Malware Analysis Report

2025-04-13 23:14

Sample ID 240723-bfebvsydjf
Target 658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118
SHA256 0f75723047e0c8fcd31f2c51ecf0ec3b920fa39ebaa2c9ab2c38a33c3e6878c8
Tags
themida darkcomet defeult evasion persistence rat trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

0f75723047e0c8fcd31f2c51ecf0ec3b920fa39ebaa2c9ab2c38a33c3e6878c8

Threat Level: Known bad

The file 658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

themida darkcomet defeult evasion persistence rat trojan

Darkcomet

Modifies WinLogon for persistence

Drops file in Drivers directory

Identifies Wine through registry keys

Deletes itself

Executes dropped EXE

Checks computer location settings

Themida packer

Loads dropped DLL

Adds Run key to start application

Suspicious use of NtSetInformationThreadHideFromDebugger

Drops file in System32 directory

Unsigned PE

Enumerates physical storage devices

Modifies registry class

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-07-23 01:04

Signatures

Themida packer

themida
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-07-23 01:04

Reported

2024-07-23 02:15

Platform

win7-20240705-en

Max time kernel

121s

Max time network

122s

Command Line

"C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe"

Signatures

Darkcomet

trojan rat darkcomet

Modifies WinLogon for persistence

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe" C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe" C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe" C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe" C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe" C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe" C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe" C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe" C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe" C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe" C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe" C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe" C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe" C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe" C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe" C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe" C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe" C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe" C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe" C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe" C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe" C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A

Drops file in Drivers directory

Description Indicator Process Target
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A

Deletes itself

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\notepad.exe N/A

Identifies Wine through registry keys

evasion
Description Indicator Process Target
Key opened \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Wine C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Wine C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Wine C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Wine C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Wine C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Wine C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Wine C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Wine C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Wine C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Wine C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Wine C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Wine C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Wine C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Wine C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Wine C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Wine C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Wine C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Wine C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Wine C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Wine C:\Windows\SysWOW64\MSDCSC\crss.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A

Themida packer

themida
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\crss = "C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe" C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\crss = "C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe" C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\crss = "C:\\Windows\\system32\\MSDCSC\\crss.exe" C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\crss = "C:\\Windows\\system32\\MSDCSC\\crss.exe" C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\crss = "C:\\Windows\\system32\\MSDCSC\\crss.exe" C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\crss = "C:\\Windows\\system32\\MSDCSC\\crss.exe" C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\crss = "C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe" C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\crss = "C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe" C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\crss = "C:\\Windows\\system32\\MSDCSC\\crss.exe" C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\crss = "C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe" C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\crss = "C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe" C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\crss = "C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe" C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\crss = "C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe" C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\crss = "C:\\Windows\\system32\\MSDCSC\\crss.exe" C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\crss = "C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe" C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\crss = "C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe" C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\crss = "C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe" C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\crss = "C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe" C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\crss = "C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe" C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\crss = "C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe" C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\crss = "C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe" C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
File created C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
File created C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
File created C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\ C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
File created C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
File created C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
File created C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
File created C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
File created C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\ C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
File created C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
File created C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
File created C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
File created C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
File created C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\ C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
File created C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\ C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\ C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
File created C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\ C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
File created C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
File created C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\ C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
File created C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\ C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\ C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\ C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
File created C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
File created C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\ C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
File created C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
File created C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\ C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
File created C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
File created C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
File created C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\ C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\ C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
File created C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
File created C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\ C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\ C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\ C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
Token: 34 N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
Token: 35 N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Token: SeImpersonatePrivilege N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Token: 33 N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Token: 34 N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Token: 35 N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2108 wrote to memory of 1296 N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 2108 wrote to memory of 1296 N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 2108 wrote to memory of 1296 N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 2108 wrote to memory of 1296 N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 2108 wrote to memory of 1296 N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 2108 wrote to memory of 1296 N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 2108 wrote to memory of 1296 N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 2108 wrote to memory of 1296 N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 2108 wrote to memory of 1296 N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 2108 wrote to memory of 1296 N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 2108 wrote to memory of 1296 N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 2108 wrote to memory of 1296 N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 2108 wrote to memory of 1296 N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 2108 wrote to memory of 1296 N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 2108 wrote to memory of 1296 N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 2108 wrote to memory of 1296 N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 2108 wrote to memory of 1296 N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 2108 wrote to memory of 1296 N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 2108 wrote to memory of 2764 N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe C:\Windows\SysWOW64\MSDCSC\crss.exe
PID 2108 wrote to memory of 2764 N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe C:\Windows\SysWOW64\MSDCSC\crss.exe
PID 2108 wrote to memory of 2764 N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe C:\Windows\SysWOW64\MSDCSC\crss.exe
PID 2108 wrote to memory of 2764 N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe C:\Windows\SysWOW64\MSDCSC\crss.exe
PID 2764 wrote to memory of 2956 N/A C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 2764 wrote to memory of 2956 N/A C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 2764 wrote to memory of 2956 N/A C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 2764 wrote to memory of 2956 N/A C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 2764 wrote to memory of 2956 N/A C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 2764 wrote to memory of 2956 N/A C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 2764 wrote to memory of 2956 N/A C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 2764 wrote to memory of 2956 N/A C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 2764 wrote to memory of 2956 N/A C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 2764 wrote to memory of 2956 N/A C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 2764 wrote to memory of 2956 N/A C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 2764 wrote to memory of 2956 N/A C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 2764 wrote to memory of 2956 N/A C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 2764 wrote to memory of 2956 N/A C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 2764 wrote to memory of 2956 N/A C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 2764 wrote to memory of 2956 N/A C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 2764 wrote to memory of 2956 N/A C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 2764 wrote to memory of 2956 N/A C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 2764 wrote to memory of 320 N/A C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe
PID 2764 wrote to memory of 320 N/A C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe
PID 2764 wrote to memory of 320 N/A C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe
PID 2764 wrote to memory of 320 N/A C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe
PID 320 wrote to memory of 1760 N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 320 wrote to memory of 1760 N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 320 wrote to memory of 1760 N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 320 wrote to memory of 1760 N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 320 wrote to memory of 1760 N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 320 wrote to memory of 1760 N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 320 wrote to memory of 1760 N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 320 wrote to memory of 1760 N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 320 wrote to memory of 1760 N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 320 wrote to memory of 1760 N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 320 wrote to memory of 1760 N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 320 wrote to memory of 1760 N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 320 wrote to memory of 1760 N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 320 wrote to memory of 1760 N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 320 wrote to memory of 1760 N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 320 wrote to memory of 1760 N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 320 wrote to memory of 1760 N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 320 wrote to memory of 1760 N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 320 wrote to memory of 2228 N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe
PID 320 wrote to memory of 2228 N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe

Processes

C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe"

C:\Windows\SysWOW64\notepad.exe

notepad

C:\Windows\SysWOW64\MSDCSC\crss.exe

"C:\Windows\system32\MSDCSC\crss.exe"

C:\Windows\SysWOW64\notepad.exe

notepad

C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe

"C:\Windows\system32\MSDCSC\jdDHAcgEiQiK\crss.exe"

C:\Windows\SysWOW64\notepad.exe

notepad

C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe

"C:\Windows\system32\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe"

C:\Windows\SysWOW64\notepad.exe

notepad

C:\Windows\SysWOW64\MSDCSC\crss.exe

"C:\Windows\system32\MSDCSC\crss.exe"

C:\Windows\SysWOW64\notepad.exe

notepad

C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe

"C:\Windows\system32\MSDCSC\jdDHAcgEiQiK\crss.exe"

C:\Windows\SysWOW64\notepad.exe

notepad

C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe

"C:\Windows\system32\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe"

C:\Windows\SysWOW64\notepad.exe

notepad

C:\Windows\SysWOW64\MSDCSC\crss.exe

"C:\Windows\system32\MSDCSC\crss.exe"

C:\Windows\SysWOW64\notepad.exe

notepad

C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe

"C:\Windows\system32\MSDCSC\jdDHAcgEiQiK\crss.exe"

C:\Windows\SysWOW64\notepad.exe

notepad

C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe

"C:\Windows\system32\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe"

C:\Windows\SysWOW64\notepad.exe

notepad

C:\Windows\SysWOW64\MSDCSC\crss.exe

"C:\Windows\system32\MSDCSC\crss.exe"

C:\Windows\SysWOW64\notepad.exe

notepad

C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe

"C:\Windows\system32\MSDCSC\jdDHAcgEiQiK\crss.exe"

C:\Windows\SysWOW64\notepad.exe

notepad

C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe

"C:\Windows\system32\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe"

C:\Windows\SysWOW64\notepad.exe

notepad

C:\Windows\SysWOW64\MSDCSC\crss.exe

"C:\Windows\system32\MSDCSC\crss.exe"

C:\Windows\SysWOW64\notepad.exe

notepad

C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe

"C:\Windows\system32\MSDCSC\jdDHAcgEiQiK\crss.exe"

C:\Windows\SysWOW64\notepad.exe

notepad

C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe

"C:\Windows\system32\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe"

C:\Windows\SysWOW64\notepad.exe

notepad

C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe

"C:\Windows\system32\MSDCSC\jdDHAcgEiQiK\crss.exe"

C:\Windows\SysWOW64\notepad.exe

notepad

C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe

"C:\Windows\system32\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe"

C:\Windows\SysWOW64\notepad.exe

notepad

C:\Windows\SysWOW64\MSDCSC\crss.exe

"C:\Windows\system32\MSDCSC\crss.exe"

C:\Windows\SysWOW64\notepad.exe

notepad

C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe

"C:\Windows\system32\MSDCSC\jdDHAcgEiQiK\crss.exe"

C:\Windows\SysWOW64\notepad.exe

notepad

C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe

"C:\Windows\system32\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe"

C:\Windows\SysWOW64\notepad.exe

notepad

Network

N/A

Files

memory/2108-0-0x0000000000400000-0x0000000000668000-memory.dmp

memory/2108-1-0x0000000000401000-0x0000000000450000-memory.dmp

memory/2108-22-0x0000000000400000-0x0000000000668000-memory.dmp

memory/1296-21-0x0000000000190000-0x0000000000191000-memory.dmp

memory/1296-6-0x0000000000080000-0x0000000000081000-memory.dmp

memory/2108-5-0x0000000000400000-0x0000000000668000-memory.dmp

\Windows\SysWOW64\MSDCSC\crss.exe

MD5 658988f2b817b216bc2e5d6fc4a2d189
SHA1 6bddb74ac5f44bf9576e07894209e27cdf41600f
SHA256 0f75723047e0c8fcd31f2c51ecf0ec3b920fa39ebaa2c9ab2c38a33c3e6878c8
SHA512 c45223591741115ae827470cdd1c26c635ebe50b883e0917fe40e1b4ffe62d41691eebb977acbcbb434b4b1647ab5fb1af0ad9d28cc1eccd5df2a493c36baf9c

memory/2108-32-0x0000000006AC0000-0x0000000006D28000-memory.dmp

memory/2108-31-0x0000000006AC0000-0x0000000006D28000-memory.dmp

memory/2764-34-0x0000000000400000-0x0000000000668000-memory.dmp

C:\Windows\system32\drivers\etc\hosts

MD5 857b6bb99a59c5b78f9dd2b9c2dc31e5
SHA1 05a01f96173511d1a25fb77f06e4d5f99b9f7c48
SHA256 f54f3c669bd072ba2107b0ea6233de465dd283f8c50f47e662729c766fb644ac
SHA512 047ff5edecc5c31661e540fc5e84616ba2f841482237336fb228887eb8cfabf696f663cf0da8762337e17b97f76688c64454793afc9ffb4a4e6cb005d795f68b

memory/320-81-0x0000000000400000-0x0000000000668000-memory.dmp

memory/2764-80-0x0000000000400000-0x0000000000668000-memory.dmp

memory/2764-79-0x0000000007130000-0x0000000007398000-memory.dmp

\??\PIPE\srvsvc

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

memory/2228-128-0x0000000000400000-0x0000000000668000-memory.dmp

memory/320-126-0x0000000000400000-0x0000000000668000-memory.dmp

memory/2228-172-0x0000000000400000-0x0000000000668000-memory.dmp

memory/2012-218-0x0000000000400000-0x0000000000668000-memory.dmp

memory/2632-220-0x0000000000400000-0x0000000000668000-memory.dmp

memory/2632-265-0x0000000000400000-0x0000000000668000-memory.dmp

memory/1880-312-0x0000000000400000-0x0000000000668000-memory.dmp

memory/2560-309-0x0000000000400000-0x0000000000668000-memory.dmp

memory/320-310-0x0000000006D10000-0x0000000006F78000-memory.dmp

memory/1164-358-0x0000000000400000-0x0000000000668000-memory.dmp

memory/1880-356-0x0000000000400000-0x0000000000668000-memory.dmp

memory/3068-405-0x0000000000400000-0x0000000000668000-memory.dmp

memory/1164-404-0x0000000000400000-0x0000000000668000-memory.dmp

memory/3068-448-0x0000000006DC0000-0x0000000007028000-memory.dmp

memory/2916-451-0x0000000000400000-0x0000000000668000-memory.dmp

memory/2916-499-0x0000000006D40000-0x0000000006FA8000-memory.dmp

memory/2916-498-0x0000000000400000-0x0000000000668000-memory.dmp

memory/2916-497-0x0000000006D40000-0x0000000006FA8000-memory.dmp

memory/2616-543-0x0000000000400000-0x0000000000668000-memory.dmp

memory/1288-545-0x0000000000400000-0x0000000000668000-memory.dmp

memory/1288-585-0x0000000006E30000-0x0000000007098000-memory.dmp

memory/1824-589-0x0000000000400000-0x0000000000668000-memory.dmp

memory/3068-588-0x0000000000400000-0x0000000000668000-memory.dmp

memory/1288-587-0x0000000006E30000-0x0000000007098000-memory.dmp

memory/1288-586-0x0000000000400000-0x0000000000668000-memory.dmp

memory/1824-630-0x0000000000400000-0x0000000000668000-memory.dmp

memory/1824-629-0x0000000006DC0000-0x0000000007028000-memory.dmp

memory/2916-900-0x0000000006D40000-0x0000000006FA8000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-07-23 01:04

Reported

2024-07-23 02:15

Platform

win10v2004-20240709-en

Max time kernel

149s

Max time network

142s

Command Line

"C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe"

Signatures

Darkcomet

trojan rat darkcomet

Modifies WinLogon for persistence

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe" C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe" C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe" C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe" C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe" C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe" C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe" C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe" C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe" C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe" C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe" C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe" C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe" C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe" C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe" C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe" C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe" C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe" C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe,C:\\Windows\\system32\\MSDCSC\\crss.exe" C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A

Drops file in Drivers directory

Description Indicator Process Target
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\International\Geo\Nation C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\International\Geo\Nation C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\International\Geo\Nation C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\International\Geo\Nation C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\International\Geo\Nation C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\International\Geo\Nation C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\International\Geo\Nation C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\International\Geo\Nation C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\International\Geo\Nation C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\International\Geo\Nation C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\International\Geo\Nation C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\International\Geo\Nation C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\International\Geo\Nation C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\International\Geo\Nation C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\International\Geo\Nation C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\International\Geo\Nation C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\International\Geo\Nation C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\International\Geo\Nation C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A

Deletes itself

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\notepad.exe N/A

Identifies Wine through registry keys

evasion
Description Indicator Process Target
Key opened \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Software\Wine C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Software\Wine C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Software\Wine C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Software\Wine C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Software\Wine C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Software\Wine C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Software\Wine C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Software\Wine C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Software\Wine C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Software\Wine C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Software\Wine C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Software\Wine C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Software\Wine C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Software\Wine C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Software\Wine C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Software\Wine C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Software\Wine C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Software\Wine C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A

Themida packer

themida
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\crss = "C:\\Windows\\system32\\MSDCSC\\crss.exe" C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\crss = "C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe" C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\crss = "C:\\Windows\\system32\\MSDCSC\\crss.exe" C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\crss = "C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe" C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\crss = "C:\\Windows\\system32\\MSDCSC\\crss.exe" C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\crss = "C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe" C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\crss = "C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe" C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\crss = "C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe" C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\crss = "C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe" C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\crss = "C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe" C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\crss = "C:\\Windows\\system32\\MSDCSC\\crss.exe" C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\crss = "C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe" C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\crss = "C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe" C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\crss = "C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe" C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\crss = "C:\\Windows\\system32\\MSDCSC\\crss.exe" C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\crss = "C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\crss.exe" C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\crss = "C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe" C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\crss = "C:\\Windows\\system32\\MSDCSC\\jdDHAcgEiQiK\\jdDHAcgEiQiK\\crss.exe" C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\crss = "C:\\Windows\\system32\\MSDCSC\\crss.exe" C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
File created C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\ C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
File created C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
File created C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\ C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
File created C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
File created C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\ C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
File created C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
File created C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\ C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\ C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\ C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
File created C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
File created C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\ C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
File created C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
File created C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\ C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\ C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
File created C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
File created C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
File created C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
File created C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\ C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\ C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
File created C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
File created C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
File created C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\ C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
File created C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\ C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\ C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
File created C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
File created C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\ C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\ C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\ C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
File created C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
File created C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
File created C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
File created C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
File created C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
File created C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
File created C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\ C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Windows\SysWOW64\MSDCSC\crss.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A
N/A N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
Token: 34 N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
Token: 35 N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
Token: 36 N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Token: SeImpersonatePrivilege N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Token: 33 N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Token: 34 N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Token: 35 N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Token: 36 N/A C:\Windows\SysWOW64\MSDCSC\crss.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3756 wrote to memory of 1360 N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 3756 wrote to memory of 1360 N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 3756 wrote to memory of 1360 N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 3756 wrote to memory of 1360 N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 3756 wrote to memory of 1360 N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 3756 wrote to memory of 1360 N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 3756 wrote to memory of 1360 N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 3756 wrote to memory of 1360 N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 3756 wrote to memory of 1360 N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 3756 wrote to memory of 1360 N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 3756 wrote to memory of 1360 N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 3756 wrote to memory of 1360 N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 3756 wrote to memory of 1360 N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 3756 wrote to memory of 1360 N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 3756 wrote to memory of 1360 N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 3756 wrote to memory of 1360 N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 3756 wrote to memory of 1360 N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 3756 wrote to memory of 4756 N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe C:\Windows\SysWOW64\MSDCSC\crss.exe
PID 3756 wrote to memory of 4756 N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe C:\Windows\SysWOW64\MSDCSC\crss.exe
PID 3756 wrote to memory of 4756 N/A C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe C:\Windows\SysWOW64\MSDCSC\crss.exe
PID 4756 wrote to memory of 4692 N/A C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 4756 wrote to memory of 4692 N/A C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 4756 wrote to memory of 4692 N/A C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 4756 wrote to memory of 4692 N/A C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 4756 wrote to memory of 4692 N/A C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 4756 wrote to memory of 4692 N/A C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 4756 wrote to memory of 4692 N/A C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 4756 wrote to memory of 4692 N/A C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 4756 wrote to memory of 4692 N/A C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 4756 wrote to memory of 4692 N/A C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 4756 wrote to memory of 4692 N/A C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 4756 wrote to memory of 4692 N/A C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 4756 wrote to memory of 4692 N/A C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 4756 wrote to memory of 4692 N/A C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 4756 wrote to memory of 4692 N/A C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 4756 wrote to memory of 4692 N/A C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 4756 wrote to memory of 4692 N/A C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 4756 wrote to memory of 4588 N/A C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe
PID 4756 wrote to memory of 4588 N/A C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe
PID 4756 wrote to memory of 4588 N/A C:\Windows\SysWOW64\MSDCSC\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe
PID 4588 wrote to memory of 2796 N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 4588 wrote to memory of 2796 N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 4588 wrote to memory of 2796 N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 4588 wrote to memory of 2796 N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 4588 wrote to memory of 2796 N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 4588 wrote to memory of 2796 N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 4588 wrote to memory of 2796 N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 4588 wrote to memory of 2796 N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 4588 wrote to memory of 2796 N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 4588 wrote to memory of 2796 N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 4588 wrote to memory of 2796 N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 4588 wrote to memory of 2796 N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 4588 wrote to memory of 2796 N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 4588 wrote to memory of 2796 N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 4588 wrote to memory of 2796 N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 4588 wrote to memory of 2796 N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 4588 wrote to memory of 2796 N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 4588 wrote to memory of 4408 N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe
PID 4588 wrote to memory of 4408 N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe
PID 4588 wrote to memory of 4408 N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe
PID 4408 wrote to memory of 4964 N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 4408 wrote to memory of 4964 N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 4408 wrote to memory of 4964 N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\notepad.exe
PID 4408 wrote to memory of 4964 N/A C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe C:\Windows\SysWOW64\notepad.exe

Processes

C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\658988f2b817b216bc2e5d6fc4a2d189_JaffaCakes118.exe"

C:\Windows\SysWOW64\notepad.exe

notepad

C:\Windows\SysWOW64\MSDCSC\crss.exe

"C:\Windows\system32\MSDCSC\crss.exe"

C:\Windows\SysWOW64\notepad.exe

notepad

C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe

"C:\Windows\system32\MSDCSC\jdDHAcgEiQiK\crss.exe"

C:\Windows\SysWOW64\notepad.exe

notepad

C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe

"C:\Windows\system32\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe"

C:\Windows\SysWOW64\notepad.exe

notepad

C:\Windows\SysWOW64\MSDCSC\crss.exe

"C:\Windows\system32\MSDCSC\crss.exe"

C:\Windows\SysWOW64\notepad.exe

notepad

C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe

"C:\Windows\system32\MSDCSC\jdDHAcgEiQiK\crss.exe"

C:\Windows\SysWOW64\notepad.exe

notepad

C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe

"C:\Windows\system32\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe"

C:\Windows\SysWOW64\notepad.exe

notepad

C:\Windows\SysWOW64\MSDCSC\crss.exe

"C:\Windows\system32\MSDCSC\crss.exe"

C:\Windows\SysWOW64\notepad.exe

notepad

C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe

"C:\Windows\system32\MSDCSC\jdDHAcgEiQiK\crss.exe"

C:\Windows\SysWOW64\notepad.exe

notepad

C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe

"C:\Windows\system32\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe"

C:\Windows\SysWOW64\notepad.exe

notepad

C:\Windows\SysWOW64\MSDCSC\crss.exe

"C:\Windows\system32\MSDCSC\crss.exe"

C:\Windows\SysWOW64\notepad.exe

notepad

C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe

"C:\Windows\system32\MSDCSC\jdDHAcgEiQiK\crss.exe"

C:\Windows\SysWOW64\notepad.exe

notepad

C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe

"C:\Windows\system32\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe"

C:\Windows\SysWOW64\notepad.exe

notepad

C:\Windows\SysWOW64\MSDCSC\crss.exe

"C:\Windows\system32\MSDCSC\crss.exe"

C:\Windows\SysWOW64\notepad.exe

notepad

C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe

"C:\Windows\system32\MSDCSC\jdDHAcgEiQiK\crss.exe"

C:\Windows\SysWOW64\notepad.exe

notepad

C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe

"C:\Windows\system32\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe"

C:\Windows\SysWOW64\notepad.exe

notepad

C:\Windows\SysWOW64\MSDCSC\crss.exe

"C:\Windows\system32\MSDCSC\crss.exe"

C:\Windows\SysWOW64\notepad.exe

notepad

C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\crss.exe

"C:\Windows\system32\MSDCSC\jdDHAcgEiQiK\crss.exe"

C:\Windows\SysWOW64\notepad.exe

notepad

C:\Windows\SysWOW64\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe

"C:\Windows\system32\MSDCSC\jdDHAcgEiQiK\jdDHAcgEiQiK\crss.exe"

C:\Windows\SysWOW64\notepad.exe

notepad

Network

Country Destination Domain Proto
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 64.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 75.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 205.47.74.20.in-addr.arpa udp
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 20.58.20.217.in-addr.arpa udp
US 8.8.8.8:53 57.169.31.20.in-addr.arpa udp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 10.28.171.150.in-addr.arpa udp

Files

memory/3756-0-0x0000000000400000-0x0000000000668000-memory.dmp

memory/3756-1-0x0000000000401000-0x0000000000450000-memory.dmp

memory/3756-2-0x0000000000400000-0x0000000000668000-memory.dmp

memory/1360-6-0x0000000001390000-0x0000000001391000-memory.dmp

memory/3756-7-0x0000000000400000-0x0000000000668000-memory.dmp

memory/3756-8-0x0000000000400000-0x0000000000668000-memory.dmp

C:\Windows\SysWOW64\MSDCSC\crss.exe

MD5 658988f2b817b216bc2e5d6fc4a2d189
SHA1 6bddb74ac5f44bf9576e07894209e27cdf41600f
SHA256 0f75723047e0c8fcd31f2c51ecf0ec3b920fa39ebaa2c9ab2c38a33c3e6878c8
SHA512 c45223591741115ae827470cdd1c26c635ebe50b883e0917fe40e1b4ffe62d41691eebb977acbcbb434b4b1647ab5fb1af0ad9d28cc1eccd5df2a493c36baf9c

memory/4756-68-0x0000000000400000-0x0000000000668000-memory.dmp

memory/4756-69-0x0000000000401000-0x0000000000450000-memory.dmp

C:\Windows\system32\drivers\etc\hosts

MD5 857b6bb99a59c5b78f9dd2b9c2dc31e5
SHA1 05a01f96173511d1a25fb77f06e4d5f99b9f7c48
SHA256 f54f3c669bd072ba2107b0ea6233de465dd283f8c50f47e662729c766fb644ac
SHA512 047ff5edecc5c31661e540fc5e84616ba2f841482237336fb228887eb8cfabf696f663cf0da8762337e17b97f76688c64454793afc9ffb4a4e6cb005d795f68b

memory/4756-71-0x0000000000400000-0x0000000000668000-memory.dmp

memory/4756-70-0x0000000000400000-0x0000000000668000-memory.dmp

memory/4756-77-0x0000000000400000-0x0000000000668000-memory.dmp

memory/4588-137-0x0000000000400000-0x0000000000668000-memory.dmp

memory/4588-203-0x0000000000400000-0x0000000000668000-memory.dmp

memory/4408-204-0x0000000000400000-0x0000000000668000-memory.dmp

memory/4920-270-0x0000000000400000-0x0000000000668000-memory.dmp

memory/4408-269-0x0000000000400000-0x0000000000668000-memory.dmp

memory/4920-336-0x0000000000400000-0x0000000000668000-memory.dmp

memory/1668-337-0x0000000000400000-0x0000000000668000-memory.dmp

memory/1168-404-0x0000000000400000-0x0000000000668000-memory.dmp

memory/1668-403-0x0000000000400000-0x0000000000668000-memory.dmp

memory/1168-470-0x0000000000400000-0x0000000000668000-memory.dmp

memory/4500-536-0x0000000000400000-0x0000000000668000-memory.dmp

memory/912-537-0x0000000000400000-0x0000000000668000-memory.dmp

memory/912-603-0x0000000000400000-0x0000000000668000-memory.dmp

memory/1204-604-0x0000000000400000-0x0000000000668000-memory.dmp

memory/1204-669-0x0000000000400000-0x0000000000668000-memory.dmp

memory/1948-737-0x0000000000400000-0x0000000000668000-memory.dmp

memory/2432-736-0x0000000000400000-0x0000000000668000-memory.dmp

memory/1948-802-0x0000000000400000-0x0000000000668000-memory.dmp

memory/4624-868-0x0000000000400000-0x0000000000668000-memory.dmp

memory/4852-869-0x0000000000400000-0x0000000000668000-memory.dmp

memory/4852-935-0x0000000000400000-0x0000000000668000-memory.dmp

memory/4580-936-0x0000000000400000-0x0000000000668000-memory.dmp

memory/4580-1002-0x0000000000400000-0x0000000000668000-memory.dmp

memory/2492-1068-0x0000000000400000-0x0000000000668000-memory.dmp

memory/4416-1135-0x0000000000400000-0x0000000000668000-memory.dmp

memory/1576-1133-0x0000000000400000-0x0000000000668000-memory.dmp

memory/1576-1198-0x0000000000400000-0x0000000000668000-memory.dmp

memory/4480-1210-0x0000000000400000-0x0000000000668000-memory.dmp