Analysis
-
max time kernel
1792s -
max time network
1794s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
12-12-2024 03:21
Static task
static1
General
-
Target
3diAJd.html
-
Size
7KB
-
MD5
aa5d13590623abb5d3963a8af5dfb85d
-
SHA1
8dcb62e75f970ac4f9f78e2558f335951b599774
-
SHA256
4c6183029dcf2e4d604c473c2dfb4f72037b6a8f13d9183b0842fd201e422d7a
-
SHA512
94899bfebc29d4d76c1a8d0e9b787ae50386a5e8718194791d27d86eb7e67e1b0e1a9b0a4e68031905c767419bd767b9d2666ac5ffd0a8dd87c0bf842ac7282b
-
SSDEEP
96:CMq9SlLh2B3Zq36uWl/PtxyjttJQ8Maoah3vL5LaNclmnU1Eh2sS:T1lLhwJrPahtJxMaoah3vG12sS
Malware Config
Extracted
quasar
1.4.1
Office04
snimewhile-38203.portmap.host:38203
51.91.144.1:4782
51.91.144.1:3789
60047b8b-4ad1-4a61-af31-77c617e99945
-
encryption_key
9CD2B9F914AD2DE5F4E76D73DB6248BE3586A707
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows Update
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral1/files/0x0029000000045206-230.dat family_quasar behavioral1/memory/1100-280-0x00000000008C0000-0x0000000000BE4000-memory.dmp family_quasar -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Client.exe -
Executes dropped EXE 64 IoCs
pid Process 1100 Client-built.exe 3792 Client.exe 2284 Client-built.exe 1260 Client.exe 1620 Client.exe 3540 Client.exe 2648 Client-built.exe 1744 Client.exe 2252 Client-built.exe 2512 Client-built.exe 2148 Client.exe 4000 Client.exe 988 Client.exe 764 Client.exe 4664 Client.exe 2240 Client.exe 3860 Client.exe 1280 Client.exe 3632 Client.exe 4352 Client.exe 1204 Client.exe 3304 Client.exe 1016 Client.exe 3560 Client.exe 3620 Client.exe 1240 Client.exe 3784 Client.exe 4548 Client.exe 3408 Client.exe 2276 Client.exe 2724 Client.exe 3088 Client.exe 3240 Client.exe 4072 Client.exe 4480 Client.exe 2096 Client.exe 3708 Client.exe 4036 Client.exe 3124 Client.exe 2076 Client.exe 2296 Client.exe 5096 Client.exe 2020 Client.exe 3328 Client.exe 3128 Client.exe 1636 Client.exe 444 Client.exe 2716 Client.exe 1176 Client.exe 464 Client.exe 1800 Client.exe 4528 Client.exe 1776 Client.exe 5004 Client.exe 1868 Client.exe 4988 Client.exe 2648 Client.exe 936 Client.exe 456 Client.exe 4476 Client.exe 4560 Client.exe 2368 Client.exe 4504 Client.exe 2500 Client.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\d43cf3e9-9fdd-4b9a-b8ff-d6ba778146ca.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20241212032151.pma setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 64 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1448 PING.EXE 3624 PING.EXE 3852 PING.EXE 5016 Process not Found 3884 Process not Found 3744 Process not Found 4536 PING.EXE 2384 PING.EXE 1380 PING.EXE 1156 Process not Found 5432 Process not Found 4400 Process not Found 4380 PING.EXE 2344 PING.EXE 1388 Process not Found 2660 Process not Found 2396 Process not Found 5548 Process not Found 4092 PING.EXE 3724 PING.EXE 4916 PING.EXE 1200 PING.EXE 2312 PING.EXE 3296 Process not Found 412 Process not Found 5720 Process not Found 4316 PING.EXE 4116 PING.EXE 4232 PING.EXE 3284 Process not Found 5992 Process not Found 5476 Process not Found 1752 PING.EXE 4356 PING.EXE 4740 PING.EXE 3552 PING.EXE 3764 Process not Found 5272 Process not Found 3556 PING.EXE 4068 PING.EXE 1104 PING.EXE 3340 PING.EXE 5488 Process not Found 856 PING.EXE 4460 PING.EXE 1740 PING.EXE 188 PING.EXE 5396 Process not Found 5672 Process not Found 1388 PING.EXE 2008 PING.EXE 2124 Process not Found 2244 Process not Found 3084 Process not Found 3248 PING.EXE 5104 PING.EXE 660 PING.EXE 4628 PING.EXE 3724 PING.EXE 4464 PING.EXE 3904 Process not Found 5696 Process not Found 5920 Process not Found 5532 Process not Found -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000_Classes\Local Settings msedge.exe -
NTFS ADS 5 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\SubDir\Client.exe\:SmartScreen:$DATA Client-built.exe File created C:\Users\Admin\AppData\Roaming\SubDir\Client.exe\:SmartScreen:$DATA Client-built.exe File created C:\Users\Admin\AppData\Roaming\SubDir\Client.exe\:SmartScreen:$DATA Client-built.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 554071.crdownload:SmartScreen msedge.exe File created C:\Users\Admin\AppData\Roaming\SubDir\Client.exe\:SmartScreen:$DATA Client-built.exe -
Runs ping.exe 1 TTPs 64 IoCs
pid Process 2052 PING.EXE 5104 PING.EXE 1156 PING.EXE 1160 PING.EXE 1452 PING.EXE 4280 PING.EXE 4400 Process not Found 2984 PING.EXE 4468 PING.EXE 4420 PING.EXE 1448 PING.EXE 2284 PING.EXE 3824 PING.EXE 5016 Process not Found 2580 Process not Found 2072 Process not Found 5916 Process not Found 1432 PING.EXE 4536 PING.EXE 660 PING.EXE 2744 PING.EXE 1380 PING.EXE 4400 Process not Found 3284 Process not Found 5476 Process not Found 1956 PING.EXE 1960 PING.EXE 5036 PING.EXE 1500 Process not Found 6020 Process not Found 5156 Process not Found 5220 Process not Found 3500 PING.EXE 4460 PING.EXE 1104 PING.EXE 3212 PING.EXE 4340 PING.EXE 3116 PING.EXE 2636 PING.EXE 5000 Process not Found 5664 Process not Found 2888 PING.EXE 4760 PING.EXE 4656 PING.EXE 2396 Process not Found 5160 Process not Found 5624 Process not Found 4472 PING.EXE 2184 PING.EXE 4648 Process not Found 5528 Process not Found 5396 Process not Found 4356 PING.EXE 1772 PING.EXE 2668 PING.EXE 3352 PING.EXE 5240 Process not Found 4740 Process not Found 5272 Process not Found 2556 PING.EXE 2840 PING.EXE 3744 Process not Found 5652 Process not Found 388 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 64 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4184 schtasks.exe 3812 schtasks.exe 3104 schtasks.exe 3876 schtasks.exe 2180 schtasks.exe 5052 Process not Found 1448 schtasks.exe 3612 schtasks.exe 3744 schtasks.exe 1052 schtasks.exe 4280 Process not Found 5776 Process not Found 824 schtasks.exe 1728 schtasks.exe 5824 Process not Found 824 Process not Found 3748 schtasks.exe 2084 schtasks.exe 5060 schtasks.exe 2984 schtasks.exe 964 schtasks.exe 4180 schtasks.exe 1672 schtasks.exe 5292 Process not Found 568 Process not Found 1276 schtasks.exe 3008 schtasks.exe 2284 schtasks.exe 1852 schtasks.exe 1200 Process not Found 4732 Process not Found 4868 Process not Found 6016 Process not Found 3116 schtasks.exe 1216 schtasks.exe 1504 Process not Found 5564 Process not Found 5808 Process not Found 2620 schtasks.exe 1528 schtasks.exe 4596 schtasks.exe 2932 schtasks.exe 4976 schtasks.exe 4740 schtasks.exe 412 schtasks.exe 3044 schtasks.exe 3080 Process not Found 5556 Process not Found 5024 Process not Found 5436 Process not Found 1816 schtasks.exe 1288 schtasks.exe 4768 schtasks.exe 4400 Process not Found 5428 Process not Found 5656 Process not Found 5752 Process not Found 4696 schtasks.exe 1960 schtasks.exe 1880 Process not Found 4352 schtasks.exe 4712 schtasks.exe 3520 schtasks.exe 2644 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4784 msedge.exe 4784 msedge.exe 2848 msedge.exe 2848 msedge.exe 2636 identity_helper.exe 2636 identity_helper.exe 5100 msedge.exe 5100 msedge.exe 2648 Client-built.exe 2648 Client-built.exe 2512 Client-built.exe 2512 Client-built.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1100 Client-built.exe Token: SeDebugPrivilege 3792 Client.exe Token: SeDebugPrivilege 2284 Client-built.exe Token: SeDebugPrivilege 1260 Client.exe Token: SeDebugPrivilege 1620 Client.exe Token: SeDebugPrivilege 3540 Client.exe Token: SeDebugPrivilege 1744 Client.exe Token: SeDebugPrivilege 2648 Client-built.exe Token: SeDebugPrivilege 2252 Client-built.exe Token: SeDebugPrivilege 2512 Client-built.exe Token: SeDebugPrivilege 4000 Client.exe Token: SeDebugPrivilege 988 Client.exe Token: SeDebugPrivilege 764 Client.exe Token: SeDebugPrivilege 4664 Client.exe Token: SeDebugPrivilege 2240 Client.exe Token: SeDebugPrivilege 3860 Client.exe Token: SeDebugPrivilege 1280 Client.exe Token: SeDebugPrivilege 3632 Client.exe Token: SeDebugPrivilege 4352 Client.exe Token: SeDebugPrivilege 1204 Client.exe Token: SeDebugPrivilege 3304 Client.exe Token: SeDebugPrivilege 1016 Client.exe Token: SeDebugPrivilege 3560 Client.exe Token: SeDebugPrivilege 3620 Client.exe Token: SeDebugPrivilege 1240 Client.exe Token: SeDebugPrivilege 3784 Client.exe Token: SeDebugPrivilege 4548 Client.exe Token: SeDebugPrivilege 3408 Client.exe Token: SeDebugPrivilege 2276 Client.exe Token: SeDebugPrivilege 2724 Client.exe Token: SeDebugPrivilege 3088 Client.exe Token: SeDebugPrivilege 3240 Client.exe Token: SeDebugPrivilege 4072 Client.exe Token: SeDebugPrivilege 4480 Client.exe Token: SeDebugPrivilege 2096 Client.exe Token: SeDebugPrivilege 3708 Client.exe Token: SeDebugPrivilege 4036 Client.exe Token: SeDebugPrivilege 3124 Client.exe Token: SeDebugPrivilege 2076 Client.exe Token: SeDebugPrivilege 2296 Client.exe Token: SeDebugPrivilege 5096 Client.exe Token: SeDebugPrivilege 2020 Client.exe Token: SeDebugPrivilege 3328 Client.exe Token: SeDebugPrivilege 3128 Client.exe Token: SeDebugPrivilege 1636 Client.exe Token: SeDebugPrivilege 444 Client.exe Token: SeDebugPrivilege 2716 Client.exe Token: SeDebugPrivilege 1176 Client.exe Token: SeDebugPrivilege 464 Client.exe Token: SeDebugPrivilege 1800 Client.exe Token: SeDebugPrivilege 4528 Client.exe Token: SeDebugPrivilege 1776 Client.exe Token: SeDebugPrivilege 5004 Client.exe Token: SeDebugPrivilege 1868 Client.exe Token: SeDebugPrivilege 4988 Client.exe Token: SeDebugPrivilege 2648 Client.exe Token: SeDebugPrivilege 936 Client.exe Token: SeDebugPrivilege 456 Client.exe Token: SeDebugPrivilege 4476 Client.exe Token: SeDebugPrivilege 4560 Client.exe Token: SeDebugPrivilege 2368 Client.exe Token: SeDebugPrivilege 4504 Client.exe Token: SeDebugPrivilege 2500 Client.exe Token: SeDebugPrivilege 5028 Client.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 3792 Client.exe 2848 msedge.exe 1260 Client.exe 1620 Client.exe 3540 Client.exe 2848 msedge.exe 4000 Client.exe 988 Client.exe 764 Client.exe 4664 Client.exe 2240 Client.exe 3860 Client.exe 1280 Client.exe 3632 Client.exe 4352 Client.exe 1204 Client.exe 3304 Client.exe 1016 Client.exe 3560 Client.exe 3620 Client.exe 1240 Client.exe 3784 Client.exe 4548 Client.exe 3408 Client.exe 2276 Client.exe 2724 Client.exe 3088 Client.exe 3240 Client.exe 4072 Client.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 3792 Client.exe 1260 Client.exe 1620 Client.exe 3540 Client.exe 4000 Client.exe 988 Client.exe 764 Client.exe 4664 Client.exe 2240 Client.exe 3860 Client.exe 1280 Client.exe 3632 Client.exe 4352 Client.exe 1204 Client.exe 3304 Client.exe 1016 Client.exe 3560 Client.exe 3620 Client.exe 1240 Client.exe 3784 Client.exe 4548 Client.exe 3408 Client.exe 2276 Client.exe 2724 Client.exe 3088 Client.exe 3240 Client.exe 4072 Client.exe 4480 Client.exe 2096 Client.exe 3708 Client.exe 4036 Client.exe 3124 Client.exe 2076 Client.exe 2296 Client.exe 5096 Client.exe 2020 Client.exe 3328 Client.exe 3128 Client.exe 1636 Client.exe 444 Client.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3792 Client.exe 5724 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2848 wrote to memory of 4936 2848 msedge.exe 80 PID 2848 wrote to memory of 4936 2848 msedge.exe 80 PID 2848 wrote to memory of 5016 2848 msedge.exe 81 PID 2848 wrote to memory of 5016 2848 msedge.exe 81 PID 2848 wrote to memory of 5016 2848 msedge.exe 81 PID 2848 wrote to memory of 5016 2848 msedge.exe 81 PID 2848 wrote to memory of 5016 2848 msedge.exe 81 PID 2848 wrote to memory of 5016 2848 msedge.exe 81 PID 2848 wrote to memory of 5016 2848 msedge.exe 81 PID 2848 wrote to memory of 5016 2848 msedge.exe 81 PID 2848 wrote to memory of 5016 2848 msedge.exe 81 PID 2848 wrote to memory of 5016 2848 msedge.exe 81 PID 2848 wrote to memory of 5016 2848 msedge.exe 81 PID 2848 wrote to memory of 5016 2848 msedge.exe 81 PID 2848 wrote to memory of 5016 2848 msedge.exe 81 PID 2848 wrote to memory of 5016 2848 msedge.exe 81 PID 2848 wrote to memory of 5016 2848 msedge.exe 81 PID 2848 wrote to memory of 5016 2848 msedge.exe 81 PID 2848 wrote to memory of 5016 2848 msedge.exe 81 PID 2848 wrote to memory of 5016 2848 msedge.exe 81 PID 2848 wrote to memory of 5016 2848 msedge.exe 81 PID 2848 wrote to memory of 5016 2848 msedge.exe 81 PID 2848 wrote to memory of 5016 2848 msedge.exe 81 PID 2848 wrote to memory of 5016 2848 msedge.exe 81 PID 2848 wrote to memory of 5016 2848 msedge.exe 81 PID 2848 wrote to memory of 5016 2848 msedge.exe 81 PID 2848 wrote to memory of 5016 2848 msedge.exe 81 PID 2848 wrote to memory of 5016 2848 msedge.exe 81 PID 2848 wrote to memory of 5016 2848 msedge.exe 81 PID 2848 wrote to memory of 5016 2848 msedge.exe 81 PID 2848 wrote to memory of 5016 2848 msedge.exe 81 PID 2848 wrote to memory of 5016 2848 msedge.exe 81 PID 2848 wrote to memory of 5016 2848 msedge.exe 81 PID 2848 wrote to memory of 5016 2848 msedge.exe 81 PID 2848 wrote to memory of 5016 2848 msedge.exe 81 PID 2848 wrote to memory of 5016 2848 msedge.exe 81 PID 2848 wrote to memory of 5016 2848 msedge.exe 81 PID 2848 wrote to memory of 5016 2848 msedge.exe 81 PID 2848 wrote to memory of 5016 2848 msedge.exe 81 PID 2848 wrote to memory of 5016 2848 msedge.exe 81 PID 2848 wrote to memory of 5016 2848 msedge.exe 81 PID 2848 wrote to memory of 5016 2848 msedge.exe 81 PID 2848 wrote to memory of 4784 2848 msedge.exe 82 PID 2848 wrote to memory of 4784 2848 msedge.exe 82 PID 2848 wrote to memory of 4260 2848 msedge.exe 83 PID 2848 wrote to memory of 4260 2848 msedge.exe 83 PID 2848 wrote to memory of 4260 2848 msedge.exe 83 PID 2848 wrote to memory of 4260 2848 msedge.exe 83 PID 2848 wrote to memory of 4260 2848 msedge.exe 83 PID 2848 wrote to memory of 4260 2848 msedge.exe 83 PID 2848 wrote to memory of 4260 2848 msedge.exe 83 PID 2848 wrote to memory of 4260 2848 msedge.exe 83 PID 2848 wrote to memory of 4260 2848 msedge.exe 83 PID 2848 wrote to memory of 4260 2848 msedge.exe 83 PID 2848 wrote to memory of 4260 2848 msedge.exe 83 PID 2848 wrote to memory of 4260 2848 msedge.exe 83 PID 2848 wrote to memory of 4260 2848 msedge.exe 83 PID 2848 wrote to memory of 4260 2848 msedge.exe 83 PID 2848 wrote to memory of 4260 2848 msedge.exe 83 PID 2848 wrote to memory of 4260 2848 msedge.exe 83 PID 2848 wrote to memory of 4260 2848 msedge.exe 83 PID 2848 wrote to memory of 4260 2848 msedge.exe 83 PID 2848 wrote to memory of 4260 2848 msedge.exe 83 PID 2848 wrote to memory of 4260 2848 msedge.exe 83 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\3diAJd.html1⤵
- Enumerates system info in registry
- Modifies registry class
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x124,0x128,0x12c,0x100,0x130,0x7ffef7cd46f8,0x7ffef7cd4708,0x7ffef7cd47182⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2204,8714812538458083923,12721703875700595509,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2212 /prefetch:22⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2204,8714812538458083923,12721703875700595509,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2204,8714812538458083923,12721703875700595509,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:82⤵PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,8714812538458083923,12721703875700595509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:1908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,8714812538458083923,12721703875700595509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2204,8714812538458083923,12721703875700595509,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5696 /prefetch:82⤵PID:2376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings2⤵
- Drops file in Program Files directory
PID:2616 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x248,0x24c,0x250,0x224,0x254,0x7ff7331f5460,0x7ff7331f5470,0x7ff7331f54803⤵PID:1976
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2204,8714812538458083923,12721703875700595509,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5696 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,8714812538458083923,12721703875700595509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5756 /prefetch:12⤵PID:3340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,8714812538458083923,12721703875700595509,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5772 /prefetch:12⤵PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,8714812538458083923,12721703875700595509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4124 /prefetch:12⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,8714812538458083923,12721703875700595509,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6056 /prefetch:12⤵PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,8714812538458083923,12721703875700595509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6292 /prefetch:12⤵PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,8714812538458083923,12721703875700595509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6000 /prefetch:12⤵PID:936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,8714812538458083923,12721703875700595509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3120 /prefetch:12⤵PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,8714812538458083923,12721703875700595509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6452 /prefetch:12⤵PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2204,8714812538458083923,12721703875700595509,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=6492 /prefetch:82⤵PID:1464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2204,8714812538458083923,12721703875700595509,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5784 /prefetch:82⤵PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2204,8714812538458083923,12721703875700595509,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6876 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5100
-
-
C:\Users\Admin\Downloads\Client-built.exe"C:\Users\Admin\Downloads\Client-built.exe"2⤵
- Executes dropped EXE
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
PID:1100 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵PID:3904
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3792 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f4⤵PID:3212
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\D7VvnOtxpTFN.bat" "4⤵PID:4388
-
C:\Windows\system32\chcp.comchcp 650015⤵PID:2888
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost5⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1752
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1620 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f6⤵PID:2076
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\s4bQsslQ8la0.bat" "6⤵PID:3372
-
C:\Windows\system32\chcp.comchcp 650017⤵PID:2580
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost7⤵
- Runs ping.exe
PID:2052
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1744 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f8⤵PID:3876
-
-
-
-
-
-
-
-
C:\Users\Admin\Downloads\Client-built.exe"C:\Users\Admin\Downloads\Client-built.exe"2⤵
- Executes dropped EXE
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
PID:2284 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵PID:3844
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1260 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f4⤵PID:3904
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\fJasszhFtACc.bat" "4⤵PID:4748
-
C:\Windows\system32\chcp.comchcp 650015⤵PID:4632
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost5⤵PID:824
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3540 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f6⤵PID:3844
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Qn2eNwAR1Dpm.bat" "6⤵PID:4640
-
C:\Windows\system32\chcp.comchcp 650017⤵PID:3304
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost7⤵PID:4060
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:988 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f8⤵PID:4928
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\pQjky62EAReu.bat" "8⤵PID:416
-
C:\Windows\system32\chcp.comchcp 650019⤵PID:1788
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost9⤵PID:4784
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"9⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4664 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f10⤵PID:4412
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\dcqhdNYnfDrH.bat" "10⤵PID:4780
-
C:\Windows\system32\chcp.comchcp 6500111⤵PID:3656
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost11⤵
- Runs ping.exe
PID:2284
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"11⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3860 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f12⤵PID:1104
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\fMYOqI5umggl.bat" "12⤵PID:1956
-
C:\Windows\system32\chcp.comchcp 6500113⤵PID:4452
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost13⤵
- Runs ping.exe
PID:2556
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"13⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3632 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f14⤵PID:3740
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\EkIdcX8o13QS.bat" "14⤵PID:1240
-
C:\Windows\system32\chcp.comchcp 6500115⤵PID:2360
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost15⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4316
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"15⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1204 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f16⤵
- Scheduled Task/Job: Scheduled Task
PID:1528
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\g5e0HbYoxvAh.bat" "16⤵PID:2172
-
C:\Windows\system32\chcp.comchcp 6500117⤵PID:1736
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost17⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4380
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"17⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1016 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f18⤵PID:1876
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\GAXDltwLeRZi.bat" "18⤵PID:1532
-
C:\Windows\system32\chcp.comchcp 6500119⤵PID:936
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost19⤵PID:4228
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"19⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3620 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f20⤵
- Scheduled Task/Job: Scheduled Task
PID:4184
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zJlZ0bVNmLe7.bat" "20⤵PID:3552
-
C:\Windows\system32\chcp.comchcp 6500121⤵PID:4164
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost21⤵PID:2688
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"21⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3784 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f22⤵
- Scheduled Task/Job: Scheduled Task
PID:1276
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\2SG3W97GQhWc.bat" "22⤵PID:216
-
C:\Windows\system32\chcp.comchcp 6500123⤵PID:4892
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost23⤵PID:2212
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"23⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3408 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f24⤵PID:932
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ztw4jxTlr5QA.bat" "24⤵PID:1452
-
C:\Windows\system32\chcp.comchcp 6500125⤵PID:3844
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost25⤵PID:1356
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"25⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2724 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f26⤵PID:2444
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\qEY2ARABCGSn.bat" "26⤵PID:3104
-
C:\Windows\system32\chcp.comchcp 6500127⤵PID:4616
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost27⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4116
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"27⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3240 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f28⤵PID:2344
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\gO6uTMOiaIt2.bat" "28⤵PID:2756
-
C:\Windows\system32\chcp.comchcp 6500129⤵PID:2384
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost29⤵PID:1456
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"29⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SendNotifyMessage
PID:4480 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f30⤵
- Scheduled Task/Job: Scheduled Task
PID:964
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4MuchG2o0ehM.bat" "30⤵PID:4400
-
C:\Windows\system32\chcp.comchcp 6500131⤵PID:1504
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost31⤵
- Runs ping.exe
PID:2984
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SendNotifyMessage
PID:3708 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f32⤵
- Scheduled Task/Job: Scheduled Task
PID:4712
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\LR8uFQZD4NRg.bat" "32⤵PID:4784
-
C:\Windows\system32\chcp.comchcp 6500133⤵PID:1496
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost33⤵PID:4364
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"33⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SendNotifyMessage
PID:3124 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f34⤵PID:3044
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\A6UlZB0TI01k.bat" "34⤵PID:3956
-
C:\Windows\system32\chcp.comchcp 6500135⤵PID:5000
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost35⤵PID:4720
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"35⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SendNotifyMessage
PID:2296 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f36⤵PID:4932
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\WSNcpR4BVxcG.bat" "36⤵PID:3212
-
C:\Windows\system32\chcp.comchcp 6500137⤵PID:4604
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost37⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:856
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"37⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SendNotifyMessage
PID:2020 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f38⤵PID:2696
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\mNU493Nbae2B.bat" "38⤵PID:384
-
C:\Windows\system32\chcp.comchcp 6500139⤵PID:2556
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost39⤵PID:2992
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"39⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SendNotifyMessage
PID:3128 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f40⤵PID:2808
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5oW2BMifIqm6.bat" "40⤵PID:2000
-
C:\Windows\system32\chcp.comchcp 6500141⤵PID:3044
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost41⤵PID:3032
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"41⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SendNotifyMessage
PID:444 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f42⤵PID:1936
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Gw8Mmm5OayV0.bat" "42⤵PID:5060
-
C:\Windows\system32\chcp.comchcp 6500143⤵PID:1456
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost43⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4536
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"43⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1176 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f44⤵PID:2244
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\dhewh7DcrR1W.bat" "44⤵PID:1876
-
C:\Windows\system32\chcp.comchcp 6500145⤵PID:2744
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost45⤵
- Runs ping.exe
PID:1772
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"45⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1800 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f46⤵PID:2280
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7BOAov4IvxOa.bat" "46⤵PID:2576
-
C:\Windows\system32\chcp.comchcp 6500147⤵PID:188
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost47⤵PID:4276
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"47⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1776 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f48⤵PID:3680
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BdSfVnDdIGvM.bat" "48⤵PID:2000
-
C:\Windows\system32\chcp.comchcp 6500149⤵PID:3744
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost49⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2384
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"49⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1868 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f50⤵PID:4112
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\OO7qpfDHTXb7.bat" "50⤵PID:2424
-
C:\Windows\system32\chcp.comchcp 6500151⤵PID:4696
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost51⤵PID:4232
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"51⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2648 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f52⤵PID:5052
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\C5ITvvXtjZ1i.bat" "52⤵PID:3876
-
C:\Windows\system32\chcp.comchcp 6500153⤵PID:4228
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost53⤵
- Runs ping.exe
PID:388
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"53⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:456 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f54⤵PID:4576
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3NEl6jhErFa8.bat" "54⤵PID:4500
-
C:\Windows\system32\chcp.comchcp 6500155⤵PID:3340
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost55⤵PID:4496
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"55⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4560 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f56⤵PID:2384
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cAuWbpwUSGaO.bat" "56⤵PID:3272
-
C:\Windows\system32\chcp.comchcp 6500157⤵PID:2640
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost57⤵
- Runs ping.exe
PID:4468
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"57⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4504 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f58⤵PID:3852
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ZsJ34RSDg9n2.bat" "58⤵PID:4404
-
C:\Windows\system32\chcp.comchcp 6500159⤵PID:436
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost59⤵PID:2424
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"59⤵
- Suspicious use of AdjustPrivilegeToken
PID:5028 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f60⤵PID:1816
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\EjNvAb3s8TQI.bat" "60⤵PID:2464
-
C:\Windows\system32\chcp.comchcp 6500161⤵PID:4340
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost61⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4460
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"61⤵
- Checks computer location settings
PID:472 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f62⤵PID:4116
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\g79TZzLW3yJG.bat" "62⤵PID:4324
-
C:\Windows\system32\chcp.comchcp 6500163⤵PID:4660
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost63⤵PID:1880
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"63⤵
- Checks computer location settings
PID:3388 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f64⤵PID:3416
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\hqeoeVgus7fW.bat" "64⤵PID:4628
-
C:\Windows\system32\chcp.comchcp 6500165⤵PID:348
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost65⤵PID:1876
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"65⤵PID:2932
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f66⤵PID:1640
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\lz1c3HrcF4lT.bat" "66⤵PID:2620
-
C:\Windows\system32\chcp.comchcp 6500167⤵PID:2340
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost67⤵PID:4708
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"67⤵PID:2748
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f68⤵
- Scheduled Task/Job: Scheduled Task
PID:3812
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\J3zMpqLd3xIi.bat" "68⤵PID:4496
-
C:\Windows\system32\chcp.comchcp 6500169⤵PID:1156
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost69⤵PID:1828
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"69⤵PID:4900
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f70⤵PID:1472
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\S0GgB54d8wmV.bat" "70⤵PID:1676
-
C:\Windows\system32\chcp.comchcp 6500171⤵PID:4492
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost71⤵PID:2100
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"71⤵PID:776
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f72⤵PID:4340
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DeV9NoYi0JNJ.bat" "72⤵PID:2664
-
C:\Windows\system32\chcp.comchcp 6500173⤵PID:2360
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost73⤵PID:856
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"73⤵PID:2640
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f74⤵PID:4500
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\2gLNF0DRStB6.bat" "74⤵PID:388
-
C:\Windows\system32\chcp.comchcp 6500175⤵PID:1272
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost75⤵PID:1792
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"75⤵PID:416
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f76⤵PID:4732
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\8pKsTp0z6J8P.bat" "76⤵PID:3868
-
C:\Windows\system32\chcp.comchcp 6500177⤵PID:2324
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost77⤵PID:3520
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"77⤵PID:4312
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f78⤵
- Scheduled Task/Job: Scheduled Task
PID:1288
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7Qrd3F6SN3iv.bat" "78⤵PID:5020
-
C:\Windows\system32\chcp.comchcp 6500179⤵PID:1720
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost79⤵PID:3680
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"79⤵PID:232
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f80⤵PID:1596
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\TbmBbBiBW30H.bat" "80⤵PID:2508
-
C:\Windows\system32\chcp.comchcp 6500181⤵PID:1740
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost81⤵
- Runs ping.exe
PID:1156
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"81⤵
- Checks computer location settings
PID:4256 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f82⤵
- Scheduled Task/Job: Scheduled Task
PID:2284
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\D9qIQ5F3KKgo.bat" "82⤵PID:568
-
C:\Windows\system32\chcp.comchcp 6500183⤵PID:1604
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost83⤵PID:2324
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"83⤵PID:4324
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f84⤵
- Scheduled Task/Job: Scheduled Task
PID:4740
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Bb39JSaPhyer.bat" "84⤵PID:756
-
C:\Windows\system32\chcp.comchcp 6500185⤵PID:3116
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost85⤵PID:2888
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"85⤵PID:5084
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f86⤵PID:4784
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\NY5OA8BCyv08.bat" "86⤵PID:656
-
C:\Windows\system32\chcp.comchcp 6500187⤵PID:2584
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost87⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1448
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"87⤵PID:4724
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f88⤵PID:4460
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zRubTsmmj2HP.bat" "88⤵PID:1604
-
C:\Windows\system32\chcp.comchcp 6500189⤵PID:2688
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost89⤵PID:3140
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"89⤵PID:2988
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f90⤵PID:1288
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\xQ9Tfg8CBXk3.bat" "90⤵PID:4868
-
C:\Windows\system32\chcp.comchcp 6500191⤵PID:2868
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost91⤵PID:2320
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"91⤵PID:2520
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f92⤵PID:4500
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\0AdHZqcFW0cq.bat" "92⤵PID:4180
-
C:\Windows\system32\chcp.comchcp 6500193⤵PID:2728
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost93⤵PID:2176
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"93⤵PID:3584
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f94⤵PID:5024
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Px8of2xYGlzg.bat" "94⤵PID:388
-
C:\Windows\system32\chcp.comchcp 6500195⤵PID:4584
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost95⤵PID:2688
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"95⤵
- Checks computer location settings
PID:3396 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f96⤵PID:3704
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\wEJZaOhIexsm.bat" "96⤵PID:2340
-
C:\Windows\system32\chcp.comchcp 6500197⤵PID:3552
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost97⤵PID:4720
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"97⤵PID:3520
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f98⤵
- Scheduled Task/Job: Scheduled Task
PID:3116
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\kJGBJDHbYZAN.bat" "98⤵PID:2984
-
C:\Windows\system32\chcp.comchcp 6500199⤵PID:1892
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost99⤵PID:1248
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"99⤵PID:4088
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f100⤵PID:2284
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\nSTyJYtKFRWg.bat" "100⤵PID:4544
-
C:\Windows\system32\chcp.comchcp 65001101⤵PID:216
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost101⤵PID:1348
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"101⤵
- Checks computer location settings
PID:3704 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f102⤵
- Scheduled Task/Job: Scheduled Task
PID:3104
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\MUIfMElJ2vry.bat" "102⤵PID:4628
-
C:\Windows\system32\chcp.comchcp 65001103⤵PID:2328
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost103⤵PID:4892
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"103⤵PID:4784
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f104⤵PID:2080
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\u2ohPoVgtcER.bat" "104⤵PID:1456
-
C:\Windows\system32\chcp.comchcp 65001105⤵PID:2576
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost105⤵PID:3904
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"105⤵PID:4584
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f106⤵PID:4492
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\dV9ylklAgo2K.bat" "106⤵PID:2388
-
C:\Windows\system32\chcp.comchcp 65001107⤵PID:720
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost107⤵PID:4984
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"107⤵
- Checks computer location settings
PID:1704 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f108⤵PID:2868
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\04yR2wpJICvn.bat" "108⤵PID:112
-
C:\Windows\system32\chcp.comchcp 65001109⤵PID:1384
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost109⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2008
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"109⤵PID:1988
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f110⤵PID:3556
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\bqn84l2IoMEJ.bat" "110⤵PID:1248
-
C:\Windows\system32\chcp.comchcp 65001111⤵PID:2248
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost111⤵
- Runs ping.exe
PID:4472
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"111⤵PID:4460
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f112⤵PID:656
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\T2wdm0K5WmZ8.bat" "112⤵PID:4592
-
C:\Windows\system32\chcp.comchcp 65001113⤵PID:1832
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost113⤵
- Runs ping.exe
PID:2636
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"113⤵PID:2624
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f114⤵PID:5052
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Q1FpSVtGe04Y.bat" "114⤵PID:1672
-
C:\Windows\system32\chcp.comchcp 65001115⤵PID:3964
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost115⤵
- Runs ping.exe
PID:2888
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"115⤵PID:1892
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f116⤵PID:4768
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\m4KxzFL09dK5.bat" "116⤵PID:2176
-
C:\Windows\system32\chcp.comchcp 65001117⤵PID:1216
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost117⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1740
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"117⤵
- Checks computer location settings
PID:4344 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f118⤵PID:3808
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\MDOO2QJSeNMC.bat" "118⤵PID:3836
-
C:\Windows\system32\chcp.comchcp 65001119⤵PID:3340
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost119⤵PID:4916
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"119⤵PID:1604
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f120⤵PID:4632
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\rjgdvLHag0Ex.bat" "120⤵PID:1412
-
C:\Windows\system32\chcp.comchcp 65001121⤵PID:1936
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost121⤵PID:5104
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"121⤵PID:2248
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f122⤵PID:4904
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-