID:2160
-
C:\Windows\system32\chcp.comchcp 65001120⤵PID:3164
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost120⤵PID:2284
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"120⤵PID:560
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f121⤵
- Scheduled Task/Job: Scheduled Task
PID:2520
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\U8BzXMUL4x7I.bat" "121⤵PID:2164
-
C:\Windows\system32\chcp.comchcp 65001122⤵PID:2704
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-