Analysis
-
max time kernel
4s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 03:20
Static task
static1
Behavioral task
behavioral1
Sample
ea7cc83a0236e197be8d3ad0854408e5_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
ea7cc83a0236e197be8d3ad0854408e5_JaffaCakes118.exe
-
Size
15KB
-
MD5
ea7cc83a0236e197be8d3ad0854408e5
-
SHA1
7ae698f0850ddc071e3167c05d221245152940b1
-
SHA256
ee994d3fa5f9f1181463552baebe0625ea385d677fc7649971959e628b2e8d88
-
SHA512
a5cad2fba7afa4aed846089d0373df3d0cf2fdc6a5b8334e727a3fbc6ffc5e2b4dd9d4bee2a9f5a2c7ca6940666510e4cba7330c0bf5fdb1c6f51d172e635659
-
SSDEEP
384:Ie766GhJWeI8ZeIra/0s2v9dpHKjV0ESWzRvpnBRhApnBRhr:i/0eItua/0s2ztuV0ErRvRhAvRhr
Malware Config
Signatures
-
Executes dropped EXE 13 IoCs
pid Process 6564 isdsasrv.exe 6816 isdsasrv.exe 7112 isdsasrv.exe 5720 isdsasrv.exe 7492 isdsasrv.exe 5196 isdsasrv.exe 1676 isdsasrv.exe 6720 isdsasrv.exe 5176 isdsasrv.exe 7808 isdsasrv.exe 5032 isdsasrv.exe 6360 isdsasrv.exe 6324 isdsasrv.exe -
Installs/modifies Browser Helper Object 2 TTPs 26 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{87FD640A-158F-48AC-FD14-1597F14A9778} isdsasrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{87FD640A-158F-48AC-FD14-1597F14A9778}\ = "mndshsrv.dll" isdsasrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{87FD640A-158F-48AC-FD14-1597F14A9778}\ = "mndshsrv.dll" isdsasrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{87FD640A-158F-48AC-FD14-1597F14A9778}\ = "mndshsrv.dll" isdsasrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{87FD640A-158F-48AC-FD14-1597F14A9778}\ = "mndshsrv.dll" isdsasrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{87FD640A-158F-48AC-FD14-1597F14A9778} isdsasrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{87FD640A-158F-48AC-FD14-1597F14A9778}\ = "mndshsrv.dll" isdsasrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{87FD640A-158F-48AC-FD14-1597F14A9778}\ = "mndshsrv.dll" isdsasrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{87FD640A-158F-48AC-FD14-1597F14A9778} isdsasrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{87FD640A-158F-48AC-FD14-1597F14A9778}\ = "mndshsrv.dll" isdsasrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{87FD640A-158F-48AC-FD14-1597F14A9778} isdsasrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{87FD640A-158F-48AC-FD14-1597F14A9778}\ = "mndshsrv.dll" isdsasrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{87FD640A-158F-48AC-FD14-1597F14A9778} isdsasrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{87FD640A-158F-48AC-FD14-1597F14A9778} isdsasrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{87FD640A-158F-48AC-FD14-1597F14A9778} isdsasrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{87FD640A-158F-48AC-FD14-1597F14A9778} isdsasrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{87FD640A-158F-48AC-FD14-1597F14A9778}\ = "mndshsrv.dll" isdsasrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{87FD640A-158F-48AC-FD14-1597F14A9778} isdsasrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{87FD640A-158F-48AC-FD14-1597F14A9778} isdsasrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{87FD640A-158F-48AC-FD14-1597F14A9778}\ = "mndshsrv.dll" isdsasrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{87FD640A-158F-48AC-FD14-1597F14A9778}\ = "mndshsrv.dll" isdsasrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{87FD640A-158F-48AC-FD14-1597F14A9778} isdsasrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{87FD640A-158F-48AC-FD14-1597F14A9778}\ = "mndshsrv.dll" isdsasrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{87FD640A-158F-48AC-FD14-1597F14A9778} ea7cc83a0236e197be8d3ad0854408e5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{87FD640A-158F-48AC-FD14-1597F14A9778}\ = "mndshsrv.dll" ea7cc83a0236e197be8d3ad0854408e5_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{87FD640A-158F-48AC-FD14-1597F14A9778} isdsasrv.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\verclsid.exe isdsasrv.exe File opened for modification C:\Windows\SysWOW64\isdsasrv.exe isdsasrv.exe File opened for modification C:\Windows\SysWOW64\smdsbsrv.sys isdsasrv.exe File opened for modification C:\Windows\SysWOW64\mndshsrv.dll ea7cc83a0236e197be8d3ad0854408e5_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\smdsbsrv.sys isdsasrv.exe File opened for modification C:\Windows\SysWOW64\mndshsrv.dll isdsasrv.exe File opened for modification C:\Windows\SysWOW64\isdsasrv.exe isdsasrv.exe File opened for modification C:\Windows\SysWOW64\isdsasrv.exe ea7cc83a0236e197be8d3ad0854408e5_JaffaCakes118.exe File created C:\Windows\SysWOW64\mndshsrv.dll isdsasrv.exe File opened for modification C:\Windows\SysWOW64\isdsasrv.exe isdsasrv.exe File created C:\Windows\SysWOW64\mndshsrv.dll isdsasrv.exe File opened for modification C:\Windows\SysWOW64\smdsbsrv.sys isdsasrv.exe File opened for modification C:\Windows\SysWOW64\smdsbsrv.sys isdsasrv.exe File opened for modification C:\Windows\SysWOW64\isdsasrv.exe isdsasrv.exe File opened for modification C:\Windows\SysWOW64\isdsasrv.exe isdsasrv.exe File created C:\Windows\SysWOW64\mndshsrv.dll isdsasrv.exe File created C:\Windows\SysWOW64\isdsasrv.exe ea7cc83a0236e197be8d3ad0854408e5_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\smdsbsrv.sys isdsasrv.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe isdsasrv.exe File created C:\Windows\SysWOW64\mndshsrv.dll isdsasrv.exe File opened for modification C:\Windows\SysWOW64\isdsasrv.exe isdsasrv.exe File opened for modification C:\Windows\SysWOW64\smdsbsrv.sys isdsasrv.exe File opened for modification C:\Windows\SysWOW64\mndshsrv.dll isdsasrv.exe File created C:\Windows\SysWOW64\mndshsrv.dll isdsasrv.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe isdsasrv.exe File opened for modification C:\Windows\SysWOW64\smdsbsrv.sys ea7cc83a0236e197be8d3ad0854408e5_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\smdsbsrv.sys isdsasrv.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe isdsasrv.exe File opened for modification C:\Windows\SysWOW64\mndshsrv.dll isdsasrv.exe File created C:\Windows\SysWOW64\mndshsrv.dll isdsasrv.exe File opened for modification C:\Windows\SysWOW64\smdsbsrv.sys isdsasrv.exe File opened for modification C:\Windows\SysWOW64\mndshsrv.dll isdsasrv.exe File opened for modification C:\Windows\SysWOW64\mndshsrv.dll isdsasrv.exe File created C:\Windows\SysWOW64\mndshsrv.dll isdsasrv.exe File opened for modification C:\Windows\SysWOW64\isdsasrv.exe isdsasrv.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe isdsasrv.exe File opened for modification C:\Windows\SysWOW64\isdsasrv.exe isdsasrv.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe isdsasrv.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe isdsasrv.exe File created C:\Windows\SysWOW64\mndshsrv.dll isdsasrv.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe isdsasrv.exe File opened for modification C:\Windows\SysWOW64\smdsbsrv.sys isdsasrv.exe File opened for modification C:\Windows\SysWOW64\mndshsrv.dll isdsasrv.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe isdsasrv.exe File opened for modification C:\Windows\SysWOW64\mndshsrv.dll isdsasrv.exe File created C:\Windows\SysWOW64\mndshsrv.dll isdsasrv.exe File created C:\Windows\SysWOW64\mndshsrv.dll isdsasrv.exe File opened for modification C:\Windows\SysWOW64\isdsasrv.exe isdsasrv.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe isdsasrv.exe File opened for modification C:\Windows\SysWOW64\mndshsrv.dll isdsasrv.exe File opened for modification C:\Windows\SysWOW64\mndshsrv.dll isdsasrv.exe File opened for modification C:\Windows\SysWOW64\smdsbsrv.sys isdsasrv.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe isdsasrv.exe File opened for modification C:\Windows\SysWOW64\mndshsrv.dll isdsasrv.exe File opened for modification C:\Windows\SysWOW64\isdsasrv.exe isdsasrv.exe File opened for modification C:\Windows\SysWOW64\isdsasrv.exe isdsasrv.exe File opened for modification C:\Windows\SysWOW64\mndshsrv.dll isdsasrv.exe File opened for modification C:\Windows\SysWOW64\mndshsrv.dll isdsasrv.exe File created C:\Windows\SysWOW64\mndshsrv.dll ea7cc83a0236e197be8d3ad0854408e5_JaffaCakes118.exe File created C:\Windows\SysWOW64\mndshsrv.dll isdsasrv.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe isdsasrv.exe File opened for modification C:\Windows\SysWOW64\smdsbsrv.sys isdsasrv.exe File opened for modification C:\Windows\SysWOW64\smdsbsrv.sys isdsasrv.exe File opened for modification C:\Windows\SysWOW64\mndshsrv.dll isdsasrv.exe -
System Location Discovery: System Language Discovery 1 TTPs 27 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea7cc83a0236e197be8d3ad0854408e5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language isdsasrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language isdsasrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language isdsasrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language isdsasrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language isdsasrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language isdsasrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language isdsasrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language isdsasrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language isdsasrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language isdsasrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language isdsasrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language isdsasrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language isdsasrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 42 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID ea7cc83a0236e197be8d3ad0854408e5_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{87FD640A-158F-48AC-FD14-1597F14A9778}\InprocServer32 isdsasrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{87FD640A-158F-48AC-FD14-1597F14A9778}\InprocServer32 isdsasrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{87FD640A-158F-48AC-FD14-1597F14A9778}\InprocServer32 isdsasrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{87FD640A-158F-48AC-FD14-1597F14A9778}\InprocServer32 isdsasrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{87FD640A-158F-48AC-FD14-1597F14A9778}\InprocServer32\ThreadingModel = "Apartment" isdsasrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{87FD640A-158F-48AC-FD14-1597F14A9778}\InprocServer32\ThreadingModel = "Apartment" ea7cc83a0236e197be8d3ad0854408e5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{87FD640A-158F-48AC-FD14-1597F14A9778}\InprocServer32\ = "C:\\Windows\\SysWow64\\mndshsrv.dll" isdsasrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{87FD640A-158F-48AC-FD14-1597F14A9778}\InprocServer32\ = "C:\\Windows\\SysWow64\\mndshsrv.dll" isdsasrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{87FD640A-158F-48AC-FD14-1597F14A9778}\InprocServer32\ThreadingModel = "Apartment" isdsasrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{87FD640A-158F-48AC-FD14-1597F14A9778}\InprocServer32\ = "C:\\Windows\\SysWow64\\mndshsrv.dll" isdsasrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{87FD640A-158F-48AC-FD14-1597F14A9778}\InprocServer32\ = "C:\\Windows\\SysWow64\\mndshsrv.dll" ea7cc83a0236e197be8d3ad0854408e5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{87FD640A-158F-48AC-FD14-1597F14A9778}\InprocServer32\ThreadingModel = "Apartment" isdsasrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{87FD640A-158F-48AC-FD14-1597F14A9778}\InprocServer32\ThreadingModel = "Apartment" isdsasrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{87FD640A-158F-48AC-FD14-1597F14A9778}\InprocServer32\ = "C:\\Windows\\SysWow64\\mndshsrv.dll" isdsasrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{87FD640A-158F-48AC-FD14-1597F14A9778}\InprocServer32\ThreadingModel = "Apartment" isdsasrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{87FD640A-158F-48AC-FD14-1597F14A9778}\InprocServer32\ = "C:\\Windows\\SysWow64\\mndshsrv.dll" isdsasrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{87FD640A-158F-48AC-FD14-1597F14A9778}\InprocServer32 ea7cc83a0236e197be8d3ad0854408e5_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{87FD640A-158F-48AC-FD14-1597F14A9778} ea7cc83a0236e197be8d3ad0854408e5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{87FD640A-158F-48AC-FD14-1597F14A9778}\InprocServer32\ThreadingModel = "Apartment" isdsasrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{87FD640A-158F-48AC-FD14-1597F14A9778}\InprocServer32 isdsasrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{87FD640A-158F-48AC-FD14-1597F14A9778}\InprocServer32 isdsasrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{87FD640A-158F-48AC-FD14-1597F14A9778}\InprocServer32 isdsasrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{87FD640A-158F-48AC-FD14-1597F14A9778}\InprocServer32\ThreadingModel = "Apartment" isdsasrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{87FD640A-158F-48AC-FD14-1597F14A9778}\InprocServer32 isdsasrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{87FD640A-158F-48AC-FD14-1597F14A9778}\InprocServer32\ThreadingModel = "Apartment" isdsasrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{87FD640A-158F-48AC-FD14-1597F14A9778}\InprocServer32 isdsasrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{87FD640A-158F-48AC-FD14-1597F14A9778}\InprocServer32\ = "C:\\Windows\\SysWow64\\mndshsrv.dll" isdsasrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{87FD640A-158F-48AC-FD14-1597F14A9778}\InprocServer32 isdsasrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{87FD640A-158F-48AC-FD14-1597F14A9778}\InprocServer32\ThreadingModel = "Apartment" isdsasrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{87FD640A-158F-48AC-FD14-1597F14A9778}\InprocServer32 isdsasrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{87FD640A-158F-48AC-FD14-1597F14A9778}\InprocServer32\ = "C:\\Windows\\SysWow64\\mndshsrv.dll" isdsasrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{87FD640A-158F-48AC-FD14-1597F14A9778}\InprocServer32\ = "C:\\Windows\\SysWow64\\mndshsrv.dll" isdsasrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{87FD640A-158F-48AC-FD14-1597F14A9778}\InprocServer32\ = "C:\\Windows\\SysWow64\\mndshsrv.dll" isdsasrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{87FD640A-158F-48AC-FD14-1597F14A9778}\InprocServer32\ThreadingModel = "Apartment" isdsasrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{87FD640A-158F-48AC-FD14-1597F14A9778}\InprocServer32\ = "C:\\Windows\\SysWow64\\mndshsrv.dll" isdsasrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{87FD640A-158F-48AC-FD14-1597F14A9778}\InprocServer32\ThreadingModel = "Apartment" isdsasrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{87FD640A-158F-48AC-FD14-1597F14A9778}\InprocServer32 isdsasrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node ea7cc83a0236e197be8d3ad0854408e5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{87FD640A-158F-48AC-FD14-1597F14A9778}\InprocServer32\ = "C:\\Windows\\SysWow64\\mndshsrv.dll" isdsasrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{87FD640A-158F-48AC-FD14-1597F14A9778}\InprocServer32\ThreadingModel = "Apartment" isdsasrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{87FD640A-158F-48AC-FD14-1597F14A9778}\InprocServer32\ = "C:\\Windows\\SysWow64\\mndshsrv.dll" isdsasrv.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 436 ea7cc83a0236e197be8d3ad0854408e5_JaffaCakes118.exe 436 ea7cc83a0236e197be8d3ad0854408e5_JaffaCakes118.exe 6564 isdsasrv.exe 6564 isdsasrv.exe 6816 isdsasrv.exe 6816 isdsasrv.exe 7112 isdsasrv.exe 7112 isdsasrv.exe 5720 isdsasrv.exe 5720 isdsasrv.exe 7492 isdsasrv.exe 7492 isdsasrv.exe 5196 isdsasrv.exe 5196 isdsasrv.exe 1676 isdsasrv.exe 1676 isdsasrv.exe 6720 isdsasrv.exe 6720 isdsasrv.exe 5176 isdsasrv.exe 5176 isdsasrv.exe 7808 isdsasrv.exe 7808 isdsasrv.exe 5032 isdsasrv.exe 5032 isdsasrv.exe 6360 isdsasrv.exe 6360 isdsasrv.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 436 ea7cc83a0236e197be8d3ad0854408e5_JaffaCakes118.exe Token: SeDebugPrivilege 6564 isdsasrv.exe Token: SeDebugPrivilege 6816 isdsasrv.exe Token: SeDebugPrivilege 7112 isdsasrv.exe Token: SeDebugPrivilege 5720 isdsasrv.exe Token: SeDebugPrivilege 7492 isdsasrv.exe Token: SeDebugPrivilege 5196 isdsasrv.exe Token: SeDebugPrivilege 1676 isdsasrv.exe Token: SeDebugPrivilege 6720 isdsasrv.exe Token: SeDebugPrivilege 5176 isdsasrv.exe Token: SeDebugPrivilege 7808 isdsasrv.exe Token: SeDebugPrivilege 5032 isdsasrv.exe Token: SeDebugPrivilege 6360 isdsasrv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 436 wrote to memory of 1920 436 ea7cc83a0236e197be8d3ad0854408e5_JaffaCakes118.exe 82 PID 436 wrote to memory of 1920 436 ea7cc83a0236e197be8d3ad0854408e5_JaffaCakes118.exe 82 PID 436 wrote to memory of 1920 436 ea7cc83a0236e197be8d3ad0854408e5_JaffaCakes118.exe 82 PID 436 wrote to memory of 6564 436 ea7cc83a0236e197be8d3ad0854408e5_JaffaCakes118.exe 84 PID 436 wrote to memory of 6564 436 ea7cc83a0236e197be8d3ad0854408e5_JaffaCakes118.exe 84 PID 436 wrote to memory of 6564 436 ea7cc83a0236e197be8d3ad0854408e5_JaffaCakes118.exe 84 PID 6564 wrote to memory of 6608 6564 isdsasrv.exe 85 PID 6564 wrote to memory of 6608 6564 isdsasrv.exe 85 PID 6564 wrote to memory of 6608 6564 isdsasrv.exe 85 PID 6564 wrote to memory of 6816 6564 isdsasrv.exe 87 PID 6564 wrote to memory of 6816 6564 isdsasrv.exe 87 PID 6564 wrote to memory of 6816 6564 isdsasrv.exe 87 PID 6816 wrote to memory of 6856 6816 isdsasrv.exe 88 PID 6816 wrote to memory of 6856 6816 isdsasrv.exe 88 PID 6816 wrote to memory of 6856 6816 isdsasrv.exe 88 PID 6816 wrote to memory of 7112 6816 isdsasrv.exe 90 PID 6816 wrote to memory of 7112 6816 isdsasrv.exe 90 PID 6816 wrote to memory of 7112 6816 isdsasrv.exe 90 PID 7112 wrote to memory of 7144 7112 isdsasrv.exe 91 PID 7112 wrote to memory of 7144 7112 isdsasrv.exe 91 PID 7112 wrote to memory of 7144 7112 isdsasrv.exe 91 PID 7112 wrote to memory of 5720 7112 isdsasrv.exe 93 PID 7112 wrote to memory of 5720 7112 isdsasrv.exe 93 PID 7112 wrote to memory of 5720 7112 isdsasrv.exe 93 PID 5720 wrote to memory of 5704 5720 isdsasrv.exe 94 PID 5720 wrote to memory of 5704 5720 isdsasrv.exe 94 PID 5720 wrote to memory of 5704 5720 isdsasrv.exe 94 PID 5720 wrote to memory of 7492 5720 isdsasrv.exe 95 PID 5720 wrote to memory of 7492 5720 isdsasrv.exe 95 PID 5720 wrote to memory of 7492 5720 isdsasrv.exe 95 PID 7492 wrote to memory of 7564 7492 isdsasrv.exe 97 PID 7492 wrote to memory of 7564 7492 isdsasrv.exe 97 PID 7492 wrote to memory of 7564 7492 isdsasrv.exe 97 PID 7492 wrote to memory of 5196 7492 isdsasrv.exe 99 PID 7492 wrote to memory of 5196 7492 isdsasrv.exe 99 PID 7492 wrote to memory of 5196 7492 isdsasrv.exe 99 PID 5196 wrote to memory of 7156 5196 isdsasrv.exe 100 PID 5196 wrote to memory of 7156 5196 isdsasrv.exe 100 PID 5196 wrote to memory of 7156 5196 isdsasrv.exe 100 PID 5196 wrote to memory of 1676 5196 isdsasrv.exe 102 PID 5196 wrote to memory of 1676 5196 isdsasrv.exe 102 PID 5196 wrote to memory of 1676 5196 isdsasrv.exe 102 PID 1676 wrote to memory of 2944 1676 isdsasrv.exe 103 PID 1676 wrote to memory of 2944 1676 isdsasrv.exe 103 PID 1676 wrote to memory of 2944 1676 isdsasrv.exe 103 PID 1676 wrote to memory of 6720 1676 isdsasrv.exe 105 PID 1676 wrote to memory of 6720 1676 isdsasrv.exe 105 PID 1676 wrote to memory of 6720 1676 isdsasrv.exe 105 PID 6720 wrote to memory of 4712 6720 isdsasrv.exe 106 PID 6720 wrote to memory of 4712 6720 isdsasrv.exe 106 PID 6720 wrote to memory of 4712 6720 isdsasrv.exe 106 PID 6720 wrote to memory of 5176 6720 isdsasrv.exe 108 PID 6720 wrote to memory of 5176 6720 isdsasrv.exe 108 PID 6720 wrote to memory of 5176 6720 isdsasrv.exe 108 PID 5176 wrote to memory of 5596 5176 isdsasrv.exe 109 PID 5176 wrote to memory of 5596 5176 isdsasrv.exe 109 PID 5176 wrote to memory of 5596 5176 isdsasrv.exe 109 PID 5176 wrote to memory of 7808 5176 isdsasrv.exe 111 PID 5176 wrote to memory of 7808 5176 isdsasrv.exe 111 PID 5176 wrote to memory of 7808 5176 isdsasrv.exe 111 PID 7808 wrote to memory of 7840 7808 isdsasrv.exe 112 PID 7808 wrote to memory of 7840 7808 isdsasrv.exe 112 PID 7808 wrote to memory of 7840 7808 isdsasrv.exe 112 PID 7808 wrote to memory of 5032 7808 isdsasrv.exe 621
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea7cc83a0236e197be8d3ad0854408e5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ea7cc83a0236e197be8d3ad0854408e5_JaffaCakes118.exe"1⤵
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240624500.bat2⤵
- System Location Discovery: System Language Discovery
PID:1920
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe2⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:6564 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240624937.bat3⤵
- System Location Discovery: System Language Discovery
PID:6608
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe3⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:6816 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240625265.bat4⤵
- System Location Discovery: System Language Discovery
PID:6856
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe4⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:7112 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240625609.bat5⤵
- System Location Discovery: System Language Discovery
PID:7144
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe5⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5720 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240625953.bat6⤵
- System Location Discovery: System Language Discovery
PID:5704
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe6⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:7492 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240626296.bat7⤵
- System Location Discovery: System Language Discovery
PID:7564
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe7⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5196 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240626625.bat8⤵
- System Location Discovery: System Language Discovery
PID:7156
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe8⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240626859.bat9⤵
- System Location Discovery: System Language Discovery
PID:2944
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe9⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:6720 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240627218.bat10⤵
- System Location Discovery: System Language Discovery
PID:4712
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe10⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5176 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240627531.bat11⤵
- System Location Discovery: System Language Discovery
PID:5596
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe11⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:7808 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240627953.bat12⤵
- System Location Discovery: System Language Discovery
PID:7840
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe12⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5032 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240628296.bat13⤵
- System Location Discovery: System Language Discovery
PID:2924
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe13⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6360 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240628546.bat14⤵
- System Location Discovery: System Language Discovery
PID:6096
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe14⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:6324 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240628859.bat15⤵PID:3832
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe15⤵PID:1352
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240629234.bat16⤵PID:6708
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe16⤵PID:4084
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240630640.bat17⤵PID:6552
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe17⤵PID:4980
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240631015.bat18⤵PID:1692
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe18⤵PID:668
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240631281.bat19⤵PID:2384
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe19⤵PID:1724
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240631578.bat20⤵PID:5156
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe20⤵PID:8248
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240631828.bat21⤵PID:8304
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe21⤵PID:3708
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240632156.bat22⤵PID:6316
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe22⤵PID:7708
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240632546.bat23⤵PID:1940
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe23⤵PID:7844
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240632781.bat24⤵PID:7612
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe24⤵PID:7004
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240633078.bat25⤵PID:6948
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe25⤵PID:6776
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240633359.bat26⤵PID:4940
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe26⤵PID:8748
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240633656.bat27⤵PID:8812
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe27⤵PID:7236
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240633937.bat28⤵PID:8196
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe28⤵PID:7672
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240634203.bat29⤵PID:4808
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe29⤵PID:7656
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240634515.bat30⤵PID:7800
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe30⤵PID:1264
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240634796.bat31⤵PID:6884
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe31⤵PID:6148
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240635125.bat32⤵PID:7512
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe32⤵PID:8264
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240635546.bat33⤵PID:6064
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe33⤵PID:6400
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240635812.bat34⤵PID:6452
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe34⤵PID:7572
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240636140.bat35⤵PID:6388
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe35⤵PID:8176
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240636500.bat36⤵PID:5748
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe36⤵PID:8776
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240636859.bat37⤵PID:7352
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe37⤵PID:1904
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240637265.bat38⤵PID:2664
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe38⤵PID:6344
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240637656.bat39⤵PID:5652
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe39⤵PID:9360
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240638000.bat40⤵PID:9400
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe40⤵PID:9172
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240638375.bat41⤵PID:8560
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe41⤵PID:7780
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240638656.bat42⤵PID:7332
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe42⤵PID:2540
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240639000.bat43⤵PID:2916
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe43⤵PID:6152
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240639375.bat44⤵PID:8112
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe44⤵PID:5296
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240639718.bat45⤵PID:4960
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe45⤵PID:9684
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240640078.bat46⤵PID:9832
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe46⤵PID:9416
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240640515.bat47⤵PID:9500
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe47⤵PID:6728
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240640890.bat48⤵PID:5868
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe48⤵PID:9108
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240641281.bat49⤵PID:4072
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe49⤵PID:5964
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240641546.bat50⤵PID:6204
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe50⤵PID:8156
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240641812.bat51⤵PID:6048
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe51⤵PID:5016
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240642125.bat52⤵PID:8088
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe52⤵PID:10036
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240642421.bat53⤵PID:9856
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe53⤵PID:9892
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240642734.bat54⤵PID:4496
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe54⤵PID:8128
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240643125.bat55⤵PID:8140
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe55⤵PID:2892
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240643406.bat56⤵PID:9600
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe56⤵PID:5188
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240643765.bat57⤵PID:9428
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe57⤵PID:10360
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240644093.bat58⤵PID:10392
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe58⤵PID:2428
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240644343.bat59⤵PID:4524
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe59⤵PID:9272
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240644640.bat60⤵PID:5348
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe60⤵PID:9688
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240644921.bat61⤵PID:6908
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe61⤵PID:8612
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240645203.bat62⤵PID:1444
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe62⤵PID:8840
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240645546.bat63⤵PID:4608
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe63⤵PID:11016
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240645843.bat64⤵PID:11064
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe64⤵PID:7348
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240646203.bat65⤵PID:8372
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe65⤵PID:1112
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240646546.bat66⤵PID:4264
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe66⤵PID:9604
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240646859.bat67⤵PID:1928
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe67⤵PID:7644
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240647156.bat68⤵PID:9932
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe68⤵PID:10532
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240647546.bat69⤵PID:11020
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe69⤵PID:8416
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240647812.bat70⤵PID:3408
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe70⤵PID:6036
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240648109.bat71⤵PID:5164
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe71⤵PID:8568
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240648437.bat72⤵PID:8500
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe72⤵PID:6668
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240648796.bat73⤵PID:8216
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe73⤵PID:10000
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240649109.bat74⤵PID:10140
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe74⤵PID:11324
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240649437.bat75⤵PID:11380
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe75⤵PID:10064
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240649718.bat76⤵PID:9212
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe76⤵PID:748
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240650062.bat77⤵PID:8952
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe77⤵PID:8724
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240650343.bat78⤵PID:800
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe78⤵PID:8008
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240650703.bat79⤵PID:10180
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe79⤵PID:12172
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240650968.bat80⤵PID:12220
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe80⤵PID:4336
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240651359.bat81⤵PID:8536
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe81⤵PID:11504
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240651656.bat82⤵PID:11540
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe82⤵PID:11176
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240652015.bat83⤵PID:10268
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe83⤵PID:4740
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240652343.bat84⤵PID:9544
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe84⤵PID:7956
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240652765.bat85⤵PID:764
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe85⤵PID:1064
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240653125.bat86⤵PID:1256
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe86⤵PID:1748
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240653515.bat87⤵PID:10632
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe87⤵PID:10828
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240653906.bat88⤵PID:11152
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe88⤵PID:3976
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240654265.bat89⤵PID:11088
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe89⤵PID:9936
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240654562.bat90⤵PID:6652
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe90⤵PID:4492
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240654953.bat91⤵PID:6636
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe91⤵PID:8420
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240655203.bat92⤵PID:12320
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe92⤵PID:8332
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240655718.bat93⤵PID:10744
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe93⤵PID:11960
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240655953.bat94⤵PID:9464
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe94⤵PID:8844
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240656390.bat95⤵PID:9424
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe95⤵PID:11480
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240656687.bat96⤵PID:8356
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe96⤵PID:2496
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240657031.bat97⤵PID:11280
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe97⤵PID:10440
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240657484.bat98⤵PID:11648
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe98⤵PID:6820
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240657906.bat99⤵PID:9668
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe99⤵PID:10884
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240658250.bat100⤵PID:12264
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe100⤵PID:4008
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240658531.bat101⤵PID:4292
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe101⤵PID:5908
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240658953.bat102⤵PID:12028
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe102⤵PID:1292
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240659390.bat103⤵PID:5312
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe103⤵PID:9060
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240659718.bat104⤵PID:9260
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe104⤵PID:10504
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240660046.bat105⤵PID:12496
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe105⤵PID:13356
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240660328.bat106⤵PID:13388
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe106⤵PID:13624
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240660750.bat107⤵PID:9748
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe107⤵PID:2292
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240661046.bat108⤵PID:13148
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe108⤵PID:12384
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240661437.bat109⤵PID:12396
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe109⤵PID:5232
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240662078.bat110⤵PID:11796
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe110⤵PID:10336
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240662468.bat111⤵PID:7268
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe111⤵PID:14144
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240662843.bat112⤵PID:14188
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe112⤵PID:13536
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240663406.bat113⤵PID:13852
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe113⤵PID:9288
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240663812.bat114⤵PID:11892
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe114⤵PID:13516
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240664093.bat115⤵PID:5912
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe115⤵PID:8072
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240664562.bat116⤵PID:13512
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe116⤵PID:10212
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240664843.bat117⤵PID:4288
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe117⤵PID:8532
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240665187.bat118⤵PID:7940
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe118⤵PID:15304
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240665609.bat119⤵PID:8852
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe119⤵PID:2176
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240665906.bat120⤵PID:10060
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe120⤵PID:11704
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240666250.bat121⤵PID:9548
-
-
C:\Windows\SysWOW64\isdsasrv.exeC:\Windows\system32\isdsasrv.exe121⤵PID:8616
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240666562.bat122⤵PID:4412
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-