Analysis
-
max time kernel
80s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/07/2024, 06:13
Static task
static1
Behavioral task
behavioral1
Sample
666f6ba2ae0d60cac389dc0b31a3a48e_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
666f6ba2ae0d60cac389dc0b31a3a48e_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
666f6ba2ae0d60cac389dc0b31a3a48e_JaffaCakes118.exe
-
Size
168KB
-
MD5
666f6ba2ae0d60cac389dc0b31a3a48e
-
SHA1
53698510eff3fd1f64a94f8f318defbf5c11614a
-
SHA256
b1af944422431cda23e69078563ac8613098a3e296ac401e2ddd2cbbbdddb192
-
SHA512
bc0dcaf3f49f7ae0c8b78ec95eeb64c0af6895e657ea961e40bb940f93ad14dd9dd6f1e641c346d0ff5d155241ed4c1ddb26b4c563a7833a70d2ab87fda8d1b0
-
SSDEEP
3072:+un3t/ZFvZWgQpYPpjwLkh66UxzU0a4X8hiQdKr55R:FZFvZNXwLkhdUH2aR
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 2800 wnpdxv.exe -
Executes dropped EXE 46 IoCs
pid Process 2944 wnpdxv.exe 2800 wnpdxv.exe 2768 wnpdxv.exe 2552 wnpdxv.exe 2100 wnpdxv.exe 1076 wnpdxv.exe 3004 wnpdxv.exe 2300 wnpdxv.exe 2996 wnpdxv.exe 572 wnpdxv.exe 2156 wnpdxv.exe 368 wnpdxv.exe 2424 wnpdxv.exe 2892 wnpdxv.exe 1756 wnpdxv.exe 2604 wnpdxv.exe 2016 wnpdxv.exe 1308 wnpdxv.exe 1700 wnpdxv.exe 1932 wnpdxv.exe 2612 wnpdxv.exe 2464 wnpdxv.exe 1888 wnpdxv.exe 2844 wnpdxv.exe 2784 wnpdxv.exe 2700 wnpdxv.exe 1176 wnpdxv.exe 3056 wnpdxv.exe 948 wnpdxv.exe 1692 wnpdxv.exe 1192 wnpdxv.exe 2756 wnpdxv.exe 1924 wnpdxv.exe 616 wnpdxv.exe 1912 wnpdxv.exe 2428 wnpdxv.exe 1616 wnpdxv.exe 608 wnpdxv.exe 2088 wnpdxv.exe 1448 wnpdxv.exe 848 wnpdxv.exe 2016 wnpdxv.exe 2112 wnpdxv.exe 1896 wnpdxv.exe 876 wnpdxv.exe 872 wnpdxv.exe -
Loads dropped DLL 47 IoCs
pid Process 1948 666f6ba2ae0d60cac389dc0b31a3a48e_JaffaCakes118.exe 1948 666f6ba2ae0d60cac389dc0b31a3a48e_JaffaCakes118.exe 2944 wnpdxv.exe 2800 wnpdxv.exe 2800 wnpdxv.exe 2552 wnpdxv.exe 2552 wnpdxv.exe 1076 wnpdxv.exe 1076 wnpdxv.exe 2300 wnpdxv.exe 2300 wnpdxv.exe 572 wnpdxv.exe 572 wnpdxv.exe 368 wnpdxv.exe 368 wnpdxv.exe 2892 wnpdxv.exe 2892 wnpdxv.exe 2604 wnpdxv.exe 2604 wnpdxv.exe 1308 wnpdxv.exe 1308 wnpdxv.exe 1932 wnpdxv.exe 1932 wnpdxv.exe 2464 wnpdxv.exe 2464 wnpdxv.exe 2844 wnpdxv.exe 2844 wnpdxv.exe 2700 wnpdxv.exe 2700 wnpdxv.exe 3056 wnpdxv.exe 3056 wnpdxv.exe 1692 wnpdxv.exe 1692 wnpdxv.exe 2756 wnpdxv.exe 2756 wnpdxv.exe 616 wnpdxv.exe 616 wnpdxv.exe 2428 wnpdxv.exe 2428 wnpdxv.exe 608 wnpdxv.exe 608 wnpdxv.exe 1448 wnpdxv.exe 1448 wnpdxv.exe 2016 wnpdxv.exe 2016 wnpdxv.exe 1896 wnpdxv.exe 1896 wnpdxv.exe -
resource yara_rule behavioral1/memory/1948-3-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1948-2-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1948-6-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1948-9-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1948-8-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1948-7-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1948-4-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1948-22-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2800-34-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2800-33-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2800-35-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2800-41-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2552-50-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2552-52-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2552-51-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2552-59-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1076-73-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2300-83-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2300-91-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/572-100-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/572-101-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/572-102-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/572-109-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/368-125-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2892-142-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2604-153-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2604-159-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1308-169-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1308-176-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1932-185-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1932-193-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2464-203-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2464-210-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2844-220-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2844-228-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2700-239-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2700-244-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/3056-254-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/3056-257-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1692-265-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1692-270-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2756-278-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2756-283-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/616-293-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/616-296-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2428-304-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2428-309-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/608-317-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/608-322-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1448-331-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1448-335-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2016-343-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2016-348-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1896-360-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/872-370-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/872-373-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2948-383-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/676-395-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2948-386-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2436-409-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/676-399-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2436-412-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2100-421-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2100-425-0x0000000000400000-0x0000000000468000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 48 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdxv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdxv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdxv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdxv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdxv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdxv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdxv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdxv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdxv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdxv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdxv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdxv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdxv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdxv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdxv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdxv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdxv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdxv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdxv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdxv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdxv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdxv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdxv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdxv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdxv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdxv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdxv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdxv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdxv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdxv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdxv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdxv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdxv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdxv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdxv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdxv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 666f6ba2ae0d60cac389dc0b31a3a48e_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 666f6ba2ae0d60cac389dc0b31a3a48e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdxv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdxv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdxv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdxv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdxv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdxv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdxv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdxv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdxv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdxv.exe -
Drops file in System32 directory 48 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wnpdxv.exe wnpdxv.exe File created C:\Windows\SysWOW64\wnpdxv.exe wnpdxv.exe File opened for modification C:\Windows\SysWOW64\wnpdxv.exe wnpdxv.exe File opened for modification C:\Windows\SysWOW64\wnpdxv.exe wnpdxv.exe File opened for modification C:\Windows\SysWOW64\wnpdxv.exe wnpdxv.exe File created C:\Windows\SysWOW64\wnpdxv.exe wnpdxv.exe File opened for modification C:\Windows\SysWOW64\wnpdxv.exe wnpdxv.exe File opened for modification C:\Windows\SysWOW64\wnpdxv.exe wnpdxv.exe File created C:\Windows\SysWOW64\wnpdxv.exe wnpdxv.exe File opened for modification C:\Windows\SysWOW64\wnpdxv.exe wnpdxv.exe File opened for modification C:\Windows\SysWOW64\wnpdxv.exe wnpdxv.exe File opened for modification C:\Windows\SysWOW64\wnpdxv.exe wnpdxv.exe File created C:\Windows\SysWOW64\wnpdxv.exe wnpdxv.exe File created C:\Windows\SysWOW64\wnpdxv.exe wnpdxv.exe File opened for modification C:\Windows\SysWOW64\wnpdxv.exe wnpdxv.exe File created C:\Windows\SysWOW64\wnpdxv.exe 666f6ba2ae0d60cac389dc0b31a3a48e_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wnpdxv.exe wnpdxv.exe File created C:\Windows\SysWOW64\wnpdxv.exe wnpdxv.exe File created C:\Windows\SysWOW64\wnpdxv.exe wnpdxv.exe File created C:\Windows\SysWOW64\wnpdxv.exe wnpdxv.exe File opened for modification C:\Windows\SysWOW64\wnpdxv.exe wnpdxv.exe File created C:\Windows\SysWOW64\wnpdxv.exe wnpdxv.exe File created C:\Windows\SysWOW64\wnpdxv.exe wnpdxv.exe File created C:\Windows\SysWOW64\wnpdxv.exe wnpdxv.exe File created C:\Windows\SysWOW64\wnpdxv.exe wnpdxv.exe File created C:\Windows\SysWOW64\wnpdxv.exe wnpdxv.exe File opened for modification C:\Windows\SysWOW64\wnpdxv.exe wnpdxv.exe File opened for modification C:\Windows\SysWOW64\wnpdxv.exe wnpdxv.exe File created C:\Windows\SysWOW64\wnpdxv.exe wnpdxv.exe File opened for modification C:\Windows\SysWOW64\wnpdxv.exe wnpdxv.exe File created C:\Windows\SysWOW64\wnpdxv.exe wnpdxv.exe File created C:\Windows\SysWOW64\wnpdxv.exe wnpdxv.exe File opened for modification C:\Windows\SysWOW64\wnpdxv.exe wnpdxv.exe File created C:\Windows\SysWOW64\wnpdxv.exe wnpdxv.exe File opened for modification C:\Windows\SysWOW64\wnpdxv.exe wnpdxv.exe File created C:\Windows\SysWOW64\wnpdxv.exe wnpdxv.exe File opened for modification C:\Windows\SysWOW64\wnpdxv.exe wnpdxv.exe File created C:\Windows\SysWOW64\wnpdxv.exe wnpdxv.exe File created C:\Windows\SysWOW64\wnpdxv.exe wnpdxv.exe File created C:\Windows\SysWOW64\wnpdxv.exe wnpdxv.exe File opened for modification C:\Windows\SysWOW64\wnpdxv.exe 666f6ba2ae0d60cac389dc0b31a3a48e_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wnpdxv.exe wnpdxv.exe File created C:\Windows\SysWOW64\wnpdxv.exe wnpdxv.exe File opened for modification C:\Windows\SysWOW64\wnpdxv.exe wnpdxv.exe File opened for modification C:\Windows\SysWOW64\wnpdxv.exe wnpdxv.exe File created C:\Windows\SysWOW64\wnpdxv.exe wnpdxv.exe File opened for modification C:\Windows\SysWOW64\wnpdxv.exe wnpdxv.exe File opened for modification C:\Windows\SysWOW64\wnpdxv.exe wnpdxv.exe -
Suspicious use of SetThreadContext 24 IoCs
description pid Process procid_target PID 2780 set thread context of 1948 2780 666f6ba2ae0d60cac389dc0b31a3a48e_JaffaCakes118.exe 30 PID 2944 set thread context of 2800 2944 wnpdxv.exe 32 PID 2768 set thread context of 2552 2768 wnpdxv.exe 34 PID 2100 set thread context of 1076 2100 wnpdxv.exe 36 PID 3004 set thread context of 2300 3004 wnpdxv.exe 38 PID 2996 set thread context of 572 2996 wnpdxv.exe 40 PID 2156 set thread context of 368 2156 wnpdxv.exe 42 PID 2424 set thread context of 2892 2424 wnpdxv.exe 44 PID 1756 set thread context of 2604 1756 wnpdxv.exe 46 PID 2016 set thread context of 1308 2016 wnpdxv.exe 48 PID 1700 set thread context of 1932 1700 wnpdxv.exe 50 PID 2612 set thread context of 2464 2612 wnpdxv.exe 52 PID 1888 set thread context of 2844 1888 wnpdxv.exe 54 PID 2784 set thread context of 2700 2784 wnpdxv.exe 56 PID 1176 set thread context of 3056 1176 wnpdxv.exe 58 PID 948 set thread context of 1692 948 wnpdxv.exe 60 PID 1192 set thread context of 2756 1192 wnpdxv.exe 62 PID 1924 set thread context of 616 1924 wnpdxv.exe 64 PID 1912 set thread context of 2428 1912 wnpdxv.exe 66 PID 1616 set thread context of 608 1616 wnpdxv.exe 68 PID 2088 set thread context of 1448 2088 wnpdxv.exe 70 PID 848 set thread context of 2016 848 wnpdxv.exe 72 PID 2112 set thread context of 1896 2112 wnpdxv.exe 74 PID 876 set thread context of 872 876 wnpdxv.exe 76 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 1948 666f6ba2ae0d60cac389dc0b31a3a48e_JaffaCakes118.exe 2800 wnpdxv.exe 2552 wnpdxv.exe 1076 wnpdxv.exe 2300 wnpdxv.exe 572 wnpdxv.exe 368 wnpdxv.exe 2892 wnpdxv.exe 2604 wnpdxv.exe 1308 wnpdxv.exe 1932 wnpdxv.exe 2464 wnpdxv.exe 2844 wnpdxv.exe 2700 wnpdxv.exe 3056 wnpdxv.exe 1692 wnpdxv.exe 2756 wnpdxv.exe 616 wnpdxv.exe 2428 wnpdxv.exe 608 wnpdxv.exe 1448 wnpdxv.exe 2016 wnpdxv.exe 1896 wnpdxv.exe 872 wnpdxv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2780 wrote to memory of 1948 2780 666f6ba2ae0d60cac389dc0b31a3a48e_JaffaCakes118.exe 30 PID 2780 wrote to memory of 1948 2780 666f6ba2ae0d60cac389dc0b31a3a48e_JaffaCakes118.exe 30 PID 2780 wrote to memory of 1948 2780 666f6ba2ae0d60cac389dc0b31a3a48e_JaffaCakes118.exe 30 PID 2780 wrote to memory of 1948 2780 666f6ba2ae0d60cac389dc0b31a3a48e_JaffaCakes118.exe 30 PID 2780 wrote to memory of 1948 2780 666f6ba2ae0d60cac389dc0b31a3a48e_JaffaCakes118.exe 30 PID 2780 wrote to memory of 1948 2780 666f6ba2ae0d60cac389dc0b31a3a48e_JaffaCakes118.exe 30 PID 2780 wrote to memory of 1948 2780 666f6ba2ae0d60cac389dc0b31a3a48e_JaffaCakes118.exe 30 PID 1948 wrote to memory of 2944 1948 666f6ba2ae0d60cac389dc0b31a3a48e_JaffaCakes118.exe 31 PID 1948 wrote to memory of 2944 1948 666f6ba2ae0d60cac389dc0b31a3a48e_JaffaCakes118.exe 31 PID 1948 wrote to memory of 2944 1948 666f6ba2ae0d60cac389dc0b31a3a48e_JaffaCakes118.exe 31 PID 1948 wrote to memory of 2944 1948 666f6ba2ae0d60cac389dc0b31a3a48e_JaffaCakes118.exe 31 PID 2944 wrote to memory of 2800 2944 wnpdxv.exe 32 PID 2944 wrote to memory of 2800 2944 wnpdxv.exe 32 PID 2944 wrote to memory of 2800 2944 wnpdxv.exe 32 PID 2944 wrote to memory of 2800 2944 wnpdxv.exe 32 PID 2944 wrote to memory of 2800 2944 wnpdxv.exe 32 PID 2944 wrote to memory of 2800 2944 wnpdxv.exe 32 PID 2944 wrote to memory of 2800 2944 wnpdxv.exe 32 PID 2800 wrote to memory of 2768 2800 wnpdxv.exe 33 PID 2800 wrote to memory of 2768 2800 wnpdxv.exe 33 PID 2800 wrote to memory of 2768 2800 wnpdxv.exe 33 PID 2800 wrote to memory of 2768 2800 wnpdxv.exe 33 PID 2768 wrote to memory of 2552 2768 wnpdxv.exe 34 PID 2768 wrote to memory of 2552 2768 wnpdxv.exe 34 PID 2768 wrote to memory of 2552 2768 wnpdxv.exe 34 PID 2768 wrote to memory of 2552 2768 wnpdxv.exe 34 PID 2768 wrote to memory of 2552 2768 wnpdxv.exe 34 PID 2768 wrote to memory of 2552 2768 wnpdxv.exe 34 PID 2768 wrote to memory of 2552 2768 wnpdxv.exe 34 PID 2552 wrote to memory of 2100 2552 wnpdxv.exe 35 PID 2552 wrote to memory of 2100 2552 wnpdxv.exe 35 PID 2552 wrote to memory of 2100 2552 wnpdxv.exe 35 PID 2552 wrote to memory of 2100 2552 wnpdxv.exe 35 PID 2100 wrote to memory of 1076 2100 wnpdxv.exe 36 PID 2100 wrote to memory of 1076 2100 wnpdxv.exe 36 PID 2100 wrote to memory of 1076 2100 wnpdxv.exe 36 PID 2100 wrote to memory of 1076 2100 wnpdxv.exe 36 PID 2100 wrote to memory of 1076 2100 wnpdxv.exe 36 PID 2100 wrote to memory of 1076 2100 wnpdxv.exe 36 PID 2100 wrote to memory of 1076 2100 wnpdxv.exe 36 PID 1076 wrote to memory of 3004 1076 wnpdxv.exe 37 PID 1076 wrote to memory of 3004 1076 wnpdxv.exe 37 PID 1076 wrote to memory of 3004 1076 wnpdxv.exe 37 PID 1076 wrote to memory of 3004 1076 wnpdxv.exe 37 PID 3004 wrote to memory of 2300 3004 wnpdxv.exe 38 PID 3004 wrote to memory of 2300 3004 wnpdxv.exe 38 PID 3004 wrote to memory of 2300 3004 wnpdxv.exe 38 PID 3004 wrote to memory of 2300 3004 wnpdxv.exe 38 PID 3004 wrote to memory of 2300 3004 wnpdxv.exe 38 PID 3004 wrote to memory of 2300 3004 wnpdxv.exe 38 PID 3004 wrote to memory of 2300 3004 wnpdxv.exe 38 PID 2300 wrote to memory of 2996 2300 wnpdxv.exe 39 PID 2300 wrote to memory of 2996 2300 wnpdxv.exe 39 PID 2300 wrote to memory of 2996 2300 wnpdxv.exe 39 PID 2300 wrote to memory of 2996 2300 wnpdxv.exe 39 PID 2996 wrote to memory of 572 2996 wnpdxv.exe 40 PID 2996 wrote to memory of 572 2996 wnpdxv.exe 40 PID 2996 wrote to memory of 572 2996 wnpdxv.exe 40 PID 2996 wrote to memory of 572 2996 wnpdxv.exe 40 PID 2996 wrote to memory of 572 2996 wnpdxv.exe 40 PID 2996 wrote to memory of 572 2996 wnpdxv.exe 40 PID 2996 wrote to memory of 572 2996 wnpdxv.exe 40 PID 572 wrote to memory of 2156 572 wnpdxv.exe 41 PID 572 wrote to memory of 2156 572 wnpdxv.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\666f6ba2ae0d60cac389dc0b31a3a48e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\666f6ba2ae0d60cac389dc0b31a3a48e_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\666f6ba2ae0d60cac389dc0b31a3a48e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\666f6ba2ae0d60cac389dc0b31a3a48e_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Users\Admin\AppData\Local\Temp\666F6B~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Users\Admin\AppData\Local\Temp\666F6B~1.EXE4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2156 -
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:368 -
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2424 -
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2892 -
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1756 -
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2604 -
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2016 -
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1308 -
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1700 -
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1932 -
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2612 -
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2464 -
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1888 -
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2844 -
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2784 -
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2700 -
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1176 -
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:3056 -
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:948 -
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1692 -
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1192 -
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe34⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2756 -
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1924 -
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe36⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:616 -
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1912 -
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe38⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2428 -
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1616 -
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe40⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:608 -
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2088 -
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe42⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1448 -
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:848 -
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe44⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2016 -
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2112 -
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe46⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1896 -
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:876 -
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe48⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:872 -
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe49⤵PID:2420
-
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe50⤵PID:2948
-
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe51⤵PID:2704
-
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe52⤵PID:676
-
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe53⤵PID:852
-
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe54⤵PID:2436
-
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe55⤵PID:1176
-
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe56⤵PID:2100
-
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe57⤵PID:2476
-
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe58⤵PID:2020
-
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe59⤵PID:2880
-
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe60⤵PID:3024
-
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe61⤵PID:1228
-
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe62⤵PID:1572
-
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe63⤵PID:2188
-
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe64⤵PID:400
-
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe65⤵PID:1368
-
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe66⤵PID:2208
-
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe67⤵PID:1712
-
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe68⤵PID:1956
-
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe69⤵PID:1564
-
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe70⤵PID:2324
-
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe71⤵PID:2120
-
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe72⤵PID:2380
-
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe73⤵PID:2012
-
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe74⤵PID:2468
-
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe75⤵PID:1064
-
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe76⤵PID:1700
-
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe77⤵PID:2836
-
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe78⤵PID:3068
-
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe79⤵PID:2884
-
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe80⤵PID:2412
-
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe81⤵PID:328
-
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe82⤵PID:2268
-
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe83⤵PID:2680
-
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe84⤵PID:1216
-
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe85⤵PID:1356
-
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe86⤵PID:1732
-
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe87⤵PID:2684
-
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe88⤵PID:3008
-
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe89⤵PID:3044
-
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe90⤵PID:2244
-
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe91⤵PID:1508
-
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe92⤵PID:2860
-
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe93⤵PID:2392
-
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe94⤵PID:696
-
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe95⤵PID:2484
-
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe96⤵PID:1272
-
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe97⤵PID:2732
-
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe98⤵PID:2876
-
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe99⤵PID:1016
-
C:\Windows\SysWOW64\wnpdxv.exe"C:\Windows\system32\wnpdxv.exe" C:\Windows\SysWOW64\wnpdxv.exe100⤵PID:2220
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5666f6ba2ae0d60cac389dc0b31a3a48e
SHA153698510eff3fd1f64a94f8f318defbf5c11614a
SHA256b1af944422431cda23e69078563ac8613098a3e296ac401e2ddd2cbbbdddb192
SHA512bc0dcaf3f49f7ae0c8b78ec95eeb64c0af6895e657ea961e40bb940f93ad14dd9dd6f1e641c346d0ff5d155241ed4c1ddb26b4c563a7833a70d2ab87fda8d1b0