Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01/07/2024, 18:31
Static task
static1
Behavioral task
behavioral1
Sample
1c0f5afba06355ef242cd0ecc1e880c1_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
1c0f5afba06355ef242cd0ecc1e880c1_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
1c0f5afba06355ef242cd0ecc1e880c1_JaffaCakes118.exe
-
Size
97KB
-
MD5
1c0f5afba06355ef242cd0ecc1e880c1
-
SHA1
6149d9f7cbbeecf65a5a83bb474a8b5ee28efb52
-
SHA256
d8c4a82e69d87d9e5a2cc5fad5e47854104df2d6989efc6685c348c3128fa061
-
SHA512
c98fe4f714279452785ffda24956b19e99dc006cf5ba537ff8b125bfb6957765dd9cfac5156d4589220ddb09286985a1260c898683eb6bd7ff8cfa2e6394e3f9
-
SSDEEP
1536:KC0OMcamTaWf1zwQVgv6I83yDIjU6J8UlrmfvttU5Hn:JnamTa+1zwLv65CWLnJmXjU5H
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\userinit.exe" userinit.exe -
Executes dropped EXE 64 IoCs
pid Process 2428 userinit.exe 1796 system.exe 4124 system.exe 4756 system.exe 4268 system.exe 3044 system.exe 1984 system.exe 4928 system.exe 3112 system.exe 1616 system.exe 1152 system.exe 3456 system.exe 3488 system.exe 4052 system.exe 1448 system.exe 3376 system.exe 1400 system.exe 1644 system.exe 1512 system.exe 1196 system.exe 3400 system.exe 3048 system.exe 3700 system.exe 3076 system.exe 4280 system.exe 3212 system.exe 2056 system.exe 3320 system.exe 4544 system.exe 4780 system.exe 3688 system.exe 2044 system.exe 4120 system.exe 1796 system.exe 1236 system.exe 1000 system.exe 4672 system.exe 3196 system.exe 4624 system.exe 5088 system.exe 4996 system.exe 1224 system.exe 4924 system.exe 1996 system.exe 4700 system.exe 2168 system.exe 1276 system.exe 1028 system.exe 2796 system.exe 4872 system.exe 5080 system.exe 4044 system.exe 2296 system.exe 3876 system.exe 1976 system.exe 876 system.exe 1164 system.exe 3080 system.exe 760 system.exe 2572 system.exe 4816 system.exe 3548 system.exe 2380 system.exe 3212 system.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\system.exe userinit.exe File opened for modification C:\Windows\SysWOW64\system.exe userinit.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\userinit.exe 1c0f5afba06355ef242cd0ecc1e880c1_JaffaCakes118.exe File opened for modification C:\Windows\userinit.exe 1c0f5afba06355ef242cd0ecc1e880c1_JaffaCakes118.exe File created C:\Windows\kdcoms.dll userinit.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2652 1c0f5afba06355ef242cd0ecc1e880c1_JaffaCakes118.exe 2652 1c0f5afba06355ef242cd0ecc1e880c1_JaffaCakes118.exe 2428 userinit.exe 2428 userinit.exe 2428 userinit.exe 2428 userinit.exe 1796 system.exe 1796 system.exe 2428 userinit.exe 2428 userinit.exe 4124 system.exe 4124 system.exe 2428 userinit.exe 2428 userinit.exe 4756 system.exe 4756 system.exe 2428 userinit.exe 2428 userinit.exe 4268 system.exe 4268 system.exe 2428 userinit.exe 2428 userinit.exe 3044 system.exe 3044 system.exe 2428 userinit.exe 2428 userinit.exe 1984 system.exe 1984 system.exe 2428 userinit.exe 2428 userinit.exe 4928 system.exe 4928 system.exe 2428 userinit.exe 2428 userinit.exe 3112 system.exe 3112 system.exe 2428 userinit.exe 2428 userinit.exe 1616 system.exe 1616 system.exe 2428 userinit.exe 2428 userinit.exe 1152 system.exe 1152 system.exe 2428 userinit.exe 2428 userinit.exe 3456 system.exe 3456 system.exe 2428 userinit.exe 2428 userinit.exe 3488 system.exe 3488 system.exe 2428 userinit.exe 2428 userinit.exe 4052 system.exe 4052 system.exe 2428 userinit.exe 2428 userinit.exe 1448 system.exe 1448 system.exe 2428 userinit.exe 2428 userinit.exe 3376 system.exe 3376 system.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2428 userinit.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2652 1c0f5afba06355ef242cd0ecc1e880c1_JaffaCakes118.exe 2652 1c0f5afba06355ef242cd0ecc1e880c1_JaffaCakes118.exe 2428 userinit.exe 2428 userinit.exe 1796 system.exe 1796 system.exe 4124 system.exe 4124 system.exe 4756 system.exe 4756 system.exe 4268 system.exe 4268 system.exe 3044 system.exe 3044 system.exe 1984 system.exe 1984 system.exe 4928 system.exe 4928 system.exe 3112 system.exe 3112 system.exe 1616 system.exe 1616 system.exe 1152 system.exe 1152 system.exe 3456 system.exe 3456 system.exe 3488 system.exe 3488 system.exe 4052 system.exe 4052 system.exe 1448 system.exe 1448 system.exe 3376 system.exe 3376 system.exe 1400 system.exe 1400 system.exe 1644 system.exe 1644 system.exe 1512 system.exe 1512 system.exe 1196 system.exe 1196 system.exe 3400 system.exe 3400 system.exe 3048 system.exe 3048 system.exe 3700 system.exe 3700 system.exe 3076 system.exe 3076 system.exe 4280 system.exe 4280 system.exe 3212 system.exe 3212 system.exe 2056 system.exe 2056 system.exe 3320 system.exe 3320 system.exe 4544 system.exe 4544 system.exe 4780 system.exe 4780 system.exe 3688 system.exe 3688 system.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2652 wrote to memory of 2428 2652 1c0f5afba06355ef242cd0ecc1e880c1_JaffaCakes118.exe 81 PID 2652 wrote to memory of 2428 2652 1c0f5afba06355ef242cd0ecc1e880c1_JaffaCakes118.exe 81 PID 2652 wrote to memory of 2428 2652 1c0f5afba06355ef242cd0ecc1e880c1_JaffaCakes118.exe 81 PID 2428 wrote to memory of 1796 2428 userinit.exe 82 PID 2428 wrote to memory of 1796 2428 userinit.exe 82 PID 2428 wrote to memory of 1796 2428 userinit.exe 82 PID 2428 wrote to memory of 4124 2428 userinit.exe 83 PID 2428 wrote to memory of 4124 2428 userinit.exe 83 PID 2428 wrote to memory of 4124 2428 userinit.exe 83 PID 2428 wrote to memory of 4756 2428 userinit.exe 84 PID 2428 wrote to memory of 4756 2428 userinit.exe 84 PID 2428 wrote to memory of 4756 2428 userinit.exe 84 PID 2428 wrote to memory of 4268 2428 userinit.exe 85 PID 2428 wrote to memory of 4268 2428 userinit.exe 85 PID 2428 wrote to memory of 4268 2428 userinit.exe 85 PID 2428 wrote to memory of 3044 2428 userinit.exe 86 PID 2428 wrote to memory of 3044 2428 userinit.exe 86 PID 2428 wrote to memory of 3044 2428 userinit.exe 86 PID 2428 wrote to memory of 1984 2428 userinit.exe 89 PID 2428 wrote to memory of 1984 2428 userinit.exe 89 PID 2428 wrote to memory of 1984 2428 userinit.exe 89 PID 2428 wrote to memory of 4928 2428 userinit.exe 92 PID 2428 wrote to memory of 4928 2428 userinit.exe 92 PID 2428 wrote to memory of 4928 2428 userinit.exe 92 PID 2428 wrote to memory of 3112 2428 userinit.exe 93 PID 2428 wrote to memory of 3112 2428 userinit.exe 93 PID 2428 wrote to memory of 3112 2428 userinit.exe 93 PID 2428 wrote to memory of 1616 2428 userinit.exe 94 PID 2428 wrote to memory of 1616 2428 userinit.exe 94 PID 2428 wrote to memory of 1616 2428 userinit.exe 94 PID 2428 wrote to memory of 1152 2428 userinit.exe 96 PID 2428 wrote to memory of 1152 2428 userinit.exe 96 PID 2428 wrote to memory of 1152 2428 userinit.exe 96 PID 2428 wrote to memory of 3456 2428 userinit.exe 97 PID 2428 wrote to memory of 3456 2428 userinit.exe 97 PID 2428 wrote to memory of 3456 2428 userinit.exe 97 PID 2428 wrote to memory of 3488 2428 userinit.exe 98 PID 2428 wrote to memory of 3488 2428 userinit.exe 98 PID 2428 wrote to memory of 3488 2428 userinit.exe 98 PID 2428 wrote to memory of 4052 2428 userinit.exe 101 PID 2428 wrote to memory of 4052 2428 userinit.exe 101 PID 2428 wrote to memory of 4052 2428 userinit.exe 101 PID 2428 wrote to memory of 1448 2428 userinit.exe 102 PID 2428 wrote to memory of 1448 2428 userinit.exe 102 PID 2428 wrote to memory of 1448 2428 userinit.exe 102 PID 2428 wrote to memory of 3376 2428 userinit.exe 103 PID 2428 wrote to memory of 3376 2428 userinit.exe 103 PID 2428 wrote to memory of 3376 2428 userinit.exe 103 PID 2428 wrote to memory of 1400 2428 userinit.exe 104 PID 2428 wrote to memory of 1400 2428 userinit.exe 104 PID 2428 wrote to memory of 1400 2428 userinit.exe 104 PID 2428 wrote to memory of 1644 2428 userinit.exe 105 PID 2428 wrote to memory of 1644 2428 userinit.exe 105 PID 2428 wrote to memory of 1644 2428 userinit.exe 105 PID 2428 wrote to memory of 1512 2428 userinit.exe 106 PID 2428 wrote to memory of 1512 2428 userinit.exe 106 PID 2428 wrote to memory of 1512 2428 userinit.exe 106 PID 2428 wrote to memory of 1196 2428 userinit.exe 107 PID 2428 wrote to memory of 1196 2428 userinit.exe 107 PID 2428 wrote to memory of 1196 2428 userinit.exe 107 PID 2428 wrote to memory of 3400 2428 userinit.exe 108 PID 2428 wrote to memory of 3400 2428 userinit.exe 108 PID 2428 wrote to memory of 3400 2428 userinit.exe 108 PID 2428 wrote to memory of 3048 2428 userinit.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c0f5afba06355ef242cd0ecc1e880c1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1c0f5afba06355ef242cd0ecc1e880c1_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\userinit.exeC:\Windows\userinit.exe2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1796
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4124
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4756
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4268
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3044
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1984
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4928
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3112
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1616
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1152
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3456
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3488
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4052
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1448
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3376
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1400
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1644
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1512
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1196
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3400
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3048
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3700
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3076
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4280
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3212
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2056
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3320
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4544
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4780
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3688
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2044
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4120
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1796
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1236
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1000
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4672
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3196
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4624
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:5088
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4996
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1224
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4924
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1996
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4700
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2168
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1276
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1028
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2796
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4872
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:5080
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4044
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2296
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3876
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1976
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:876
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1164
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3080
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:760
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2572
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4816
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3548
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2380
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3212
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2056
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3068
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4304
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4680
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1264
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:408
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1576
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:220
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4120
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1624
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3096
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2364
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2108
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4436
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:812
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2328
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4188
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4804
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3000
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1648
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4608
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1220
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1408
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3664
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1156
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4652
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2092
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2224
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4836
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3140
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2200
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3280
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3780
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:448
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:5036
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1872
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4532
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1668
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3756
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3548
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1200
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2184
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4128
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3180
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4524
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2652
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3148
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:408
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:224
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4564
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2616
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3412
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1236
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:5112
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4772
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1324
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2108
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:884
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3492
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3196
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4620
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4884
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4188
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4804
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3488
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3016
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2736
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3988
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3664
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1948
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1652
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4760
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4456
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2368
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1744
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:8
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3400
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2312
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
97KB
MD51c0f5afba06355ef242cd0ecc1e880c1
SHA16149d9f7cbbeecf65a5a83bb474a8b5ee28efb52
SHA256d8c4a82e69d87d9e5a2cc5fad5e47854104df2d6989efc6685c348c3128fa061
SHA512c98fe4f714279452785ffda24956b19e99dc006cf5ba537ff8b125bfb6957765dd9cfac5156d4589220ddb09286985a1260c898683eb6bd7ff8cfa2e6394e3f9