Analysis
-
max time kernel
49s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
27/11/2024, 04:04
Behavioral task
behavioral1
Sample
a5cefa1a4d31d896eb4a36b052f5975b_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
a5cefa1a4d31d896eb4a36b052f5975b_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
a5cefa1a4d31d896eb4a36b052f5975b_JaffaCakes118.exe
-
Size
308KB
-
MD5
a5cefa1a4d31d896eb4a36b052f5975b
-
SHA1
073a25138c7b5ca12441b9382f1d8818c044047f
-
SHA256
0a92f29858b225486714b36a23ed1c1d15ff3594fbc920fc8967e3146de314b5
-
SHA512
128f3369a7ecf782d031c4e68b20fa2046a6611daddf89305841bf5b4716802d2d36ec7a538a38c114a516fbefa86dfe62b9a692cbb9cd26c13ecdd53c9dd76e
-
SSDEEP
6144:j4/hzQk7kq4u8EN4wUi9g7mUNsRM+xmJcBsN1y:jQ79F4wL9SmUsM51
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 64 IoCs
resource yara_rule behavioral1/memory/3052-16-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/2200-25-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/2812-31-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/2724-37-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/2724-34-0x0000000004EA0000-0x0000000004F63000-memory.dmp modiloader_stage2 behavioral1/memory/2780-41-0x0000000003A10000-0x0000000003AD3000-memory.dmp modiloader_stage2 behavioral1/memory/836-45-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/2780-44-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/2780-40-0x0000000003A10000-0x0000000003AD3000-memory.dmp modiloader_stage2 behavioral1/memory/836-50-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/2920-52-0x0000000003A50000-0x0000000003B13000-memory.dmp modiloader_stage2 behavioral1/memory/2920-57-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/1048-62-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/1724-63-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/1724-68-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/2864-69-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/2864-72-0x0000000003AE0000-0x0000000003BA3000-memory.dmp modiloader_stage2 behavioral1/memory/2864-75-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/584-83-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/3020-84-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/584-80-0x0000000004F00000-0x0000000004FC3000-memory.dmp modiloader_stage2 behavioral1/memory/3020-89-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/2208-96-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/2096-102-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/1396-108-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/1508-113-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/772-118-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/1536-117-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/772-119-0x00000000039E0000-0x0000000003AA3000-memory.dmp modiloader_stage2 behavioral1/memory/772-121-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/2284-124-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/1128-123-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/2284-126-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/2104-130-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/2104-127-0x0000000003AD0000-0x0000000003B93000-memory.dmp modiloader_stage2 behavioral1/memory/1016-131-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/1128-132-0x0000000004D40000-0x0000000004E03000-memory.dmp modiloader_stage2 behavioral1/memory/2304-133-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/2304-135-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/1636-136-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/2072-137-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/2716-139-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/2736-142-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/2616-145-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/2616-144-0x0000000003B50000-0x0000000003C13000-memory.dmp modiloader_stage2 behavioral1/memory/2624-146-0x00000000037E0000-0x00000000038A3000-memory.dmp modiloader_stage2 behavioral1/memory/2624-150-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/3064-151-0x0000000004F30000-0x0000000004FF3000-memory.dmp modiloader_stage2 behavioral1/memory/2596-155-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/3064-154-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/2596-159-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/2596-156-0x0000000003B20000-0x0000000003BE3000-memory.dmp modiloader_stage2 behavioral1/memory/1804-162-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/1752-166-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/528-171-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/768-176-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/1564-175-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/768-178-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/264-181-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/2496-184-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/2140-187-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/856-190-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/904-194-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/1536-205-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 -
Executes dropped EXE 64 IoCs
pid Process 2200 vssms32.exe 2812 vssms32.exe 2724 vssms32.exe 2780 vssms32.exe 836 vssms32.exe 2920 vssms32.exe 1048 vssms32.exe 1724 vssms32.exe 2864 vssms32.exe 584 vssms32.exe 3020 vssms32.exe 2208 vssms32.exe 2096 vssms32.exe 1396 vssms32.exe 1508 vssms32.exe 1536 vssms32.exe 772 vssms32.exe 1128 vssms32.exe 2284 vssms32.exe 2104 vssms32.exe 1016 vssms32.exe 2304 vssms32.exe 1636 vssms32.exe 2072 vssms32.exe 2716 vssms32.exe 2736 vssms32.exe 2616 vssms32.exe 2624 vssms32.exe 3064 vssms32.exe 2596 vssms32.exe 1804 vssms32.exe 1752 vssms32.exe 528 vssms32.exe 1564 vssms32.exe 768 vssms32.exe 264 vssms32.exe 2496 vssms32.exe 2140 vssms32.exe 856 vssms32.exe 904 vssms32.exe 2508 vssms32.exe 316 vssms32.exe 2460 vssms32.exe 1536 vssms32.exe 560 vssms32.exe 824 vssms32.exe 1812 vssms32.exe 548 vssms32.exe 2536 vssms32.exe 1924 vssms32.exe 2304 vssms32.exe 2216 vssms32.exe 2124 vssms32.exe 2716 vssms32.exe 2908 vssms32.exe 2748 vssms32.exe 2732 vssms32.exe 1476 vssms32.exe 1676 vssms32.exe 1240 vssms32.exe 1492 vssms32.exe 568 vssms32.exe 1048 vssms32.exe 528 vssms32.exe -
Impair Defenses: Safe Mode Boot 1 TTPs 3 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\WinDefend a5cefa1a4d31d896eb4a36b052f5975b_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\ProfSvc a5cefa1a4d31d896eb4a36b052f5975b_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\Power a5cefa1a4d31d896eb4a36b052f5975b_JaffaCakes118.exe -
Loads dropped DLL 64 IoCs
pid Process 3052 a5cefa1a4d31d896eb4a36b052f5975b_JaffaCakes118.exe 3052 a5cefa1a4d31d896eb4a36b052f5975b_JaffaCakes118.exe 2200 vssms32.exe 2200 vssms32.exe 2812 vssms32.exe 2812 vssms32.exe 2724 vssms32.exe 2724 vssms32.exe 2780 vssms32.exe 2780 vssms32.exe 836 vssms32.exe 836 vssms32.exe 2920 vssms32.exe 2920 vssms32.exe 1048 vssms32.exe 1048 vssms32.exe 1724 vssms32.exe 1724 vssms32.exe 2864 vssms32.exe 2864 vssms32.exe 584 vssms32.exe 584 vssms32.exe 3020 vssms32.exe 3020 vssms32.exe 2208 vssms32.exe 2208 vssms32.exe 2096 vssms32.exe 2096 vssms32.exe 1396 vssms32.exe 1396 vssms32.exe 1508 vssms32.exe 1508 vssms32.exe 1536 vssms32.exe 1536 vssms32.exe 772 vssms32.exe 772 vssms32.exe 1128 vssms32.exe 1128 vssms32.exe 2284 vssms32.exe 2284 vssms32.exe 2104 vssms32.exe 2104 vssms32.exe 1016 vssms32.exe 1016 vssms32.exe 2304 vssms32.exe 2304 vssms32.exe 1636 vssms32.exe 1636 vssms32.exe 2072 vssms32.exe 2072 vssms32.exe 2716 vssms32.exe 2716 vssms32.exe 2736 vssms32.exe 2736 vssms32.exe 2616 vssms32.exe 2616 vssms32.exe 2624 vssms32.exe 2624 vssms32.exe 3064 vssms32.exe 3064 vssms32.exe 2596 vssms32.exe 2596 vssms32.exe 1804 vssms32.exe 1804 vssms32.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" a5cefa1a4d31d896eb4a36b052f5975b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe a5cefa1a4d31d896eb4a36b052f5975b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe -
resource yara_rule behavioral1/memory/3052-0-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/files/0x000d0000000133b8-11.dat upx behavioral1/memory/2200-14-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/3052-16-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2200-25-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2812-23-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2200-20-0x0000000003A20000-0x0000000003AE3000-memory.dmp upx behavioral1/memory/2812-31-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2724-37-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/836-45-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2780-44-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2920-49-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/836-50-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2920-57-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/1048-55-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/1048-62-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/1724-63-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/1724-68-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2864-69-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2864-72-0x0000000003AE0000-0x0000000003BA3000-memory.dmp upx behavioral1/memory/2864-75-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/584-76-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/584-83-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/3020-84-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2208-90-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/3020-89-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2096-97-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2208-96-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2096-102-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/1508-107-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/1396-108-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/1536-114-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/1508-113-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/772-118-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/1536-117-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/772-121-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2284-124-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/1128-123-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2284-126-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/1016-128-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2104-130-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2104-127-0x0000000003AD0000-0x0000000003B93000-memory.dmp upx behavioral1/memory/1016-131-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2304-133-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2304-135-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/1636-136-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2072-137-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2716-139-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2616-140-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2736-142-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2616-145-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/3064-148-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2624-150-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/3064-151-0x0000000004F30000-0x0000000004FF3000-memory.dmp upx behavioral1/memory/2596-155-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/3064-154-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2596-159-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/1804-162-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/528-167-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/1752-166-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/528-171-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/1564-169-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/768-176-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/1564-175-0x0000000000400000-0x00000000004C3000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a5cefa1a4d31d896eb4a36b052f5975b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2200 3052 a5cefa1a4d31d896eb4a36b052f5975b_JaffaCakes118.exe 30 PID 3052 wrote to memory of 2200 3052 a5cefa1a4d31d896eb4a36b052f5975b_JaffaCakes118.exe 30 PID 3052 wrote to memory of 2200 3052 a5cefa1a4d31d896eb4a36b052f5975b_JaffaCakes118.exe 30 PID 3052 wrote to memory of 2200 3052 a5cefa1a4d31d896eb4a36b052f5975b_JaffaCakes118.exe 30 PID 2200 wrote to memory of 2812 2200 vssms32.exe 31 PID 2200 wrote to memory of 2812 2200 vssms32.exe 31 PID 2200 wrote to memory of 2812 2200 vssms32.exe 31 PID 2200 wrote to memory of 2812 2200 vssms32.exe 31 PID 2812 wrote to memory of 2724 2812 vssms32.exe 32 PID 2812 wrote to memory of 2724 2812 vssms32.exe 32 PID 2812 wrote to memory of 2724 2812 vssms32.exe 32 PID 2812 wrote to memory of 2724 2812 vssms32.exe 32 PID 2724 wrote to memory of 2780 2724 vssms32.exe 33 PID 2724 wrote to memory of 2780 2724 vssms32.exe 33 PID 2724 wrote to memory of 2780 2724 vssms32.exe 33 PID 2724 wrote to memory of 2780 2724 vssms32.exe 33 PID 2780 wrote to memory of 836 2780 vssms32.exe 34 PID 2780 wrote to memory of 836 2780 vssms32.exe 34 PID 2780 wrote to memory of 836 2780 vssms32.exe 34 PID 2780 wrote to memory of 836 2780 vssms32.exe 34 PID 836 wrote to memory of 2920 836 vssms32.exe 35 PID 836 wrote to memory of 2920 836 vssms32.exe 35 PID 836 wrote to memory of 2920 836 vssms32.exe 35 PID 836 wrote to memory of 2920 836 vssms32.exe 35 PID 2920 wrote to memory of 1048 2920 vssms32.exe 36 PID 2920 wrote to memory of 1048 2920 vssms32.exe 36 PID 2920 wrote to memory of 1048 2920 vssms32.exe 36 PID 2920 wrote to memory of 1048 2920 vssms32.exe 36 PID 1048 wrote to memory of 1724 1048 vssms32.exe 37 PID 1048 wrote to memory of 1724 1048 vssms32.exe 37 PID 1048 wrote to memory of 1724 1048 vssms32.exe 37 PID 1048 wrote to memory of 1724 1048 vssms32.exe 37 PID 1724 wrote to memory of 2864 1724 vssms32.exe 38 PID 1724 wrote to memory of 2864 1724 vssms32.exe 38 PID 1724 wrote to memory of 2864 1724 vssms32.exe 38 PID 1724 wrote to memory of 2864 1724 vssms32.exe 38 PID 2864 wrote to memory of 584 2864 vssms32.exe 39 PID 2864 wrote to memory of 584 2864 vssms32.exe 39 PID 2864 wrote to memory of 584 2864 vssms32.exe 39 PID 2864 wrote to memory of 584 2864 vssms32.exe 39 PID 584 wrote to memory of 3020 584 vssms32.exe 40 PID 584 wrote to memory of 3020 584 vssms32.exe 40 PID 584 wrote to memory of 3020 584 vssms32.exe 40 PID 584 wrote to memory of 3020 584 vssms32.exe 40 PID 3020 wrote to memory of 2208 3020 vssms32.exe 41 PID 3020 wrote to memory of 2208 3020 vssms32.exe 41 PID 3020 wrote to memory of 2208 3020 vssms32.exe 41 PID 3020 wrote to memory of 2208 3020 vssms32.exe 41 PID 2208 wrote to memory of 2096 2208 vssms32.exe 42 PID 2208 wrote to memory of 2096 2208 vssms32.exe 42 PID 2208 wrote to memory of 2096 2208 vssms32.exe 42 PID 2208 wrote to memory of 2096 2208 vssms32.exe 42 PID 2096 wrote to memory of 1396 2096 vssms32.exe 43 PID 2096 wrote to memory of 1396 2096 vssms32.exe 43 PID 2096 wrote to memory of 1396 2096 vssms32.exe 43 PID 2096 wrote to memory of 1396 2096 vssms32.exe 43 PID 1396 wrote to memory of 1508 1396 vssms32.exe 44 PID 1396 wrote to memory of 1508 1396 vssms32.exe 44 PID 1396 wrote to memory of 1508 1396 vssms32.exe 44 PID 1396 wrote to memory of 1508 1396 vssms32.exe 44 PID 1508 wrote to memory of 1536 1508 vssms32.exe 73 PID 1508 wrote to memory of 1536 1508 vssms32.exe 73 PID 1508 wrote to memory of 1536 1508 vssms32.exe 73 PID 1508 wrote to memory of 1536 1508 vssms32.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5cefa1a4d31d896eb4a36b052f5975b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5cefa1a4d31d896eb4a36b052f5975b_JaffaCakes118.exe"1⤵
- Impair Defenses: Safe Mode Boot
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1536 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:772 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1128 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2284 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2104 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1016 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2304 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
PID:1636 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:2072 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2716 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"27⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2736 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2616 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2624 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
PID:3064 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2596 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1804 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"33⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1752 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"34⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:528 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"35⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1564 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"36⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:768 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"37⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:264 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"38⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:2496 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"39⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2140 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"40⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:856 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"41⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:904 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"42⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2508 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"43⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:316 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"44⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2460 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"45⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1536 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"46⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:560 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"47⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:824 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"48⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1812 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"49⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:548 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"50⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2536 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"51⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1924 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"52⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2304 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"53⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2216 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"54⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2124 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"55⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2716 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"56⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2908 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"57⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2748 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"58⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2732 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"59⤵
- Executes dropped EXE
PID:1476 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"60⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1676 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"61⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1240 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"62⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1492 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"63⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:568 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"64⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1048 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"65⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:528 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"66⤵
- System Location Discovery: System Language Discovery
PID:1264 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"67⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2428 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"68⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2248 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"69⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2116 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"70⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2496 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"71⤵
- Adds Run key to start application
PID:2140 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"72⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2412 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"73⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1744 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"74⤵PID:912
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"75⤵PID:1372
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"76⤵PID:2940
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"77⤵PID:2416
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"78⤵PID:1800
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"79⤵PID:2984
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"80⤵PID:1956
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"81⤵PID:2284
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"82⤵PID:2512
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"83⤵PID:2316
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"84⤵PID:1688
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"85⤵PID:2420
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"86⤵PID:2756
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"87⤵PID:2360
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"88⤵PID:2640
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"89⤵PID:796
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"90⤵PID:1940
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"91⤵PID:2592
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"92⤵PID:1268
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"93⤵PID:2780
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"94⤵PID:1148
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"95⤵PID:628
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"96⤵PID:872
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"97⤵PID:2280
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"98⤵PID:1756
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"99⤵PID:2864
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"100⤵PID:3016
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"101⤵PID:2168
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"102⤵PID:2372
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"103⤵PID:860
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"104⤵PID:700
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"105⤵PID:1644
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"106⤵PID:1980
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"107⤵PID:2916
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"108⤵PID:1396
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"109⤵PID:968
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"110⤵PID:2220
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"111⤵PID:1572
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"112⤵PID:2300
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"113⤵PID:1796
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"114⤵PID:1812
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"115⤵PID:2260
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"116⤵PID:2536
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"117⤵PID:1248
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"118⤵PID:2836
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"119⤵PID:2896
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"120⤵PID:2404
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"121⤵PID:2784
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"122⤵PID:2656
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-