Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2024, 06:19
Static task
static1
Behavioral task
behavioral1
Sample
2b4846bc9f043bf38cd4e36fb852e48d_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2b4846bc9f043bf38cd4e36fb852e48d_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2b4846bc9f043bf38cd4e36fb852e48d_JaffaCakes118.exe
-
Size
672KB
-
MD5
2b4846bc9f043bf38cd4e36fb852e48d
-
SHA1
73d54a031225e308691deb2a573816ad80b1e12e
-
SHA256
a840a47e67040c1070022d4bf772e2b0a7bf3b6b9856a2bff66df7cd0601b549
-
SHA512
cc021a277ff3ba5b906d0dd9580cd83a7e8fb13cff3bc8494f3b984d59190e7757dae8195a62aac869ac03609a8ddcef51df1b8ebbaa1542e9484d6d5934e1bc
-
SSDEEP
12288:7vehvlYuXb6cK4QJrr186amIWge+RCQdyIMA65xUlNqRC+NSK:7vehviuXbZKXJrr186amIWgVRFyIMX5h
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\userinit.exe" userinit.exe -
Executes dropped EXE 64 IoCs
pid Process 4812 userinit.exe 5116 system.exe 2084 system.exe 1780 system.exe 2588 system.exe 4288 system.exe 4964 system.exe 3432 system.exe 1192 system.exe 3868 system.exe 748 system.exe 1672 system.exe 1784 system.exe 2492 system.exe 5088 system.exe 2164 system.exe 2240 system.exe 944 system.exe 4408 system.exe 4080 system.exe 408 system.exe 4272 system.exe 1832 system.exe 3440 system.exe 1812 system.exe 2604 system.exe 4940 system.exe 4828 system.exe 3124 system.exe 1668 system.exe 4560 system.exe 4420 system.exe 2488 system.exe 1956 system.exe 2664 system.exe 4688 system.exe 1820 system.exe 2836 system.exe 5116 system.exe 5080 system.exe 3140 system.exe 1816 system.exe 2380 system.exe 748 system.exe 4604 system.exe 2228 system.exe 4684 system.exe 2040 system.exe 1096 system.exe 3952 system.exe 4016 system.exe 1536 system.exe 2736 system.exe 1044 system.exe 1300 system.exe 3128 system.exe 2044 system.exe 3672 system.exe 1180 system.exe 4412 system.exe 3464 system.exe 3080 system.exe 4916 system.exe 3764 system.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\system.exe userinit.exe File opened for modification C:\Windows\SysWOW64\system.exe userinit.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\userinit.exe 2b4846bc9f043bf38cd4e36fb852e48d_JaffaCakes118.exe File opened for modification C:\Windows\userinit.exe 2b4846bc9f043bf38cd4e36fb852e48d_JaffaCakes118.exe File created C:\Windows\kdcoms.dll userinit.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3040 2b4846bc9f043bf38cd4e36fb852e48d_JaffaCakes118.exe 3040 2b4846bc9f043bf38cd4e36fb852e48d_JaffaCakes118.exe 4812 userinit.exe 4812 userinit.exe 4812 userinit.exe 4812 userinit.exe 5116 system.exe 5116 system.exe 4812 userinit.exe 4812 userinit.exe 2084 system.exe 2084 system.exe 4812 userinit.exe 4812 userinit.exe 1780 system.exe 1780 system.exe 4812 userinit.exe 4812 userinit.exe 2588 system.exe 2588 system.exe 4812 userinit.exe 4812 userinit.exe 4288 system.exe 4288 system.exe 4812 userinit.exe 4812 userinit.exe 4964 system.exe 4964 system.exe 4812 userinit.exe 4812 userinit.exe 3432 system.exe 3432 system.exe 4812 userinit.exe 4812 userinit.exe 1192 system.exe 1192 system.exe 4812 userinit.exe 4812 userinit.exe 3868 system.exe 3868 system.exe 4812 userinit.exe 4812 userinit.exe 748 system.exe 748 system.exe 4812 userinit.exe 4812 userinit.exe 1672 system.exe 1672 system.exe 4812 userinit.exe 4812 userinit.exe 1784 system.exe 1784 system.exe 4812 userinit.exe 4812 userinit.exe 2492 system.exe 2492 system.exe 4812 userinit.exe 4812 userinit.exe 5088 system.exe 5088 system.exe 4812 userinit.exe 4812 userinit.exe 2164 system.exe 2164 system.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4812 userinit.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 3040 2b4846bc9f043bf38cd4e36fb852e48d_JaffaCakes118.exe 3040 2b4846bc9f043bf38cd4e36fb852e48d_JaffaCakes118.exe 4812 userinit.exe 4812 userinit.exe 5116 system.exe 5116 system.exe 2084 system.exe 2084 system.exe 1780 system.exe 1780 system.exe 2588 system.exe 2588 system.exe 4288 system.exe 4288 system.exe 4964 system.exe 4964 system.exe 3432 system.exe 3432 system.exe 1192 system.exe 1192 system.exe 3868 system.exe 3868 system.exe 748 system.exe 748 system.exe 1672 system.exe 1672 system.exe 1784 system.exe 1784 system.exe 2492 system.exe 2492 system.exe 5088 system.exe 5088 system.exe 2164 system.exe 2164 system.exe 2240 system.exe 2240 system.exe 944 system.exe 944 system.exe 4408 system.exe 4408 system.exe 4080 system.exe 4080 system.exe 408 system.exe 408 system.exe 4272 system.exe 4272 system.exe 1832 system.exe 1832 system.exe 3440 system.exe 3440 system.exe 1812 system.exe 1812 system.exe 2604 system.exe 2604 system.exe 4940 system.exe 4940 system.exe 4828 system.exe 4828 system.exe 3124 system.exe 3124 system.exe 1668 system.exe 1668 system.exe 4560 system.exe 4560 system.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3040 wrote to memory of 4812 3040 2b4846bc9f043bf38cd4e36fb852e48d_JaffaCakes118.exe 83 PID 3040 wrote to memory of 4812 3040 2b4846bc9f043bf38cd4e36fb852e48d_JaffaCakes118.exe 83 PID 3040 wrote to memory of 4812 3040 2b4846bc9f043bf38cd4e36fb852e48d_JaffaCakes118.exe 83 PID 4812 wrote to memory of 5116 4812 userinit.exe 86 PID 4812 wrote to memory of 5116 4812 userinit.exe 86 PID 4812 wrote to memory of 5116 4812 userinit.exe 86 PID 4812 wrote to memory of 2084 4812 userinit.exe 87 PID 4812 wrote to memory of 2084 4812 userinit.exe 87 PID 4812 wrote to memory of 2084 4812 userinit.exe 87 PID 4812 wrote to memory of 1780 4812 userinit.exe 88 PID 4812 wrote to memory of 1780 4812 userinit.exe 88 PID 4812 wrote to memory of 1780 4812 userinit.exe 88 PID 4812 wrote to memory of 2588 4812 userinit.exe 89 PID 4812 wrote to memory of 2588 4812 userinit.exe 89 PID 4812 wrote to memory of 2588 4812 userinit.exe 89 PID 4812 wrote to memory of 4288 4812 userinit.exe 90 PID 4812 wrote to memory of 4288 4812 userinit.exe 90 PID 4812 wrote to memory of 4288 4812 userinit.exe 90 PID 4812 wrote to memory of 4964 4812 userinit.exe 91 PID 4812 wrote to memory of 4964 4812 userinit.exe 91 PID 4812 wrote to memory of 4964 4812 userinit.exe 91 PID 4812 wrote to memory of 3432 4812 userinit.exe 92 PID 4812 wrote to memory of 3432 4812 userinit.exe 92 PID 4812 wrote to memory of 3432 4812 userinit.exe 92 PID 4812 wrote to memory of 1192 4812 userinit.exe 93 PID 4812 wrote to memory of 1192 4812 userinit.exe 93 PID 4812 wrote to memory of 1192 4812 userinit.exe 93 PID 4812 wrote to memory of 3868 4812 userinit.exe 94 PID 4812 wrote to memory of 3868 4812 userinit.exe 94 PID 4812 wrote to memory of 3868 4812 userinit.exe 94 PID 4812 wrote to memory of 748 4812 userinit.exe 95 PID 4812 wrote to memory of 748 4812 userinit.exe 95 PID 4812 wrote to memory of 748 4812 userinit.exe 95 PID 4812 wrote to memory of 1672 4812 userinit.exe 96 PID 4812 wrote to memory of 1672 4812 userinit.exe 96 PID 4812 wrote to memory of 1672 4812 userinit.exe 96 PID 4812 wrote to memory of 1784 4812 userinit.exe 97 PID 4812 wrote to memory of 1784 4812 userinit.exe 97 PID 4812 wrote to memory of 1784 4812 userinit.exe 97 PID 4812 wrote to memory of 2492 4812 userinit.exe 98 PID 4812 wrote to memory of 2492 4812 userinit.exe 98 PID 4812 wrote to memory of 2492 4812 userinit.exe 98 PID 4812 wrote to memory of 5088 4812 userinit.exe 99 PID 4812 wrote to memory of 5088 4812 userinit.exe 99 PID 4812 wrote to memory of 5088 4812 userinit.exe 99 PID 4812 wrote to memory of 2164 4812 userinit.exe 100 PID 4812 wrote to memory of 2164 4812 userinit.exe 100 PID 4812 wrote to memory of 2164 4812 userinit.exe 100 PID 4812 wrote to memory of 2240 4812 userinit.exe 101 PID 4812 wrote to memory of 2240 4812 userinit.exe 101 PID 4812 wrote to memory of 2240 4812 userinit.exe 101 PID 4812 wrote to memory of 944 4812 userinit.exe 102 PID 4812 wrote to memory of 944 4812 userinit.exe 102 PID 4812 wrote to memory of 944 4812 userinit.exe 102 PID 4812 wrote to memory of 4408 4812 userinit.exe 103 PID 4812 wrote to memory of 4408 4812 userinit.exe 103 PID 4812 wrote to memory of 4408 4812 userinit.exe 103 PID 4812 wrote to memory of 4080 4812 userinit.exe 104 PID 4812 wrote to memory of 4080 4812 userinit.exe 104 PID 4812 wrote to memory of 4080 4812 userinit.exe 104 PID 4812 wrote to memory of 408 4812 userinit.exe 105 PID 4812 wrote to memory of 408 4812 userinit.exe 105 PID 4812 wrote to memory of 408 4812 userinit.exe 105 PID 4812 wrote to memory of 4272 4812 userinit.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b4846bc9f043bf38cd4e36fb852e48d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2b4846bc9f043bf38cd4e36fb852e48d_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\userinit.exeC:\Windows\userinit.exe2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5116
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2084
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1780
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2588
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4288
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4964
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3432
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1192
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3868
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:748
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1672
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1784
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2492
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5088
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2164
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2240
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:944
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4408
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4080
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:408
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4272
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1832
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3440
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1812
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2604
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4940
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4828
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3124
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1668
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4560
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4420
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2488
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1956
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2664
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4688
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1820
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2836
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:5116
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:5080
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3140
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1816
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2380
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:748
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4604
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2228
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4684
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2040
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1096
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3952
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4016
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1536
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2736
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1044
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1300
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3128
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2044
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3672
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1180
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4412
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3464
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3080
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4916
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3764
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4760
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4376
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1916
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:608
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4580
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2916
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3428
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:5100
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4276
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2312
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:68
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2700
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2688
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1744
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2372
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:5048
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:784
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4452
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2560
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4288
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3980
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2228
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2492
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3064
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1096
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:392
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4012
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4104
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:876
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3456
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4988
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2416
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1480
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3128
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4084
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2468
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3888
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2976
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4556
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:5084
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3396
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1668
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:508
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1160
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3024
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3112
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3624
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2488
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:608
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4688
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1164
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2836
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4600
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4960
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4340
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:624
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3160
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4784
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1816
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2536
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1928
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3772
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2180
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2612
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1016
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3648
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2252
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3012
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1944
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1396
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4016
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4708
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1692
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:408
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1316
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3756
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1300
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
672KB
MD52b4846bc9f043bf38cd4e36fb852e48d
SHA173d54a031225e308691deb2a573816ad80b1e12e
SHA256a840a47e67040c1070022d4bf772e2b0a7bf3b6b9856a2bff66df7cd0601b549
SHA512cc021a277ff3ba5b906d0dd9580cd83a7e8fb13cff3bc8494f3b984d59190e7757dae8195a62aac869ac03609a8ddcef51df1b8ebbaa1542e9484d6d5934e1bc