Analysis
-
max time kernel
1799s -
max time network
1800s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
11-12-2024 23:05
Static task
static1
General
-
Target
TwoOA1.html
-
Size
7KB
-
MD5
aa5d13590623abb5d3963a8af5dfb85d
-
SHA1
8dcb62e75f970ac4f9f78e2558f335951b599774
-
SHA256
4c6183029dcf2e4d604c473c2dfb4f72037b6a8f13d9183b0842fd201e422d7a
-
SHA512
94899bfebc29d4d76c1a8d0e9b787ae50386a5e8718194791d27d86eb7e67e1b0e1a9b0a4e68031905c767419bd767b9d2666ac5ffd0a8dd87c0bf842ac7282b
-
SSDEEP
96:CMq9SlLh2B3Zq36uWl/PtxyjttJQ8Maoah3vL5LaNclmnU1Eh2sS:T1lLhwJrPahtJxMaoah3vG12sS
Malware Config
Extracted
quasar
1.4.1
Office04
snimewhile-38203.portmap.host:38203
485b7f49-f0e9-4e9f-a33c-05550e9dae96
-
encryption_key
9CD2B9F914AD2DE5F4E76D73DB6248BE3586A707
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows Update
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral1/files/0x002a000000046299-1163.dat family_quasar behavioral1/memory/5008-1185-0x0000000000480000-0x00000000007A4000-memory.dmp family_quasar -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000\Control Panel\International\Geo\Nation Process not Found -
Executes dropped EXE 64 IoCs
pid Process 4588 Client(1).exe 5040 Client(1).exe 2524 Client(1).exe 5028 Client(1).exe 4608 Client(1).exe 4468 Client(1).exe 2372 Client(1).exe 1072 Client(1).exe 2592 Client(1).exe 2076 Client(1).exe 3468 Client(1).exe 4780 Client(1).exe 4988 Client(1).exe 4740 Client(1).exe 568 Client(1).exe 3124 Client(1).exe 2360 Client(1).exe 2848 Client(1).exe 5008 Client-built.exe 4008 Client.exe 3920 Client-built.exe 4944 Client-built.exe 2312 Client-built.exe 3868 Client.exe 1688 Client-built.exe 2096 Client-built.exe 4956 Client.exe 2840 Client.exe 1072 Client.exe 4692 Client.exe 3668 Client.exe 4304 Client.exe 4276 Client.exe 4080 Client-built.exe 4316 Client.exe 1612 Client.exe 3648 Client.exe 3848 Client.exe 1260 Client.exe 2308 Client.exe 3104 Client.exe 4764 Client.exe 5028 Client.exe 2472 Client.exe 3492 Client-built.exe 2540 Client-built.exe 3124 Client.exe 3256 Client.exe 4612 Client(1).exe 1704 Client.exe 2804 Client.exe 4708 Client.exe 1464 Client.exe 4960 Client.exe 4752 Client.exe 648 Client.exe 4996 Client.exe 3700 Client.exe 3860 Client.exe 1696 Client.exe 1256 Client.exe 1528 Client.exe 1772 Client.exe 2952 Client.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 2 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File created C:\Users\Admin\Downloads\Client(1).exe:Zone.Identifier firefox.exe File created C:\Users\Admin\Downloads\Client-built.exe:Zone.Identifier firefox.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 64 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 624 PING.EXE 2976 PING.EXE 4420 PING.EXE 792 PING.EXE 696 PING.EXE 4424 PING.EXE 2644 PING.EXE 3288 PING.EXE 3368 PING.EXE 3048 PING.EXE 2520 Process not Found 5540 Process not Found 4268 PING.EXE 3372 PING.EXE 524 PING.EXE 1840 PING.EXE 2208 PING.EXE 4856 PING.EXE 5136 Process not Found 1860 PING.EXE 1708 PING.EXE 5088 PING.EXE 4272 PING.EXE 4500 PING.EXE 5180 Process not Found 1948 PING.EXE 4308 PING.EXE 2892 PING.EXE 1364 PING.EXE 4040 Process not Found 1800 PING.EXE 1164 PING.EXE 2572 Process not Found 3560 PING.EXE 1104 PING.EXE 2152 Process not Found 5948 Process not Found 1272 PING.EXE 3924 PING.EXE 568 Process not Found 5876 Process not Found 1556 PING.EXE 5040 PING.EXE 3476 PING.EXE 4224 Process not Found 4952 Process not Found 5064 Process not Found 4484 Process not Found 4428 PING.EXE 4516 Process not Found 2340 PING.EXE 4292 PING.EXE 1780 PING.EXE 2520 Process not Found 2164 PING.EXE 1184 PING.EXE 2520 PING.EXE 1036 PING.EXE 2444 PING.EXE 980 PING.EXE 472 PING.EXE 1012 PING.EXE 3000 PING.EXE 4592 PING.EXE -
Checks processor information in registry 2 TTPs 24 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Gathers network information 2 TTPs 5 IoCs
Uses commandline utility to view network configuration.
pid Process 1076 NETSTAT.EXE 4132 NETSTAT.EXE 4940 NETSTAT.EXE 2496 NETSTAT.EXE 3772 ipconfig.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\USER\S-1-5-21-2062871678-1047416116-518495306-1000_Classes\Local Settings firefox.exe -
NTFS ADS 2 IoCs
description ioc Process File created C:\Users\Admin\Downloads\Client(1).exe:Zone.Identifier firefox.exe File created C:\Users\Admin\Downloads\Client-built.exe:Zone.Identifier firefox.exe -
Runs ping.exe 1 TTPs 64 IoCs
pid Process 3000 PING.EXE 3344 PING.EXE 3300 PING.EXE 1956 Process not Found 4040 Process not Found 3924 PING.EXE 472 PING.EXE 4868 PING.EXE 4800 PING.EXE 696 PING.EXE 2236 PING.EXE 3984 PING.EXE 1868 Process not Found 1076 PING.EXE 4308 PING.EXE 2532 PING.EXE 2228 Process not Found 1420 Process not Found 4952 PING.EXE 4500 PING.EXE 3820 PING.EXE 1184 PING.EXE 2208 PING.EXE 1012 PING.EXE 3716 Process not Found 4760 Process not Found 2228 PING.EXE 3984 Process not Found 1168 Process not Found 3712 Process not Found 1284 PING.EXE 3288 PING.EXE 1184 PING.EXE 1532 PING.EXE 3560 PING.EXE 1764 PING.EXE 2560 PING.EXE 5136 Process not Found 1344 PING.EXE 328 PING.EXE 1012 Process not Found 956 Process not Found 3372 PING.EXE 3548 PING.EXE 2560 PING.EXE 4516 Process not Found 788 PING.EXE 900 PING.EXE 4460 PING.EXE 2056 Process not Found 1912 PING.EXE 624 PING.EXE 2644 PING.EXE 1420 Process not Found 3920 PING.EXE 3544 PING.EXE 1604 PING.EXE 5908 Process not Found 4516 Process not Found 2816 PING.EXE 4424 PING.EXE 1840 PING.EXE 3368 PING.EXE 4952 Process not Found -
Scheduled Task/Job: Scheduled Task 1 TTPs 64 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2892 schtasks.exe 1500 schtasks.exe 860 schtasks.exe 636 schtasks.exe 3628 schtasks.exe 1488 schtasks.exe 1104 schtasks.exe 3680 schtasks.exe 2560 schtasks.exe 5344 Process not Found 1012 schtasks.exe 1168 Process not Found 6032 Process not Found 1448 schtasks.exe 2536 schtasks.exe 4600 schtasks.exe 2732 schtasks.exe 1168 Process not Found 3644 schtasks.exe 3196 schtasks.exe 1364 Process not Found 2276 schtasks.exe 3948 schtasks.exe 4704 Process not Found 5564 Process not Found 3664 schtasks.exe 3868 schtasks.exe 2680 schtasks.exe 1420 Process not Found 4844 schtasks.exe 4800 Process not Found 2732 Process not Found 3436 schtasks.exe 2112 schtasks.exe 1012 schtasks.exe 2424 schtasks.exe 3716 Process not Found 2420 schtasks.exe 2272 schtasks.exe 3312 schtasks.exe 3084 schtasks.exe 3088 schtasks.exe 4288 schtasks.exe 3116 schtasks.exe 1512 schtasks.exe 2208 Process not Found 1956 Process not Found 2320 schtasks.exe 3792 schtasks.exe 1248 schtasks.exe 3700 schtasks.exe 1304 schtasks.exe 1184 schtasks.exe 4728 schtasks.exe 4840 Process not Found 6140 Process not Found 4344 schtasks.exe 1780 Process not Found 4220 Process not Found 3448 schtasks.exe 1748 schtasks.exe 3752 Process not Found 1912 schtasks.exe 1368 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 408 chrome.exe 408 chrome.exe 4944 Client-built.exe 4944 Client-built.exe 2096 Client-built.exe 2096 Client-built.exe 2540 Client-built.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 408 chrome.exe Token: SeCreatePagefilePrivilege 408 chrome.exe Token: SeShutdownPrivilege 408 chrome.exe Token: SeCreatePagefilePrivilege 408 chrome.exe Token: SeShutdownPrivilege 408 chrome.exe Token: SeCreatePagefilePrivilege 408 chrome.exe Token: SeShutdownPrivilege 408 chrome.exe Token: SeCreatePagefilePrivilege 408 chrome.exe Token: SeShutdownPrivilege 408 chrome.exe Token: SeCreatePagefilePrivilege 408 chrome.exe Token: SeShutdownPrivilege 408 chrome.exe Token: SeCreatePagefilePrivilege 408 chrome.exe Token: SeShutdownPrivilege 408 chrome.exe Token: SeCreatePagefilePrivilege 408 chrome.exe Token: SeShutdownPrivilege 408 chrome.exe Token: SeCreatePagefilePrivilege 408 chrome.exe Token: SeShutdownPrivilege 408 chrome.exe Token: SeCreatePagefilePrivilege 408 chrome.exe Token: SeShutdownPrivilege 408 chrome.exe Token: SeCreatePagefilePrivilege 408 chrome.exe Token: SeShutdownPrivilege 408 chrome.exe Token: SeCreatePagefilePrivilege 408 chrome.exe Token: SeShutdownPrivilege 408 chrome.exe Token: SeCreatePagefilePrivilege 408 chrome.exe Token: SeShutdownPrivilege 408 chrome.exe Token: SeCreatePagefilePrivilege 408 chrome.exe Token: SeShutdownPrivilege 408 chrome.exe Token: SeCreatePagefilePrivilege 408 chrome.exe Token: SeShutdownPrivilege 408 chrome.exe Token: SeCreatePagefilePrivilege 408 chrome.exe Token: SeShutdownPrivilege 408 chrome.exe Token: SeCreatePagefilePrivilege 408 chrome.exe Token: SeShutdownPrivilege 408 chrome.exe Token: SeCreatePagefilePrivilege 408 chrome.exe Token: SeShutdownPrivilege 408 chrome.exe Token: SeCreatePagefilePrivilege 408 chrome.exe Token: SeShutdownPrivilege 408 chrome.exe Token: SeCreatePagefilePrivilege 408 chrome.exe Token: SeShutdownPrivilege 408 chrome.exe Token: SeCreatePagefilePrivilege 408 chrome.exe Token: SeShutdownPrivilege 408 chrome.exe Token: SeCreatePagefilePrivilege 408 chrome.exe Token: SeShutdownPrivilege 408 chrome.exe Token: SeCreatePagefilePrivilege 408 chrome.exe Token: SeShutdownPrivilege 408 chrome.exe Token: SeCreatePagefilePrivilege 408 chrome.exe Token: SeShutdownPrivilege 408 chrome.exe Token: SeCreatePagefilePrivilege 408 chrome.exe Token: SeShutdownPrivilege 408 chrome.exe Token: SeCreatePagefilePrivilege 408 chrome.exe Token: SeShutdownPrivilege 408 chrome.exe Token: SeCreatePagefilePrivilege 408 chrome.exe Token: SeShutdownPrivilege 408 chrome.exe Token: SeCreatePagefilePrivilege 408 chrome.exe Token: SeShutdownPrivilege 408 chrome.exe Token: SeCreatePagefilePrivilege 408 chrome.exe Token: SeShutdownPrivilege 408 chrome.exe Token: SeCreatePagefilePrivilege 408 chrome.exe Token: SeShutdownPrivilege 408 chrome.exe Token: SeCreatePagefilePrivilege 408 chrome.exe Token: SeShutdownPrivilege 408 chrome.exe Token: SeCreatePagefilePrivilege 408 chrome.exe Token: SeShutdownPrivilege 408 chrome.exe Token: SeCreatePagefilePrivilege 408 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 2804 firefox.exe 2804 firefox.exe 2804 firefox.exe 2804 firefox.exe 2804 firefox.exe 2804 firefox.exe 2804 firefox.exe 2804 firefox.exe 2804 firefox.exe 2804 firefox.exe 2804 firefox.exe 2804 firefox.exe 2804 firefox.exe 2804 firefox.exe 2804 firefox.exe 2804 firefox.exe 2804 firefox.exe 2804 firefox.exe 2804 firefox.exe 2804 firefox.exe 2804 firefox.exe 2804 firefox.exe 2804 firefox.exe 2804 firefox.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 408 chrome.exe 2804 firefox.exe 2804 firefox.exe 2804 firefox.exe 2804 firefox.exe 2804 firefox.exe 2804 firefox.exe 2804 firefox.exe 2804 firefox.exe 2804 firefox.exe 2804 firefox.exe 2804 firefox.exe 2804 firefox.exe 2804 firefox.exe 2804 firefox.exe 2804 firefox.exe 2804 firefox.exe 2804 firefox.exe 2804 firefox.exe 2804 firefox.exe 2804 firefox.exe 2804 firefox.exe 2804 firefox.exe 2804 firefox.exe 2804 firefox.exe 2804 firefox.exe 2804 firefox.exe 2804 firefox.exe 2804 firefox.exe 3684 firefox.exe 3684 firefox.exe 4008 Client.exe 4956 Client.exe 1072 Client.exe 4692 Client.exe 3668 Client.exe 4304 Client.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2804 firefox.exe 2804 firefox.exe 2804 firefox.exe 2804 firefox.exe 2804 firefox.exe 2804 firefox.exe 2804 firefox.exe 3684 firefox.exe 3684 firefox.exe 3684 firefox.exe 3684 firefox.exe 2084 SecHealthUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 408 wrote to memory of 4280 408 chrome.exe 79 PID 408 wrote to memory of 4280 408 chrome.exe 79 PID 408 wrote to memory of 2496 408 chrome.exe 80 PID 408 wrote to memory of 2496 408 chrome.exe 80 PID 408 wrote to memory of 2496 408 chrome.exe 80 PID 408 wrote to memory of 2496 408 chrome.exe 80 PID 408 wrote to memory of 2496 408 chrome.exe 80 PID 408 wrote to memory of 2496 408 chrome.exe 80 PID 408 wrote to memory of 2496 408 chrome.exe 80 PID 408 wrote to memory of 2496 408 chrome.exe 80 PID 408 wrote to memory of 2496 408 chrome.exe 80 PID 408 wrote to memory of 2496 408 chrome.exe 80 PID 408 wrote to memory of 2496 408 chrome.exe 80 PID 408 wrote to memory of 2496 408 chrome.exe 80 PID 408 wrote to memory of 2496 408 chrome.exe 80 PID 408 wrote to memory of 2496 408 chrome.exe 80 PID 408 wrote to memory of 2496 408 chrome.exe 80 PID 408 wrote to memory of 2496 408 chrome.exe 80 PID 408 wrote to memory of 2496 408 chrome.exe 80 PID 408 wrote to memory of 2496 408 chrome.exe 80 PID 408 wrote to memory of 2496 408 chrome.exe 80 PID 408 wrote to memory of 2496 408 chrome.exe 80 PID 408 wrote to memory of 2496 408 chrome.exe 80 PID 408 wrote to memory of 2496 408 chrome.exe 80 PID 408 wrote to memory of 2496 408 chrome.exe 80 PID 408 wrote to memory of 2496 408 chrome.exe 80 PID 408 wrote to memory of 2496 408 chrome.exe 80 PID 408 wrote to memory of 2496 408 chrome.exe 80 PID 408 wrote to memory of 2496 408 chrome.exe 80 PID 408 wrote to memory of 2496 408 chrome.exe 80 PID 408 wrote to memory of 2496 408 chrome.exe 80 PID 408 wrote to memory of 2496 408 chrome.exe 80 PID 408 wrote to memory of 1016 408 chrome.exe 81 PID 408 wrote to memory of 1016 408 chrome.exe 81 PID 408 wrote to memory of 4960 408 chrome.exe 82 PID 408 wrote to memory of 4960 408 chrome.exe 82 PID 408 wrote to memory of 4960 408 chrome.exe 82 PID 408 wrote to memory of 4960 408 chrome.exe 82 PID 408 wrote to memory of 4960 408 chrome.exe 82 PID 408 wrote to memory of 4960 408 chrome.exe 82 PID 408 wrote to memory of 4960 408 chrome.exe 82 PID 408 wrote to memory of 4960 408 chrome.exe 82 PID 408 wrote to memory of 4960 408 chrome.exe 82 PID 408 wrote to memory of 4960 408 chrome.exe 82 PID 408 wrote to memory of 4960 408 chrome.exe 82 PID 408 wrote to memory of 4960 408 chrome.exe 82 PID 408 wrote to memory of 4960 408 chrome.exe 82 PID 408 wrote to memory of 4960 408 chrome.exe 82 PID 408 wrote to memory of 4960 408 chrome.exe 82 PID 408 wrote to memory of 4960 408 chrome.exe 82 PID 408 wrote to memory of 4960 408 chrome.exe 82 PID 408 wrote to memory of 4960 408 chrome.exe 82 PID 408 wrote to memory of 4960 408 chrome.exe 82 PID 408 wrote to memory of 4960 408 chrome.exe 82 PID 408 wrote to memory of 4960 408 chrome.exe 82 PID 408 wrote to memory of 4960 408 chrome.exe 82 PID 408 wrote to memory of 4960 408 chrome.exe 82 PID 408 wrote to memory of 4960 408 chrome.exe 82 PID 408 wrote to memory of 4960 408 chrome.exe 82 PID 408 wrote to memory of 4960 408 chrome.exe 82 PID 408 wrote to memory of 4960 408 chrome.exe 82 PID 408 wrote to memory of 4960 408 chrome.exe 82 PID 408 wrote to memory of 4960 408 chrome.exe 82 PID 408 wrote to memory of 4960 408 chrome.exe 82 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\TwoOA1.html1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x21c,0x220,0x224,0x1f8,0x228,0x7ff9ca09cc40,0x7ff9ca09cc4c,0x7ff9ca09cc582⤵PID:4280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1860,i,6415140214647064372,9813952208155425256,262144 --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=1856 /prefetch:22⤵PID:2496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2168,i,6415140214647064372,9813952208155425256,262144 --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=2176 /prefetch:32⤵PID:1016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2248,i,6415140214647064372,9813952208155425256,262144 --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=2460 /prefetch:82⤵PID:4960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3120,i,6415140214647064372,9813952208155425256,262144 --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=3156 /prefetch:12⤵PID:4344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3136,i,6415140214647064372,9813952208155425256,262144 --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:4480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4100,i,6415140214647064372,9813952208155425256,262144 --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=4700 /prefetch:82⤵PID:3116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4472,i,6415140214647064372,9813952208155425256,262144 --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=3848 /prefetch:12⤵PID:4880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=2276,i,6415140214647064372,9813952208155425256,262144 --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=3124 /prefetch:12⤵PID:2848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=5136,i,6415140214647064372,9813952208155425256,262144 --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:1036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=3180,i,6415140214647064372,9813952208155425256,262144 --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=5256 /prefetch:82⤵PID:5108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=3176,i,6415140214647064372,9813952208155425256,262144 --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=5280 /prefetch:82⤵PID:2396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5372,i,6415140214647064372,9813952208155425256,262144 --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=5580 /prefetch:82⤵PID:2984
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4820
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1712
-
C:\Users\Admin\Desktop\Client.exe"C:\Users\Admin\Desktop\Client.exe"1⤵PID:2808
-
C:\Users\Admin\Desktop\Client.exe"C:\Users\Admin\Desktop\Client.exe"1⤵PID:4080
-
C:\Users\Admin\Desktop\Client.exe"C:\Users\Admin\Desktop\Client.exe"1⤵PID:4828
-
C:\Users\Admin\Desktop\Client.exe"C:\Users\Admin\Desktop\Client.exe"1⤵PID:1700
-
C:\Users\Admin\Desktop\Client.exe"C:\Users\Admin\Desktop\Client.exe"1⤵PID:1464
-
C:\Users\Admin\Desktop\Client.exe"C:\Users\Admin\Desktop\Client.exe"1⤵PID:2532
-
C:\Users\Admin\Desktop\Client.exe"C:\Users\Admin\Desktop\Client.exe"1⤵PID:4364
-
C:\Users\Admin\Desktop\Client.exe"C:\Users\Admin\Desktop\Client.exe"1⤵PID:3372
-
C:\Users\Admin\Desktop\Client.exe"C:\Users\Admin\Desktop\Client.exe"1⤵PID:756
-
C:\Users\Admin\Desktop\Client.exe"C:\Users\Admin\Desktop\Client.exe"1⤵PID:2272
-
C:\Users\Admin\Desktop\Client.exe"C:\Users\Admin\Desktop\Client.exe"1⤵PID:1252
-
C:\Users\Admin\Desktop\Client.exe"C:\Users\Admin\Desktop\Client.exe"1⤵PID:252
-
C:\Users\Admin\Desktop\Client.exe"C:\Users\Admin\Desktop\Client.exe"1⤵PID:3832
-
C:\Users\Admin\Desktop\Client.exe"C:\Users\Admin\Desktop\Client.exe"1⤵PID:4868
-
C:\Users\Admin\Desktop\Client.exe"C:\Users\Admin\Desktop\Client.exe"1⤵PID:968
-
C:\Users\Admin\Desktop\Client.exe"C:\Users\Admin\Desktop\Client.exe"1⤵PID:3900
-
C:\Users\Admin\Desktop\Client.exe"C:\Users\Admin\Desktop\Client.exe"1⤵PID:4960
-
C:\Users\Admin\Desktop\Client.exe"C:\Users\Admin\Desktop\Client.exe"1⤵PID:640
-
C:\Users\Admin\Desktop\Client.exe"C:\Users\Admin\Desktop\Client.exe"1⤵PID:3400
-
C:\Users\Admin\Desktop\Client.exe"C:\Users\Admin\Desktop\Client.exe"1⤵PID:4472
-
C:\Users\Admin\Desktop\Client.exe"C:\Users\Admin\Desktop\Client.exe"1⤵PID:1864
-
C:\Users\Admin\Desktop\Client.exe"C:\Users\Admin\Desktop\Client.exe"1⤵PID:1528
-
C:\Users\Admin\Desktop\Client.exe"C:\Users\Admin\Desktop\Client.exe"1⤵PID:1900
-
C:\Users\Admin\Desktop\Client.exe"C:\Users\Admin\Desktop\Client.exe"1⤵PID:992
-
C:\Users\Admin\Desktop\Client.exe"C:\Users\Admin\Desktop\Client.exe"1⤵PID:1368
-
C:\Users\Admin\Desktop\Client.exe"C:\Users\Admin\Desktop\Client.exe"1⤵PID:4512
-
C:\Users\Admin\Desktop\Client.exe"C:\Users\Admin\Desktop\Client.exe"1⤵PID:4648
-
C:\Users\Admin\Desktop\Client.exe"C:\Users\Admin\Desktop\Client.exe"1⤵PID:5040
-
C:\Users\Admin\Desktop\Client.exe"C:\Users\Admin\Desktop\Client.exe"1⤵PID:2204
-
C:\Users\Admin\Desktop\Client.exe"C:\Users\Admin\Desktop\Client.exe"1⤵PID:2064
-
C:\Users\Admin\Desktop\Client.exe"C:\Users\Admin\Desktop\Client.exe"1⤵PID:328
-
C:\Users\Admin\Desktop\Client.exe"C:\Users\Admin\Desktop\Client.exe"1⤵PID:1640
-
C:\Users\Admin\Desktop\Client.exe"C:\Users\Admin\Desktop\Client.exe"1⤵PID:4704
-
C:\Users\Admin\Desktop\Client.exe"C:\Users\Admin\Desktop\Client.exe"1⤵PID:2528
-
C:\Users\Admin\Desktop\Client.exe"C:\Users\Admin\Desktop\Client.exe"1⤵PID:2252
-
C:\Users\Admin\Desktop\Client.exe"C:\Users\Admin\Desktop\Client.exe"1⤵PID:3076
-
C:\Users\Admin\Desktop\Client.exe"C:\Users\Admin\Desktop\Client.exe"1⤵PID:3544
-
C:\Users\Admin\Desktop\Client.exe"C:\Users\Admin\Desktop\Client.exe"1⤵PID:4960
-
C:\Users\Admin\Desktop\Client.exe"C:\Users\Admin\Desktop\Client.exe"1⤵PID:852
-
C:\Users\Admin\Desktop\Client.exe"C:\Users\Admin\Desktop\Client.exe"1⤵PID:3164
-
C:\Users\Admin\Desktop\Client.exe"C:\Users\Admin\Desktop\Client.exe"1⤵PID:2856
-
C:\Users\Admin\Desktop\Client.exe"C:\Users\Admin\Desktop\Client.exe"1⤵PID:2228
-
C:\Users\Admin\Desktop\Client.exe"C:\Users\Admin\Desktop\Client.exe"1⤵PID:2236
-
C:\Users\Admin\Desktop\Client.exe"C:\Users\Admin\Desktop\Client.exe"1⤵PID:3856
-
C:\Users\Admin\Desktop\Client.exe"C:\Users\Admin\Desktop\Client.exe"1⤵PID:2464
-
C:\Users\Admin\Desktop\Client.exe"C:\Users\Admin\Desktop\Client.exe"1⤵PID:1284
-
C:\Users\Admin\Desktop\Client.exe"C:\Users\Admin\Desktop\Client.exe"1⤵PID:4992
-
C:\Users\Admin\Desktop\Client.exe"C:\Users\Admin\Desktop\Client.exe"1⤵PID:4860
-
C:\Users\Admin\Desktop\Client.exe"C:\Users\Admin\Desktop\Client.exe"1⤵PID:2888
-
C:\Users\Admin\Desktop\Client.exe"C:\Users\Admin\Desktop\Client.exe"1⤵PID:1712
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵PID:5036
-
C:\Windows\system32\ipconfig.exeipconfig2⤵
- Gathers network information
PID:3772
-
-
C:\Windows\system32\NETSTAT.EXEnetstat a2⤵
- Gathers network information
PID:1076
-
-
C:\Windows\system32\NETSTAT.EXEnetstat e2⤵
- Gathers network information
PID:4132
-
-
C:\Windows\system32\NETSTAT.EXEnetstat /e2⤵
- Gathers network information
PID:4940
-
-
C:\Windows\system32\NETSTAT.EXEnetstat /a2⤵
- Gathers network information
PID:2496
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2576
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵PID:1884
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- Checks processor information in registry
- Modifies registry class
- NTFS ADS
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2804 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2024 -parentBuildID 20240401114208 -prefsHandle 1952 -prefMapHandle 1944 -prefsLen 23839 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {4898d6f1-1f45-4322-863c-b93328f2409e} 2804 "\\.\pipe\gecko-crash-server-pipe.2804" gpu3⤵PID:3028
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2428 -parentBuildID 20240401114208 -prefsHandle 2420 -prefMapHandle 2416 -prefsLen 23717 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b9212c97-6fdf-4c29-9881-de4683abd3a9} 2804 "\\.\pipe\gecko-crash-server-pipe.2804" socket3⤵
- Checks processor information in registry
PID:4200
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2968 -childID 1 -isForBrowser -prefsHandle 3184 -prefMapHandle 3196 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1248 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7d40cb15-5c27-4425-ab4f-ae4df80dcd11} 2804 "\\.\pipe\gecko-crash-server-pipe.2804" tab3⤵PID:3000
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3924 -childID 2 -isForBrowser -prefsHandle 3904 -prefMapHandle 3900 -prefsLen 29091 -prefMapSize 244658 -jsInitHandle 1248 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a9f1a3be-11af-4083-b9fd-1914e0cdcfce} 2804 "\\.\pipe\gecko-crash-server-pipe.2804" tab3⤵PID:4848
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4648 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4604 -prefMapHandle 4516 -prefsLen 29091 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bb953eb8-53bf-4460-9062-4f72c05ae9f9} 2804 "\\.\pipe\gecko-crash-server-pipe.2804" utility3⤵
- Checks processor information in registry
PID:1300
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5332 -childID 3 -isForBrowser -prefsHandle 5316 -prefMapHandle 5312 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1248 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bf00138b-9bf1-4f23-b7e6-27b527814920} 2804 "\\.\pipe\gecko-crash-server-pipe.2804" tab3⤵PID:1692
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5444 -childID 4 -isForBrowser -prefsHandle 5456 -prefMapHandle 5460 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1248 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {36bda38c-5b34-466a-92fe-8ac6ed01fe27} 2804 "\\.\pipe\gecko-crash-server-pipe.2804" tab3⤵PID:740
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5768 -childID 5 -isForBrowser -prefsHandle 5688 -prefMapHandle 5692 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1248 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c977a708-ac37-4108-a70f-5f17dc1c0c25} 2804 "\\.\pipe\gecko-crash-server-pipe.2804" tab3⤵PID:4248
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5520 -childID 6 -isForBrowser -prefsHandle 5088 -prefMapHandle 5728 -prefsLen 29279 -prefMapSize 244658 -jsInitHandle 1248 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d9e351f5-7c06-4658-bff6-a3d3ba3973ac} 2804 "\\.\pipe\gecko-crash-server-pipe.2804" tab3⤵PID:3308
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6524 -childID 7 -isForBrowser -prefsHandle 4200 -prefMapHandle 6380 -prefsLen 27211 -prefMapSize 244658 -jsInitHandle 1248 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {87bf4224-fd39-4857-afb5-87fdb52d1965} 2804 "\\.\pipe\gecko-crash-server-pipe.2804" tab3⤵PID:4536
-
-
-
C:\Users\Admin\Desktop\Client(1).exe"C:\Users\Admin\Desktop\Client(1).exe"1⤵
- Executes dropped EXE
PID:4588
-
C:\Users\Admin\Desktop\Client(1).exe"C:\Users\Admin\Desktop\Client(1).exe"1⤵
- Executes dropped EXE
PID:5040
-
C:\Users\Admin\Desktop\Client(1).exe"C:\Users\Admin\Desktop\Client(1).exe"1⤵
- Executes dropped EXE
PID:2524
-
C:\Users\Admin\Desktop\Client(1).exe"C:\Users\Admin\Desktop\Client(1).exe"1⤵
- Executes dropped EXE
PID:5028
-
C:\Users\Admin\Desktop\Client(1).exe"C:\Users\Admin\Desktop\Client(1).exe"1⤵
- Executes dropped EXE
PID:4608
-
C:\Users\Admin\Desktop\Client(1).exe"C:\Users\Admin\Desktop\Client(1).exe"1⤵
- Executes dropped EXE
PID:4468
-
C:\Users\Admin\Desktop\Client(1).exe"C:\Users\Admin\Desktop\Client(1).exe"1⤵
- Executes dropped EXE
PID:2372
-
C:\Users\Admin\Desktop\Client(1).exe"C:\Users\Admin\Desktop\Client(1).exe"1⤵
- Executes dropped EXE
PID:1072
-
C:\Users\Admin\Desktop\Client(1).exe"C:\Users\Admin\Desktop\Client(1).exe"1⤵
- Executes dropped EXE
PID:2592
-
C:\Users\Admin\Desktop\Client(1).exe"C:\Users\Admin\Desktop\Client(1).exe"1⤵
- Executes dropped EXE
PID:2076
-
C:\Users\Admin\Desktop\Client(1).exe"C:\Users\Admin\Desktop\Client(1).exe"1⤵
- Executes dropped EXE
PID:3468
-
C:\Users\Admin\Desktop\Client(1).exe"C:\Users\Admin\Desktop\Client(1).exe"1⤵
- Executes dropped EXE
PID:4780
-
C:\Users\Admin\Desktop\Client(1).exe"C:\Users\Admin\Desktop\Client(1).exe"1⤵
- Executes dropped EXE
PID:4988
-
C:\Users\Admin\Desktop\Client(1).exe"C:\Users\Admin\Desktop\Client(1).exe"1⤵
- Executes dropped EXE
PID:4740
-
C:\Users\Admin\Desktop\Client(1).exe"C:\Users\Admin\Desktop\Client(1).exe"1⤵
- Executes dropped EXE
PID:568
-
C:\Users\Admin\Desktop\Client(1).exe"C:\Users\Admin\Desktop\Client(1).exe"1⤵
- Executes dropped EXE
PID:3124
-
C:\Users\Admin\Desktop\Client(1).exe"C:\Users\Admin\Desktop\Client(1).exe"1⤵
- Executes dropped EXE
PID:2360
-
C:\Users\Admin\Desktop\Client(1).exe"C:\Users\Admin\Desktop\Client(1).exe"1⤵
- Executes dropped EXE
PID:2848
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵PID:4620
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- Checks processor information in registry
- Modifies registry class
- NTFS ADS
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3684 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1940 -parentBuildID 20240401114208 -prefsHandle 1856 -prefMapHandle 1848 -prefsLen 24531 -prefMapSize 245025 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5036b001-b78f-4c96-bca5-c983c5811429} 3684 "\\.\pipe\gecko-crash-server-pipe.3684" gpu3⤵PID:3256
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2284 -parentBuildID 20240401114208 -prefsHandle 2268 -prefMapHandle 2264 -prefsLen 24531 -prefMapSize 245025 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7b54f5e1-f5a6-4c7f-9707-23401574454e} 3684 "\\.\pipe\gecko-crash-server-pipe.3684" socket3⤵
- Checks processor information in registry
PID:540
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2860 -childID 1 -isForBrowser -prefsHandle 3096 -prefMapHandle 3092 -prefsLen 25030 -prefMapSize 245025 -jsInitHandle 1340 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {87f31f56-03d4-4468-8707-298601e17515} 3684 "\\.\pipe\gecko-crash-server-pipe.3684" tab3⤵PID:3288
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3700 -childID 2 -isForBrowser -prefsHandle 3716 -prefMapHandle 3712 -prefsLen 30263 -prefMapSize 245025 -jsInitHandle 1340 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ce09733e-45e7-4837-830c-4cca6f0f098b} 3684 "\\.\pipe\gecko-crash-server-pipe.3684" tab3⤵PID:4276
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4612 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4616 -prefMapHandle 4608 -prefsLen 30263 -prefMapSize 245025 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1f857af3-b53d-485d-a83e-837775fd951f} 3684 "\\.\pipe\gecko-crash-server-pipe.3684" utility3⤵
- Checks processor information in registry
PID:4344
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5336 -childID 3 -isForBrowser -prefsHandle 5376 -prefMapHandle 5372 -prefsLen 27782 -prefMapSize 245025 -jsInitHandle 1340 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b4f4b6fd-d1e7-44b9-80c6-ded8da3c44d1} 3684 "\\.\pipe\gecko-crash-server-pipe.3684" tab3⤵PID:2480
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5520 -childID 4 -isForBrowser -prefsHandle 5192 -prefMapHandle 5196 -prefsLen 27782 -prefMapSize 245025 -jsInitHandle 1340 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {adf246fb-c65c-4ebf-b11e-ab0ba59c5834} 3684 "\\.\pipe\gecko-crash-server-pipe.3684" tab3⤵PID:2512
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5180 -childID 5 -isForBrowser -prefsHandle 5672 -prefMapHandle 5676 -prefsLen 27782 -prefMapSize 245025 -jsInitHandle 1340 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bd2bbc1d-d248-4ba8-93a2-a974bf64e07f} 3684 "\\.\pipe\gecko-crash-server-pipe.3684" tab3⤵PID:3184
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6036 -childID 6 -isForBrowser -prefsHandle 5048 -prefMapHandle 6052 -prefsLen 27782 -prefMapSize 245025 -jsInitHandle 1340 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a3fc529c-a0ad-4aef-a39b-cfb1000c257c} 3684 "\\.\pipe\gecko-crash-server-pipe.3684" tab3⤵PID:4608
-
-
-
C:\Users\Admin\Desktop\Client-built.exe"C:\Users\Admin\Desktop\Client-built.exe"1⤵
- Executes dropped EXE
PID:5008 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f2⤵PID:1440
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SendNotifyMessage
PID:4008 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:4728
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\bLPL40Zuv9LW.bat" "3⤵PID:1252
-
C:\Windows\system32\chcp.comchcp 650014⤵PID:1892
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost4⤵PID:5056
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"4⤵
- Executes dropped EXE
- Suspicious use of SendNotifyMessage
PID:4692 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f5⤵PID:3436
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\TL6CMEmhUrdI.bat" "5⤵PID:384
-
C:\Windows\system32\chcp.comchcp 650016⤵PID:2864
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost6⤵PID:1884
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"6⤵
- Executes dropped EXE
PID:4276 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f7⤵PID:4036
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\9RrgCZRJcV5W.bat" "7⤵PID:4752
-
C:\Windows\system32\chcp.comchcp 650018⤵PID:2360
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost8⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4272
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"8⤵
- Executes dropped EXE
PID:3648 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f9⤵PID:1288
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\yYisl1tIbKhC.bat" "9⤵PID:1764
-
C:\Windows\system32\chcp.comchcp 6500110⤵PID:4844
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost10⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1948
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"10⤵
- Executes dropped EXE
PID:2308 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f11⤵PID:3752
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\faUmdJ4DOp6r.bat" "11⤵PID:2536
-
C:\Windows\system32\chcp.comchcp 6500112⤵PID:1244
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost12⤵PID:2980
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
PID:5028 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f13⤵PID:2280
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\bwHsI5Fh5YBi.bat" "13⤵PID:1140
-
C:\Windows\system32\chcp.comchcp 6500114⤵PID:2480
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost14⤵PID:2084
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"14⤵
- Executes dropped EXE
PID:3256 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f15⤵
- Scheduled Task/Job: Scheduled Task
PID:3664
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RQQ7iPzOpJfY.bat" "15⤵PID:2112
-
C:\Windows\system32\chcp.comchcp 6500116⤵PID:3172
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost16⤵PID:792
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"16⤵
- Executes dropped EXE
PID:2804 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f17⤵PID:2320
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\KZwxF19c5MpM.bat" "17⤵PID:2360
-
C:\Windows\system32\chcp.comchcp 6500118⤵PID:1772
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost18⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2340
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"18⤵
- Executes dropped EXE
PID:1464 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f19⤵PID:2952
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\jB4tMmiZvHc5.bat" "19⤵PID:1344
-
C:\Windows\system32\chcp.comchcp 6500120⤵PID:1892
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost20⤵PID:1840
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"20⤵
- Executes dropped EXE
PID:4752 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f21⤵PID:3916
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\TZwb3iHOGmF0.bat" "21⤵PID:3320
-
C:\Windows\system32\chcp.comchcp 6500122⤵PID:1620
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost22⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4424
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"22⤵
- Executes dropped EXE
PID:4996 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f23⤵PID:4368
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\mbbWEcKMDQLR.bat" "23⤵PID:2556
-
C:\Windows\system32\chcp.comchcp 6500124⤵PID:992
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost24⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3560
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"24⤵
- Executes dropped EXE
PID:3860 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f25⤵PID:2700
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\dBcg1aeKNFp9.bat" "25⤵PID:1472
-
C:\Windows\system32\chcp.comchcp 6500126⤵PID:2164
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost26⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4292
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"26⤵
- Executes dropped EXE
PID:1256 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f27⤵PID:4120
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ktMdcowTN3D2.bat" "27⤵PID:2980
-
C:\Windows\system32\chcp.comchcp 6500128⤵PID:3680
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost28⤵PID:1468
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
PID:1772 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f29⤵PID:4372
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JH2WgtggwxBo.bat" "29⤵PID:1692
-
C:\Windows\system32\chcp.comchcp 6500130⤵PID:1288
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost30⤵PID:2644
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"30⤵PID:4612
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f31⤵PID:2432
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\dlXMdsf5P5Lj.bat" "31⤵PID:1276
-
C:\Windows\system32\chcp.comchcp 6500132⤵PID:4632
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost32⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:792
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"32⤵PID:3800
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f33⤵PID:4052
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cTF5EUlbUEri.bat" "33⤵PID:4540
-
C:\Windows\system32\chcp.comchcp 6500134⤵PID:4740
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost34⤵PID:2708
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"34⤵PID:4012
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f35⤵PID:5008
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\moFpQSzQCEav.bat" "35⤵PID:328
-
C:\Windows\system32\chcp.comchcp 6500136⤵PID:1312
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost36⤵PID:4320
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"36⤵PID:540
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f37⤵PID:1764
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4WA8jVSXZq7m.bat" "37⤵PID:1744
-
C:\Windows\system32\chcp.comchcp 6500138⤵PID:2164
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost38⤵
- Runs ping.exe
PID:4424
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"38⤵PID:1860
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f39⤵
- Scheduled Task/Job: Scheduled Task
PID:3628
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\mFoKXfOzVJod.bat" "39⤵PID:3876
-
C:\Windows\system32\chcp.comchcp 6500140⤵PID:4220
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost40⤵PID:2420
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"40⤵PID:5008
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f41⤵PID:2372
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\m0QcmpyM2JdL.bat" "41⤵PID:2728
-
C:\Windows\system32\chcp.comchcp 6500142⤵PID:4972
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost42⤵PID:4640
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"42⤵PID:3744
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f43⤵PID:4464
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\SQJxtkeAg2YE.bat" "43⤵PID:4576
-
C:\Windows\system32\chcp.comchcp 6500144⤵PID:2776
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost44⤵PID:2148
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"44⤵
- Checks computer location settings
PID:1976 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f45⤵PID:384
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DFHU4isNlYIo.bat" "45⤵PID:3868
-
C:\Windows\system32\chcp.comchcp 6500146⤵PID:2192
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost46⤵PID:3376
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"46⤵
- Checks computer location settings
PID:2660 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f47⤵PID:1584
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\xJvNGCeKSfuD.bat" "47⤵PID:2808
-
C:\Windows\system32\chcp.comchcp 6500148⤵PID:1368
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost48⤵PID:2916
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"48⤵PID:912
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f49⤵PID:2312
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\rKLReEqTXWkt.bat" "49⤵PID:1800
-
C:\Windows\system32\chcp.comchcp 6500150⤵PID:2196
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost50⤵
- Runs ping.exe
PID:3288
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"50⤵
- Checks computer location settings
PID:1156 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f51⤵PID:2516
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\adDvQtLt4Ow8.bat" "51⤵PID:1468
-
C:\Windows\system32\chcp.comchcp 6500152⤵PID:3792
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost52⤵PID:3312
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"52⤵PID:4500
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f53⤵
- Scheduled Task/Job: Scheduled Task
PID:2272
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ladnBLDNTVS9.bat" "53⤵PID:1440
-
C:\Windows\system32\chcp.comchcp 6500154⤵PID:4548
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost54⤵PID:392
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"54⤵
- Checks computer location settings
PID:4884 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f55⤵PID:3252
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\9Xs2yGh6DChd.bat" "55⤵PID:2196
-
C:\Windows\system32\chcp.comchcp 6500156⤵PID:1416
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost56⤵PID:1348
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"56⤵PID:5068
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f57⤵PID:1080
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\UZE1rLNpjkzj.bat" "57⤵PID:2964
-
C:\Windows\system32\chcp.comchcp 6500158⤵PID:3200
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost58⤵PID:3044
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"58⤵PID:3900
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f59⤵
- Scheduled Task/Job: Scheduled Task
PID:3436
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\U5St3fQmO5au.bat" "59⤵PID:2200
-
C:\Windows\system32\chcp.comchcp 6500160⤵PID:5088
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost60⤵PID:1512
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"60⤵PID:2312
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f61⤵PID:3888
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\vSrwZTC2QKow.bat" "61⤵PID:3948
-
C:\Windows\system32\chcp.comchcp 6500162⤵PID:4640
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost62⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1036
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"62⤵PID:1728
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f63⤵
- Scheduled Task/Job: Scheduled Task
PID:3792
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\gUZ6QPrl68Gk.bat" "63⤵PID:3984
-
C:\Windows\system32\chcp.comchcp 6500164⤵PID:4592
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost64⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1800
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"64⤵PID:4796
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f65⤵PID:3868
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5t5FvgcMrILO.bat" "65⤵PID:3476
-
C:\Windows\system32\chcp.comchcp 6500166⤵PID:524
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost66⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1840
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"66⤵PID:400
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f67⤵PID:1244
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7H1g29BzPkhV.bat" "67⤵PID:4640
-
C:\Windows\system32\chcp.comchcp 6500168⤵PID:3252
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost68⤵PID:4176
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"68⤵
- Checks computer location settings
PID:4348 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f69⤵PID:4388
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\63g539CWlLDo.bat" "69⤵PID:4864
-
C:\Windows\system32\chcp.comchcp 6500170⤵PID:2732
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost70⤵PID:1540
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"70⤵PID:1344
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f71⤵PID:3908
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\g6QNGgRnQEnh.bat" "71⤵PID:1284
-
C:\Windows\system32\chcp.comchcp 6500172⤵PID:2572
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost72⤵PID:984
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"72⤵PID:2088
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f73⤵PID:3008
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\dEsmOxFQJngL.bat" "73⤵PID:3040
-
C:\Windows\system32\chcp.comchcp 6500174⤵PID:1448
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost74⤵PID:4868
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"74⤵PID:2416
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f75⤵
- Scheduled Task/Job: Scheduled Task
PID:3644
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Ad4QIJ0XkSLz.bat" "75⤵PID:568
-
C:\Windows\system32\chcp.comchcp 6500176⤵PID:3748
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost76⤵PID:3044
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"76⤵
- Checks computer location settings
PID:1892 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f77⤵
- Scheduled Task/Job: Scheduled Task
PID:1012
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\AEmtX65K6WkC.bat" "77⤵PID:3436
-
C:\Windows\system32\chcp.comchcp 6500178⤵PID:4540
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost78⤵PID:4084
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"78⤵PID:1180
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f79⤵
- Scheduled Task/Job: Scheduled Task
PID:1248
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Jkn0bavCIIAW.bat" "79⤵PID:980
-
C:\Windows\system32\chcp.comchcp 6500180⤵PID:2164
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost80⤵
- Runs ping.exe
PID:900
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"80⤵
- Checks computer location settings
PID:1736 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f81⤵PID:2984
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\LNjLB9WvMUaR.bat" "81⤵PID:3372
-
C:\Windows\system32\chcp.comchcp 6500182⤵PID:5080
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost82⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2892
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"82⤵PID:756
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f83⤵
- Scheduled Task/Job: Scheduled Task
PID:1304
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\rxYrzpwfE4o1.bat" "83⤵PID:1540
-
C:\Windows\system32\chcp.comchcp 6500184⤵PID:3956
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost84⤵PID:2428
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"84⤵PID:3888
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f85⤵
- Scheduled Task/Job: Scheduled Task
PID:1512
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\HcpgFWniRJHx.bat" "85⤵PID:4048
-
C:\Windows\system32\chcp.comchcp 6500186⤵PID:4576
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost86⤵
- Runs ping.exe
PID:3544
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"86⤵PID:1080
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f87⤵PID:2732
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\9ToFmF71c9N7.bat" "87⤵PID:3540
-
C:\Windows\system32\chcp.comchcp 6500188⤵PID:2536
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost88⤵PID:4656
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"88⤵PID:2504
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f89⤵PID:740
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\uKwyLacozsQe.bat" "89⤵PID:3548
-
C:\Windows\system32\chcp.comchcp 6500190⤵PID:3308
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost90⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4428
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"90⤵PID:3724
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f91⤵PID:2644
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sfdBCL3R7eIj.bat" "91⤵PID:2496
-
C:\Windows\system32\chcp.comchcp 6500192⤵PID:4784
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost92⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1164
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"92⤵PID:2216
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f93⤵PID:4940
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\YfVYqtgw4Ni1.bat" "93⤵PID:3084
-
C:\Windows\system32\chcp.comchcp 6500194⤵PID:3780
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost94⤵
- Runs ping.exe
PID:3344
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"94⤵
- Checks computer location settings
PID:3588 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f95⤵PID:928
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\0GzSriiT3xoK.bat" "95⤵PID:4844
-
C:\Windows\system32\chcp.comchcp 6500196⤵PID:4360
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost96⤵PID:4220
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"96⤵PID:4544
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f97⤵
- Scheduled Task/Job: Scheduled Task
PID:2276
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DMMA7yfds3dS.bat" "97⤵PID:792
-
C:\Windows\system32\chcp.comchcp 6500198⤵PID:3024
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost98⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:696
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"98⤵PID:5080
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f99⤵
- Scheduled Task/Job: Scheduled Task
PID:1912
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\gXlF8yJ1LrMZ.bat" "99⤵PID:2488
-
C:\Windows\system32\chcp.comchcp 65001100⤵PID:1112
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost100⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3372
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"100⤵PID:3504
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f101⤵PID:3956
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BbeaHyqwxBRD.bat" "101⤵PID:1604
-
C:\Windows\system32\chcp.comchcp 65001102⤵PID:2224
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost102⤵PID:964
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"102⤵PID:476
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f103⤵PID:4576
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\vxkibT9kInR4.bat" "103⤵PID:1748
-
C:\Windows\system32\chcp.comchcp 65001104⤵PID:3476
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost104⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:5040
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"104⤵PID:2284
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f105⤵PID:4352
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\hyhr5DrA63m2.bat" "105⤵PID:3200
-
C:\Windows\system32\chcp.comchcp 65001106⤵PID:3184
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost106⤵PID:2488
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"106⤵PID:2204
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f107⤵PID:3544
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cTQKmEaoagPB.bat" "107⤵PID:3024
-
C:\Windows\system32\chcp.comchcp 65001108⤵PID:3976
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost108⤵
- Runs ping.exe
PID:1532
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"108⤵PID:888
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f109⤵PID:5032
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\8IvDgnqQ4Kvw.bat" "109⤵PID:1616
-
C:\Windows\system32\chcp.comchcp 65001110⤵PID:3780
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost110⤵PID:4528
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"110⤵
- Checks computer location settings
PID:2240 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f111⤵PID:1368
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\W7DyERTWbuE0.bat" "111⤵PID:3044
-
C:\Windows\system32\chcp.comchcp 65001112⤵PID:3500
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost112⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:472
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"112⤵
- Checks computer location settings
PID:3792 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f113⤵PID:3832
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\gqXULBxCi2HO.bat" "113⤵PID:1532
-
C:\Windows\system32\chcp.comchcp 65001114⤵PID:1100
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost114⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:3368
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"114⤵PID:2196
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f115⤵PID:3772
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ATE7SV3oju4Y.bat" "115⤵PID:4940
-
C:\Windows\system32\chcp.comchcp 65001116⤵PID:3816
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost116⤵PID:1700
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"116⤵PID:3308
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f117⤵PID:4564
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7hgUB4QtHADG.bat" "117⤵PID:3200
-
C:\Windows\system32\chcp.comchcp 65001118⤵PID:5024
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost118⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2976
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"118⤵
- Checks computer location settings
PID:1228 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f119⤵PID:1660
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\HLLpQzrYz1Bb.bat" "119⤵PID:3196
-
C:\Windows\system32\chcp.comchcp 65001120⤵PID:3040
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost120⤵PID:4840
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"120⤵
- Checks computer location settings
PID:4428 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f121⤵PID:1056
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\pnhwb7EUK0tP.bat" "121⤵PID:4220
-
C:\Windows\system32\chcp.comchcp 65001122⤵PID:472
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-