Analysis
-
max time kernel
899s -
max time network
440s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
15-01-2025 18:04
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win10v2004-20241007-en
General
-
Target
Client-built.exe
-
Size
3.1MB
-
MD5
79069701295f944d67c5f2e0213b3b9c
-
SHA1
589e8b6227ec6ef923f7eb8e4dc96797593f9535
-
SHA256
ff62c26c8faf00f841ddeae1e095b8a65a9cb4e0d2a01879aaa8d767c4550cf8
-
SHA512
472570fbf5ee21c05d9e40aaef32686b5f3f63eba93c7f3efdc23493e74017cea8b2a91a1ac7d8cdbc67fedb18f4dcae20c08fa3b6486807fa38d03dd2114f67
-
SSDEEP
49152:mvjI22SsaNYfdPBldt698dBcjHtqRJ6sbR3LoGdnTHHB72eh2NT:mvc22SsaNYfdPBldt6+dBcjHtqRJ62
Malware Config
Extracted
quasar
1.4.1
test-rat
46.125.249.50:4782:4782
e2bb43be-2392-4c93-9a3c-dcea173d5afd
-
encryption_key
AE2F816185F134AF4E7D747D3E55802DE0F16A45
-
install_name
Virus-Rat.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows Defender Update
-
subdirectory
Rat-Test-cx
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral2/memory/892-1-0x00000000004E0000-0x0000000000804000-memory.dmp family_quasar behavioral2/files/0x001b00000002aab2-5.dat family_quasar -
Executes dropped EXE 64 IoCs
pid Process 2324 Virus-Rat.exe 4212 Virus-Rat.exe 2764 Virus-Rat.exe 3604 Virus-Rat.exe 456 Virus-Rat.exe 5068 Virus-Rat.exe 5012 Virus-Rat.exe 4168 Virus-Rat.exe 2404 Virus-Rat.exe 2076 Virus-Rat.exe 1040 Virus-Rat.exe 5112 Virus-Rat.exe 3136 Virus-Rat.exe 1072 Virus-Rat.exe 1140 Virus-Rat.exe 3444 Virus-Rat.exe 836 Virus-Rat.exe 1204 Virus-Rat.exe 3548 Virus-Rat.exe 3108 Virus-Rat.exe 1484 Virus-Rat.exe 1540 Virus-Rat.exe 2104 Virus-Rat.exe 1564 Virus-Rat.exe 2728 Virus-Rat.exe 3084 Virus-Rat.exe 5088 Virus-Rat.exe 4700 Virus-Rat.exe 3952 Virus-Rat.exe 2804 Virus-Rat.exe 1456 Virus-Rat.exe 3440 Virus-Rat.exe 4336 Virus-Rat.exe 1096 Virus-Rat.exe 3420 Virus-Rat.exe 1180 Virus-Rat.exe 1784 Virus-Rat.exe 4812 Virus-Rat.exe 536 Virus-Rat.exe 1040 Virus-Rat.exe 5080 Virus-Rat.exe 1964 Virus-Rat.exe 856 Virus-Rat.exe 4796 Virus-Rat.exe 1464 Virus-Rat.exe 3992 Virus-Rat.exe 2728 Virus-Rat.exe 2460 Virus-Rat.exe 4968 Virus-Rat.exe 808 Virus-Rat.exe 4752 Virus-Rat.exe 1960 Virus-Rat.exe 4588 Virus-Rat.exe 4788 Virus-Rat.exe 4336 Virus-Rat.exe 1692 Virus-Rat.exe 3980 Virus-Rat.exe 1648 Virus-Rat.exe 1032 Virus-Rat.exe 2392 Virus-Rat.exe 3540 Virus-Rat.exe 2092 Virus-Rat.exe 2628 Virus-Rat.exe 5100 Virus-Rat.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 64 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 580 PING.EXE 2700 PING.EXE 2616 PING.EXE 232 PING.EXE 4600 PING.EXE 464 PING.EXE 2884 PING.EXE 3920 PING.EXE 4652 PING.EXE 1236 PING.EXE 3120 PING.EXE 3956 PING.EXE 1724 PING.EXE 3760 PING.EXE 2108 PING.EXE 3996 PING.EXE 4956 PING.EXE 3464 PING.EXE 3876 PING.EXE 3288 PING.EXE 2368 PING.EXE 892 PING.EXE 860 PING.EXE 4952 PING.EXE 1452 PING.EXE 1216 PING.EXE 3520 PING.EXE 1908 PING.EXE 1236 PING.EXE 1124 PING.EXE 2924 PING.EXE 2520 PING.EXE 3864 PING.EXE 2808 PING.EXE 2280 PING.EXE 1540 PING.EXE 3692 PING.EXE 2948 PING.EXE 2804 PING.EXE 3140 PING.EXE 4660 PING.EXE 764 PING.EXE 2164 PING.EXE 3408 PING.EXE 2708 PING.EXE 3344 PING.EXE 232 PING.EXE 3568 PING.EXE 3100 PING.EXE 2764 PING.EXE 2820 PING.EXE 4108 PING.EXE 3292 PING.EXE 1268 PING.EXE 660 PING.EXE 3356 PING.EXE 1484 PING.EXE 1884 PING.EXE 3620 PING.EXE 2656 PING.EXE 3128 PING.EXE 2320 PING.EXE 2968 PING.EXE 1788 PING.EXE -
Runs ping.exe 1 TTPs 64 IoCs
pid Process 1840 PING.EXE 3716 PING.EXE 1216 PING.EXE 4308 PING.EXE 1908 PING.EXE 2968 PING.EXE 1884 PING.EXE 1452 PING.EXE 464 PING.EXE 1540 PING.EXE 1004 PING.EXE 3876 PING.EXE 3996 PING.EXE 2948 PING.EXE 3140 PING.EXE 4660 PING.EXE 3288 PING.EXE 4108 PING.EXE 2708 PING.EXE 3292 PING.EXE 3100 PING.EXE 1124 PING.EXE 3080 PING.EXE 3540 PING.EXE 3520 PING.EXE 580 PING.EXE 860 PING.EXE 1252 PING.EXE 1788 PING.EXE 2368 PING.EXE 3356 PING.EXE 2616 PING.EXE 3620 PING.EXE 3644 PING.EXE 2808 PING.EXE 4960 PING.EXE 3692 PING.EXE 2700 PING.EXE 4652 PING.EXE 4956 PING.EXE 232 PING.EXE 2924 PING.EXE 4440 PING.EXE 3464 PING.EXE 2820 PING.EXE 2204 PING.EXE 3288 PING.EXE 3568 PING.EXE 3128 PING.EXE 2280 PING.EXE 2764 PING.EXE 4600 PING.EXE 1236 PING.EXE 2656 PING.EXE 232 PING.EXE 1764 PING.EXE 3052 PING.EXE 1768 PING.EXE 1268 PING.EXE 660 PING.EXE 5020 PING.EXE 2520 PING.EXE 3408 PING.EXE 3760 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 64 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4220 schtasks.exe 4888 schtasks.exe 4092 schtasks.exe 2988 schtasks.exe 3848 schtasks.exe 608 schtasks.exe 1528 schtasks.exe 4648 schtasks.exe 4968 schtasks.exe 2868 schtasks.exe 4844 schtasks.exe 5112 schtasks.exe 3128 schtasks.exe 4068 schtasks.exe 4624 schtasks.exe 3056 schtasks.exe 3100 schtasks.exe 1360 schtasks.exe 1400 schtasks.exe 2916 schtasks.exe 3252 schtasks.exe 4960 schtasks.exe 2720 schtasks.exe 4444 schtasks.exe 1364 schtasks.exe 2808 schtasks.exe 4656 schtasks.exe 3524 schtasks.exe 1540 schtasks.exe 716 schtasks.exe 1172 schtasks.exe 948 schtasks.exe 3252 schtasks.exe 3808 schtasks.exe 2600 schtasks.exe 4816 schtasks.exe 3456 schtasks.exe 4208 schtasks.exe 2820 schtasks.exe 836 schtasks.exe 5108 schtasks.exe 4308 schtasks.exe 5104 schtasks.exe 1180 schtasks.exe 4440 schtasks.exe 5024 schtasks.exe 3852 schtasks.exe 640 schtasks.exe 4744 schtasks.exe 1268 schtasks.exe 3496 schtasks.exe 1116 schtasks.exe 3320 schtasks.exe 3708 schtasks.exe 4324 schtasks.exe 4968 schtasks.exe 1484 schtasks.exe 1988 schtasks.exe 2072 schtasks.exe 4896 schtasks.exe 1568 schtasks.exe 2332 schtasks.exe 3252 schtasks.exe 4080 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 892 Client-built.exe Token: SeDebugPrivilege 2324 Virus-Rat.exe Token: SeDebugPrivilege 4212 Virus-Rat.exe Token: SeDebugPrivilege 2764 Virus-Rat.exe Token: SeDebugPrivilege 3604 Virus-Rat.exe Token: SeDebugPrivilege 456 Virus-Rat.exe Token: SeDebugPrivilege 5068 Virus-Rat.exe Token: SeDebugPrivilege 5012 Virus-Rat.exe Token: SeDebugPrivilege 4168 Virus-Rat.exe Token: SeDebugPrivilege 2404 Virus-Rat.exe Token: SeDebugPrivilege 2076 Virus-Rat.exe Token: SeDebugPrivilege 1040 Virus-Rat.exe Token: SeDebugPrivilege 5112 Virus-Rat.exe Token: SeDebugPrivilege 3136 Virus-Rat.exe Token: SeDebugPrivilege 1072 Virus-Rat.exe Token: SeDebugPrivilege 1140 Virus-Rat.exe Token: SeDebugPrivilege 3444 Virus-Rat.exe Token: SeDebugPrivilege 836 Virus-Rat.exe Token: SeDebugPrivilege 1204 Virus-Rat.exe Token: SeDebugPrivilege 3548 Virus-Rat.exe Token: SeDebugPrivilege 3108 Virus-Rat.exe Token: SeDebugPrivilege 1484 Virus-Rat.exe Token: SeDebugPrivilege 1540 Virus-Rat.exe Token: SeDebugPrivilege 2104 Virus-Rat.exe Token: SeDebugPrivilege 1564 Virus-Rat.exe Token: SeDebugPrivilege 2728 Virus-Rat.exe Token: SeDebugPrivilege 3084 Virus-Rat.exe Token: SeDebugPrivilege 5088 Virus-Rat.exe Token: SeDebugPrivilege 4700 Virus-Rat.exe Token: SeDebugPrivilege 3952 Virus-Rat.exe Token: SeDebugPrivilege 2804 Virus-Rat.exe Token: SeDebugPrivilege 1456 Virus-Rat.exe Token: SeDebugPrivilege 3440 Virus-Rat.exe Token: SeDebugPrivilege 4336 Virus-Rat.exe Token: SeDebugPrivilege 1096 Virus-Rat.exe Token: SeDebugPrivilege 3420 Virus-Rat.exe Token: SeDebugPrivilege 1180 Virus-Rat.exe Token: SeDebugPrivilege 1784 Virus-Rat.exe Token: SeDebugPrivilege 4812 Virus-Rat.exe Token: SeDebugPrivilege 536 Virus-Rat.exe Token: SeDebugPrivilege 1040 Virus-Rat.exe Token: SeDebugPrivilege 5080 Virus-Rat.exe Token: SeDebugPrivilege 1964 Virus-Rat.exe Token: SeDebugPrivilege 856 Virus-Rat.exe Token: SeDebugPrivilege 4796 Virus-Rat.exe Token: SeDebugPrivilege 1464 Virus-Rat.exe Token: SeDebugPrivilege 3992 Virus-Rat.exe Token: SeDebugPrivilege 2728 Virus-Rat.exe Token: SeDebugPrivilege 2460 Virus-Rat.exe Token: SeDebugPrivilege 4968 Virus-Rat.exe Token: SeDebugPrivilege 808 Virus-Rat.exe Token: SeDebugPrivilege 4752 Virus-Rat.exe Token: SeDebugPrivilege 1960 Virus-Rat.exe Token: SeDebugPrivilege 4588 Virus-Rat.exe Token: SeDebugPrivilege 4788 Virus-Rat.exe Token: SeDebugPrivilege 4336 Virus-Rat.exe Token: SeDebugPrivilege 1692 Virus-Rat.exe Token: SeDebugPrivilege 3980 Virus-Rat.exe Token: SeDebugPrivilege 1648 Virus-Rat.exe Token: SeDebugPrivilege 1032 Virus-Rat.exe Token: SeDebugPrivilege 2392 Virus-Rat.exe Token: SeDebugPrivilege 3540 Virus-Rat.exe Token: SeDebugPrivilege 2092 Virus-Rat.exe Token: SeDebugPrivilege 2628 Virus-Rat.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 892 wrote to memory of 5028 892 Client-built.exe 77 PID 892 wrote to memory of 5028 892 Client-built.exe 77 PID 892 wrote to memory of 2324 892 Client-built.exe 79 PID 892 wrote to memory of 2324 892 Client-built.exe 79 PID 2324 wrote to memory of 2600 2324 Virus-Rat.exe 80 PID 2324 wrote to memory of 2600 2324 Virus-Rat.exe 80 PID 2324 wrote to memory of 4968 2324 Virus-Rat.exe 82 PID 2324 wrote to memory of 4968 2324 Virus-Rat.exe 82 PID 4968 wrote to memory of 4300 4968 cmd.exe 84 PID 4968 wrote to memory of 4300 4968 cmd.exe 84 PID 4968 wrote to memory of 3540 4968 cmd.exe 85 PID 4968 wrote to memory of 3540 4968 cmd.exe 85 PID 4968 wrote to memory of 4212 4968 cmd.exe 86 PID 4968 wrote to memory of 4212 4968 cmd.exe 86 PID 4212 wrote to memory of 3100 4212 Virus-Rat.exe 87 PID 4212 wrote to memory of 3100 4212 Virus-Rat.exe 87 PID 4212 wrote to memory of 2092 4212 Virus-Rat.exe 89 PID 4212 wrote to memory of 2092 4212 Virus-Rat.exe 89 PID 2092 wrote to memory of 1236 2092 cmd.exe 91 PID 2092 wrote to memory of 1236 2092 cmd.exe 91 PID 2092 wrote to memory of 3520 2092 cmd.exe 92 PID 2092 wrote to memory of 3520 2092 cmd.exe 92 PID 2092 wrote to memory of 2764 2092 cmd.exe 93 PID 2092 wrote to memory of 2764 2092 cmd.exe 93 PID 2764 wrote to memory of 5112 2764 Virus-Rat.exe 94 PID 2764 wrote to memory of 5112 2764 Virus-Rat.exe 94 PID 2764 wrote to memory of 1356 2764 Virus-Rat.exe 96 PID 2764 wrote to memory of 1356 2764 Virus-Rat.exe 96 PID 1356 wrote to memory of 920 1356 cmd.exe 98 PID 1356 wrote to memory of 920 1356 cmd.exe 98 PID 1356 wrote to memory of 580 1356 cmd.exe 99 PID 1356 wrote to memory of 580 1356 cmd.exe 99 PID 1356 wrote to memory of 3604 1356 cmd.exe 100 PID 1356 wrote to memory of 3604 1356 cmd.exe 100 PID 3604 wrote to memory of 1520 3604 Virus-Rat.exe 101 PID 3604 wrote to memory of 1520 3604 Virus-Rat.exe 101 PID 3604 wrote to memory of 2820 3604 Virus-Rat.exe 103 PID 3604 wrote to memory of 2820 3604 Virus-Rat.exe 103 PID 2820 wrote to memory of 3888 2820 cmd.exe 105 PID 2820 wrote to memory of 3888 2820 cmd.exe 105 PID 2820 wrote to memory of 2280 2820 cmd.exe 106 PID 2820 wrote to memory of 2280 2820 cmd.exe 106 PID 2820 wrote to memory of 456 2820 cmd.exe 107 PID 2820 wrote to memory of 456 2820 cmd.exe 107 PID 456 wrote to memory of 1528 456 Virus-Rat.exe 108 PID 456 wrote to memory of 1528 456 Virus-Rat.exe 108 PID 456 wrote to memory of 1048 456 Virus-Rat.exe 110 PID 456 wrote to memory of 1048 456 Virus-Rat.exe 110 PID 1048 wrote to memory of 428 1048 cmd.exe 112 PID 1048 wrote to memory of 428 1048 cmd.exe 112 PID 1048 wrote to memory of 1004 1048 cmd.exe 113 PID 1048 wrote to memory of 1004 1048 cmd.exe 113 PID 1048 wrote to memory of 5068 1048 cmd.exe 114 PID 1048 wrote to memory of 5068 1048 cmd.exe 114 PID 5068 wrote to memory of 2504 5068 Virus-Rat.exe 115 PID 5068 wrote to memory of 2504 5068 Virus-Rat.exe 115 PID 5068 wrote to memory of 4260 5068 Virus-Rat.exe 117 PID 5068 wrote to memory of 4260 5068 Virus-Rat.exe 117 PID 4260 wrote to memory of 2276 4260 cmd.exe 119 PID 4260 wrote to memory of 2276 4260 cmd.exe 119 PID 4260 wrote to memory of 1840 4260 cmd.exe 120 PID 4260 wrote to memory of 1840 4260 cmd.exe 120 PID 4260 wrote to memory of 5012 4260 cmd.exe 121 PID 4260 wrote to memory of 5012 4260 cmd.exe 121 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f2⤵PID:5028
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:2600
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\0LvIISRUWlpo.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\system32\chcp.comchcp 650014⤵PID:4300
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
PID:3540
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:3100
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\el6IWZtKIxcG.bat" "5⤵
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\system32\chcp.comchcp 650016⤵PID:1236
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3520
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f7⤵
- Scheduled Task/Job: Scheduled Task
PID:5112
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Wj5NLMWkglMb.bat" "7⤵
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\system32\chcp.comchcp 650018⤵PID:920
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost8⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:580
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f9⤵PID:1520
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\oZ0okR6g3HTQ.bat" "9⤵
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\system32\chcp.comchcp 6500110⤵PID:3888
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost10⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2280
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"10⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f11⤵
- Scheduled Task/Job: Scheduled Task
PID:1528
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\rmwFefguwqBe.bat" "11⤵
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\system32\chcp.comchcp 6500112⤵PID:428
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost12⤵
- Runs ping.exe
PID:1004
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"12⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f13⤵PID:2504
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\MXfubnsO1BIR.bat" "13⤵
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Windows\system32\chcp.comchcp 6500114⤵PID:2276
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost14⤵
- Runs ping.exe
PID:1840
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"14⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5012 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f15⤵
- Scheduled Task/Job: Scheduled Task
PID:3524
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\XRFpnc0p6yRN.bat" "15⤵PID:3080
-
C:\Windows\system32\chcp.comchcp 6500116⤵PID:436
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost16⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4956
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"16⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4168 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f17⤵PID:1508
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Ymlx34tru2uZ.bat" "17⤵PID:996
-
C:\Windows\system32\chcp.comchcp 6500118⤵PID:4128
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost18⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1908
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"18⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2404 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f19⤵
- Scheduled Task/Job: Scheduled Task
PID:3252
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\rYJNXfBfMcuG.bat" "19⤵PID:4992
-
C:\Windows\system32\chcp.comchcp 6500120⤵PID:5024
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost20⤵
- Runs ping.exe
PID:3716
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"20⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2076 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f21⤵PID:1112
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\621lckv08Wh4.bat" "21⤵PID:1448
-
C:\Windows\system32\chcp.comchcp 6500122⤵PID:4112
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost22⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:860
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"22⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1040 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f23⤵PID:3108
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\B2Cj0VQ44rrz.bat" "23⤵PID:4640
-
C:\Windows\system32\chcp.comchcp 6500124⤵PID:1984
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost24⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:3344
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"24⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5112 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f25⤵
- Scheduled Task/Job: Scheduled Task
PID:1484
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\dk3mH2uz07BZ.bat" "25⤵PID:580
-
C:\Windows\system32\chcp.comchcp 6500126⤵PID:3996
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost26⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2700
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"26⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3136 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f27⤵
- Scheduled Task/Job: Scheduled Task
PID:1540
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\CUgXTpZGBHsn.bat" "27⤵PID:2340
-
C:\Windows\system32\chcp.comchcp 6500128⤵PID:1556
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost28⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2968
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"28⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1072 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f29⤵
- Scheduled Task/Job: Scheduled Task
PID:3320
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\HeEusd2aemF0.bat" "29⤵PID:5116
-
C:\Windows\system32\chcp.comchcp 6500130⤵PID:2392
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost30⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4952
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"30⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1140 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f31⤵PID:4260
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\HFcz9UW15Bhx.bat" "31⤵PID:2180
-
C:\Windows\system32\chcp.comchcp 6500132⤵PID:2620
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost32⤵PID:5032
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"32⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3444 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f33⤵
- Scheduled Task/Job: Scheduled Task
PID:4648
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\8vkzVKJoeMvJ.bat" "33⤵PID:4592
-
C:\Windows\system32\chcp.comchcp 6500134⤵PID:764
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost34⤵PID:4656
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"34⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:836 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f35⤵
- Scheduled Task/Job: Scheduled Task
PID:1988
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ueQZ89R7oSUE.bat" "35⤵PID:4740
-
C:\Windows\system32\chcp.comchcp 6500136⤵PID:4024
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost36⤵
- Runs ping.exe
PID:1252
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"36⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1204 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f37⤵
- Scheduled Task/Job: Scheduled Task
PID:3708
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\fgpD8gWOy329.bat" "37⤵PID:4424
-
C:\Windows\system32\chcp.comchcp 6500138⤵PID:4004
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost38⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4652
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"38⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3548 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f39⤵
- Scheduled Task/Job: Scheduled Task
PID:4968
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Jo96uo2r89Q1.bat" "39⤵PID:860
-
C:\Windows\system32\chcp.comchcp 6500140⤵PID:4212
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost40⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1236
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"40⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3108 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f41⤵
- Scheduled Task/Job: Scheduled Task
PID:716
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\nZCS4MCQlOTE.bat" "41⤵PID:3344
-
C:\Windows\system32\chcp.comchcp 6500142⤵PID:2492
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost42⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2616
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"42⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1484 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f43⤵
- Scheduled Task/Job: Scheduled Task
PID:3128
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\oyNIoFkKItNG.bat" "43⤵PID:4588
-
C:\Windows\system32\chcp.comchcp 6500144⤵PID:4156
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost44⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1884
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"44⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1540 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f45⤵
- Scheduled Task/Job: Scheduled Task
PID:4324
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\NuhY5gmrtZLv.bat" "45⤵PID:2256
-
C:\Windows\system32\chcp.comchcp 6500146⤵PID:4976
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost46⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1452
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"46⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2104 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f47⤵
- Scheduled Task/Job: Scheduled Task
PID:1172
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JhzG0R0nelyV.bat" "47⤵PID:700
-
C:\Windows\system32\chcp.comchcp 6500148⤵PID:4952
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost48⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:3120
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"48⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1564 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f49⤵
- Scheduled Task/Job: Scheduled Task
PID:608
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Tp4sV5ppS4rH.bat" "49⤵PID:4708
-
C:\Windows\system32\chcp.comchcp 6500150⤵PID:752
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost50⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2924
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"50⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2728 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f51⤵
- Scheduled Task/Job: Scheduled Task
PID:4440
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\VB3DDCheFKS5.bat" "51⤵PID:1636
-
C:\Windows\system32\chcp.comchcp 6500152⤵PID:764
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost52⤵PID:5052
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"52⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3084 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f53⤵
- Scheduled Task/Job: Scheduled Task
PID:1364
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\27YLK47Xr8pV.bat" "53⤵PID:3104
-
C:\Windows\system32\chcp.comchcp 6500154⤵PID:3764
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost54⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1788
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"54⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5088 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f55⤵
- Scheduled Task/Job: Scheduled Task
PID:5024
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ylXOniSnsafa.bat" "55⤵PID:2404
-
C:\Windows\system32\chcp.comchcp 6500156⤵PID:3984
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost56⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:3956
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"56⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4700 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f57⤵
- Scheduled Task/Job: Scheduled Task
PID:3852
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ewrO9BESl5uM.bat" "57⤵PID:4192
-
C:\Windows\system32\chcp.comchcp 6500158⤵PID:740
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost58⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3464
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"58⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3952 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f59⤵
- Scheduled Task/Job: Scheduled Task
PID:2072
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1Bro1Ir4A2d8.bat" "59⤵PID:4380
-
C:\Windows\system32\chcp.comchcp 6500160⤵PID:4956
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost60⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2764
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"60⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2804 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f61⤵
- Scheduled Task/Job: Scheduled Task
PID:4896
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\WwL1BxFuDgPn.bat" "61⤵PID:1628
-
C:\Windows\system32\chcp.comchcp 6500162⤵PID:2932
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost62⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1216
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"62⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1456 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f63⤵
- Scheduled Task/Job: Scheduled Task
PID:948
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\v0xp3MdfsOMq.bat" "63⤵PID:1712
-
C:\Windows\system32\chcp.comchcp 6500164⤵PID:3544
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost64⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2820
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"64⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3440 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f65⤵PID:832
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\vmuS5qR4qUg5.bat" "65⤵PID:2708
-
C:\Windows\system32\chcp.comchcp 6500166⤵PID:2256
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost66⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4600
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"66⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4336 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f67⤵PID:1172
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\x9ieYs4k4546.bat" "67⤵PID:4952
-
C:\Windows\system32\chcp.comchcp 6500168⤵PID:4036
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost68⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:464
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"68⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1096 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f69⤵
- Scheduled Task/Job: Scheduled Task
PID:1568
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\qtqqiJ6dMOU3.bat" "69⤵PID:4860
-
C:\Windows\system32\chcp.comchcp 6500170⤵PID:3276
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost70⤵PID:1524
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"70⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3420 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f71⤵
- Scheduled Task/Job: Scheduled Task
PID:4220
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\mmxq8kgfeHt3.bat" "71⤵PID:3776
-
C:\Windows\system32\chcp.comchcp 6500172⤵PID:1340
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost72⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3876
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"72⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1180 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f73⤵PID:328
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\YVA1G4sZiOIm.bat" "73⤵PID:4064
-
C:\Windows\system32\chcp.comchcp 6500174⤵PID:3764
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost74⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3288
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"74⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1784 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f75⤵
- Scheduled Task/Job: Scheduled Task
PID:836
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\0dK6ZJdBVN6q.bat" "75⤵PID:4596
-
C:\Windows\system32\chcp.comchcp 6500176⤵PID:408
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost76⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2884
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"76⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4812 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f77⤵
- Scheduled Task/Job: Scheduled Task
PID:640
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\rvgnsNwtsxVL.bat" "77⤵PID:572
-
C:\Windows\system32\chcp.comchcp 6500178⤵PID:2144
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost78⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:232
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"78⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:536 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f79⤵
- Scheduled Task/Job: Scheduled Task
PID:4888
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\rLx0hi6MeyxZ.bat" "79⤵PID:4192
-
C:\Windows\system32\chcp.comchcp 6500180⤵PID:4836
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost80⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4108
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"80⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1040 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f81⤵
- Scheduled Task/Job: Scheduled Task
PID:4092
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\dQwVxbxLJQfJ.bat" "81⤵PID:2616
-
C:\Windows\system32\chcp.comchcp 6500182⤵PID:2212
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost82⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:3920
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"82⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5080 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f83⤵
- Scheduled Task/Job: Scheduled Task
PID:1360
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\IhULExyHj4Do.bat" "83⤵PID:1536
-
C:\Windows\system32\chcp.comchcp 6500184⤵PID:1484
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost84⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2520
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"84⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1964 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f85⤵PID:3604
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cQsa1KEuFzxC.bat" "85⤵PID:1344
-
C:\Windows\system32\chcp.comchcp 6500186⤵PID:1144
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost86⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2108
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"86⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:856 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f87⤵
- Scheduled Task/Job: Scheduled Task
PID:2332
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\mtsvB6tFbv82.bat" "87⤵PID:2816
-
C:\Windows\system32\chcp.comchcp 6500188⤵PID:2708
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost88⤵
- Runs ping.exe
PID:2204
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"88⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4796 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f89⤵PID:1944
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4OqgyPaosdtc.bat" "89⤵PID:4776
-
C:\Windows\system32\chcp.comchcp 6500190⤵PID:5104
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost90⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2368
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"90⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1464 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f91⤵
- Scheduled Task/Job: Scheduled Task
PID:4068
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\kVXeRZHy47Nq.bat" "91⤵PID:1248
-
C:\Windows\system32\chcp.comchcp 6500192⤵PID:3320
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost92⤵
- Runs ping.exe
PID:4440
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"92⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3992 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f93⤵PID:3316
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\L3vFX3yd3P9f.bat" "93⤵PID:1112
-
C:\Windows\system32\chcp.comchcp 6500194⤵PID:1708
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost94⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:764
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"94⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2728 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f95⤵
- Scheduled Task/Job: Scheduled Task
PID:2868
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FGOoeW5kaNL6.bat" "95⤵PID:3532
-
C:\Windows\system32\chcp.comchcp 6500196⤵PID:1896
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost96⤵
- Runs ping.exe
PID:3288
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"96⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2460 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f97⤵
- Scheduled Task/Job: Scheduled Task
PID:4744
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sKGjzgDkmntm.bat" "97⤵PID:2884
-
C:\Windows\system32\chcp.comchcp 6500198⤵PID:4120
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost98⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1724
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"98⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4968 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f99⤵PID:4652
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\v7Faci6I2VnN.bat" "99⤵PID:2324
-
C:\Windows\system32\chcp.comchcp 65001100⤵PID:4636
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost100⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1236
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"100⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:808 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f101⤵
- Scheduled Task/Job: Scheduled Task
PID:2988
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\96XuUOs4VnQv.bat" "101⤵PID:3752
-
C:\Windows\system32\chcp.comchcp 65001102⤵PID:3952
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost102⤵PID:3032
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"102⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4752 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f103⤵
- Scheduled Task/Job: Scheduled Task
PID:5108
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4TRUyHtE5PIs.bat" "103⤵PID:2764
-
C:\Windows\system32\chcp.comchcp 65001104⤵PID:3144
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost104⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3996
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"104⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1960 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f105⤵PID:3608
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Li1eUKIQaB5C.bat" "105⤵PID:1500
-
C:\Windows\system32\chcp.comchcp 65001106⤵PID:3148
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost106⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3568
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"106⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4588 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f107⤵
- Scheduled Task/Job: Scheduled Task
PID:1268
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\l7s6dcA0w8EF.bat" "107⤵PID:2096
-
C:\Windows\system32\chcp.comchcp 65001108⤵PID:2732
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost108⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2164
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"108⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4788 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f109⤵PID:1100
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\U8MFf2yZItrh.bat" "109⤵PID:1528
-
C:\Windows\system32\chcp.comchcp 65001110⤵PID:1048
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost110⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3620
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"110⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4336 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f111⤵
- Scheduled Task/Job: Scheduled Task
PID:4960
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\N1yBh2vEQZPi.bat" "111⤵PID:5116
-
C:\Windows\system32\chcp.comchcp 65001112⤵PID:1684
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost112⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2656
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"112⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1692 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f113⤵
- Scheduled Task/Job: Scheduled Task
PID:1400
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\8DSUFzOePUfI.bat" "113⤵PID:4660
-
C:\Windows\system32\chcp.comchcp 65001114⤵PID:564
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost114⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3408
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"114⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3980 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f115⤵
- Scheduled Task/Job: Scheduled Task
PID:4656
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\xU2mkQ5Nc0E1.bat" "115⤵PID:4148
-
C:\Windows\system32\chcp.comchcp 65001116⤵PID:1636
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost116⤵PID:1700
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"116⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1648 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f117⤵
- Scheduled Task/Job: Scheduled Task
PID:3252
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\mT1soNR2lhzV.bat" "117⤵PID:2776
-
C:\Windows\system32\chcp.comchcp 65001118⤵PID:3984
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost118⤵
- Runs ping.exe
PID:3644
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"118⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1032 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f119⤵PID:4816
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\M8j7x0BFYKRC.bat" "119⤵PID:2660
-
C:\Windows\system32\chcp.comchcp 65001120⤵PID:4652
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost120⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:232
-
-
C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe"120⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2392 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Rat-Test-cx\Virus-Rat.exe" /rl HIGHEST /f121⤵
- Scheduled Task/Job: Scheduled Task
PID:4968
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3rdLKsxvLxBt.bat" "121⤵PID:3100
-
C:\Windows\system32\chcp.comchcp 65001122⤵PID:4304
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-