Analysis
-
max time kernel
1042s -
max time network
1042s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
15-12-2024 17:51
Behavioral task
behavioral1
Sample
fortnite cloud.exe
Resource
win11-20241007-en
General
-
Target
fortnite cloud.exe
-
Size
3.1MB
-
MD5
a39f29a2f774febb2c532577de2f407c
-
SHA1
bf97e76565ae9a78f33601c154e97ef9e2631430
-
SHA256
7ce9d2b8f4a344b07a8e3b9bf58ede5a2ba7a85bfa94d8b103179183fbb7c24f
-
SHA512
ca28aa66f392356e19d3fb43327ffb9cf1aae0777c8fcdc3530b02f50b50a0347a12db76f90717c51355f8c25de020a989b722c231a14f0995b7e149303a4fa0
-
SSDEEP
49152:KvYt62XlaSFNWPjljiFa2RoUYIy6jrcFGnoGdoXuTHHB72eh2NT:Kv062XlaSFNWPjljiFXRoUYIy6HcFKo
Malware Config
Extracted
quasar
1.4.1
fortnite cloud
roham:9999
34f9808a-f860-420a-9060-bdcca871577f
-
encryption_key
C98F5FD72C77D3C38A5C7ECBED91435EDD8177FE
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
fortnite updater cloud
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral1/memory/2956-1-0x0000000000910000-0x0000000000C34000-memory.dmp family_quasar behavioral1/files/0x001c00000002aa9e-6.dat family_quasar -
Executes dropped EXE 64 IoCs
pid Process 4956 Client.exe 3068 Client.exe 4856 Client.exe 3340 Client.exe 2428 Client.exe 3668 Client.exe 3664 Client.exe 4872 Client.exe 692 Client.exe 4032 Client.exe 3712 Client.exe 2704 Client.exe 3084 Client.exe 3976 Client.exe 4776 Client.exe 2124 Client.exe 1252 Client.exe 4324 Client.exe 2448 Client.exe 2184 Client.exe 4656 Client.exe 2436 Client.exe 804 Client.exe 2112 Client.exe 3664 Client.exe 2248 Client.exe 4856 Client.exe 4840 Client.exe 3488 Client.exe 4536 Client.exe 3448 Client.exe 1720 Client.exe 3680 Client.exe 4180 Client.exe 1436 Client.exe 2644 Client.exe 2044 Client.exe 4028 Client.exe 3592 Client.exe 1480 Client.exe 4228 Client.exe 4248 Client.exe 3856 Client.exe 2572 Client.exe 3212 Client.exe 2888 Client.exe 1824 Client.exe 1736 Client.exe 3788 Client.exe 4992 Client.exe 2080 Client.exe 4228 Client.exe 352 Client.exe 2964 Client.exe 4372 Client.exe 3228 Client.exe 3824 Client.exe 4968 Client.exe 3376 Client.exe 1188 Client.exe 4036 Client.exe 2748 Client.exe 1732 Client.exe 3972 Client.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File created C:\Windows\system32\SubDir\Client.exe fortnite cloud.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File opened for modification C:\Windows\system32\SubDir\Client.exe fortnite cloud.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 64 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1336 PING.EXE 1564 PING.EXE 4344 PING.EXE 4164 PING.EXE 1832 PING.EXE 3312 PING.EXE 1692 PING.EXE 2868 PING.EXE 2952 PING.EXE 3892 PING.EXE 2184 PING.EXE 4892 PING.EXE 1188 PING.EXE 2660 PING.EXE 656 PING.EXE 3500 PING.EXE 1064 PING.EXE 3088 PING.EXE 960 PING.EXE 4260 PING.EXE 4864 PING.EXE 4248 PING.EXE 4228 PING.EXE 4832 PING.EXE 1968 PING.EXE 1144 PING.EXE 4908 PING.EXE 3208 PING.EXE 4124 PING.EXE 2868 PING.EXE 3680 PING.EXE 4456 PING.EXE 1076 PING.EXE 232 PING.EXE 2572 PING.EXE 1720 PING.EXE 4948 PING.EXE 3052 PING.EXE 1544 PING.EXE 4200 PING.EXE 3180 PING.EXE 2932 PING.EXE 4828 PING.EXE 968 PING.EXE 5100 PING.EXE 3932 PING.EXE 3200 PING.EXE 2852 PING.EXE 4468 PING.EXE 2376 PING.EXE 4808 PING.EXE 1784 PING.EXE 72 PING.EXE 1964 PING.EXE 1032 PING.EXE 3940 PING.EXE 4696 PING.EXE 4556 PING.EXE 4032 PING.EXE 2928 PING.EXE 3968 PING.EXE 1936 PING.EXE 4944 PING.EXE 3316 PING.EXE -
Runs ping.exe 1 TTPs 64 IoCs
pid Process 1964 PING.EXE 4080 PING.EXE 3932 PING.EXE 4892 PING.EXE 4456 PING.EXE 2932 PING.EXE 3312 PING.EXE 3436 PING.EXE 3680 PING.EXE 1188 PING.EXE 2148 PING.EXE 3208 PING.EXE 3500 PING.EXE 2376 PING.EXE 2868 PING.EXE 4228 PING.EXE 4084 PING.EXE 1784 PING.EXE 4260 PING.EXE 4248 PING.EXE 72 PING.EXE 576 PING.EXE 1436 PING.EXE 3200 PING.EXE 1072 PING.EXE 4828 PING.EXE 968 PING.EXE 4324 PING.EXE 2520 PING.EXE 1832 PING.EXE 5100 PING.EXE 4468 PING.EXE 3484 PING.EXE 960 PING.EXE 4944 PING.EXE 4696 PING.EXE 3964 PING.EXE 2952 PING.EXE 3940 PING.EXE 656 PING.EXE 3052 PING.EXE 1720 PING.EXE 2868 PING.EXE 4200 PING.EXE 3088 PING.EXE 3892 PING.EXE 1144 PING.EXE 1564 PING.EXE 3412 PING.EXE 232 PING.EXE 4164 PING.EXE 4556 PING.EXE 4032 PING.EXE 1064 PING.EXE 3968 PING.EXE 2572 PING.EXE 3316 PING.EXE 1968 PING.EXE 4948 PING.EXE 1032 PING.EXE 1544 PING.EXE 2928 PING.EXE 1336 PING.EXE 1076 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 64 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4608 schtasks.exe 1300 schtasks.exe 3672 schtasks.exe 4648 schtasks.exe 1568 schtasks.exe 3936 schtasks.exe 1220 schtasks.exe 2976 schtasks.exe 2124 schtasks.exe 2740 schtasks.exe 2564 schtasks.exe 2180 schtasks.exe 4236 schtasks.exe 2556 schtasks.exe 3260 schtasks.exe 2148 schtasks.exe 1512 schtasks.exe 3992 schtasks.exe 1980 schtasks.exe 660 schtasks.exe 2608 schtasks.exe 2460 schtasks.exe 3992 schtasks.exe 3164 schtasks.exe 3912 schtasks.exe 4620 schtasks.exe 2588 schtasks.exe 2336 schtasks.exe 5024 schtasks.exe 1480 schtasks.exe 3340 schtasks.exe 1036 schtasks.exe 2052 schtasks.exe 4460 schtasks.exe 3664 schtasks.exe 1768 schtasks.exe 2772 schtasks.exe 4320 schtasks.exe 3240 schtasks.exe 1956 schtasks.exe 1188 schtasks.exe 1280 schtasks.exe 4112 schtasks.exe 1856 schtasks.exe 1604 schtasks.exe 2088 schtasks.exe 4200 schtasks.exe 2144 schtasks.exe 4036 schtasks.exe 3668 schtasks.exe 3068 schtasks.exe 4036 schtasks.exe 4608 schtasks.exe 3964 schtasks.exe 2892 schtasks.exe 1804 schtasks.exe 4556 schtasks.exe 4816 schtasks.exe 4336 schtasks.exe 2928 schtasks.exe 3456 schtasks.exe 3596 schtasks.exe 3196 schtasks.exe 4752 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2956 fortnite cloud.exe Token: SeDebugPrivilege 4956 Client.exe Token: SeDebugPrivilege 3068 Client.exe Token: SeDebugPrivilege 4856 Client.exe Token: SeDebugPrivilege 3340 Client.exe Token: SeDebugPrivilege 2428 Client.exe Token: SeDebugPrivilege 3668 Client.exe Token: SeDebugPrivilege 3664 Client.exe Token: SeDebugPrivilege 692 Client.exe Token: SeDebugPrivilege 4032 Client.exe Token: SeDebugPrivilege 3712 Client.exe Token: SeDebugPrivilege 2704 Client.exe Token: SeDebugPrivilege 3084 Client.exe Token: SeDebugPrivilege 3976 Client.exe Token: SeDebugPrivilege 4776 Client.exe Token: SeDebugPrivilege 2124 Client.exe Token: SeDebugPrivilege 1252 Client.exe Token: SeDebugPrivilege 4324 Client.exe Token: SeDebugPrivilege 2448 Client.exe Token: SeDebugPrivilege 2184 Client.exe Token: SeDebugPrivilege 4656 Client.exe Token: SeDebugPrivilege 2436 Client.exe Token: SeDebugPrivilege 804 Client.exe Token: SeDebugPrivilege 2112 Client.exe Token: SeDebugPrivilege 3664 Client.exe Token: SeDebugPrivilege 2248 Client.exe Token: SeDebugPrivilege 4856 Client.exe Token: SeDebugPrivilege 4840 Client.exe Token: SeDebugPrivilege 3488 Client.exe Token: SeDebugPrivilege 4536 Client.exe Token: SeDebugPrivilege 3448 Client.exe Token: SeDebugPrivilege 1720 Client.exe Token: SeDebugPrivilege 3680 Client.exe Token: SeDebugPrivilege 4180 Client.exe Token: SeDebugPrivilege 1436 Client.exe Token: SeDebugPrivilege 2644 Client.exe Token: SeDebugPrivilege 2044 Client.exe Token: SeDebugPrivilege 4028 Client.exe Token: SeDebugPrivilege 3592 Client.exe Token: SeDebugPrivilege 1480 Client.exe Token: SeDebugPrivilege 4228 Client.exe Token: SeDebugPrivilege 4248 Client.exe Token: SeDebugPrivilege 3856 Client.exe Token: SeDebugPrivilege 2572 Client.exe Token: SeDebugPrivilege 3212 Client.exe Token: SeDebugPrivilege 2888 Client.exe Token: SeDebugPrivilege 1824 Client.exe Token: SeDebugPrivilege 1736 Client.exe Token: SeDebugPrivilege 3788 Client.exe Token: SeDebugPrivilege 4992 Client.exe Token: SeDebugPrivilege 2080 Client.exe Token: SeDebugPrivilege 4228 Client.exe Token: SeDebugPrivilege 352 Client.exe Token: SeDebugPrivilege 2964 Client.exe Token: SeDebugPrivilege 4372 Client.exe Token: SeDebugPrivilege 3228 Client.exe Token: SeDebugPrivilege 3824 Client.exe Token: SeDebugPrivilege 4968 Client.exe Token: SeDebugPrivilege 3376 Client.exe Token: SeDebugPrivilege 1188 Client.exe Token: SeDebugPrivilege 4036 Client.exe Token: SeDebugPrivilege 2748 Client.exe Token: SeDebugPrivilege 1732 Client.exe Token: SeDebugPrivilege 3972 Client.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 4956 Client.exe 3068 Client.exe 4856 Client.exe 3340 Client.exe 2428 Client.exe 3668 Client.exe 3664 Client.exe 692 Client.exe 4032 Client.exe 3712 Client.exe 2704 Client.exe 3084 Client.exe 3976 Client.exe 4776 Client.exe 2124 Client.exe 1252 Client.exe 4324 Client.exe 2448 Client.exe 2184 Client.exe 4656 Client.exe 2436 Client.exe 804 Client.exe 2112 Client.exe 3664 Client.exe 2248 Client.exe 4856 Client.exe 4840 Client.exe 3488 Client.exe 4536 Client.exe 3448 Client.exe 1720 Client.exe 3680 Client.exe 4180 Client.exe 1436 Client.exe 2644 Client.exe 2044 Client.exe 4028 Client.exe 3592 Client.exe 1480 Client.exe 4228 Client.exe 4248 Client.exe 3856 Client.exe 2572 Client.exe 3212 Client.exe 2888 Client.exe 1824 Client.exe 1736 Client.exe 3788 Client.exe 4992 Client.exe 2080 Client.exe 4228 Client.exe 352 Client.exe 2964 Client.exe 4372 Client.exe 3228 Client.exe 3824 Client.exe 4968 Client.exe 3376 Client.exe 1188 Client.exe 4036 Client.exe 2748 Client.exe 1732 Client.exe 3972 Client.exe 2912 Client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2956 wrote to memory of 1856 2956 fortnite cloud.exe 77 PID 2956 wrote to memory of 1856 2956 fortnite cloud.exe 77 PID 2956 wrote to memory of 4956 2956 fortnite cloud.exe 79 PID 2956 wrote to memory of 4956 2956 fortnite cloud.exe 79 PID 4956 wrote to memory of 1568 4956 Client.exe 80 PID 4956 wrote to memory of 1568 4956 Client.exe 80 PID 4956 wrote to memory of 2204 4956 Client.exe 82 PID 4956 wrote to memory of 2204 4956 Client.exe 82 PID 2204 wrote to memory of 1140 2204 cmd.exe 84 PID 2204 wrote to memory of 1140 2204 cmd.exe 84 PID 2204 wrote to memory of 2988 2204 cmd.exe 85 PID 2204 wrote to memory of 2988 2204 cmd.exe 85 PID 2204 wrote to memory of 3068 2204 cmd.exe 86 PID 2204 wrote to memory of 3068 2204 cmd.exe 86 PID 3068 wrote to memory of 3164 3068 Client.exe 87 PID 3068 wrote to memory of 3164 3068 Client.exe 87 PID 3068 wrote to memory of 3508 3068 Client.exe 89 PID 3068 wrote to memory of 3508 3068 Client.exe 89 PID 3508 wrote to memory of 3504 3508 cmd.exe 91 PID 3508 wrote to memory of 3504 3508 cmd.exe 91 PID 3508 wrote to memory of 3940 3508 cmd.exe 92 PID 3508 wrote to memory of 3940 3508 cmd.exe 92 PID 3508 wrote to memory of 4856 3508 cmd.exe 93 PID 3508 wrote to memory of 4856 3508 cmd.exe 93 PID 4856 wrote to memory of 4196 4856 Client.exe 94 PID 4856 wrote to memory of 4196 4856 Client.exe 94 PID 4856 wrote to memory of 4464 4856 Client.exe 96 PID 4856 wrote to memory of 4464 4856 Client.exe 96 PID 4464 wrote to memory of 928 4464 cmd.exe 98 PID 4464 wrote to memory of 928 4464 cmd.exe 98 PID 4464 wrote to memory of 1144 4464 cmd.exe 99 PID 4464 wrote to memory of 1144 4464 cmd.exe 99 PID 4464 wrote to memory of 3340 4464 cmd.exe 100 PID 4464 wrote to memory of 3340 4464 cmd.exe 100 PID 3340 wrote to memory of 1512 3340 Client.exe 101 PID 3340 wrote to memory of 1512 3340 Client.exe 101 PID 3340 wrote to memory of 3852 3340 Client.exe 103 PID 3340 wrote to memory of 3852 3340 Client.exe 103 PID 3852 wrote to memory of 2192 3852 cmd.exe 105 PID 3852 wrote to memory of 2192 3852 cmd.exe 105 PID 3852 wrote to memory of 960 3852 cmd.exe 106 PID 3852 wrote to memory of 960 3852 cmd.exe 106 PID 3852 wrote to memory of 2428 3852 cmd.exe 107 PID 3852 wrote to memory of 2428 3852 cmd.exe 107 PID 2428 wrote to memory of 2740 2428 Client.exe 108 PID 2428 wrote to memory of 2740 2428 Client.exe 108 PID 2428 wrote to memory of 1732 2428 Client.exe 110 PID 2428 wrote to memory of 1732 2428 Client.exe 110 PID 1732 wrote to memory of 656 1732 cmd.exe 112 PID 1732 wrote to memory of 656 1732 cmd.exe 112 PID 1732 wrote to memory of 4892 1732 cmd.exe 113 PID 1732 wrote to memory of 4892 1732 cmd.exe 113 PID 1732 wrote to memory of 3668 1732 cmd.exe 114 PID 1732 wrote to memory of 3668 1732 cmd.exe 114 PID 3668 wrote to memory of 5024 3668 Client.exe 115 PID 3668 wrote to memory of 5024 3668 Client.exe 115 PID 3668 wrote to memory of 3248 3668 Client.exe 117 PID 3668 wrote to memory of 3248 3668 Client.exe 117 PID 3248 wrote to memory of 4580 3248 cmd.exe 119 PID 3248 wrote to memory of 4580 3248 cmd.exe 119 PID 3248 wrote to memory of 4908 3248 cmd.exe 120 PID 3248 wrote to memory of 4908 3248 cmd.exe 120 PID 3248 wrote to memory of 3664 3248 cmd.exe 121 PID 3248 wrote to memory of 3664 3248 cmd.exe 121 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\fortnite cloud.exe"C:\Users\Admin\AppData\Local\Temp\fortnite cloud.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fortnite updater cloud" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:1856
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fortnite updater cloud" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:1568
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3xZwkuI4cAVS.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\system32\chcp.comchcp 650014⤵PID:1140
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost4⤵PID:2988
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fortnite updater cloud" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:3164
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\xIk6yc5TAjiO.bat" "5⤵
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Windows\system32\chcp.comchcp 650016⤵PID:3504
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3940
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fortnite updater cloud" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f7⤵PID:4196
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\AZhyBYODJmgN.bat" "7⤵
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Windows\system32\chcp.comchcp 650018⤵PID:928
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost8⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1144
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"8⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fortnite updater cloud" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f9⤵
- Scheduled Task/Job: Scheduled Task
PID:1512
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\U0JcDSEtRBr0.bat" "9⤵
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Windows\system32\chcp.comchcp 6500110⤵PID:2192
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost10⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:960
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"10⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fortnite updater cloud" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f11⤵
- Scheduled Task/Job: Scheduled Task
PID:2740
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\6gabA67sGpvV.bat" "11⤵
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\system32\chcp.comchcp 6500112⤵PID:656
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4892
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"12⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fortnite updater cloud" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f13⤵
- Scheduled Task/Job: Scheduled Task
PID:5024
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\IEtvkYZLT9Uc.bat" "13⤵
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Windows\system32\chcp.comchcp 6500114⤵PID:4580
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost14⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4908
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"14⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3664 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fortnite updater cloud" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f15⤵
- Scheduled Task/Job: Scheduled Task
PID:3912
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\f1ZfYS1WcXJz.bat" "15⤵PID:5052
-
C:\Windows\system32\chcp.comchcp 6500116⤵PID:3044
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost16⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4944
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"16⤵
- Executes dropped EXE
PID:4872 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fortnite updater cloud" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f17⤵
- Scheduled Task/Job: Scheduled Task
PID:3992
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\0QX9AGy7CtSV.bat" "17⤵PID:2376
-
C:\Windows\system32\chcp.comchcp 6500118⤵PID:4368
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost18⤵PID:1472
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"18⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:692 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fortnite updater cloud" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f19⤵
- Scheduled Task/Job: Scheduled Task
PID:4460
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\AfC5jxYeqd76.bat" "19⤵PID:1348
-
C:\Windows\system32\chcp.comchcp 6500120⤵PID:3376
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost20⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1336
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"20⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4032 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fortnite updater cloud" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f21⤵
- Scheduled Task/Job: Scheduled Task
PID:3936
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\X4kvbGTBNHjm.bat" "21⤵PID:3488
-
C:\Windows\system32\chcp.comchcp 6500122⤵PID:2848
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost22⤵PID:2968
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"22⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3712 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fortnite updater cloud" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f23⤵PID:2228
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\YjgAI349CVz2.bat" "23⤵PID:1480
-
C:\Windows\system32\chcp.comchcp 6500124⤵PID:4196
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost24⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1564
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"24⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2704 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fortnite updater cloud" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f25⤵
- Scheduled Task/Job: Scheduled Task
PID:4752
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BstFW15UuWPR.bat" "25⤵PID:3472
-
C:\Windows\system32\chcp.comchcp 6500126⤵PID:2280
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost26⤵
- Runs ping.exe
PID:3412
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"26⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3084 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fortnite updater cloud" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f27⤵
- Scheduled Task/Job: Scheduled Task
PID:4608
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\h9eCBc11ZfoI.bat" "27⤵PID:2888
-
C:\Windows\system32\chcp.comchcp 6500128⤵PID:2452
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost28⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3680
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"28⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3976 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fortnite updater cloud" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f29⤵PID:2516
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\aYSnhOgRcDps.bat" "29⤵PID:2076
-
C:\Windows\system32\chcp.comchcp 6500130⤵PID:1728
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost30⤵PID:1804
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"30⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4776 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fortnite updater cloud" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f31⤵
- Scheduled Task/Job: Scheduled Task
PID:4620
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\iW96s9nTZ072.bat" "31⤵PID:5004
-
C:\Windows\system32\chcp.comchcp 6500132⤵PID:2016
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost32⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4696
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"32⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2124 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fortnite updater cloud" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f33⤵
- Scheduled Task/Job: Scheduled Task
PID:3664
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FBl7JUFfhv5R.bat" "33⤵PID:3564
-
C:\Windows\system32\chcp.comchcp 6500134⤵PID:4500
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost34⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4456
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"34⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1252 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fortnite updater cloud" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f35⤵PID:4320
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\J5RDG4yoSTLA.bat" "35⤵PID:2956
-
C:\Windows\system32\chcp.comchcp 6500136⤵PID:1968
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost36⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2868
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"36⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4324 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fortnite updater cloud" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f37⤵PID:4952
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\uQzPRRgjNGOk.bat" "37⤵PID:4284
-
C:\Windows\system32\chcp.comchcp 6500138⤵PID:976
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost38⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:232
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"38⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2448 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fortnite updater cloud" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f39⤵
- Scheduled Task/Job: Scheduled Task
PID:1220
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\TslBSiRhnTin.bat" "39⤵PID:3220
-
C:\Windows\system32\chcp.comchcp 6500140⤵PID:848
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost40⤵
- Runs ping.exe
PID:3964
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"40⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2184 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fortnite updater cloud" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f41⤵
- Scheduled Task/Job: Scheduled Task
PID:2564
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1WTsWIF1jiww.bat" "41⤵PID:3304
-
C:\Windows\system32\chcp.comchcp 6500142⤵PID:2344
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost42⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1076
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"42⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4656 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fortnite updater cloud" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f43⤵
- Scheduled Task/Job: Scheduled Task
PID:1980
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\EHP7zW9m8ijA.bat" "43⤵PID:3292
-
C:\Windows\system32\chcp.comchcp 6500144⤵PID:5028
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost44⤵PID:2808
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"44⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2436 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fortnite updater cloud" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f45⤵PID:4448
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Jj56icvdV8nc.bat" "45⤵PID:3680
-
C:\Windows\system32\chcp.comchcp 6500146⤵PID:4340
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost46⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3200
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"46⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:804 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fortnite updater cloud" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f47⤵
- Scheduled Task/Job: Scheduled Task
PID:3668
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\taavowrYA3PJ.bat" "47⤵PID:3836
-
C:\Windows\system32\chcp.comchcp 6500148⤵PID:1344
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost48⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2572
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"48⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2112 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fortnite updater cloud" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f49⤵
- Scheduled Task/Job: Scheduled Task
PID:2976
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ReS8OnG9ydnC.bat" "49⤵PID:4316
-
C:\Windows\system32\chcp.comchcp 6500150⤵PID:5104
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost50⤵
- Runs ping.exe
PID:2520
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"50⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3664 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fortnite updater cloud" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f51⤵PID:3500
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ahEeS7xuYStH.bat" "51⤵PID:4456
-
C:\Windows\system32\chcp.comchcp 6500152⤵PID:3628
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost52⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4344
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"52⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2248 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fortnite updater cloud" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f53⤵PID:3240
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\XBSbSHZvmhyr.bat" "53⤵PID:1256
-
C:\Windows\system32\chcp.comchcp 6500154⤵PID:2472
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost54⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1784
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"54⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4856 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fortnite updater cloud" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f55⤵
- Scheduled Task/Job: Scheduled Task
PID:1768
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\GSrc4G4WX7T7.bat" "55⤵PID:2496
-
C:\Windows\system32\chcp.comchcp 6500156⤵PID:3776
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost56⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4260
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"56⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4840 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fortnite updater cloud" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f57⤵
- Scheduled Task/Job: Scheduled Task
PID:2588
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\XrxzAbWhYg1z.bat" "57⤵PID:3952
-
C:\Windows\system32\chcp.comchcp 6500158⤵PID:4948
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost58⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1188
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"58⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3488 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fortnite updater cloud" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f59⤵PID:1856
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\jtVCPnbXVzSw.bat" "59⤵PID:3604
-
C:\Windows\system32\chcp.comchcp 6500160⤵PID:2032
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost60⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4556
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"60⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4536 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fortnite updater cloud" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f61⤵
- Scheduled Task/Job: Scheduled Task
PID:4336
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\8UkKA67GxBIU.bat" "61⤵PID:3264
-
C:\Windows\system32\chcp.comchcp 6500162⤵PID:1492
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost62⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3208
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"62⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3448 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fortnite updater cloud" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f63⤵PID:1536
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Ot3GyOamAtFx.bat" "63⤵PID:3672
-
C:\Windows\system32\chcp.comchcp 6500164⤵PID:656
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost64⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4248
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"64⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1720 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fortnite updater cloud" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f65⤵PID:4960
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\SYpeeGbjcR0u.bat" "65⤵PID:844
-
C:\Windows\system32\chcp.comchcp 6500166⤵PID:1300
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost66⤵
- Runs ping.exe
PID:1072
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"66⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3680 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fortnite updater cloud" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f67⤵
- Scheduled Task/Job: Scheduled Task
PID:2928
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\uHAvt2K5XTaX.bat" "67⤵PID:5024
-
C:\Windows\system32\chcp.comchcp 6500168⤵PID:5100
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost68⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2932
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"68⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4180 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fortnite updater cloud" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f69⤵PID:4564
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\WOJ6C1QU45OG.bat" "69⤵PID:4976
-
C:\Windows\system32\chcp.comchcp 6500170⤵PID:104
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost70⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:72
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"70⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1436 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fortnite updater cloud" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f71⤵
- Scheduled Task/Job: Scheduled Task
PID:2124
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4JPnQRUtcWJy.bat" "71⤵PID:3664
-
C:\Windows\system32\chcp.comchcp 6500172⤵PID:4736
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost72⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2660
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"72⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2644 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fortnite updater cloud" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f73⤵
- Scheduled Task/Job: Scheduled Task
PID:3240
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\OIkAABPJkDWM.bat" "73⤵PID:3556
-
C:\Windows\system32\chcp.comchcp 6500174⤵PID:4552
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost74⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3316
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"74⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2044 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fortnite updater cloud" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f75⤵PID:3524
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\akRvkDTWHIrh.bat" "75⤵PID:2956
-
C:\Windows\system32\chcp.comchcp 6500176⤵PID:1160
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost76⤵PID:464
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"76⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4028 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fortnite updater cloud" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f77⤵
- Scheduled Task/Job: Scheduled Task
PID:660
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\msAkvgX7JghF.bat" "77⤵PID:3516
-
C:\Windows\system32\chcp.comchcp 6500178⤵PID:3788
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost78⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4032
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"78⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3592 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fortnite updater cloud" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f79⤵
- Scheduled Task/Job: Scheduled Task
PID:1604
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\aF3OSoLb0Kq5.bat" "79⤵PID:3220
-
C:\Windows\system32\chcp.comchcp 6500180⤵PID:3964
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost80⤵PID:1184
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"80⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1480 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fortnite updater cloud" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f81⤵
- Scheduled Task/Job: Scheduled Task
PID:3456
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\EjXGYb373eRI.bat" "81⤵PID:868
-
C:\Windows\system32\chcp.comchcp 6500182⤵PID:4752
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost82⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4124
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"82⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4228 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fortnite updater cloud" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f83⤵PID:3108
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Og47rZFHCYNO.bat" "83⤵PID:2628
-
C:\Windows\system32\chcp.comchcp 6500184⤵PID:3448
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost84⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:656
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"84⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4248 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fortnite updater cloud" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f85⤵
- Scheduled Task/Job: Scheduled Task
PID:3672
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\TsEup56blCXb.bat" "85⤵PID:4980
-
C:\Windows\system32\chcp.comchcp 6500186⤵PID:3216
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost86⤵
- Runs ping.exe
PID:576
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"86⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3856 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fortnite updater cloud" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f87⤵
- Scheduled Task/Job: Scheduled Task
PID:2180
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\XhlKnb6rbecn.bat" "87⤵PID:2508
-
C:\Windows\system32\chcp.comchcp 6500188⤵PID:4176
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost88⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1964
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"88⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2572 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fortnite updater cloud" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f89⤵
- Scheduled Task/Job: Scheduled Task
PID:2772
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\A5JFShoFnl50.bat" "89⤵PID:3020
-
C:\Windows\system32\chcp.comchcp 6500190⤵PID:496
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost90⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1032
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"90⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3212 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fortnite updater cloud" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f91⤵PID:572
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Y50EElVM0AZr.bat" "91⤵PID:3772
-
C:\Windows\system32\chcp.comchcp 6500192⤵PID:436
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost92⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3500
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"92⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2888 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fortnite updater cloud" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f93⤵
- Scheduled Task/Job: Scheduled Task
PID:3596
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\wfnrAzR2A0Nl.bat" "93⤵PID:2712
-
C:\Windows\system32\chcp.comchcp 6500194⤵PID:2248
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost94⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4164
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"94⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1824 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fortnite updater cloud" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f95⤵
- Scheduled Task/Job: Scheduled Task
PID:4648
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\CFEUJW42A8SV.bat" "95⤵PID:1180
-
C:\Windows\system32\chcp.comchcp 6500196⤵PID:1768
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost96⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4828
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"96⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1736 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fortnite updater cloud" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f97⤵PID:2724
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\pHLc1uazkjbX.bat" "97⤵PID:4024
-
C:\Windows\system32\chcp.comchcp 6500198⤵PID:4844
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost98⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3052
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"98⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3788 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fortnite updater cloud" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f99⤵
- Scheduled Task/Job: Scheduled Task
PID:2088
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\jKRtYomiv3yW.bat" "99⤵PID:3508
-
C:\Windows\system32\chcp.comchcp 65001100⤵PID:3952
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost100⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1832
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"100⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4992 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fortnite updater cloud" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f101⤵
- Scheduled Task/Job: Scheduled Task
PID:3964
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\b9YYqFPCoT6C.bat" "101⤵PID:4520
-
C:\Windows\system32\chcp.comchcp 65001102⤵PID:1688
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost102⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1544
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"102⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2080 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fortnite updater cloud" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f103⤵
- Scheduled Task/Job: Scheduled Task
PID:1480
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tjmT90a1qTOB.bat" "103⤵PID:4052
-
C:\Windows\system32\chcp.comchcp 65001104⤵PID:1112
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost104⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2852
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"104⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4228 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fortnite updater cloud" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f105⤵
- Scheduled Task/Job: Scheduled Task
PID:2608
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BTysTtFLpokz.bat" "105⤵PID:4448
-
C:\Windows\system32\chcp.comchcp 65001106⤵PID:1732
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost106⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4200
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"106⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:352 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fortnite updater cloud" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f107⤵
- Scheduled Task/Job: Scheduled Task
PID:1300
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3tZSg3KC98Se.bat" "107⤵PID:1132
-
C:\Windows\system32\chcp.comchcp 65001108⤵PID:3972
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost108⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2928
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"108⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2964 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fortnite updater cloud" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f109⤵
- Scheduled Task/Job: Scheduled Task
PID:2892
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\eyFJwp8sY9gA.bat" "109⤵PID:1964
-
C:\Windows\system32\chcp.comchcp 65001110⤵PID:3648
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost110⤵
- Runs ping.exe
PID:4080
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"110⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4372 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fortnite updater cloud" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f111⤵
- Scheduled Task/Job: Scheduled Task
PID:1804
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Zro2OjkCfSJm.bat" "111⤵PID:4708
-
C:\Windows\system32\chcp.comchcp 65001112⤵PID:2460
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost112⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2952
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"112⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3228 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fortnite updater cloud" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f113⤵
- Scheduled Task/Job: Scheduled Task
PID:3340
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\EqjeufzTh07G.bat" "113⤵PID:4500
-
C:\Windows\system32\chcp.comchcp 65001114⤵PID:3664
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost114⤵
- Runs ping.exe
PID:2148
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"114⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3824 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fortnite updater cloud" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f115⤵
- Scheduled Task/Job: Scheduled Task
PID:4320
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\MAw2mA0fD9lN.bat" "115⤵PID:4164
-
C:\Windows\system32\chcp.comchcp 65001116⤵PID:5020
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost116⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:3180
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"116⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4968 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fortnite updater cloud" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f117⤵
- Scheduled Task/Job: Scheduled Task
PID:2336
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\W7Yv6ErmNYZI.bat" "117⤵PID:2368
-
C:\Windows\system32\chcp.comchcp 65001118⤵PID:2200
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost118⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1064
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"118⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3376 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fortnite updater cloud" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f119⤵
- Scheduled Task/Job: Scheduled Task
PID:3196
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cCNBMx0JfvyJ.bat" "119⤵PID:4220
-
C:\Windows\system32\chcp.comchcp 65001120⤵PID:4512
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost120⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4864
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"120⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1188 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fortnite updater cloud" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f121⤵
- Scheduled Task/Job: Scheduled Task
PID:3068
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\PfXWFhqOKNLx.bat" "121⤵PID:3964
-
C:\Windows\system32\chcp.comchcp 65001122⤵PID:1592
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-