Analysis
-
max time kernel
1048s -
max time network
1048s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-11-2024 16:11
Behavioral task
behavioral1
Sample
Nemoxen.exe
Resource
win7-20240903-en
General
-
Target
Nemoxen.exe
-
Size
676KB
-
MD5
fd73b0b44b2d461b5f9fb9a8180de4be
-
SHA1
a22b3c1d4a77c8235a571229ce7f0aba31af9132
-
SHA256
8efc6505cd59fe757f371ff542e6a8b24ec29f8afb044c5dc32522e23a6cf4cb
-
SHA512
7665831e06ecab15114b391835d2a5df9dd7a3bcf05f63b6319f7260b7ea1cb97a9fa522cfe65563c48cc882a72ee004ba1b6392ce381008361a397e3b27871e
-
SSDEEP
12288:jTEgdfY2xUscjiez4EywIdp+sc8cdd+8:8UwQQrywIdpjcd48
Malware Config
Extracted
quasar
1.4.0
Neoxen
i92.168.0.42:4782
5e5c2635-6e73-4945-84d1-6fff2a604503
-
encryption_key
4D634613C08A5953B861CE48D768ABEFCD1484A3
-
install_name
coolpro12.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Neoxen
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 39 IoCs
resource yara_rule behavioral1/memory/2244-1-0x0000000000360000-0x0000000000410000-memory.dmp family_quasar behavioral1/files/0x000800000001686c-5.dat family_quasar behavioral1/memory/2436-7-0x0000000000F90000-0x0000000001040000-memory.dmp family_quasar behavioral1/memory/2636-22-0x0000000000FB0000-0x0000000001060000-memory.dmp family_quasar behavioral1/memory/3016-34-0x0000000000200000-0x00000000002B0000-memory.dmp family_quasar behavioral1/memory/2848-75-0x0000000000A90000-0x0000000000B40000-memory.dmp family_quasar behavioral1/memory/2744-97-0x0000000001080000-0x0000000001130000-memory.dmp family_quasar behavioral1/memory/2336-191-0x0000000000110000-0x00000000001C0000-memory.dmp family_quasar behavioral1/memory/2284-202-0x0000000001150000-0x0000000001200000-memory.dmp family_quasar behavioral1/memory/2804-235-0x0000000001330000-0x00000000013E0000-memory.dmp family_quasar behavioral1/memory/2680-246-0x0000000001380000-0x0000000001430000-memory.dmp family_quasar behavioral1/memory/592-289-0x0000000000250000-0x0000000000300000-memory.dmp family_quasar behavioral1/memory/2296-300-0x00000000009C0000-0x0000000000A70000-memory.dmp family_quasar behavioral1/memory/2300-309-0x0000000001190000-0x0000000001240000-memory.dmp family_quasar behavioral1/memory/1648-438-0x00000000000F0000-0x00000000001A0000-memory.dmp family_quasar behavioral1/memory/2136-447-0x0000000000860000-0x0000000000910000-memory.dmp family_quasar behavioral1/memory/2504-456-0x0000000000F50000-0x0000000001000000-memory.dmp family_quasar behavioral1/memory/1332-465-0x0000000001060000-0x0000000001110000-memory.dmp family_quasar behavioral1/memory/2000-474-0x0000000000210000-0x00000000002C0000-memory.dmp family_quasar behavioral1/memory/2564-483-0x0000000001350000-0x0000000001400000-memory.dmp family_quasar behavioral1/memory/920-508-0x00000000001F0000-0x00000000002A0000-memory.dmp family_quasar behavioral1/memory/880-517-0x00000000008B0000-0x0000000000960000-memory.dmp family_quasar behavioral1/memory/1836-534-0x0000000000380000-0x0000000000430000-memory.dmp family_quasar behavioral1/memory/1144-543-0x0000000000170000-0x0000000000220000-memory.dmp family_quasar behavioral1/memory/1792-560-0x00000000000A0000-0x0000000000150000-memory.dmp family_quasar behavioral1/memory/2592-569-0x00000000012A0000-0x0000000001350000-memory.dmp family_quasar behavioral1/memory/876-578-0x00000000002B0000-0x0000000000360000-memory.dmp family_quasar behavioral1/memory/688-587-0x00000000001E0000-0x0000000000290000-memory.dmp family_quasar behavioral1/memory/1048-596-0x0000000000C30000-0x0000000000CE0000-memory.dmp family_quasar behavioral1/memory/3036-613-0x0000000001260000-0x0000000001310000-memory.dmp family_quasar behavioral1/memory/2968-622-0x00000000002E0000-0x0000000000390000-memory.dmp family_quasar behavioral1/memory/1748-631-0x0000000001210000-0x00000000012C0000-memory.dmp family_quasar behavioral1/memory/924-728-0x0000000000160000-0x0000000000210000-memory.dmp family_quasar behavioral1/memory/184-737-0x00000000013A0000-0x0000000001450000-memory.dmp family_quasar behavioral1/memory/3036-778-0x00000000010A0000-0x0000000001150000-memory.dmp family_quasar behavioral1/memory/2392-803-0x00000000001D0000-0x0000000000280000-memory.dmp family_quasar behavioral1/memory/1052-812-0x0000000000D00000-0x0000000000DB0000-memory.dmp family_quasar behavioral1/memory/564-821-0x00000000011C0000-0x0000000001270000-memory.dmp family_quasar behavioral1/memory/688-830-0x00000000000E0000-0x0000000000190000-memory.dmp family_quasar -
Executes dropped EXE 64 IoCs
pid Process 2436 coolpro12.exe 2636 coolpro12.exe 3016 coolpro12.exe 2848 coolpro12.exe 2744 coolpro12.exe 2156 coolpro12.exe 1612 coolpro12.exe 2576 coolpro12.exe 3044 coolpro12.exe 384 coolpro12.exe 1952 coolpro12.exe 1940 coolpro12.exe 1872 coolpro12.exe 2336 coolpro12.exe 2284 coolpro12.exe 2308 coolpro12.exe 2192 coolpro12.exe 2804 coolpro12.exe 2680 coolpro12.exe 2852 coolpro12.exe 864 coolpro12.exe 688 coolpro12.exe 592 coolpro12.exe 2296 coolpro12.exe 2300 coolpro12.exe 1868 coolpro12.exe 2544 coolpro12.exe 1704 coolpro12.exe 1128 coolpro12.exe 852 coolpro12.exe 1548 coolpro12.exe 880 coolpro12.exe 2904 coolpro12.exe 2788 coolpro12.exe 2464 coolpro12.exe 348 coolpro12.exe 1968 coolpro12.exe 1596 coolpro12.exe 1000 coolpro12.exe 2976 coolpro12.exe 1648 coolpro12.exe 2136 coolpro12.exe 2504 coolpro12.exe 1332 coolpro12.exe 2000 coolpro12.exe 2564 coolpro12.exe 1924 coolpro12.exe 868 coolpro12.exe 920 coolpro12.exe 880 coolpro12.exe 2960 coolpro12.exe 1836 coolpro12.exe 1144 coolpro12.exe 1816 coolpro12.exe 1792 coolpro12.exe 2592 coolpro12.exe 876 coolpro12.exe 688 coolpro12.exe 1048 coolpro12.exe 1768 coolpro12.exe 3036 coolpro12.exe 2968 coolpro12.exe 1748 coolpro12.exe 2208 coolpro12.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\Saved Games\Microsoft Games\desktop.ini solitaire.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft Games\Solitaire\desktop.ini solitaire.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 64 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2352 PING.EXE 1652 PING.EXE 2860 PING.EXE 1436 PING.EXE 952 PING.EXE 3000 PING.EXE 2512 PING.EXE 1716 PING.EXE 2324 PING.EXE 2696 PING.EXE 1812 PING.EXE 2640 PING.EXE 2120 PING.EXE 2004 PING.EXE 2652 PING.EXE 384 PING.EXE 1916 PING.EXE 1640 PING.EXE 1312 PING.EXE 1764 PING.EXE 2092 PING.EXE 3044 PING.EXE 2728 PING.EXE 1748 PING.EXE 1608 PING.EXE 2368 PING.EXE 1600 PING.EXE 2240 PING.EXE 2396 PING.EXE 3048 PING.EXE 2844 PING.EXE 2188 PING.EXE 1816 PING.EXE 1868 PING.EXE 2656 PING.EXE 2620 PING.EXE 816 PING.EXE 3052 PING.EXE 2824 PING.EXE 764 PING.EXE 1772 PING.EXE 2908 PING.EXE 2284 PING.EXE 2176 PING.EXE 2056 PING.EXE 2144 PING.EXE 996 PING.EXE 2060 PING.EXE 1728 PING.EXE 284 PING.EXE 2536 PING.EXE 1432 PING.EXE 2944 PING.EXE 2448 PING.EXE 388 PING.EXE 2932 PING.EXE 2384 PING.EXE 1292 PING.EXE 2360 PING.EXE 1488 PING.EXE 1544 PING.EXE 900 PING.EXE 1100 PING.EXE 2604 PING.EXE -
Modifies registry class 8 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft solitaire.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows solitaire.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\GameUX solitaire.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\GameUX\GameStats solitaire.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\GameUX\GameStats\{8669ECE8-D1C3-4345-8310-E60F6D44FDAF}\LastPlayed = "0" solitaire.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\GameUX\GameStats\{8669ECE8-D1C3-4345-8310-E60F6D44FDAF} solitaire.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings solitaire.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software solitaire.exe -
Runs ping.exe 1 TTPs 64 IoCs
pid Process 1544 PING.EXE 2656 PING.EXE 1436 PING.EXE 2536 PING.EXE 3000 PING.EXE 2368 PING.EXE 2696 PING.EXE 1716 PING.EXE 2652 PING.EXE 1600 PING.EXE 2136 PING.EXE 2396 PING.EXE 1704 PING.EXE 2928 PING.EXE 1332 PING.EXE 2844 PING.EXE 1292 PING.EXE 604 PING.EXE 2384 PING.EXE 764 PING.EXE 2352 PING.EXE 2548 PING.EXE 1868 PING.EXE 284 PING.EXE 2512 PING.EXE 2896 PING.EXE 1432 PING.EXE 2908 PING.EXE 1488 PING.EXE 1812 PING.EXE 1100 PING.EXE 1700 PING.EXE 2856 PING.EXE 2708 PING.EXE 2932 PING.EXE 2824 PING.EXE 2360 PING.EXE 2004 PING.EXE 2076 PING.EXE 1320 PING.EXE 2604 PING.EXE 1916 PING.EXE 1156 PING.EXE 996 PING.EXE 952 PING.EXE 3052 PING.EXE 1384 PING.EXE 2060 PING.EXE 2640 PING.EXE 1748 PING.EXE 2284 PING.EXE 2092 PING.EXE 3044 PING.EXE 1976 PING.EXE 2520 PING.EXE 1652 PING.EXE 1608 PING.EXE 1312 PING.EXE 2120 PING.EXE 1816 PING.EXE 900 PING.EXE 3052 PING.EXE 2448 PING.EXE 2144 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 64 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2364 schtasks.exe 3004 schtasks.exe 2640 schtasks.exe 2332 schtasks.exe 1492 schtasks.exe 2868 schtasks.exe 2776 schtasks.exe 2860 schtasks.exe 2500 schtasks.exe 1444 schtasks.exe 1668 schtasks.exe 1396 schtasks.exe 1284 schtasks.exe 1948 schtasks.exe 2596 schtasks.exe 2776 schtasks.exe 2056 schtasks.exe 956 schtasks.exe 388 schtasks.exe 920 schtasks.exe 2812 schtasks.exe 1760 schtasks.exe 2144 schtasks.exe 1748 schtasks.exe 1952 schtasks.exe 820 schtasks.exe 2600 schtasks.exe 2388 schtasks.exe 2264 schtasks.exe 2464 schtasks.exe 2148 schtasks.exe 316 schtasks.exe 1704 schtasks.exe 1508 schtasks.exe 2040 schtasks.exe 1724 schtasks.exe 564 schtasks.exe 2000 schtasks.exe 2628 schtasks.exe 568 schtasks.exe 2668 schtasks.exe 1852 schtasks.exe 1300 schtasks.exe 2692 schtasks.exe 868 schtasks.exe 2720 schtasks.exe 2560 schtasks.exe 2928 schtasks.exe 1804 schtasks.exe 1692 schtasks.exe 1648 schtasks.exe 536 schtasks.exe 2720 schtasks.exe 640 schtasks.exe 864 schtasks.exe 2336 schtasks.exe 2108 schtasks.exe 2752 schtasks.exe 2028 schtasks.exe 764 schtasks.exe 1724 schtasks.exe 564 schtasks.exe 3020 schtasks.exe 1988 schtasks.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 876 solitaire.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2244 Nemoxen.exe Token: SeDebugPrivilege 2436 coolpro12.exe Token: SeDebugPrivilege 2636 coolpro12.exe Token: SeDebugPrivilege 3016 coolpro12.exe Token: SeDebugPrivilege 2848 coolpro12.exe Token: SeDebugPrivilege 2744 coolpro12.exe Token: SeDebugPrivilege 2156 coolpro12.exe Token: SeDebugPrivilege 1612 coolpro12.exe Token: SeDebugPrivilege 2576 coolpro12.exe Token: SeDebugPrivilege 3044 coolpro12.exe Token: SeDebugPrivilege 384 coolpro12.exe Token: SeDebugPrivilege 1952 coolpro12.exe Token: SeDebugPrivilege 1940 coolpro12.exe Token: SeDebugPrivilege 1872 coolpro12.exe Token: SeDebugPrivilege 2336 coolpro12.exe Token: SeDebugPrivilege 2284 coolpro12.exe Token: SeDebugPrivilege 2308 coolpro12.exe Token: SeDebugPrivilege 2192 coolpro12.exe Token: SeDebugPrivilege 2804 coolpro12.exe Token: SeDebugPrivilege 2680 coolpro12.exe Token: SeDebugPrivilege 2852 coolpro12.exe Token: SeDebugPrivilege 864 coolpro12.exe Token: SeDebugPrivilege 688 coolpro12.exe Token: SeDebugPrivilege 592 coolpro12.exe Token: SeDebugPrivilege 2296 coolpro12.exe Token: SeDebugPrivilege 2300 coolpro12.exe Token: SeDebugPrivilege 1868 coolpro12.exe Token: SeDebugPrivilege 2544 coolpro12.exe Token: SeDebugPrivilege 1704 coolpro12.exe Token: SeDebugPrivilege 1128 coolpro12.exe Token: SeDebugPrivilege 852 coolpro12.exe Token: SeDebugPrivilege 1548 coolpro12.exe Token: SeDebugPrivilege 880 coolpro12.exe Token: SeDebugPrivilege 2904 coolpro12.exe Token: SeDebugPrivilege 2788 coolpro12.exe Token: SeDebugPrivilege 2464 coolpro12.exe Token: SeDebugPrivilege 348 coolpro12.exe Token: SeDebugPrivilege 1968 coolpro12.exe Token: SeDebugPrivilege 1596 coolpro12.exe Token: SeDebugPrivilege 1000 coolpro12.exe Token: SeDebugPrivilege 2976 coolpro12.exe Token: SeDebugPrivilege 1648 coolpro12.exe Token: SeDebugPrivilege 2136 coolpro12.exe Token: SeDebugPrivilege 2504 coolpro12.exe Token: SeDebugPrivilege 1332 coolpro12.exe Token: SeDebugPrivilege 2000 coolpro12.exe Token: SeDebugPrivilege 2564 coolpro12.exe Token: SeDebugPrivilege 1924 coolpro12.exe Token: SeDebugPrivilege 868 coolpro12.exe Token: SeDebugPrivilege 920 coolpro12.exe Token: SeDebugPrivilege 880 coolpro12.exe Token: SeDebugPrivilege 2960 coolpro12.exe Token: SeDebugPrivilege 1836 coolpro12.exe Token: SeDebugPrivilege 1144 coolpro12.exe Token: SeDebugPrivilege 1816 coolpro12.exe Token: SeDebugPrivilege 1792 coolpro12.exe Token: SeDebugPrivilege 2592 coolpro12.exe Token: SeDebugPrivilege 876 coolpro12.exe Token: SeDebugPrivilege 688 coolpro12.exe Token: SeDebugPrivilege 1048 coolpro12.exe Token: SeDebugPrivilege 1768 coolpro12.exe Token: SeDebugPrivilege 3036 coolpro12.exe Token: SeDebugPrivilege 2968 coolpro12.exe Token: SeDebugPrivilege 1748 coolpro12.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2244 wrote to memory of 388 2244 Nemoxen.exe 28 PID 2244 wrote to memory of 388 2244 Nemoxen.exe 28 PID 2244 wrote to memory of 388 2244 Nemoxen.exe 28 PID 2244 wrote to memory of 2436 2244 Nemoxen.exe 30 PID 2244 wrote to memory of 2436 2244 Nemoxen.exe 30 PID 2244 wrote to memory of 2436 2244 Nemoxen.exe 30 PID 2436 wrote to memory of 2944 2436 coolpro12.exe 31 PID 2436 wrote to memory of 2944 2436 coolpro12.exe 31 PID 2436 wrote to memory of 2944 2436 coolpro12.exe 31 PID 2436 wrote to memory of 2160 2436 coolpro12.exe 33 PID 2436 wrote to memory of 2160 2436 coolpro12.exe 33 PID 2436 wrote to memory of 2160 2436 coolpro12.exe 33 PID 2160 wrote to memory of 3028 2160 cmd.exe 35 PID 2160 wrote to memory of 3028 2160 cmd.exe 35 PID 2160 wrote to memory of 3028 2160 cmd.exe 35 PID 2160 wrote to memory of 3052 2160 cmd.exe 36 PID 2160 wrote to memory of 3052 2160 cmd.exe 36 PID 2160 wrote to memory of 3052 2160 cmd.exe 36 PID 2160 wrote to memory of 2636 2160 cmd.exe 37 PID 2160 wrote to memory of 2636 2160 cmd.exe 37 PID 2160 wrote to memory of 2636 2160 cmd.exe 37 PID 2636 wrote to memory of 2720 2636 coolpro12.exe 38 PID 2636 wrote to memory of 2720 2636 coolpro12.exe 38 PID 2636 wrote to memory of 2720 2636 coolpro12.exe 38 PID 2636 wrote to memory of 2696 2636 coolpro12.exe 40 PID 2636 wrote to memory of 2696 2636 coolpro12.exe 40 PID 2636 wrote to memory of 2696 2636 coolpro12.exe 40 PID 2696 wrote to memory of 2804 2696 cmd.exe 42 PID 2696 wrote to memory of 2804 2696 cmd.exe 42 PID 2696 wrote to memory of 2804 2696 cmd.exe 42 PID 2696 wrote to memory of 2520 2696 cmd.exe 43 PID 2696 wrote to memory of 2520 2696 cmd.exe 43 PID 2696 wrote to memory of 2520 2696 cmd.exe 43 PID 2696 wrote to memory of 3016 2696 cmd.exe 46 PID 2696 wrote to memory of 3016 2696 cmd.exe 46 PID 2696 wrote to memory of 3016 2696 cmd.exe 46 PID 3016 wrote to memory of 1332 3016 coolpro12.exe 47 PID 3016 wrote to memory of 1332 3016 coolpro12.exe 47 PID 3016 wrote to memory of 1332 3016 coolpro12.exe 47 PID 3016 wrote to memory of 2324 3016 coolpro12.exe 49 PID 3016 wrote to memory of 2324 3016 coolpro12.exe 49 PID 3016 wrote to memory of 2324 3016 coolpro12.exe 49 PID 2324 wrote to memory of 2232 2324 cmd.exe 51 PID 2324 wrote to memory of 2232 2324 cmd.exe 51 PID 2324 wrote to memory of 2232 2324 cmd.exe 51 PID 2324 wrote to memory of 2004 2324 cmd.exe 52 PID 2324 wrote to memory of 2004 2324 cmd.exe 52 PID 2324 wrote to memory of 2004 2324 cmd.exe 52 PID 2324 wrote to memory of 2848 2324 cmd.exe 54 PID 2324 wrote to memory of 2848 2324 cmd.exe 54 PID 2324 wrote to memory of 2848 2324 cmd.exe 54 PID 2848 wrote to memory of 2200 2848 coolpro12.exe 55 PID 2848 wrote to memory of 2200 2848 coolpro12.exe 55 PID 2848 wrote to memory of 2200 2848 coolpro12.exe 55 PID 2848 wrote to memory of 380 2848 coolpro12.exe 57 PID 2848 wrote to memory of 380 2848 coolpro12.exe 57 PID 2848 wrote to memory of 380 2848 coolpro12.exe 57 PID 380 wrote to memory of 972 380 cmd.exe 59 PID 380 wrote to memory of 972 380 cmd.exe 59 PID 380 wrote to memory of 972 380 cmd.exe 59 PID 380 wrote to memory of 1384 380 cmd.exe 60 PID 380 wrote to memory of 1384 380 cmd.exe 60 PID 380 wrote to memory of 1384 380 cmd.exe 60 PID 380 wrote to memory of 2744 380 cmd.exe 61 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Nemoxen.exe"C:\Users\Admin\AppData\Local\Temp\Nemoxen.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Neoxen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\Nemoxen.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:388
-
-
C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Neoxen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe" /rl HIGHEST /f3⤵PID:2944
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\AI0vwax77b0n.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\system32\chcp.comchcp 650014⤵PID:3028
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost4⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3052
-
-
C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Neoxen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe" /rl HIGHEST /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:2720
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\OVd9mtYpmOZu.bat" "5⤵
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\system32\chcp.comchcp 650016⤵PID:2804
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost6⤵
- Runs ping.exe
PID:2520
-
-
C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Neoxen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe" /rl HIGHEST /f7⤵PID:1332
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\d9RK2MJS0HkQ.bat" "7⤵
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\system32\chcp.comchcp 650018⤵PID:2232
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost8⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2004
-
-
C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Neoxen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe" /rl HIGHEST /f9⤵PID:2200
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\dgRL1tUWTpk7.bat" "9⤵
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Windows\system32\chcp.comchcp 6500110⤵PID:972
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost10⤵
- Runs ping.exe
PID:1384
-
-
C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"10⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2744 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Neoxen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe" /rl HIGHEST /f11⤵
- Scheduled Task/Job: Scheduled Task
PID:2364
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\dJNvGaw0jDSz.bat" "11⤵PID:920
-
C:\Windows\system32\chcp.comchcp 6500112⤵PID:2276
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost12⤵
- Runs ping.exe
PID:2928
-
-
C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"12⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2156 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Neoxen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe" /rl HIGHEST /f13⤵
- Scheduled Task/Job: Scheduled Task
PID:764
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\Oysd2Tboaug7.bat" "13⤵PID:892
-
C:\Windows\system32\chcp.comchcp 6500114⤵PID:2372
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1100
-
-
C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"14⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1612 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Neoxen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe" /rl HIGHEST /f15⤵
- Scheduled Task/Job: Scheduled Task
PID:316
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\DM3muo6IIJOK.bat" "15⤵PID:2996
-
C:\Windows\system32\chcp.comchcp 6500116⤵PID:2108
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost16⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:284
-
-
C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"16⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2576 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Neoxen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe" /rl HIGHEST /f17⤵
- Scheduled Task/Job: Scheduled Task
PID:3004
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\A2f5uTvxzB5K.bat" "17⤵PID:2688
-
C:\Windows\system32\chcp.comchcp 6500118⤵PID:2720
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost18⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2176
-
-
C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"18⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3044 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Neoxen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe" /rl HIGHEST /f19⤵
- Scheduled Task/Job: Scheduled Task
PID:2640
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\FMig8IQXBED9.bat" "19⤵PID:2696
-
C:\Windows\system32\chcp.comchcp 6500120⤵PID:1432
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost20⤵
- Runs ping.exe
PID:1332
-
-
C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"20⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:384 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Neoxen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe" /rl HIGHEST /f21⤵
- Scheduled Task/Job: Scheduled Task
PID:1804
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\XI4T08XSJGwk.bat" "21⤵PID:2632
-
C:\Windows\system32\chcp.comchcp 6500122⤵PID:1396
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost22⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1716
-
-
C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"22⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1952 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Neoxen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe" /rl HIGHEST /f23⤵PID:1772
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\PP4FPUFOx1t9.bat" "23⤵PID:2392
-
C:\Windows\system32\chcp.comchcp 6500124⤵PID:1800
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost24⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2368
-
-
C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"24⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1940 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Neoxen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe" /rl HIGHEST /f25⤵PID:2732
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\FfdbA7sA88wK.bat" "25⤵PID:852
-
C:\Windows\system32\chcp.comchcp 6500126⤵PID:1692
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost26⤵
- Runs ping.exe
PID:604
-
-
C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"26⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1872 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Neoxen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe" /rl HIGHEST /f27⤵
- Scheduled Task/Job: Scheduled Task
PID:868
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\9q5Idmxf4zPl.bat" "27⤵PID:2208
-
C:\Windows\system32\chcp.comchcp 6500128⤵PID:340
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost28⤵
- Runs ping.exe
PID:1320
-
-
C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"28⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2336 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Neoxen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe" /rl HIGHEST /f29⤵
- Scheduled Task/Job: Scheduled Task
PID:920
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\4clf20QUCNdr.bat" "29⤵PID:1512
-
C:\Windows\system32\chcp.comchcp 6500130⤵PID:760
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost30⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2056
-
-
C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"30⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2284 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Neoxen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe" /rl HIGHEST /f31⤵
- Scheduled Task/Job: Scheduled Task
PID:1724
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\qNjv8Efazwzj.bat" "31⤵PID:2960
-
C:\Windows\system32\chcp.comchcp 6500132⤵PID:2080
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost32⤵
- Runs ping.exe
PID:2076
-
-
C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"32⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2308 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Neoxen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe" /rl HIGHEST /f33⤵PID:2136
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\aS3SJKzwAu9g.bat" "33⤵PID:3028
-
C:\Windows\system32\chcp.comchcp 6500134⤵PID:2188
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost34⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2604
-
-
C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"34⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2192 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Neoxen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe" /rl HIGHEST /f35⤵
- Scheduled Task/Job: Scheduled Task
PID:2628
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\P0CrzyI4sJuL.bat" "35⤵PID:2700
-
C:\Windows\system32\chcp.comchcp 6500136⤵PID:2968
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost36⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2652
-
-
C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"36⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2804 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Neoxen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe" /rl HIGHEST /f37⤵
- Scheduled Task/Job: Scheduled Task
PID:564
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\h8E2FO8opCWE.bat" "37⤵PID:2668
-
C:\Windows\system32\chcp.comchcp 6500138⤵PID:1784
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost38⤵
- Runs ping.exe
PID:1700
-
-
C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"38⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2680 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Neoxen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe" /rl HIGHEST /f39⤵
- Scheduled Task/Job: Scheduled Task
PID:1704
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\x3gwADUcezBn.bat" "39⤵PID:2324
-
C:\Windows\system32\chcp.comchcp 6500140⤵PID:1964
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost40⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1600
-
-
C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"40⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2852 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Neoxen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe" /rl HIGHEST /f41⤵
- Scheduled Task/Job: Scheduled Task
PID:820
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\ZaM4q1iyMS0K.bat" "41⤵PID:2732
-
C:\Windows\system32\chcp.comchcp 6500142⤵PID:2592
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost42⤵
- Runs ping.exe
PID:2856
-
-
C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"42⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:864 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Neoxen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe" /rl HIGHEST /f43⤵
- Scheduled Task/Job: Scheduled Task
PID:1692
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\Wv8k8TWVfY0X.bat" "43⤵PID:868
-
C:\Windows\system32\chcp.comchcp 6500144⤵PID:1156
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost44⤵PID:1780
-
-
C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"44⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:688 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Neoxen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe" /rl HIGHEST /f45⤵PID:1544
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\VfA1J7rtPMFb.bat" "45⤵PID:2252
-
C:\Windows\system32\chcp.comchcp 6500146⤵PID:2120
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost46⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2144
-
-
C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"46⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:592 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Neoxen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe" /rl HIGHEST /f47⤵
- Scheduled Task/Job: Scheduled Task
PID:1508
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\t8GpzweFBM4t.bat" "47⤵PID:2388
-
C:\Windows\system32\chcp.comchcp 6500148⤵PID:2204
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost48⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:388
-
-
C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"48⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2296 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Neoxen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe" /rl HIGHEST /f49⤵PID:956
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\ohOJhRpGFHyC.bat" "49⤵PID:2960
-
C:\Windows\system32\chcp.comchcp 6500150⤵PID:2952
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost50⤵
- Runs ping.exe
PID:2136
-
-
C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"50⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2300 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Neoxen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe" /rl HIGHEST /f51⤵
- Scheduled Task/Job: Scheduled Task
PID:3020
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\w3wpcdkPjEkY.bat" "51⤵PID:2604
-
C:\Windows\system32\chcp.comchcp 6500152⤵PID:2900
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost52⤵
- Runs ping.exe
PID:2708
-
-
C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"52⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1868 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Neoxen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe" /rl HIGHEST /f53⤵
- Scheduled Task/Job: Scheduled Task
PID:2720
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\le0KV2QLDxsy.bat" "53⤵PID:1928
-
C:\Windows\system32\chcp.comchcp 6500154⤵PID:1296
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost54⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1652
-
-
C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"54⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2544 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Neoxen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe" /rl HIGHEST /f55⤵PID:1804
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\pr3FOpMcjAYQ.bat" "55⤵PID:2972
-
C:\Windows\system32\chcp.comchcp 6500156⤵PID:1816
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost56⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:384
-
-
C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"56⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1704 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Neoxen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe" /rl HIGHEST /f57⤵
- Scheduled Task/Job: Scheduled Task
PID:640
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\2rWQuEtE5Bga.bat" "57⤵PID:1952
-
C:\Windows\system32\chcp.comchcp 6500158⤵PID:2004
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost58⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2324
-
-
C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"58⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1128 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Neoxen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe" /rl HIGHEST /f59⤵
- Scheduled Task/Job: Scheduled Task
PID:1988
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\hIxNXajKnqbL.bat" "59⤵PID:2824
-
C:\Windows\system32\chcp.comchcp 6500160⤵PID:1696
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost60⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2860
-
-
C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"60⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:852 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Neoxen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe" /rl HIGHEST /f61⤵PID:380
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\x1B1TCRyjRbW.bat" "61⤵PID:1260
-
C:\Windows\system32\chcp.comchcp 6500162⤵PID:1324
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost62⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1916
-
-
C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"62⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1548 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Neoxen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe" /rl HIGHEST /f63⤵
- Scheduled Task/Job: Scheduled Task
PID:568
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\ATMf7cqoLKSh.bat" "63⤵PID:2112
-
C:\Windows\system32\chcp.comchcp 6500164⤵PID:2156
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost64⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2240
-
-
C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"64⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:880 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Neoxen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe" /rl HIGHEST /f65⤵
- Scheduled Task/Job: Scheduled Task
PID:1648
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\PcP47dCBRud8.bat" "65⤵PID:2228
-
C:\Windows\system32\chcp.comchcp 6500166⤵PID:956
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost66⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2932
-
-
C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"66⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2904 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Neoxen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe" /rl HIGHEST /f67⤵PID:2420
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\r4fn9l2Fauci.bat" "67⤵PID:2960
-
C:\Windows\system32\chcp.comchcp 6500168⤵PID:3004
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost68⤵PID:3020
-
-
C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"68⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2788 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Neoxen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe" /rl HIGHEST /f69⤵PID:1616
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\bUVVFeVVGLRF.bat" "69⤵PID:2752
-
C:\Windows\system32\chcp.comchcp 6500170⤵PID:1656
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost70⤵
- Runs ping.exe
PID:2896
-
-
C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"70⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2464 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Neoxen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe" /rl HIGHEST /f71⤵
- Scheduled Task/Job: Scheduled Task
PID:2600
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\gwolY2u7z0fB.bat" "71⤵PID:1928
-
C:\Windows\system32\chcp.comchcp 6500172⤵PID:2220
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost72⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2696
-
-
C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"72⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:348 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Neoxen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe" /rl HIGHEST /f73⤵
- Scheduled Task/Job: Scheduled Task
PID:2040
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\ah8wgREmr8dR.bat" "73⤵PID:2972
-
C:\Windows\system32\chcp.comchcp 6500174⤵PID:2016
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost74⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2396
-
-
C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"74⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1968 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Neoxen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe" /rl HIGHEST /f75⤵
- Scheduled Task/Job: Scheduled Task
PID:1396
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\Xa7kRDZMRwCx.bat" "75⤵PID:936
-
C:\Windows\system32\chcp.comchcp 6500176⤵PID:2864
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost76⤵
- Runs ping.exe
PID:2548
-
-
C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"76⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1596 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Neoxen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe" /rl HIGHEST /f77⤵PID:2592
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\hzawoaQviQeN.bat" "77⤵PID:1696
-
C:\Windows\system32\chcp.comchcp 6500178⤵PID:2732
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost78⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2824
-
-
C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"78⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1000 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Neoxen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe" /rl HIGHEST /f79⤵
- Scheduled Task/Job: Scheduled Task
PID:864
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\P1mmW6VGMzJ7.bat" "79⤵PID:2744
-
C:\Windows\system32\chcp.comchcp 6500180⤵PID:2104
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost80⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1544
-
-
C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"80⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2976 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Neoxen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe" /rl HIGHEST /f81⤵
- Scheduled Task/Job: Scheduled Task
PID:2812
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\jg3gladtqraW.bat" "81⤵PID:2156
-
C:\Windows\system32\chcp.comchcp 6500182⤵PID:2240
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost82⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:900
-
-
C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"82⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1648 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Neoxen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe" /rl HIGHEST /f83⤵
- Scheduled Task/Job: Scheduled Task
PID:2388
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\I7msLSun119C.bat" "83⤵PID:1044
-
C:\Windows\system32\chcp.comchcp 6500184⤵PID:572
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost84⤵PID:1040
-
-
C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"84⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2136 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Neoxen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe" /rl HIGHEST /f85⤵
- Scheduled Task/Job: Scheduled Task
PID:1284
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\qXNuZjEUCCkt.bat" "85⤵PID:2996
-
C:\Windows\system32\chcp.comchcp 6500186⤵PID:2440
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost86⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:3048
-
-
C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"86⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2504 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Neoxen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe" /rl HIGHEST /f87⤵
- Scheduled Task/Job: Scheduled Task
PID:1760
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\WB8jXsAQvJ6y.bat" "87⤵PID:2720
-
C:\Windows\system32\chcp.comchcp 6500188⤵PID:1728
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost88⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1868
-
-
C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"88⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1332 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Neoxen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe" /rl HIGHEST /f89⤵
- Scheduled Task/Job: Scheduled Task
PID:2776
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\02UisOvlPTmv.bat" "89⤵PID:888
-
C:\Windows\system32\chcp.comchcp 6500190⤵PID:3044
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost90⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2656
-
-
C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"90⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2000 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Neoxen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe" /rl HIGHEST /f91⤵
- Scheduled Task/Job: Scheduled Task
PID:2668
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\3wjDp1Jhk7i5.bat" "91⤵PID:2876
-
C:\Windows\system32\chcp.comchcp 6500192⤵PID:1700
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost92⤵
- Runs ping.exe
PID:1704
-
-
C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"92⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2564 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Neoxen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe" /rl HIGHEST /f93⤵PID:2872
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\eDMHD0c2tXvD.bat" "93⤵PID:2568
-
C:\Windows\system32\chcp.comchcp 6500194⤵PID:1628
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost94⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2844
-
-
C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"94⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1924 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Neoxen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe" /rl HIGHEST /f95⤵
- Scheduled Task/Job: Scheduled Task
PID:1948
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\DjpY630xgNBT.bat" "95⤵PID:2860
-
C:\Windows\system32\chcp.comchcp 6500196⤵PID:2008
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost96⤵
- Runs ping.exe
PID:1156
-
-
C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"96⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:868 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Neoxen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe" /rl HIGHEST /f97⤵
- Scheduled Task/Job: Scheduled Task
PID:2264
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\oke7aZkcf8q0.bat" "97⤵PID:320
-
C:\Windows\system32\chcp.comchcp 6500198⤵PID:2280
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost98⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1640
-
-
C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"98⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:920 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Neoxen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe" /rl HIGHEST /f99⤵
- Scheduled Task/Job: Scheduled Task
PID:2144
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\I5tVdnGOjVjk.bat" "99⤵PID:2112
-
C:\Windows\system32\chcp.comchcp 65001100⤵PID:388
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost100⤵PID:1048
-
-
C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"100⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:880 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Neoxen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe" /rl HIGHEST /f101⤵
- Scheduled Task/Job: Scheduled Task
PID:2336
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\w7MK6YEwBuPE.bat" "101⤵PID:3056
-
C:\Windows\system32\chcp.comchcp 65001102⤵PID:2080
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost102⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:996
-
-
C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"102⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2960 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Neoxen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe" /rl HIGHEST /f103⤵
- Scheduled Task/Job: Scheduled Task
PID:2108
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\1v3sxvSmtVID.bat" "103⤵PID:2900
-
C:\Windows\system32\chcp.comchcp 65001104⤵PID:2996
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost104⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1312
-
-
C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"104⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1836 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Neoxen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe" /rl HIGHEST /f105⤵
- Scheduled Task/Job: Scheduled Task
PID:2752
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\JuBPhvFP9BkB.bat" "105⤵PID:2968
-
C:\Windows\system32\chcp.comchcp 65001106⤵PID:2720
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost106⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2640
-
-
C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"106⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1144 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Neoxen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe" /rl HIGHEST /f107⤵PID:2696
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\7qE7B8U513tB.bat" "107⤵PID:2988
-
C:\Windows\system32\chcp.comchcp 65001108⤵PID:888
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost108⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1748
-
-
C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"108⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1816 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Neoxen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe" /rl HIGHEST /f109⤵
- Scheduled Task/Job: Scheduled Task
PID:1852
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\D7uRPcUD3lDp.bat" "109⤵PID:340
-
C:\Windows\system32\chcp.comchcp 65001110⤵PID:3064
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost110⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2384
-
-
C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"110⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1792 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Neoxen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe" /rl HIGHEST /f111⤵PID:1668
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\ABtM3BIFCwnm.bat" "111⤵PID:2324
-
C:\Windows\system32\chcp.comchcp 65001112⤵PID:1764
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost112⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1436
-
-
C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"112⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2592 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Neoxen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe" /rl HIGHEST /f113⤵
- Scheduled Task/Job: Scheduled Task
PID:2596
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\LyT62j9TRgoR.bat" "113⤵PID:1992
-
C:\Windows\system32\chcp.comchcp 65001114⤵PID:2360
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost114⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1292
-
-
C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"114⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:876 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Neoxen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe" /rl HIGHEST /f115⤵
- Scheduled Task/Job: Scheduled Task
PID:2860
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\mX2EfNrYFRMa.bat" "115⤵PID:2888
-
C:\Windows\system32\chcp.comchcp 65001116⤵PID:940
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost116⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2120
-
-
C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"116⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:688 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Neoxen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe" /rl HIGHEST /f117⤵PID:2056
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\XD6V5tIcl5Z7.bat" "117⤵PID:1548
-
C:\Windows\system32\chcp.comchcp 65001118⤵PID:1240
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost118⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:764
-
-
C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"118⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1048 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Neoxen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe" /rl HIGHEST /f119⤵
- Scheduled Task/Job: Scheduled Task
PID:1724
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\resMI9AIxCfc.bat" "119⤵PID:2084
-
C:\Windows\system32\chcp.comchcp 65001120⤵PID:2904
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost120⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1608
-
-
C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"120⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1768 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Neoxen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe" /rl HIGHEST /f121⤵
- Scheduled Task/Job: Scheduled Task
PID:2332
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\ew6ZE1THnRnL.bat" "121⤵PID:2456
-
C:\Windows\system32\chcp.comchcp 65001122⤵PID:1656
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-