Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25/07/2024, 13:48 UTC
Static task
static1
Behavioral task
behavioral1
Sample
6fd58cd0333fd647e26b159140d042a3_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6fd58cd0333fd647e26b159140d042a3_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6fd58cd0333fd647e26b159140d042a3_JaffaCakes118.exe
-
Size
11KB
-
MD5
6fd58cd0333fd647e26b159140d042a3
-
SHA1
47effb33b334aad0b29c1fa887e8e42aebe65ed1
-
SHA256
0a2773159282f09e31d7a423da9c28cbc13b231091a4fcd728e49a286593535e
-
SHA512
1fec91956e224def6617437ee909d5b1fd1892976d47018d1d39bec753bfba2ca8139258b9e07247b553ebdb5b34382f56e7dbbf87ddaeaf07e1a8398f79bba8
-
SSDEEP
192:IIlBsTmfAxo7ofKLfTFvVXUvG6OrAwI7W1Gc7oSmRkgUwuwI:IQBsTm+eof6xNCoCCcc7oSVB
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3984 jhains.exe 3848 jhains.exe 3372 jhains.exe 4776 jhains.exe 4028 jhains.exe 2804 jhains.exe 2008 jhains.exe 3732 jhains.exe 2152 jhains.exe 4708 jhains.exe 236 jhains.exe 4456 jhains.exe 4480 jhains.exe 3048 jhains.exe 3612 jhains.exe 2088 jhains.exe 336 jhains.exe 4468 jhains.exe 5020 jhains.exe 5024 jhains.exe 3912 jhains.exe 2780 jhains.exe 2856 jhains.exe 2248 jhains.exe 3552 jhains.exe 2868 jhains.exe 2120 jhains.exe 3832 jhains.exe 1848 jhains.exe 1640 jhains.exe 5176 jhains.exe 5268 jhains.exe 5384 jhains.exe 5536 jhains.exe 5632 jhains.exe 5804 jhains.exe 5892 jhains.exe 5988 jhains.exe 6116 jhains.exe 5244 jhains.exe 5304 jhains.exe 4884 jhains.exe 5752 jhains.exe 5680 jhains.exe 3716 jhains.exe 5380 jhains.exe 5688 jhains.exe 6160 jhains.exe 6284 jhains.exe 6416 jhains.exe 6556 jhains.exe 6716 jhains.exe 6816 jhains.exe 7060 jhains.exe 7140 jhains.exe 6260 jhains.exe 6652 jhains.exe 6928 jhains.exe 6948 jhains.exe 648 jhains.exe 6348 jhains.exe 6388 jhains.exe 7040 jhains.exe 6248 jhains.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\jhapri.dll jhains.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe attrib.exe File created C:\Windows\SysWOW64\jhapri.dll jhains.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe attrib.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe attrib.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe attrib.exe File created C:\Windows\SysWOW64\jhapri.dll jhains.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe attrib.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe attrib.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe attrib.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe attrib.exe File opened for modification C:\Windows\SysWOW64\jhapri.dll jhains.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe attrib.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe attrib.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe attrib.exe File created C:\Windows\SysWOW64\jhapri.dll jhains.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe attrib.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe attrib.exe File created C:\Windows\SysWOW64\jhapri.dll jhains.exe File opened for modification C:\Windows\SysWOW64\jhapri.dll jhains.exe File opened for modification C:\Windows\SysWOW64\jhapri.dll jhains.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe attrib.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe attrib.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe attrib.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe attrib.exe File opened for modification C:\Windows\SysWOW64\jhains.exe jhains.exe File opened for modification C:\Windows\SysWOW64\jhains.exe jhains.exe File created C:\Windows\SysWOW64\jhapri.dll jhains.exe File opened for modification C:\Windows\SysWOW64\jhapri.dll jhains.exe File opened for modification C:\Windows\SysWOW64\jhains.exe jhains.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe attrib.exe File created C:\Windows\SysWOW64\jhapri.dll jhains.exe File created C:\Windows\SysWOW64\jhapri.dll jhains.exe File opened for modification C:\Windows\SysWOW64\jhapri.dll jhains.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe attrib.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe attrib.exe File opened for modification C:\Windows\SysWOW64\jhains.exe jhains.exe File opened for modification C:\Windows\SysWOW64\jhains.exe jhains.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe attrib.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe attrib.exe File opened for modification C:\Windows\SysWOW64\jhapri.dll jhains.exe File opened for modification C:\Windows\SysWOW64\jhapri.dll jhains.exe File opened for modification C:\Windows\SysWOW64\jhains.exe jhains.exe File opened for modification C:\Windows\SysWOW64\jhapri.dll jhains.exe File opened for modification C:\Windows\SysWOW64\jhains.exe jhains.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe attrib.exe File created C:\Windows\SysWOW64\jhapri.dll jhains.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe attrib.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe attrib.exe File opened for modification C:\Windows\SysWOW64\jhapri.dll jhains.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe attrib.exe File opened for modification C:\Windows\SysWOW64\jhapri.dll jhains.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe attrib.exe File opened for modification C:\Windows\SysWOW64\jhains.exe jhains.exe File opened for modification C:\Windows\SysWOW64\jhains.exe jhains.exe File opened for modification C:\Windows\SysWOW64\jhains.exe jhains.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe attrib.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe attrib.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe attrib.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe attrib.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe attrib.exe File opened for modification C:\Windows\SysWOW64\jhapri.dll jhains.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe attrib.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe attrib.exe -
Program crash 7 IoCs
pid pid_target Process procid_target 16616 12796 Process not Found 1485 16088 16680 Process not Found 1533 17036 10304 Process not Found 1785 15800 14644 Process not Found 2151 16932 14936 Process not Found 2160 6664 16044 Process not Found 2319 5844 17108 Process not Found 2532 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jhains.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jhains.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jhains.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jhains.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jhains.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jhains.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jhains.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jhains.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jhains.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jhains.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jhains.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jhains.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jhains.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jhains.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jhains.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jhains.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jhains.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jhains.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jhains.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{252D2432-37A2-324F-2A54-21BF5CF2F1A2}\InprocServer32 jhains.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{252D2432-37A2-324F-2A54-21BF5CF2F1A2}\InprocServer32 jhains.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{252D2432-37A2-324F-2A54-21BF5CF2F1A2}\InprocServer32 jhains.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{252D2432-37A2-324F-2A54-21BF5CF2F1A2}\InprocServer32\ = "C:\\Windows\\SysWow64\\jhapri.dll" jhains.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{252D2432-37A2-324F-2A54-21BF5CF2F1A2}\InprocServer32\ = "C:\\Windows\\SysWow64\\jhapri.dll" jhains.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{252D2432-37A2-324F-2A54-21BF5CF2F1A2}\InprocServer32\ThreadingModel = "Apartment" jhains.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{252D2432-37A2-324F-2A54-21BF5CF2F1A2}\InprocServer32\ThreadingModel = "Apartment" jhains.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{252D2432-37A2-324F-2A54-21BF5CF2F1A2}\InprocServer32\ThreadingModel = "Apartment" jhains.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{252D2432-37A2-324F-2A54-21BF5CF2F1A2}\InprocServer32\ = "C:\\Windows\\SysWow64\\jhapri.dll" jhains.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{252D2432-37A2-324F-2A54-21BF5CF2F1A2}\InprocServer32\ThreadingModel = "Apartment" jhains.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{252D2432-37A2-324F-2A54-21BF5CF2F1A2}\InprocServer32\ThreadingModel = "Apartment" jhains.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{252D2432-37A2-324F-2A54-21BF5CF2F1A2}\InprocServer32\ = "C:\\Windows\\SysWow64\\jhapri.dll" jhains.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{252D2432-37A2-324F-2A54-21BF5CF2F1A2}\InprocServer32 jhains.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{252D2432-37A2-324F-2A54-21BF5CF2F1A2}\InprocServer32 jhains.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{252D2432-37A2-324F-2A54-21BF5CF2F1A2}\InprocServer32\ThreadingModel = "Apartment" jhains.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{252D2432-37A2-324F-2A54-21BF5CF2F1A2}\InprocServer32 jhains.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{252D2432-37A2-324F-2A54-21BF5CF2F1A2}\InprocServer32\ThreadingModel = "Apartment" jhains.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{252D2432-37A2-324F-2A54-21BF5CF2F1A2}\InprocServer32\ThreadingModel = "Apartment" jhains.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{252D2432-37A2-324F-2A54-21BF5CF2F1A2}\InprocServer32\ = "C:\\Windows\\SysWow64\\jhapri.dll" jhains.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{252D2432-37A2-324F-2A54-21BF5CF2F1A2}\InprocServer32\ = "C:\\Windows\\SysWow64\\jhapri.dll" jhains.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{252D2432-37A2-324F-2A54-21BF5CF2F1A2}\InprocServer32 jhains.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{252D2432-37A2-324F-2A54-21BF5CF2F1A2}\InprocServer32\ = "C:\\Windows\\SysWow64\\jhapri.dll" jhains.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{252D2432-37A2-324F-2A54-21BF5CF2F1A2}\InprocServer32 jhains.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{252D2432-37A2-324F-2A54-21BF5CF2F1A2}\InprocServer32\ThreadingModel = "Apartment" jhains.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{252D2432-37A2-324F-2A54-21BF5CF2F1A2}\InprocServer32\ThreadingModel = "Apartment" jhains.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{252D2432-37A2-324F-2A54-21BF5CF2F1A2}\InprocServer32\ThreadingModel = "Apartment" jhains.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{252D2432-37A2-324F-2A54-21BF5CF2F1A2}\InprocServer32 jhains.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{252D2432-37A2-324F-2A54-21BF5CF2F1A2}\InprocServer32 jhains.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{252D2432-37A2-324F-2A54-21BF5CF2F1A2}\InprocServer32\ = "C:\\Windows\\SysWow64\\jhapri.dll" jhains.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{252D2432-37A2-324F-2A54-21BF5CF2F1A2}\InprocServer32\ThreadingModel = "Apartment" jhains.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{252D2432-37A2-324F-2A54-21BF5CF2F1A2}\InprocServer32\ThreadingModel = "Apartment" jhains.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{252D2432-37A2-324F-2A54-21BF5CF2F1A2}\InprocServer32 6fd58cd0333fd647e26b159140d042a3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{252D2432-37A2-324F-2A54-21BF5CF2F1A2}\InprocServer32\ = "C:\\Windows\\SysWow64\\jhapri.dll" jhains.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{252D2432-37A2-324F-2A54-21BF5CF2F1A2}\InprocServer32\ThreadingModel = "Apartment" jhains.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{252D2432-37A2-324F-2A54-21BF5CF2F1A2}\InprocServer32 jhains.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{252D2432-37A2-324F-2A54-21BF5CF2F1A2}\InprocServer32\ThreadingModel = "Apartment" jhains.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{252D2432-37A2-324F-2A54-21BF5CF2F1A2}\InprocServer32 jhains.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{252D2432-37A2-324F-2A54-21BF5CF2F1A2}\InprocServer32\ThreadingModel = "Apartment" jhains.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{252D2432-37A2-324F-2A54-21BF5CF2F1A2}\InprocServer32 jhains.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{252D2432-37A2-324F-2A54-21BF5CF2F1A2}\InprocServer32\ThreadingModel = "Apartment" jhains.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{252D2432-37A2-324F-2A54-21BF5CF2F1A2}\InprocServer32 jhains.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{252D2432-37A2-324F-2A54-21BF5CF2F1A2}\InprocServer32\ = "C:\\Windows\\SysWow64\\jhapri.dll" jhains.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{252D2432-37A2-324F-2A54-21BF5CF2F1A2}\InprocServer32\ThreadingModel = "Apartment" jhains.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{252D2432-37A2-324F-2A54-21BF5CF2F1A2}\InprocServer32\ = "C:\\Windows\\SysWow64\\jhapri.dll" jhains.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{252D2432-37A2-324F-2A54-21BF5CF2F1A2}\InprocServer32\ThreadingModel = "Apartment" jhains.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{252D2432-37A2-324F-2A54-21BF5CF2F1A2}\InprocServer32\ThreadingModel = "Apartment" jhains.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{252D2432-37A2-324F-2A54-21BF5CF2F1A2}\InprocServer32 jhains.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{252D2432-37A2-324F-2A54-21BF5CF2F1A2}\InprocServer32 jhains.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{252D2432-37A2-324F-2A54-21BF5CF2F1A2}\InprocServer32\ = "C:\\Windows\\SysWow64\\jhapri.dll" jhains.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{252D2432-37A2-324F-2A54-21BF5CF2F1A2}\InprocServer32\ = "C:\\Windows\\SysWow64\\jhapri.dll" jhains.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{252D2432-37A2-324F-2A54-21BF5CF2F1A2}\InprocServer32\ = "C:\\Windows\\SysWow64\\jhapri.dll" jhains.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{252D2432-37A2-324F-2A54-21BF5CF2F1A2}\InprocServer32\ThreadingModel = "Apartment" jhains.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{252D2432-37A2-324F-2A54-21BF5CF2F1A2}\InprocServer32\ = "C:\\Windows\\SysWow64\\jhapri.dll" jhains.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{252D2432-37A2-324F-2A54-21BF5CF2F1A2}\InprocServer32\ThreadingModel = "Apartment" jhains.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{252D2432-37A2-324F-2A54-21BF5CF2F1A2}\InprocServer32\ThreadingModel = "Apartment" jhains.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{252D2432-37A2-324F-2A54-21BF5CF2F1A2}\InprocServer32\ = "C:\\Windows\\SysWow64\\jhapri.dll" jhains.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{252D2432-37A2-324F-2A54-21BF5CF2F1A2}\InprocServer32\ThreadingModel = "Apartment" jhains.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{252D2432-37A2-324F-2A54-21BF5CF2F1A2}\InprocServer32\ThreadingModel = "Apartment" jhains.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{252D2432-37A2-324F-2A54-21BF5CF2F1A2}\InprocServer32\ = "C:\\Windows\\SysWow64\\jhapri.dll" jhains.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{252D2432-37A2-324F-2A54-21BF5CF2F1A2}\InprocServer32\ = "C:\\Windows\\SysWow64\\jhapri.dll" jhains.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{252D2432-37A2-324F-2A54-21BF5CF2F1A2}\InprocServer32\ThreadingModel = "Apartment" jhains.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{252D2432-37A2-324F-2A54-21BF5CF2F1A2}\InprocServer32 jhains.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{252D2432-37A2-324F-2A54-21BF5CF2F1A2}\InprocServer32\ThreadingModel = "Apartment" jhains.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{252D2432-37A2-324F-2A54-21BF5CF2F1A2}\InprocServer32 jhains.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 384 6fd58cd0333fd647e26b159140d042a3_JaffaCakes118.exe 384 6fd58cd0333fd647e26b159140d042a3_JaffaCakes118.exe 3984 jhains.exe 3984 jhains.exe 3848 jhains.exe 3848 jhains.exe 3372 jhains.exe 3372 jhains.exe 4776 jhains.exe 4776 jhains.exe 4028 jhains.exe 4028 jhains.exe 2804 jhains.exe 2804 jhains.exe 2008 jhains.exe 2008 jhains.exe 3732 jhains.exe 3732 jhains.exe 2152 jhains.exe 2152 jhains.exe 4708 jhains.exe 4708 jhains.exe 236 jhains.exe 236 jhains.exe 4456 jhains.exe 4456 jhains.exe 4480 jhains.exe 4480 jhains.exe 3048 jhains.exe 3048 jhains.exe 3612 jhains.exe 3612 jhains.exe 2088 jhains.exe 2088 jhains.exe 336 jhains.exe 336 jhains.exe 4468 jhains.exe 4468 jhains.exe 5020 jhains.exe 5020 jhains.exe 5024 jhains.exe 5024 jhains.exe 3912 jhains.exe 3912 jhains.exe 2780 jhains.exe 2780 jhains.exe 2856 jhains.exe 2856 jhains.exe 2248 jhains.exe 2248 jhains.exe 3552 jhains.exe 3552 jhains.exe 2868 jhains.exe 2868 jhains.exe 2120 jhains.exe 2120 jhains.exe 3832 jhains.exe 3832 jhains.exe 1848 jhains.exe 1848 jhains.exe 1640 jhains.exe 1640 jhains.exe 5176 jhains.exe 5176 jhains.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 384 wrote to memory of 3020 384 6fd58cd0333fd647e26b159140d042a3_JaffaCakes118.exe 84 PID 384 wrote to memory of 3020 384 6fd58cd0333fd647e26b159140d042a3_JaffaCakes118.exe 84 PID 384 wrote to memory of 3020 384 6fd58cd0333fd647e26b159140d042a3_JaffaCakes118.exe 84 PID 384 wrote to memory of 3984 384 6fd58cd0333fd647e26b159140d042a3_JaffaCakes118.exe 86 PID 384 wrote to memory of 3984 384 6fd58cd0333fd647e26b159140d042a3_JaffaCakes118.exe 86 PID 384 wrote to memory of 3984 384 6fd58cd0333fd647e26b159140d042a3_JaffaCakes118.exe 86 PID 3984 wrote to memory of 2204 3984 jhains.exe 87 PID 3984 wrote to memory of 2204 3984 jhains.exe 87 PID 3984 wrote to memory of 2204 3984 jhains.exe 87 PID 3984 wrote to memory of 3848 3984 jhains.exe 89 PID 3984 wrote to memory of 3848 3984 jhains.exe 89 PID 3984 wrote to memory of 3848 3984 jhains.exe 89 PID 3848 wrote to memory of 1712 3848 jhains.exe 90 PID 3848 wrote to memory of 1712 3848 jhains.exe 90 PID 3848 wrote to memory of 1712 3848 jhains.exe 90 PID 3848 wrote to memory of 3372 3848 jhains.exe 91 PID 3848 wrote to memory of 3372 3848 jhains.exe 91 PID 3848 wrote to memory of 3372 3848 jhains.exe 91 PID 3372 wrote to memory of 4232 3372 jhains.exe 92 PID 3372 wrote to memory of 4232 3372 jhains.exe 92 PID 3372 wrote to memory of 4232 3372 jhains.exe 92 PID 3372 wrote to memory of 4776 3372 jhains.exe 93 PID 3372 wrote to memory of 4776 3372 jhains.exe 93 PID 3372 wrote to memory of 4776 3372 jhains.exe 93 PID 4776 wrote to memory of 4640 4776 jhains.exe 96 PID 4776 wrote to memory of 4640 4776 jhains.exe 96 PID 4776 wrote to memory of 4640 4776 jhains.exe 96 PID 4776 wrote to memory of 4028 4776 jhains.exe 97 PID 4776 wrote to memory of 4028 4776 jhains.exe 97 PID 4776 wrote to memory of 4028 4776 jhains.exe 97 PID 3020 wrote to memory of 4084 3020 cmd.exe 98 PID 3020 wrote to memory of 4084 3020 cmd.exe 98 PID 3020 wrote to memory of 4084 3020 cmd.exe 98 PID 4028 wrote to memory of 4132 4028 jhains.exe 99 PID 4028 wrote to memory of 4132 4028 jhains.exe 99 PID 4028 wrote to memory of 4132 4028 jhains.exe 99 PID 4028 wrote to memory of 2804 4028 jhains.exe 100 PID 4028 wrote to memory of 2804 4028 jhains.exe 100 PID 4028 wrote to memory of 2804 4028 jhains.exe 100 PID 2804 wrote to memory of 2464 2804 jhains.exe 103 PID 2804 wrote to memory of 2464 2804 jhains.exe 103 PID 2804 wrote to memory of 2464 2804 jhains.exe 103 PID 2804 wrote to memory of 2008 2804 jhains.exe 104 PID 2804 wrote to memory of 2008 2804 jhains.exe 104 PID 2804 wrote to memory of 2008 2804 jhains.exe 104 PID 2008 wrote to memory of 4432 2008 jhains.exe 105 PID 2008 wrote to memory of 4432 2008 jhains.exe 105 PID 2008 wrote to memory of 4432 2008 jhains.exe 105 PID 2008 wrote to memory of 3732 2008 jhains.exe 107 PID 2008 wrote to memory of 3732 2008 jhains.exe 107 PID 2008 wrote to memory of 3732 2008 jhains.exe 107 PID 3732 wrote to memory of 2452 3732 jhains.exe 109 PID 3732 wrote to memory of 2452 3732 jhains.exe 109 PID 3732 wrote to memory of 2452 3732 jhains.exe 109 PID 3732 wrote to memory of 2152 3732 jhains.exe 110 PID 3732 wrote to memory of 2152 3732 jhains.exe 110 PID 3732 wrote to memory of 2152 3732 jhains.exe 110 PID 2152 wrote to memory of 1472 2152 jhains.exe 112 PID 2152 wrote to memory of 1472 2152 jhains.exe 112 PID 2152 wrote to memory of 1472 2152 jhains.exe 112 PID 2152 wrote to memory of 4708 2152 jhains.exe 113 PID 2152 wrote to memory of 4708 2152 jhains.exe 113 PID 2152 wrote to memory of 4708 2152 jhains.exe 113 PID 4708 wrote to memory of 444 4708 jhains.exe 114 -
Views/modifies file attributes 1 TTPs 64 IoCs
pid Process 16772 Process not Found 17156 Process not Found 17364 Process not Found 14480 Process not Found 11404 attrib.exe 15344 Process not Found 2912 Process not Found 16584 Process not Found 8644 Process not Found 10676 Process not Found 15772 Process not Found 13892 attrib.exe 13220 Process not Found 17220 Process not Found 11812 Process not Found 5936 Process not Found 14556 Process not Found 11860 Process not Found 13600 attrib.exe 5760 Process not Found 6396 Process not Found 1340 Process not Found 3388 Process not Found 15828 Process not Found 8596 Process not Found 7152 Process not Found 12112 Process not Found 10904 Process not Found 17144 Process not Found 16120 Process not Found 17184 Process not Found 4060 Process not Found 6928 Process not Found 5184 Process not Found 7460 Process not Found 15664 Process not Found 14984 Process not Found 13928 Process not Found 14320 Process not Found 7980 attrib.exe 1264 Process not Found 8040 Process not Found 9192 Process not Found 8536 Process not Found 7036 attrib.exe 15632 Process not Found 5752 Process not Found 14036 Process not Found 16700 Process not Found 12608 Process not Found 11244 Process not Found 9648 attrib.exe 1176 Process not Found 12236 Process not Found 11856 Process not Found 6016 Process not Found 1084 Process not Found 12512 Process not Found 3648 Process not Found 7156 Process not Found 13876 Process not Found 5820 Process not Found 7312 Process not Found 13064 Process not Found
Processes
-
C:\Users\Admin\AppData\Local\Temp\6fd58cd0333fd647e26b159140d042a3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6fd58cd0333fd647e26b159140d042a3_JaffaCakes118.exe"1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240637906.bat2⤵
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h3⤵PID:4084
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h3⤵
- Drops file in System32 directory
PID:4548
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h3⤵PID:4740
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h3⤵
- System Location Discovery: System Language Discovery
PID:7548
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h3⤵PID:7904
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h3⤵PID:11028
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h3⤵PID:11028
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240637953.bat3⤵PID:2204
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h4⤵PID:4328
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h4⤵
- System Location Discovery: System Language Discovery
PID:6524
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h4⤵PID:8176
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h4⤵PID:7788
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h4⤵
- Drops file in System32 directory
PID:7960
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h4⤵PID:11428
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h4⤵PID:13412
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3848 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240637984.bat4⤵PID:1712
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h5⤵PID:1772
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h5⤵
- Drops file in System32 directory
PID:6124
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h5⤵PID:7092
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h5⤵PID:7000
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h5⤵
- Drops file in System32 directory
PID:10912
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h5⤵PID:6524
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240638000.bat5⤵PID:4232
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h6⤵PID:2120
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h6⤵PID:5816
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h6⤵PID:7776
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h6⤵PID:9480
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h6⤵PID:10788
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h6⤵PID:9676
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h6⤵PID:12796
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240638031.bat6⤵PID:4640
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h7⤵PID:4416
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h7⤵PID:6920
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h7⤵PID:8956
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h7⤵PID:7256
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h7⤵PID:11292
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h7⤵PID:11556
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240638078.bat7⤵PID:4132
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h8⤵PID:1296
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h8⤵PID:2592
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h8⤵PID:7548
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h8⤵PID:8020
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h8⤵PID:11140
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h8⤵PID:10300
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h8⤵PID:13724
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe7⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240638125.bat8⤵
- System Location Discovery: System Language Discovery
PID:2464 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h9⤵PID:848
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h9⤵PID:6636
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h9⤵
- Drops file in System32 directory
PID:8100
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h9⤵PID:5328
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h9⤵PID:11116
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h9⤵PID:12472
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe8⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240638140.bat9⤵PID:4432
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h10⤵PID:2592
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h10⤵PID:5956
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h10⤵PID:7956
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h10⤵PID:7260
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h10⤵PID:11672
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h10⤵PID:12472
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe9⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240638218.bat10⤵
- System Location Discovery: System Language Discovery
PID:2452 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h11⤵
- Drops file in System32 directory
PID:4984
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h11⤵PID:4416
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h11⤵
- System Location Discovery: System Language Discovery
PID:7488
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h11⤵PID:10652
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h11⤵PID:9724
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h11⤵PID:15284
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe10⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240638281.bat11⤵
- System Location Discovery: System Language Discovery
PID:1472 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h12⤵PID:4884
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h12⤵PID:6900
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h12⤵PID:7476
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h12⤵PID:7860
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h12⤵PID:10216
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h12⤵PID:9916
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h12⤵PID:12320
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h12⤵PID:13376
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h12⤵PID:10220
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h12⤵PID:14716
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240638328.bat12⤵PID:444
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h13⤵PID:3132
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h13⤵PID:7160
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h13⤵PID:8540
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h13⤵PID:9788
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h13⤵PID:9084
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h13⤵PID:13136
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h13⤵PID:14988
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe12⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:236 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240638375.bat13⤵PID:4724
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h14⤵PID:1956
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h14⤵PID:6608
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h14⤵PID:7952
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h14⤵PID:7936
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h14⤵PID:9252
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h14⤵PID:11244
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h14⤵PID:11660
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h14⤵PID:11352
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe13⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:4456 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240638421.bat14⤵PID:1744
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h15⤵PID:5344
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h15⤵PID:6988
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h15⤵PID:8120
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h15⤵PID:10208
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h15⤵PID:11004
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h15⤵PID:12756
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe14⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:4480 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240638468.bat15⤵PID:1728
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h16⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:5644
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h16⤵PID:6504
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h16⤵PID:8724
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h16⤵PID:9260
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h16⤵PID:12060
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h16⤵PID:13388
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe15⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3048 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240638515.bat16⤵PID:1436
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h17⤵PID:5300
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h17⤵PID:6864
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h17⤵PID:6308
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h17⤵
- System Location Discovery: System Language Discovery
PID:9104
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h17⤵PID:6524
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h17⤵
- System Location Discovery: System Language Discovery
PID:11484
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h17⤵PID:12284
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe16⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3612 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240638562.bat17⤵PID:4156
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h18⤵PID:5700
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h18⤵PID:5328
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h18⤵
- System Location Discovery: System Language Discovery
PID:8940
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h18⤵PID:10396
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h18⤵
- System Location Discovery: System Language Discovery
PID:11960
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h18⤵PID:14320
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe17⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2088 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240638593.bat18⤵PID:3112
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h19⤵PID:324
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h19⤵PID:3716
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h19⤵PID:6676
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h19⤵PID:8828
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h19⤵PID:10888
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h19⤵PID:9436
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe18⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:336 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240638625.bat19⤵PID:4488
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h20⤵
- System Location Discovery: System Language Discovery
PID:6044
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h20⤵
- System Location Discovery: System Language Discovery
PID:7908
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h20⤵PID:7020
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h20⤵
- Drops file in System32 directory
PID:10220
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h20⤵PID:13200
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h20⤵PID:14284
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe19⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4468 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240638687.bat20⤵PID:964
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h21⤵
- Drops file in System32 directory
PID:5612
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h21⤵PID:6148
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h21⤵PID:5932
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h21⤵PID:9540
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h21⤵
- Drops file in System32 directory
PID:11412
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h21⤵PID:12740
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe20⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5020 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240638750.bat21⤵PID:3804
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h22⤵PID:5572
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h22⤵PID:6244
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h22⤵PID:8476
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h22⤵
- Drops file in System32 directory
PID:9568
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h22⤵PID:11352
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h22⤵PID:14408
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe21⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:5024 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240638781.bat22⤵PID:3956
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h23⤵PID:5772
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h23⤵PID:7224
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h23⤵PID:7476
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h23⤵
- System Location Discovery: System Language Discovery
PID:9728
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h23⤵PID:6632
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe22⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3912 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240638828.bat23⤵PID:3148
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h24⤵PID:6092
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h24⤵PID:2884
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h24⤵PID:7960
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h24⤵PID:11164
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h24⤵PID:12984
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h24⤵PID:14740
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe23⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2780 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240638906.bat24⤵PID:1104
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h25⤵PID:5680
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h25⤵PID:6412
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h25⤵PID:7344
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h25⤵PID:8412
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h25⤵
- Drops file in System32 directory
PID:9528
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h25⤵PID:10776
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe24⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2856 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240638937.bat25⤵PID:1952
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h26⤵
- Drops file in System32 directory
PID:3464
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h26⤵PID:7936
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h26⤵PID:8804
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h26⤵PID:10028
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h26⤵PID:8408
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h26⤵PID:10572
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h26⤵PID:11908
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h26⤵PID:9144
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe25⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2248 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240638984.bat26⤵
- System Location Discovery: System Language Discovery
PID:2024 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h27⤵
- Drops file in System32 directory
PID:6108
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h27⤵PID:6204
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h27⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:8492
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h27⤵PID:9436
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h27⤵PID:9656
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h27⤵PID:10732
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe26⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:3552 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240639031.bat27⤵PID:4088
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h28⤵PID:3184
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h28⤵PID:6580
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h28⤵PID:7352
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h28⤵PID:9016
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h28⤵PID:10272
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h28⤵PID:11828
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h28⤵PID:11888
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h28⤵PID:13196
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h28⤵PID:13280
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h28⤵PID:13064
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h28⤵PID:14352
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe27⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2868 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240639093.bat28⤵PID:3544
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h29⤵PID:2908
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h29⤵PID:7844
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h29⤵PID:10040
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h29⤵PID:7936
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h29⤵PID:10676
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h29⤵PID:11304
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h29⤵PID:14244
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe28⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2120 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240639140.bat29⤵PID:4380
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h30⤵
- System Location Discovery: System Language Discovery
PID:5848
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h30⤵PID:7860
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h30⤵
- Views/modifies file attributes
PID:9648
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h30⤵PID:10776
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h30⤵PID:12976
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h30⤵PID:14900
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe29⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:3832 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240639187.bat30⤵PID:1772
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h31⤵
- System Location Discovery: System Language Discovery
PID:5616
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h31⤵PID:7736
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h31⤵PID:9336
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h31⤵PID:9944
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h31⤵
- Views/modifies file attributes
PID:13600
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h31⤵PID:14068
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe30⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1848 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240639218.bat31⤵PID:3400
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h32⤵PID:5428
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h32⤵
- System Location Discovery: System Language Discovery
PID:6796
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h32⤵PID:7800
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h32⤵PID:7480
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h32⤵PID:12428
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h32⤵PID:11952
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe31⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1640 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240639312.bat32⤵PID:5136
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h33⤵PID:6152
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h33⤵PID:7300
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h33⤵PID:10084
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h33⤵PID:12088
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h33⤵PID:10444
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe32⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:5176 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240639343.bat33⤵PID:5228
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h34⤵
- Drops file in System32 directory
PID:6724
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h34⤵
- System Location Discovery: System Language Discovery
PID:6796
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h34⤵PID:9524
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h34⤵
- System Location Discovery: System Language Discovery
PID:10768
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h34⤵PID:13116
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe33⤵
- Executes dropped EXE
PID:5268 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240639390.bat34⤵PID:5336
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h35⤵PID:6848
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h35⤵PID:7868
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h35⤵
- Drops file in System32 directory
PID:8824
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h35⤵PID:11928
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h35⤵PID:11528
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe34⤵
- Executes dropped EXE
PID:5384 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240639468.bat35⤵PID:5496
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h36⤵PID:6884
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h36⤵
- Drops file in System32 directory
PID:7480
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h36⤵PID:7020
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h36⤵PID:11328
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h36⤵PID:11924
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5536 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240639515.bat36⤵PID:5588
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h37⤵PID:6004
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h37⤵PID:7728
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h37⤵PID:9668
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h37⤵PID:11116
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h37⤵PID:11520
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe36⤵
- Executes dropped EXE
- Modifies registry class
PID:5632 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240639562.bat37⤵
- System Location Discovery: System Language Discovery
PID:5724 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h38⤵PID:6596
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h38⤵PID:8424
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h38⤵PID:9372
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h38⤵PID:11600
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h38⤵PID:14416
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe37⤵
- Executes dropped EXE
- Modifies registry class
PID:5804 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240639609.bat38⤵PID:5852
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h39⤵PID:6536
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h39⤵PID:7788
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h39⤵PID:9564
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h39⤵PID:10252
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h39⤵PID:14288
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h39⤵PID:15216
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe38⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5892 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240639656.bat39⤵PID:5940
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h40⤵PID:7044
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h40⤵PID:6380
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h40⤵PID:9728
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h40⤵PID:10936
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h40⤵PID:9524
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h40⤵PID:13320
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe39⤵
- Executes dropped EXE
PID:5988 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240639687.bat40⤵PID:6032
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h41⤵PID:6828
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h41⤵PID:7720
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h41⤵PID:7820
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h41⤵PID:11536
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h41⤵PID:13656
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe40⤵
- Executes dropped EXE
PID:6116 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240639750.bat41⤵PID:5156
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h42⤵PID:5644
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h42⤵PID:8860
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h42⤵PID:5512
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h42⤵
- Drops file in System32 directory
PID:10268
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h42⤵PID:11920
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h42⤵PID:14400
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe41⤵
- Executes dropped EXE
- Modifies registry class
PID:5244 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240639781.bat42⤵PID:5332
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h43⤵PID:5572
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h43⤵PID:9556
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h43⤵PID:10828
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h43⤵PID:13016
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h43⤵PID:14956
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe42⤵
- Executes dropped EXE
- Modifies registry class
PID:5304 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240639812.bat43⤵PID:5528
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h44⤵PID:5612
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h44⤵PID:8948
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h44⤵PID:8908
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h44⤵PID:9144
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h44⤵PID:13916
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe43⤵
- Executes dropped EXE
PID:4884 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240639843.bat44⤵PID:5716
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h45⤵PID:5608
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h45⤵PID:7464
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h45⤵PID:9668
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h45⤵PID:10372
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h45⤵PID:13216
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h45⤵PID:12052
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe44⤵
- Executes dropped EXE
PID:5752 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240639921.bat45⤵PID:5936
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h46⤵PID:5776
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h46⤵PID:8408
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h46⤵PID:10100
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h46⤵PID:12252
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h46⤵PID:10312
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h46⤵PID:12828
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe45⤵
- Executes dropped EXE
- Modifies registry class
PID:5680 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240639953.bat46⤵
- System Location Discovery: System Language Discovery
PID:1296 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h47⤵PID:5360
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h47⤵
- System Location Discovery: System Language Discovery
PID:7368
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h47⤵PID:9692
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h47⤵PID:11352
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h47⤵PID:14280
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h47⤵PID:14368
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe46⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3716 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240640046.bat47⤵PID:5196
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV148⤵PID:6108
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h48⤵PID:6728
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h48⤵PID:9436
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h48⤵PID:9372
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h48⤵PID:11924
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h48⤵PID:15200
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe47⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5380 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240640125.bat48⤵PID:5784
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h49⤵PID:6684
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h49⤵PID:7944
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h49⤵PID:9344
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h49⤵PID:9016
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h49⤵PID:13064
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h49⤵PID:14628
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe48⤵
- Executes dropped EXE
PID:5688 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240640156.bat49⤵
- System Location Discovery: System Language Discovery
PID:4984 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h50⤵
- Views/modifies file attributes
PID:7036
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h50⤵PID:8676
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h50⤵PID:10376
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h50⤵PID:11796
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h50⤵PID:13136
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe49⤵
- Executes dropped EXE
PID:6160 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240640187.bat50⤵
- System Location Discovery: System Language Discovery
PID:6220 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h51⤵PID:5956
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h51⤵PID:5520
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h51⤵PID:9720
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h51⤵PID:9408
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h51⤵PID:11680
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h51⤵PID:13052
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe50⤵
- Executes dropped EXE
PID:6284 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240640250.bat51⤵PID:6372
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h52⤵PID:6256
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h52⤵PID:9000
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h52⤵
- System Location Discovery: System Language Discovery
PID:11020
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h52⤵PID:11020
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe51⤵
- Executes dropped EXE
PID:6416 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240640312.bat52⤵PID:6476
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h53⤵
- Drops file in System32 directory
PID:6660
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h53⤵PID:8544
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h53⤵
- Drops file in System32 directory
PID:10948
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h53⤵PID:12540
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h53⤵PID:13656
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe52⤵
- Executes dropped EXE
PID:6556 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240640421.bat53⤵PID:6640
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h54⤵PID:8124
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h54⤵PID:7848
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h54⤵PID:10016
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h54⤵PID:11432
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h54⤵PID:11800
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe53⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6716 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240640500.bat54⤵PID:6756
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h55⤵PID:7960
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h55⤵PID:8908
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h55⤵PID:9452
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h55⤵
- Drops file in System32 directory
PID:9012
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h55⤵PID:12212
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe54⤵
- Executes dropped EXE
- Modifies registry class
PID:6816 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240640609.bat55⤵PID:7008
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h56⤵PID:7432
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h56⤵PID:7368
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h56⤵PID:10632
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h56⤵PID:7240
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h56⤵PID:14684
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe55⤵
- Executes dropped EXE
PID:7060 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240640640.bat56⤵PID:7096
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h57⤵
- Drops file in System32 directory
PID:7488
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h57⤵
- System Location Discovery: System Language Discovery
PID:9656
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h57⤵PID:11672
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h57⤵PID:14172
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe56⤵
- Executes dropped EXE
- Modifies registry class
PID:7140 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240640703.bat57⤵PID:5220
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h58⤵
- System Location Discovery: System Language Discovery
PID:7092
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h58⤵PID:9240
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h58⤵PID:10248
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h58⤵PID:13676
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h58⤵PID:14380
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe57⤵
- Executes dropped EXE
- Modifies registry class
PID:6260 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240640781.bat58⤵PID:6496
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV159⤵PID:5428
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h59⤵PID:8024
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h59⤵
- Drops file in System32 directory
PID:10200
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h59⤵PID:10392
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h59⤵PID:13368
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe58⤵
- Executes dropped EXE
PID:6652 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240640843.bat59⤵PID:6780
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV160⤵PID:6864
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h60⤵PID:8292
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h60⤵PID:8744
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h60⤵PID:12636
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h60⤵PID:8880
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe59⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:6928 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240640890.bat60⤵PID:7088
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV161⤵PID:5816
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h61⤵PID:7824
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h61⤵PID:9144
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h61⤵PID:10248
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h61⤵PID:13484
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe60⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:6948 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240640968.bat61⤵PID:5352
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h62⤵
- System Location Discovery: System Language Discovery
PID:7564
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h62⤵PID:9720
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h62⤵PID:11556
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h62⤵PID:13984
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe61⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:648 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240640984.bat62⤵PID:5616
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h63⤵PID:8668
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h63⤵PID:7788
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h63⤵PID:10444
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h63⤵PID:11592
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe62⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:6348 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240641062.bat63⤵PID:6884
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h64⤵PID:8824
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h64⤵PID:8452
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h64⤵PID:10204
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h64⤵PID:10460
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h64⤵PID:11944
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h64⤵PID:13884
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe63⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:6388 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240641109.bat64⤵PID:6748
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h65⤵PID:8744
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h65⤵PID:8292
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h65⤵PID:11864
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h65⤵PID:10632
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe64⤵
- Executes dropped EXE
PID:7040 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240641156.bat65⤵PID:6340
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h66⤵PID:8576
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h66⤵
- System Location Discovery: System Language Discovery
PID:9040
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h66⤵PID:9012
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h66⤵PID:10368
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe65⤵
- Executes dropped EXE
PID:6248 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240641218.bat66⤵PID:6920
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h67⤵PID:8976
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h67⤵PID:10148
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h67⤵PID:11148
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h67⤵PID:7864
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h67⤵PID:12368
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h67⤵PID:15276
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe66⤵PID:7212
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240641281.bat67⤵PID:7264
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h68⤵PID:7948
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h68⤵PID:9984
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h68⤵PID:12080
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h68⤵PID:14104
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe67⤵
- Modifies registry class
PID:7312 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240641328.bat68⤵PID:7336
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h69⤵PID:6308
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h69⤵PID:9308
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h69⤵PID:10792
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h69⤵PID:7864
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe68⤵PID:7400
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240641390.bat69⤵PID:7456
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h70⤵PID:9068
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h70⤵PID:8120
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h70⤵PID:12548
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h70⤵PID:15132
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe69⤵PID:7512
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240641437.bat70⤵PID:7580
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h71⤵PID:8600
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h71⤵
- System Location Discovery: System Language Discovery
PID:8956
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h71⤵
- Drops file in System32 directory
PID:12280
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h71⤵PID:14300
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe70⤵PID:7632
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240641484.bat71⤵PID:7696
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h72⤵PID:9076
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h72⤵
- Drops file in System32 directory
PID:10588
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h72⤵PID:13032
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h72⤵PID:14840
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe71⤵
- Modifies registry class
PID:7760 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240641546.bat72⤵PID:7832
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h73⤵PID:7964
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h73⤵
- Drops file in System32 directory
PID:9452
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h73⤵PID:13592
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe72⤵PID:7872
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240641625.bat73⤵PID:7988
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h74⤵PID:8776
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h74⤵
- Views/modifies file attributes
PID:7980
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h74⤵PID:11504
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h74⤵PID:12552
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe73⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:8036 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240641687.bat74⤵PID:8084
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h75⤵PID:8824
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h75⤵PID:7092
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h75⤵PID:10864
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h75⤵PID:12660
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe74⤵PID:8132
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240641781.bat75⤵PID:7276
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h76⤵PID:9548
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h76⤵PID:10864
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h76⤵PID:13112
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h76⤵PID:14424
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe75⤵
- Drops file in System32 directory
- Modifies registry class
PID:6536 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240641812.bat76⤵PID:7360
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h77⤵PID:8780
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h77⤵PID:10152
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h77⤵PID:11060
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h77⤵PID:13152
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h77⤵PID:15000
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe76⤵
- Drops file in System32 directory
PID:6736 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240641875.bat77⤵PID:5612
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h78⤵PID:8772
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h78⤵PID:9672
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h78⤵PID:10300
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h78⤵PID:10680
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe77⤵PID:6772
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240641906.bat78⤵PID:6656
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h79⤵PID:8024
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h79⤵PID:11132
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h79⤵PID:11856
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe78⤵PID:6724
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240642000.bat79⤵PID:8104
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h80⤵
- Drops file in System32 directory
PID:9364
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h80⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:7432
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h80⤵
- System Location Discovery: System Language Discovery
PID:10468
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h80⤵PID:10000
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h80⤵PID:13300
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe79⤵
- Drops file in System32 directory
PID:7016 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240642093.bat80⤵PID:7452
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV181⤵PID:7160
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h81⤵PID:7952
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h81⤵PID:11196
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h81⤵PID:12668
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h81⤵PID:14468
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe80⤵
- Modifies registry class
PID:6236 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240642140.bat81⤵PID:7560
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h82⤵PID:10196
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h82⤵PID:10444
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h82⤵PID:14068
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe81⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2592 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240642171.bat82⤵PID:8124
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h83⤵
- Drops file in System32 directory
PID:6800
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h83⤵
- Drops file in System32 directory
PID:9300
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h83⤵PID:12320
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h83⤵PID:14592
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe82⤵
- Drops file in System32 directory
PID:6636 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240642218.bat83⤵PID:8216
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h84⤵PID:8284
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h84⤵PID:9172
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h84⤵PID:10500
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h84⤵PID:12400
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe83⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:8276 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240642250.bat84⤵
- System Location Discovery: System Language Discovery
PID:8364 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h85⤵PID:9124
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h85⤵
- Drops file in System32 directory
PID:11104
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h85⤵PID:9784
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h85⤵PID:14448
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe84⤵
- Drops file in System32 directory
- Modifies registry class
PID:8416 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240642296.bat85⤵PID:8512
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h86⤵PID:6524
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h86⤵PID:11852
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h86⤵PID:10424
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe85⤵PID:8564
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240642343.bat86⤵PID:8608
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h87⤵PID:8476
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h87⤵PID:9408
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h87⤵PID:13640
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe86⤵PID:8652
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240642406.bat87⤵PID:8760
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h88⤵PID:9012
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h88⤵PID:10152
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h88⤵PID:12484
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h88⤵
- Views/modifies file attributes
PID:11404
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe87⤵PID:8812
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240642453.bat88⤵PID:8916
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h89⤵PID:8744
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h89⤵PID:11796
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h89⤵PID:13796
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe88⤵PID:8968
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240642500.bat89⤵PID:9056
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h90⤵PID:8496
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h90⤵PID:11272
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h90⤵PID:12708
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h90⤵PID:14672
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe89⤵PID:9112
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240642562.bat90⤵PID:9204
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h91⤵PID:9512
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h91⤵PID:8576
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h91⤵PID:11920
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h91⤵PID:12464
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h91⤵PID:12552
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe90⤵PID:7136
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240642625.bat91⤵PID:8328
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV192⤵PID:7944
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h92⤵PID:7864
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h92⤵PID:8476
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h92⤵PID:14128
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe91⤵PID:8392
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240642750.bat92⤵PID:8752
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h93⤵PID:8476
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h93⤵PID:9380
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h93⤵PID:6976
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe92⤵PID:8912
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240642812.bat93⤵PID:9088
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV194⤵PID:7776
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h94⤵PID:10152
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h94⤵PID:11544
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h94⤵PID:9536
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe93⤵PID:8252
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240643125.bat94⤵PID:9200
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h95⤵PID:9220
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h95⤵PID:10452
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h95⤵PID:10908
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h95⤵PID:12152
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h95⤵PID:11428
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h95⤵PID:14084
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h95⤵PID:14948
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe94⤵
- Drops file in System32 directory
PID:8304 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240643156.bat95⤵
- System Location Discovery: System Language Discovery
PID:7552 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h96⤵PID:9872
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h96⤵PID:10608
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h96⤵PID:12836
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h96⤵PID:14688
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe95⤵
- System Location Discovery: System Language Discovery
PID:9284 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240643234.bat96⤵PID:9500
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h97⤵PID:10076
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h97⤵
- Drops file in System32 directory
PID:10704
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h97⤵PID:12460
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h97⤵PID:12716
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe96⤵
- Modifies registry class
PID:9572 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240643328.bat97⤵PID:9736
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h98⤵PID:10632
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h98⤵PID:12212
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h98⤵PID:9436
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h98⤵PID:13540
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe97⤵PID:9776
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240643390.bat98⤵PID:9880
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h99⤵PID:9704
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h99⤵PID:10888
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h99⤵PID:11628
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe98⤵
- Modifies registry class
PID:9936 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240643468.bat99⤵
- System Location Discovery: System Language Discovery
PID:10068 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h100⤵
- System Location Discovery: System Language Discovery
PID:7948
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h100⤵PID:11340
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h100⤵PID:14292
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe99⤵
- Modifies registry class
PID:10116 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240643546.bat100⤵PID:10224
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h101⤵PID:9772
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h101⤵PID:12660
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h101⤵PID:14652
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe100⤵PID:8844
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240643609.bat101⤵PID:8528
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h102⤵PID:10728
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h102⤵PID:13300
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h102⤵PID:12928
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe101⤵
- Modifies registry class
PID:7548 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240643640.bat102⤵
- System Location Discovery: System Language Discovery
PID:8492 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1103⤵PID:7844
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h103⤵
- Drops file in System32 directory
PID:9296
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h103⤵PID:12192
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h103⤵PID:12452
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe102⤵
- Modifies registry class
PID:8952 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240643687.bat103⤵PID:7184
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1104⤵PID:7800
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h104⤵PID:10232
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h104⤵PID:12396
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h104⤵PID:10148
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe103⤵PID:7912
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240643765.bat104⤵PID:8780
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h105⤵PID:10768
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h105⤵PID:12792
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h105⤵PID:14724
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe104⤵
- Modifies registry class
PID:8352 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240643812.bat105⤵PID:9896
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h106⤵PID:9516
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h106⤵PID:10932
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe105⤵
- Modifies registry class
PID:9556 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240643859.bat106⤵PID:8544
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h107⤵PID:10856
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h107⤵PID:13340
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h107⤵PID:15268
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe106⤵PID:10112
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240643906.bat107⤵
- System Location Discovery: System Language Discovery
PID:8728 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1108⤵PID:7564
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h108⤵PID:9796
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h108⤵PID:13388
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe107⤵PID:7372
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240643953.bat108⤵
- System Location Discovery: System Language Discovery
PID:6608 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h109⤵PID:11284
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h109⤵PID:13144
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h109⤵PID:15064
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe108⤵
- Drops file in System32 directory
PID:8144 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240644078.bat109⤵PID:9476
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1110⤵PID:9068
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h110⤵PID:6976
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h110⤵PID:13484
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe109⤵
- System Location Discovery: System Language Discovery
PID:7368 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240644125.bat110⤵PID:9756
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h111⤵PID:8824
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h111⤵PID:13184
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h111⤵PID:14844
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe110⤵PID:8784
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240644203.bat111⤵
- System Location Discovery: System Language Discovery
PID:9480 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h112⤵PID:11596
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h112⤵PID:12440
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h112⤵PID:10796
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe111⤵
- Modifies registry class
PID:8900 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240644281.bat112⤵PID:9428
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h113⤵PID:11324
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h113⤵PID:13308
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h113⤵PID:8476
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe112⤵PID:8468
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240644390.bat113⤵PID:9768
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1114⤵PID:8284
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h114⤵PID:11804
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h114⤵PID:11436
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe113⤵
- Drops file in System32 directory
- Modifies registry class
PID:9888 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240644484.bat114⤵PID:10288
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h115⤵PID:11344
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h115⤵PID:14268
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h115⤵PID:15232
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe114⤵
- Drops file in System32 directory
- Modifies registry class
PID:10404 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240644562.bat115⤵PID:10532
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h116⤵PID:11628
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h116⤵PID:11528
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe115⤵PID:10580
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240644609.bat116⤵PID:10696
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h117⤵PID:10596
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h117⤵PID:13576
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe116⤵PID:10752
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240644656.bat117⤵PID:10880
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h118⤵PID:11552
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h118⤵PID:13848
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe117⤵PID:10924
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240644718.bat118⤵
- System Location Discovery: System Language Discovery
PID:11008 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h119⤵PID:10220
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h119⤵PID:11468
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h119⤵PID:13024
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe118⤵PID:11048
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240644765.bat119⤵PID:11108
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h120⤵PID:11384
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h120⤵PID:14308
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe119⤵
- Modifies registry class
PID:11156 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240644796.bat120⤵PID:11200
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h121⤵PID:12200
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h121⤵PID:13608
-
-
-
C:\Windows\SysWOW64\jhains.exeC:\Windows\system32\jhains.exe120⤵
- Modifies registry class
PID:11252 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DFD240644828.bat121⤵PID:9764
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\system32\verclsid.exe" -r -a -s -h122⤵PID:9784
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-