Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-12-2024 04:31
Static task
static1
Behavioral task
behavioral1
Sample
dd052c3073b8f29720d0a20b96b932ad_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dd052c3073b8f29720d0a20b96b932ad_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
dd052c3073b8f29720d0a20b96b932ad_JaffaCakes118.exe
-
Size
240KB
-
MD5
dd052c3073b8f29720d0a20b96b932ad
-
SHA1
09bbe2f8b18d04486319f0215b629f2a1b5da3bb
-
SHA256
c158c37fd4b94dc68470343fc1753c1d2e5b117294a151c28de14af5ef246e04
-
SHA512
a1bac3159c743271b9dac992aa0fdc8f1268140dfceccf8b757a048fca97adf9dcfbf1ae667e289751dbebcec108de672e05768139c8b3271a57ec23134fbe02
-
SSDEEP
6144:TFEZhgTJvIzboy9WEcUMDNjaEsiIW3YgXP:TFjyUy9WoMxOEsFOXXP
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmicvrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmicvrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmicvrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmicvrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmicvrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmicvrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmicvrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmicvrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmicvrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmicvrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmicvrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmicvrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmicvrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmicvrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation dd052c3073b8f29720d0a20b96b932ad_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmicvrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmicvrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmicvrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmicvrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmicvrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmicvrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmicvrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmicvrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmicvrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmicvrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmicvrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmicvrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmicvrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmicvrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmicvrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmicvrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmicvrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmicvrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmicvrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmicvrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmicvrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmicvrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmicvrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmicvrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmicvrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmicvrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmicvrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmicvrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmicvrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmicvrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmicvrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmicvrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmicvrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmicvrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmicvrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmicvrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmicvrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmicvrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmicvrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmicvrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmicvrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmicvrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmicvrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmicvrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmicvrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmicvrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmicvrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmicvrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmicvrt.exe -
Deletes itself 1 IoCs
pid Process 32 wmicvrt.exe -
Executes dropped EXE 64 IoCs
pid Process 2864 wmicvrt.exe 32 wmicvrt.exe 2232 wmicvrt.exe 4960 wmicvrt.exe 616 wmicvrt.exe 4296 wmicvrt.exe 4620 wmicvrt.exe 4456 wmicvrt.exe 2388 wmicvrt.exe 4172 wmicvrt.exe 3624 wmicvrt.exe 1524 wmicvrt.exe 1112 wmicvrt.exe 2948 wmicvrt.exe 2268 wmicvrt.exe 1920 wmicvrt.exe 4968 wmicvrt.exe 1492 wmicvrt.exe 2092 wmicvrt.exe 2112 wmicvrt.exe 2232 wmicvrt.exe 5028 wmicvrt.exe 1856 wmicvrt.exe 5060 wmicvrt.exe 3332 wmicvrt.exe 3092 wmicvrt.exe 4484 wmicvrt.exe 1256 wmicvrt.exe 1852 wmicvrt.exe 1008 wmicvrt.exe 3180 wmicvrt.exe 380 wmicvrt.exe 1260 wmicvrt.exe 3540 wmicvrt.exe 232 wmicvrt.exe 5116 wmicvrt.exe 1344 wmicvrt.exe 4968 wmicvrt.exe 892 wmicvrt.exe 3024 wmicvrt.exe 4636 wmicvrt.exe 2852 wmicvrt.exe 3196 wmicvrt.exe 3640 wmicvrt.exe 4612 wmicvrt.exe 4548 wmicvrt.exe 2188 wmicvrt.exe 1304 wmicvrt.exe 3400 wmicvrt.exe 2560 wmicvrt.exe 1008 wmicvrt.exe 1632 wmicvrt.exe 524 wmicvrt.exe 540 wmicvrt.exe 440 wmicvrt.exe 3524 wmicvrt.exe 3468 wmicvrt.exe 376 wmicvrt.exe 2772 wmicvrt.exe 3136 wmicvrt.exe 4628 wmicvrt.exe 4360 wmicvrt.exe 4308 wmicvrt.exe 5088 wmicvrt.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wmicvrt.exe wmicvrt.exe File opened for modification C:\Windows\SysWOW64\wmicvrt.exe wmicvrt.exe File created C:\Windows\SysWOW64\wmicvrt.exe wmicvrt.exe File opened for modification C:\Windows\SysWOW64\wmicvrt.exe wmicvrt.exe File created C:\Windows\SysWOW64\wmicvrt.exe wmicvrt.exe File created C:\Windows\SysWOW64\wmicvrt.exe wmicvrt.exe File opened for modification C:\Windows\SysWOW64\wmicvrt.exe wmicvrt.exe File opened for modification C:\Windows\SysWOW64\wmicvrt.exe wmicvrt.exe File created C:\Windows\SysWOW64\wmicvrt.exe wmicvrt.exe File created C:\Windows\SysWOW64\wmicvrt.exe wmicvrt.exe File opened for modification C:\Windows\SysWOW64\wmicvrt.exe wmicvrt.exe File opened for modification C:\Windows\SysWOW64\wmicvrt.exe wmicvrt.exe File opened for modification C:\Windows\SysWOW64\wmicvrt.exe wmicvrt.exe File opened for modification C:\Windows\SysWOW64\wmicvrt.exe wmicvrt.exe File created C:\Windows\SysWOW64\wmicvrt.exe wmicvrt.exe File created C:\Windows\SysWOW64\wmicvrt.exe wmicvrt.exe File opened for modification C:\Windows\SysWOW64\wmicvrt.exe wmicvrt.exe File opened for modification C:\Windows\SysWOW64\wmicvrt.exe wmicvrt.exe File opened for modification C:\Windows\SysWOW64\wmicvrt.exe wmicvrt.exe File opened for modification C:\Windows\SysWOW64\wmicvrt.exe wmicvrt.exe File opened for modification C:\Windows\SysWOW64\wmicvrt.exe wmicvrt.exe File opened for modification C:\Windows\SysWOW64\wmicvrt.exe wmicvrt.exe File opened for modification C:\Windows\SysWOW64\wmicvrt.exe wmicvrt.exe File opened for modification C:\Windows\SysWOW64\wmicvrt.exe wmicvrt.exe File opened for modification C:\Windows\SysWOW64\wmicvrt.exe wmicvrt.exe File created C:\Windows\SysWOW64\wmicvrt.exe wmicvrt.exe File created C:\Windows\SysWOW64\wmicvrt.exe wmicvrt.exe File opened for modification C:\Windows\SysWOW64\wmicvrt.exe wmicvrt.exe File opened for modification C:\Windows\SysWOW64\wmicvrt.exe wmicvrt.exe File opened for modification C:\Windows\SysWOW64\wmicvrt.exe wmicvrt.exe File created C:\Windows\SysWOW64\wmicvrt.exe wmicvrt.exe File created C:\Windows\SysWOW64\wmicvrt.exe wmicvrt.exe File created C:\Windows\SysWOW64\wmicvrt.exe wmicvrt.exe File opened for modification C:\Windows\SysWOW64\wmicvrt.exe wmicvrt.exe File opened for modification C:\Windows\SysWOW64\wmicvrt.exe wmicvrt.exe File opened for modification C:\Windows\SysWOW64\wmicvrt.exe wmicvrt.exe File opened for modification C:\Windows\SysWOW64\wmicvrt.exe wmicvrt.exe File opened for modification C:\Windows\SysWOW64\wmicvrt.exe wmicvrt.exe File created C:\Windows\SysWOW64\wmicvrt.exe wmicvrt.exe File opened for modification C:\Windows\SysWOW64\wmicvrt.exe wmicvrt.exe File created C:\Windows\SysWOW64\wmicvrt.exe wmicvrt.exe File opened for modification C:\Windows\SysWOW64\wmicvrt.exe wmicvrt.exe File created C:\Windows\SysWOW64\wmicvrt.exe wmicvrt.exe File created C:\Windows\SysWOW64\wmicvrt.exe wmicvrt.exe File created C:\Windows\SysWOW64\wmicvrt.exe wmicvrt.exe File created C:\Windows\SysWOW64\wmicvrt.exe wmicvrt.exe File created C:\Windows\SysWOW64\wmicvrt.exe wmicvrt.exe File opened for modification C:\Windows\SysWOW64\wmicvrt.exe wmicvrt.exe File opened for modification C:\Windows\SysWOW64\wmicvrt.exe wmicvrt.exe File opened for modification C:\Windows\SysWOW64\wmicvrt.exe wmicvrt.exe File created C:\Windows\SysWOW64\wmicvrt.exe wmicvrt.exe File created C:\Windows\SysWOW64\wmicvrt.exe wmicvrt.exe File opened for modification C:\Windows\SysWOW64\wmicvrt.exe wmicvrt.exe File opened for modification C:\Windows\SysWOW64\wmicvrt.exe wmicvrt.exe File created C:\Windows\SysWOW64\wmicvrt.exe wmicvrt.exe File opened for modification C:\Windows\SysWOW64\wmicvrt.exe wmicvrt.exe File created C:\Windows\SysWOW64\wmicvrt.exe wmicvrt.exe File created C:\Windows\SysWOW64\wmicvrt.exe wmicvrt.exe File opened for modification C:\Windows\SysWOW64\wmicvrt.exe wmicvrt.exe File created C:\Windows\SysWOW64\wmicvrt.exe wmicvrt.exe File opened for modification C:\Windows\SysWOW64\wmicvrt.exe wmicvrt.exe File created C:\Windows\SysWOW64\wmicvrt.exe wmicvrt.exe File opened for modification C:\Windows\SysWOW64\wmicvrt.exe wmicvrt.exe File created C:\Windows\SysWOW64\wmicvrt.exe wmicvrt.exe -
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 220 set thread context of 4080 220 dd052c3073b8f29720d0a20b96b932ad_JaffaCakes118.exe 84 PID 2864 set thread context of 32 2864 wmicvrt.exe 86 PID 2232 set thread context of 4960 2232 wmicvrt.exe 89 PID 616 set thread context of 4296 616 wmicvrt.exe 91 PID 4620 set thread context of 4456 4620 wmicvrt.exe 100 PID 2388 set thread context of 4172 2388 wmicvrt.exe 102 PID 3624 set thread context of 1524 3624 wmicvrt.exe 106 PID 1112 set thread context of 2948 1112 wmicvrt.exe 111 PID 2268 set thread context of 1920 2268 wmicvrt.exe 114 PID 4968 set thread context of 1492 4968 wmicvrt.exe 116 PID 2092 set thread context of 2112 2092 wmicvrt.exe 118 PID 2232 set thread context of 5028 2232 wmicvrt.exe 120 PID 1856 set thread context of 5060 1856 wmicvrt.exe 122 PID 3332 set thread context of 3092 3332 wmicvrt.exe 124 PID 4484 set thread context of 1256 4484 wmicvrt.exe 126 PID 1852 set thread context of 1008 1852 wmicvrt.exe 128 PID 3180 set thread context of 380 3180 wmicvrt.exe 132 PID 1260 set thread context of 3540 1260 wmicvrt.exe 134 PID 232 set thread context of 5116 232 wmicvrt.exe 137 PID 1344 set thread context of 4968 1344 wmicvrt.exe 139 PID 892 set thread context of 3024 892 wmicvrt.exe 141 PID 4636 set thread context of 2852 4636 wmicvrt.exe 143 PID 3196 set thread context of 3640 3196 wmicvrt.exe 145 PID 4612 set thread context of 4548 4612 wmicvrt.exe 147 PID 2188 set thread context of 1304 2188 wmicvrt.exe 149 PID 3400 set thread context of 2560 3400 wmicvrt.exe 151 PID 1008 set thread context of 1632 1008 wmicvrt.exe 153 PID 524 set thread context of 540 524 wmicvrt.exe 155 PID 440 set thread context of 3524 440 wmicvrt.exe 157 PID 3468 set thread context of 376 3468 wmicvrt.exe 159 PID 2772 set thread context of 3136 2772 wmicvrt.exe 161 PID 4628 set thread context of 4360 4628 wmicvrt.exe 163 PID 4308 set thread context of 5088 4308 wmicvrt.exe 166 PID 1324 set thread context of 1752 1324 wmicvrt.exe 168 PID 864 set thread context of 4820 864 wmicvrt.exe 170 PID 1888 set thread context of 4484 1888 wmicvrt.exe 172 PID 2696 set thread context of 2388 2696 wmicvrt.exe 174 PID 1036 set thread context of 1612 1036 wmicvrt.exe 176 PID 4732 set thread context of 5040 4732 wmicvrt.exe 178 PID 856 set thread context of 2844 856 wmicvrt.exe 180 PID 3292 set thread context of 4944 3292 wmicvrt.exe 182 PID 2572 set thread context of 4896 2572 wmicvrt.exe 184 PID 3920 set thread context of 740 3920 wmicvrt.exe 186 PID 3816 set thread context of 4480 3816 wmicvrt.exe 188 PID 3956 set thread context of 1684 3956 wmicvrt.exe 190 PID 4912 set thread context of 3488 4912 wmicvrt.exe 192 PID 4668 set thread context of 1856 4668 wmicvrt.exe 194 PID 3204 set thread context of 3588 3204 wmicvrt.exe 196 PID 1956 set thread context of 2188 1956 wmicvrt.exe 198 PID 4012 set thread context of 2780 4012 wmicvrt.exe 200 PID 3528 set thread context of 692 3528 wmicvrt.exe 202 PID 4132 set thread context of 708 4132 wmicvrt.exe 204 PID 3364 set thread context of 2900 3364 wmicvrt.exe 206 PID 4408 set thread context of 5032 4408 wmicvrt.exe 208 PID 5000 set thread context of 3996 5000 wmicvrt.exe 210 PID 3896 set thread context of 2100 3896 wmicvrt.exe 212 PID 1748 set thread context of 4300 1748 wmicvrt.exe 214 PID 5084 set thread context of 4728 5084 wmicvrt.exe 216 PID 4476 set thread context of 4700 4476 wmicvrt.exe 218 PID 1616 set thread context of 2492 1616 wmicvrt.exe 220 PID 1000 set thread context of 3964 1000 wmicvrt.exe 222 PID 3536 set thread context of 2148 3536 wmicvrt.exe 224 PID 3428 set thread context of 2116 3428 wmicvrt.exe 226 PID 2588 set thread context of 3528 2588 wmicvrt.exe 228 -
resource yara_rule behavioral2/memory/4080-2-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/4080-4-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/4080-3-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/4080-7-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/4080-10-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/4080-9-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/4080-8-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/4080-73-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/32-81-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/32-82-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/32-83-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/32-84-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/32-86-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/4960-96-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/4960-97-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/4960-98-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/4960-100-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/4296-112-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/4296-114-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/4296-113-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/4296-111-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/4296-116-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/4456-126-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/4456-128-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/4456-127-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/4456-132-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/4172-142-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/4172-144-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/4172-143-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/4172-146-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/1524-162-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/2948-174-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/2948-179-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/1920-194-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/1492-209-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/2112-224-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/5028-239-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/5060-255-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/3092-269-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/1256-285-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/1008-300-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/380-312-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/380-316-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/3540-331-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/5116-346-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/4968-356-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/4968-362-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/3024-372-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/3024-379-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/2852-395-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/3640-410-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/4548-422-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/4548-425-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/1304-438-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/2560-451-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/1632-464-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/540-475-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/540-478-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/3524-491-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/376-504-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/3136-517-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/4360-530-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/5088-541-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/5088-544-0x0000000000400000-0x0000000000464000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmicvrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmicvrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmicvrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmicvrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmicvrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmicvrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmicvrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmicvrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmicvrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmicvrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmicvrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmicvrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmicvrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmicvrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmicvrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmicvrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmicvrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmicvrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmicvrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmicvrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmicvrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmicvrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmicvrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmicvrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmicvrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmicvrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmicvrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmicvrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmicvrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmicvrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmicvrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmicvrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmicvrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmicvrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dd052c3073b8f29720d0a20b96b932ad_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmicvrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmicvrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmicvrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmicvrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmicvrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmicvrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmicvrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmicvrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmicvrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmicvrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmicvrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmicvrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmicvrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmicvrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmicvrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmicvrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmicvrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmicvrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmicvrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmicvrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmicvrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmicvrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmicvrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmicvrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmicvrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmicvrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dd052c3073b8f29720d0a20b96b932ad_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmicvrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmicvrt.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmicvrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmicvrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmicvrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmicvrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmicvrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmicvrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmicvrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmicvrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmicvrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmicvrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmicvrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmicvrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmicvrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmicvrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmicvrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmicvrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmicvrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmicvrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmicvrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ dd052c3073b8f29720d0a20b96b932ad_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmicvrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmicvrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmicvrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmicvrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmicvrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmicvrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmicvrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmicvrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmicvrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmicvrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmicvrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmicvrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmicvrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmicvrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmicvrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmicvrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmicvrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmicvrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmicvrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmicvrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmicvrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmicvrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmicvrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmicvrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmicvrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmicvrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmicvrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmicvrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmicvrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmicvrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmicvrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmicvrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmicvrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmicvrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmicvrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmicvrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmicvrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmicvrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmicvrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmicvrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmicvrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmicvrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmicvrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmicvrt.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4080 dd052c3073b8f29720d0a20b96b932ad_JaffaCakes118.exe 4080 dd052c3073b8f29720d0a20b96b932ad_JaffaCakes118.exe 32 wmicvrt.exe 32 wmicvrt.exe 4960 wmicvrt.exe 4960 wmicvrt.exe 4296 wmicvrt.exe 4296 wmicvrt.exe 4456 wmicvrt.exe 4456 wmicvrt.exe 4172 wmicvrt.exe 4172 wmicvrt.exe 1524 wmicvrt.exe 1524 wmicvrt.exe 2948 wmicvrt.exe 2948 wmicvrt.exe 1920 wmicvrt.exe 1920 wmicvrt.exe 1492 wmicvrt.exe 1492 wmicvrt.exe 2112 wmicvrt.exe 2112 wmicvrt.exe 5028 wmicvrt.exe 5028 wmicvrt.exe 5060 wmicvrt.exe 5060 wmicvrt.exe 3092 wmicvrt.exe 3092 wmicvrt.exe 1256 wmicvrt.exe 1256 wmicvrt.exe 1008 wmicvrt.exe 1008 wmicvrt.exe 380 wmicvrt.exe 380 wmicvrt.exe 3540 wmicvrt.exe 3540 wmicvrt.exe 5116 wmicvrt.exe 5116 wmicvrt.exe 4968 wmicvrt.exe 4968 wmicvrt.exe 3024 wmicvrt.exe 3024 wmicvrt.exe 2852 wmicvrt.exe 2852 wmicvrt.exe 3640 wmicvrt.exe 3640 wmicvrt.exe 4548 wmicvrt.exe 4548 wmicvrt.exe 1304 wmicvrt.exe 1304 wmicvrt.exe 2560 wmicvrt.exe 2560 wmicvrt.exe 1632 wmicvrt.exe 1632 wmicvrt.exe 540 wmicvrt.exe 540 wmicvrt.exe 3524 wmicvrt.exe 3524 wmicvrt.exe 376 wmicvrt.exe 376 wmicvrt.exe 3136 wmicvrt.exe 3136 wmicvrt.exe 4360 wmicvrt.exe 4360 wmicvrt.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 220 dd052c3073b8f29720d0a20b96b932ad_JaffaCakes118.exe 2864 wmicvrt.exe 2232 wmicvrt.exe 616 wmicvrt.exe 4620 wmicvrt.exe 2388 wmicvrt.exe 3624 wmicvrt.exe 1112 wmicvrt.exe 2268 wmicvrt.exe 4968 wmicvrt.exe 2092 wmicvrt.exe 2232 wmicvrt.exe 1856 wmicvrt.exe 3332 wmicvrt.exe 4484 wmicvrt.exe 1852 wmicvrt.exe 3180 wmicvrt.exe 1260 wmicvrt.exe 232 wmicvrt.exe 1344 wmicvrt.exe 892 wmicvrt.exe 4636 wmicvrt.exe 3196 wmicvrt.exe 4612 wmicvrt.exe 2188 wmicvrt.exe 3400 wmicvrt.exe 1008 wmicvrt.exe 524 wmicvrt.exe 440 wmicvrt.exe 3468 wmicvrt.exe 2772 wmicvrt.exe 4628 wmicvrt.exe 4308 wmicvrt.exe 1324 wmicvrt.exe 864 wmicvrt.exe 1888 wmicvrt.exe 2696 wmicvrt.exe 1036 wmicvrt.exe 4732 wmicvrt.exe 856 wmicvrt.exe 3292 wmicvrt.exe 2572 wmicvrt.exe 3920 wmicvrt.exe 3816 wmicvrt.exe 3956 wmicvrt.exe 4912 wmicvrt.exe 4668 wmicvrt.exe 3204 wmicvrt.exe 1956 wmicvrt.exe 4012 wmicvrt.exe 3528 wmicvrt.exe 4132 wmicvrt.exe 3364 wmicvrt.exe 4408 wmicvrt.exe 5000 wmicvrt.exe 3896 wmicvrt.exe 1748 wmicvrt.exe 5084 wmicvrt.exe 4476 wmicvrt.exe 1616 wmicvrt.exe 1000 wmicvrt.exe 3536 wmicvrt.exe 3428 wmicvrt.exe 2588 wmicvrt.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 220 wrote to memory of 4080 220 dd052c3073b8f29720d0a20b96b932ad_JaffaCakes118.exe 84 PID 220 wrote to memory of 4080 220 dd052c3073b8f29720d0a20b96b932ad_JaffaCakes118.exe 84 PID 220 wrote to memory of 4080 220 dd052c3073b8f29720d0a20b96b932ad_JaffaCakes118.exe 84 PID 220 wrote to memory of 4080 220 dd052c3073b8f29720d0a20b96b932ad_JaffaCakes118.exe 84 PID 220 wrote to memory of 4080 220 dd052c3073b8f29720d0a20b96b932ad_JaffaCakes118.exe 84 PID 220 wrote to memory of 4080 220 dd052c3073b8f29720d0a20b96b932ad_JaffaCakes118.exe 84 PID 220 wrote to memory of 4080 220 dd052c3073b8f29720d0a20b96b932ad_JaffaCakes118.exe 84 PID 4080 wrote to memory of 2864 4080 dd052c3073b8f29720d0a20b96b932ad_JaffaCakes118.exe 85 PID 4080 wrote to memory of 2864 4080 dd052c3073b8f29720d0a20b96b932ad_JaffaCakes118.exe 85 PID 4080 wrote to memory of 2864 4080 dd052c3073b8f29720d0a20b96b932ad_JaffaCakes118.exe 85 PID 2864 wrote to memory of 32 2864 wmicvrt.exe 86 PID 2864 wrote to memory of 32 2864 wmicvrt.exe 86 PID 2864 wrote to memory of 32 2864 wmicvrt.exe 86 PID 2864 wrote to memory of 32 2864 wmicvrt.exe 86 PID 2864 wrote to memory of 32 2864 wmicvrt.exe 86 PID 2864 wrote to memory of 32 2864 wmicvrt.exe 86 PID 2864 wrote to memory of 32 2864 wmicvrt.exe 86 PID 32 wrote to memory of 2232 32 wmicvrt.exe 88 PID 32 wrote to memory of 2232 32 wmicvrt.exe 88 PID 32 wrote to memory of 2232 32 wmicvrt.exe 88 PID 2232 wrote to memory of 4960 2232 wmicvrt.exe 89 PID 2232 wrote to memory of 4960 2232 wmicvrt.exe 89 PID 2232 wrote to memory of 4960 2232 wmicvrt.exe 89 PID 2232 wrote to memory of 4960 2232 wmicvrt.exe 89 PID 2232 wrote to memory of 4960 2232 wmicvrt.exe 89 PID 2232 wrote to memory of 4960 2232 wmicvrt.exe 89 PID 2232 wrote to memory of 4960 2232 wmicvrt.exe 89 PID 4960 wrote to memory of 616 4960 wmicvrt.exe 90 PID 4960 wrote to memory of 616 4960 wmicvrt.exe 90 PID 4960 wrote to memory of 616 4960 wmicvrt.exe 90 PID 616 wrote to memory of 4296 616 wmicvrt.exe 91 PID 616 wrote to memory of 4296 616 wmicvrt.exe 91 PID 616 wrote to memory of 4296 616 wmicvrt.exe 91 PID 616 wrote to memory of 4296 616 wmicvrt.exe 91 PID 616 wrote to memory of 4296 616 wmicvrt.exe 91 PID 616 wrote to memory of 4296 616 wmicvrt.exe 91 PID 616 wrote to memory of 4296 616 wmicvrt.exe 91 PID 4296 wrote to memory of 4620 4296 wmicvrt.exe 99 PID 4296 wrote to memory of 4620 4296 wmicvrt.exe 99 PID 4296 wrote to memory of 4620 4296 wmicvrt.exe 99 PID 4620 wrote to memory of 4456 4620 wmicvrt.exe 100 PID 4620 wrote to memory of 4456 4620 wmicvrt.exe 100 PID 4620 wrote to memory of 4456 4620 wmicvrt.exe 100 PID 4620 wrote to memory of 4456 4620 wmicvrt.exe 100 PID 4620 wrote to memory of 4456 4620 wmicvrt.exe 100 PID 4620 wrote to memory of 4456 4620 wmicvrt.exe 100 PID 4620 wrote to memory of 4456 4620 wmicvrt.exe 100 PID 4456 wrote to memory of 2388 4456 wmicvrt.exe 101 PID 4456 wrote to memory of 2388 4456 wmicvrt.exe 101 PID 4456 wrote to memory of 2388 4456 wmicvrt.exe 101 PID 2388 wrote to memory of 4172 2388 wmicvrt.exe 102 PID 2388 wrote to memory of 4172 2388 wmicvrt.exe 102 PID 2388 wrote to memory of 4172 2388 wmicvrt.exe 102 PID 2388 wrote to memory of 4172 2388 wmicvrt.exe 102 PID 2388 wrote to memory of 4172 2388 wmicvrt.exe 102 PID 2388 wrote to memory of 4172 2388 wmicvrt.exe 102 PID 2388 wrote to memory of 4172 2388 wmicvrt.exe 102 PID 4172 wrote to memory of 3624 4172 wmicvrt.exe 105 PID 4172 wrote to memory of 3624 4172 wmicvrt.exe 105 PID 4172 wrote to memory of 3624 4172 wmicvrt.exe 105 PID 3624 wrote to memory of 1524 3624 wmicvrt.exe 106 PID 3624 wrote to memory of 1524 3624 wmicvrt.exe 106 PID 3624 wrote to memory of 1524 3624 wmicvrt.exe 106 PID 3624 wrote to memory of 1524 3624 wmicvrt.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd052c3073b8f29720d0a20b96b932ad_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dd052c3073b8f29720d0a20b96b932ad_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Users\Admin\AppData\Local\Temp\dd052c3073b8f29720d0a20b96b932ad_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\dd052c3073b8f29720d0a20b96b932ad_JaffaCakes118.exe2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Windows\SysWOW64\wmicvrt.exe"C:\Windows\system32\wmicvrt.exe" C:\Users\Admin\AppData\Local\Temp\DD052C~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\wmicvrt.exeC:\Windows\SysWOW64\wmicvrt.exe C:\Users\Admin\AppData\Local\Temp\DD052C~1.EXE4⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:32 -
C:\Windows\SysWOW64\wmicvrt.exe"C:\Windows\system32\wmicvrt.exe" C:\Windows\SysWOW64\wmicvrt.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\wmicvrt.exeC:\Windows\SysWOW64\wmicvrt.exe C:\Windows\SysWOW64\wmicvrt.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\SysWOW64\wmicvrt.exe"C:\Windows\system32\wmicvrt.exe" C:\Windows\SysWOW64\wmicvrt.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:616 -
C:\Windows\SysWOW64\wmicvrt.exeC:\Windows\SysWOW64\wmicvrt.exe C:\Windows\SysWOW64\wmicvrt.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Windows\SysWOW64\wmicvrt.exe"C:\Windows\system32\wmicvrt.exe" C:\Windows\SysWOW64\wmicvrt.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Windows\SysWOW64\wmicvrt.exeC:\Windows\SysWOW64\wmicvrt.exe C:\Windows\SysWOW64\wmicvrt.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Windows\SysWOW64\wmicvrt.exe"C:\Windows\system32\wmicvrt.exe" C:\Windows\SysWOW64\wmicvrt.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\SysWOW64\wmicvrt.exeC:\Windows\SysWOW64\wmicvrt.exe C:\Windows\SysWOW64\wmicvrt.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Windows\SysWOW64\wmicvrt.exe"C:\Windows\system32\wmicvrt.exe" C:\Windows\SysWOW64\wmicvrt.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Windows\SysWOW64\wmicvrt.exeC:\Windows\SysWOW64\wmicvrt.exe C:\Windows\SysWOW64\wmicvrt.exe14⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1524 -
C:\Windows\SysWOW64\wmicvrt.exe"C:\Windows\system32\wmicvrt.exe" C:\Windows\SysWOW64\wmicvrt.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1112 -
C:\Windows\SysWOW64\wmicvrt.exeC:\Windows\SysWOW64\wmicvrt.exe C:\Windows\SysWOW64\wmicvrt.exe16⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2948 -
C:\Windows\SysWOW64\wmicvrt.exe"C:\Windows\system32\wmicvrt.exe" C:\Windows\SysWOW64\wmicvrt.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2268 -
C:\Windows\SysWOW64\wmicvrt.exeC:\Windows\SysWOW64\wmicvrt.exe C:\Windows\SysWOW64\wmicvrt.exe18⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1920 -
C:\Windows\SysWOW64\wmicvrt.exe"C:\Windows\system32\wmicvrt.exe" C:\Windows\SysWOW64\wmicvrt.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:4968 -
C:\Windows\SysWOW64\wmicvrt.exeC:\Windows\SysWOW64\wmicvrt.exe C:\Windows\SysWOW64\wmicvrt.exe20⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1492 -
C:\Windows\SysWOW64\wmicvrt.exe"C:\Windows\system32\wmicvrt.exe" C:\Windows\SysWOW64\wmicvrt.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2092 -
C:\Windows\SysWOW64\wmicvrt.exeC:\Windows\SysWOW64\wmicvrt.exe C:\Windows\SysWOW64\wmicvrt.exe22⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2112 -
C:\Windows\SysWOW64\wmicvrt.exe"C:\Windows\system32\wmicvrt.exe" C:\Windows\SysWOW64\wmicvrt.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2232 -
C:\Windows\SysWOW64\wmicvrt.exeC:\Windows\SysWOW64\wmicvrt.exe C:\Windows\SysWOW64\wmicvrt.exe24⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:5028 -
C:\Windows\SysWOW64\wmicvrt.exe"C:\Windows\system32\wmicvrt.exe" C:\Windows\SysWOW64\wmicvrt.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1856 -
C:\Windows\SysWOW64\wmicvrt.exeC:\Windows\SysWOW64\wmicvrt.exe C:\Windows\SysWOW64\wmicvrt.exe26⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:5060 -
C:\Windows\SysWOW64\wmicvrt.exe"C:\Windows\system32\wmicvrt.exe" C:\Windows\SysWOW64\wmicvrt.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:3332 -
C:\Windows\SysWOW64\wmicvrt.exeC:\Windows\SysWOW64\wmicvrt.exe C:\Windows\SysWOW64\wmicvrt.exe28⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3092 -
C:\Windows\SysWOW64\wmicvrt.exe"C:\Windows\system32\wmicvrt.exe" C:\Windows\SysWOW64\wmicvrt.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4484 -
C:\Windows\SysWOW64\wmicvrt.exeC:\Windows\SysWOW64\wmicvrt.exe C:\Windows\SysWOW64\wmicvrt.exe30⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1256 -
C:\Windows\SysWOW64\wmicvrt.exe"C:\Windows\system32\wmicvrt.exe" C:\Windows\SysWOW64\wmicvrt.exe31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1852 -
C:\Windows\SysWOW64\wmicvrt.exeC:\Windows\SysWOW64\wmicvrt.exe C:\Windows\SysWOW64\wmicvrt.exe32⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1008 -
C:\Windows\SysWOW64\wmicvrt.exe"C:\Windows\system32\wmicvrt.exe" C:\Windows\SysWOW64\wmicvrt.exe33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:3180 -
C:\Windows\SysWOW64\wmicvrt.exeC:\Windows\SysWOW64\wmicvrt.exe C:\Windows\SysWOW64\wmicvrt.exe34⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:380 -
C:\Windows\SysWOW64\wmicvrt.exe"C:\Windows\system32\wmicvrt.exe" C:\Windows\SysWOW64\wmicvrt.exe35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1260 -
C:\Windows\SysWOW64\wmicvrt.exeC:\Windows\SysWOW64\wmicvrt.exe C:\Windows\SysWOW64\wmicvrt.exe36⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3540 -
C:\Windows\SysWOW64\wmicvrt.exe"C:\Windows\system32\wmicvrt.exe" C:\Windows\SysWOW64\wmicvrt.exe37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:232 -
C:\Windows\SysWOW64\wmicvrt.exeC:\Windows\SysWOW64\wmicvrt.exe C:\Windows\SysWOW64\wmicvrt.exe38⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:5116 -
C:\Windows\SysWOW64\wmicvrt.exe"C:\Windows\system32\wmicvrt.exe" C:\Windows\SysWOW64\wmicvrt.exe39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1344 -
C:\Windows\SysWOW64\wmicvrt.exeC:\Windows\SysWOW64\wmicvrt.exe C:\Windows\SysWOW64\wmicvrt.exe40⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4968 -
C:\Windows\SysWOW64\wmicvrt.exe"C:\Windows\system32\wmicvrt.exe" C:\Windows\SysWOW64\wmicvrt.exe41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:892 -
C:\Windows\SysWOW64\wmicvrt.exeC:\Windows\SysWOW64\wmicvrt.exe C:\Windows\SysWOW64\wmicvrt.exe42⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3024 -
C:\Windows\SysWOW64\wmicvrt.exe"C:\Windows\system32\wmicvrt.exe" C:\Windows\SysWOW64\wmicvrt.exe43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:4636 -
C:\Windows\SysWOW64\wmicvrt.exeC:\Windows\SysWOW64\wmicvrt.exe C:\Windows\SysWOW64\wmicvrt.exe44⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2852 -
C:\Windows\SysWOW64\wmicvrt.exe"C:\Windows\system32\wmicvrt.exe" C:\Windows\SysWOW64\wmicvrt.exe45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3196 -
C:\Windows\SysWOW64\wmicvrt.exeC:\Windows\SysWOW64\wmicvrt.exe C:\Windows\SysWOW64\wmicvrt.exe46⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3640 -
C:\Windows\SysWOW64\wmicvrt.exe"C:\Windows\system32\wmicvrt.exe" C:\Windows\SysWOW64\wmicvrt.exe47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4612 -
C:\Windows\SysWOW64\wmicvrt.exeC:\Windows\SysWOW64\wmicvrt.exe C:\Windows\SysWOW64\wmicvrt.exe48⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4548 -
C:\Windows\SysWOW64\wmicvrt.exe"C:\Windows\system32\wmicvrt.exe" C:\Windows\SysWOW64\wmicvrt.exe49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2188 -
C:\Windows\SysWOW64\wmicvrt.exeC:\Windows\SysWOW64\wmicvrt.exe C:\Windows\SysWOW64\wmicvrt.exe50⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1304 -
C:\Windows\SysWOW64\wmicvrt.exe"C:\Windows\system32\wmicvrt.exe" C:\Windows\SysWOW64\wmicvrt.exe51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:3400 -
C:\Windows\SysWOW64\wmicvrt.exeC:\Windows\SysWOW64\wmicvrt.exe C:\Windows\SysWOW64\wmicvrt.exe52⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2560 -
C:\Windows\SysWOW64\wmicvrt.exe"C:\Windows\system32\wmicvrt.exe" C:\Windows\SysWOW64\wmicvrt.exe53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1008 -
C:\Windows\SysWOW64\wmicvrt.exeC:\Windows\SysWOW64\wmicvrt.exe C:\Windows\SysWOW64\wmicvrt.exe54⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1632 -
C:\Windows\SysWOW64\wmicvrt.exe"C:\Windows\system32\wmicvrt.exe" C:\Windows\SysWOW64\wmicvrt.exe55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:524 -
C:\Windows\SysWOW64\wmicvrt.exeC:\Windows\SysWOW64\wmicvrt.exe C:\Windows\SysWOW64\wmicvrt.exe56⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:540 -
C:\Windows\SysWOW64\wmicvrt.exe"C:\Windows\system32\wmicvrt.exe" C:\Windows\SysWOW64\wmicvrt.exe57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:440 -
C:\Windows\SysWOW64\wmicvrt.exeC:\Windows\SysWOW64\wmicvrt.exe C:\Windows\SysWOW64\wmicvrt.exe58⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3524 -
C:\Windows\SysWOW64\wmicvrt.exe"C:\Windows\system32\wmicvrt.exe" C:\Windows\SysWOW64\wmicvrt.exe59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3468 -
C:\Windows\SysWOW64\wmicvrt.exeC:\Windows\SysWOW64\wmicvrt.exe C:\Windows\SysWOW64\wmicvrt.exe60⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:376 -
C:\Windows\SysWOW64\wmicvrt.exe"C:\Windows\system32\wmicvrt.exe" C:\Windows\SysWOW64\wmicvrt.exe61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2772 -
C:\Windows\SysWOW64\wmicvrt.exeC:\Windows\SysWOW64\wmicvrt.exe C:\Windows\SysWOW64\wmicvrt.exe62⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3136 -
C:\Windows\SysWOW64\wmicvrt.exe"C:\Windows\system32\wmicvrt.exe" C:\Windows\SysWOW64\wmicvrt.exe63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:4628 -
C:\Windows\SysWOW64\wmicvrt.exeC:\Windows\SysWOW64\wmicvrt.exe C:\Windows\SysWOW64\wmicvrt.exe64⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4360 -
C:\Windows\SysWOW64\wmicvrt.exe"C:\Windows\system32\wmicvrt.exe" C:\Windows\SysWOW64\wmicvrt.exe65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:4308 -
C:\Windows\SysWOW64\wmicvrt.exeC:\Windows\SysWOW64\wmicvrt.exe C:\Windows\SysWOW64\wmicvrt.exe66⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:5088 -
C:\Windows\SysWOW64\wmicvrt.exe"C:\Windows\system32\wmicvrt.exe" C:\Windows\SysWOW64\wmicvrt.exe67⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1324 -
C:\Windows\SysWOW64\wmicvrt.exeC:\Windows\SysWOW64\wmicvrt.exe C:\Windows\SysWOW64\wmicvrt.exe68⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:1752 -
C:\Windows\SysWOW64\wmicvrt.exe"C:\Windows\system32\wmicvrt.exe" C:\Windows\SysWOW64\wmicvrt.exe69⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:864 -
C:\Windows\SysWOW64\wmicvrt.exeC:\Windows\SysWOW64\wmicvrt.exe C:\Windows\SysWOW64\wmicvrt.exe70⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4820 -
C:\Windows\SysWOW64\wmicvrt.exe"C:\Windows\system32\wmicvrt.exe" C:\Windows\SysWOW64\wmicvrt.exe71⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1888 -
C:\Windows\SysWOW64\wmicvrt.exeC:\Windows\SysWOW64\wmicvrt.exe C:\Windows\SysWOW64\wmicvrt.exe72⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4484 -
C:\Windows\SysWOW64\wmicvrt.exe"C:\Windows\system32\wmicvrt.exe" C:\Windows\SysWOW64\wmicvrt.exe73⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2696 -
C:\Windows\SysWOW64\wmicvrt.exeC:\Windows\SysWOW64\wmicvrt.exe C:\Windows\SysWOW64\wmicvrt.exe74⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2388 -
C:\Windows\SysWOW64\wmicvrt.exe"C:\Windows\system32\wmicvrt.exe" C:\Windows\SysWOW64\wmicvrt.exe75⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1036 -
C:\Windows\SysWOW64\wmicvrt.exeC:\Windows\SysWOW64\wmicvrt.exe C:\Windows\SysWOW64\wmicvrt.exe76⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:1612 -
C:\Windows\SysWOW64\wmicvrt.exe"C:\Windows\system32\wmicvrt.exe" C:\Windows\SysWOW64\wmicvrt.exe77⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:4732 -
C:\Windows\SysWOW64\wmicvrt.exeC:\Windows\SysWOW64\wmicvrt.exe C:\Windows\SysWOW64\wmicvrt.exe78⤵
- Drops file in System32 directory
- Modifies registry class
PID:5040 -
C:\Windows\SysWOW64\wmicvrt.exe"C:\Windows\system32\wmicvrt.exe" C:\Windows\SysWOW64\wmicvrt.exe79⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:856 -
C:\Windows\SysWOW64\wmicvrt.exeC:\Windows\SysWOW64\wmicvrt.exe C:\Windows\SysWOW64\wmicvrt.exe80⤵
- Checks computer location settings
- Drops file in System32 directory
PID:2844 -
C:\Windows\SysWOW64\wmicvrt.exe"C:\Windows\system32\wmicvrt.exe" C:\Windows\SysWOW64\wmicvrt.exe81⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3292 -
C:\Windows\SysWOW64\wmicvrt.exeC:\Windows\SysWOW64\wmicvrt.exe C:\Windows\SysWOW64\wmicvrt.exe82⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4944 -
C:\Windows\SysWOW64\wmicvrt.exe"C:\Windows\system32\wmicvrt.exe" C:\Windows\SysWOW64\wmicvrt.exe83⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2572 -
C:\Windows\SysWOW64\wmicvrt.exeC:\Windows\SysWOW64\wmicvrt.exe C:\Windows\SysWOW64\wmicvrt.exe84⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4896 -
C:\Windows\SysWOW64\wmicvrt.exe"C:\Windows\system32\wmicvrt.exe" C:\Windows\SysWOW64\wmicvrt.exe85⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:3920 -
C:\Windows\SysWOW64\wmicvrt.exeC:\Windows\SysWOW64\wmicvrt.exe C:\Windows\SysWOW64\wmicvrt.exe86⤵
- Checks computer location settings
- Modifies registry class
PID:740 -
C:\Windows\SysWOW64\wmicvrt.exe"C:\Windows\system32\wmicvrt.exe" C:\Windows\SysWOW64\wmicvrt.exe87⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:3816 -
C:\Windows\SysWOW64\wmicvrt.exeC:\Windows\SysWOW64\wmicvrt.exe C:\Windows\SysWOW64\wmicvrt.exe88⤵PID:4480
-
C:\Windows\SysWOW64\wmicvrt.exe"C:\Windows\system32\wmicvrt.exe" C:\Windows\SysWOW64\wmicvrt.exe89⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:3956 -
C:\Windows\SysWOW64\wmicvrt.exeC:\Windows\SysWOW64\wmicvrt.exe C:\Windows\SysWOW64\wmicvrt.exe90⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:1684 -
C:\Windows\SysWOW64\wmicvrt.exe"C:\Windows\system32\wmicvrt.exe" C:\Windows\SysWOW64\wmicvrt.exe91⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:4912 -
C:\Windows\SysWOW64\wmicvrt.exeC:\Windows\SysWOW64\wmicvrt.exe C:\Windows\SysWOW64\wmicvrt.exe92⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:3488 -
C:\Windows\SysWOW64\wmicvrt.exe"C:\Windows\system32\wmicvrt.exe" C:\Windows\SysWOW64\wmicvrt.exe93⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4668 -
C:\Windows\SysWOW64\wmicvrt.exeC:\Windows\SysWOW64\wmicvrt.exe C:\Windows\SysWOW64\wmicvrt.exe94⤵
- Modifies registry class
PID:1856 -
C:\Windows\SysWOW64\wmicvrt.exe"C:\Windows\system32\wmicvrt.exe" C:\Windows\SysWOW64\wmicvrt.exe95⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:3204 -
C:\Windows\SysWOW64\wmicvrt.exeC:\Windows\SysWOW64\wmicvrt.exe C:\Windows\SysWOW64\wmicvrt.exe96⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3588 -
C:\Windows\SysWOW64\wmicvrt.exe"C:\Windows\system32\wmicvrt.exe" C:\Windows\SysWOW64\wmicvrt.exe97⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1956 -
C:\Windows\SysWOW64\wmicvrt.exeC:\Windows\SysWOW64\wmicvrt.exe C:\Windows\SysWOW64\wmicvrt.exe98⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2188 -
C:\Windows\SysWOW64\wmicvrt.exe"C:\Windows\system32\wmicvrt.exe" C:\Windows\SysWOW64\wmicvrt.exe99⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:4012 -
C:\Windows\SysWOW64\wmicvrt.exeC:\Windows\SysWOW64\wmicvrt.exe C:\Windows\SysWOW64\wmicvrt.exe100⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2780 -
C:\Windows\SysWOW64\wmicvrt.exe"C:\Windows\system32\wmicvrt.exe" C:\Windows\SysWOW64\wmicvrt.exe101⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:3528 -
C:\Windows\SysWOW64\wmicvrt.exeC:\Windows\SysWOW64\wmicvrt.exe C:\Windows\SysWOW64\wmicvrt.exe102⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:692 -
C:\Windows\SysWOW64\wmicvrt.exe"C:\Windows\system32\wmicvrt.exe" C:\Windows\SysWOW64\wmicvrt.exe103⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4132 -
C:\Windows\SysWOW64\wmicvrt.exeC:\Windows\SysWOW64\wmicvrt.exe C:\Windows\SysWOW64\wmicvrt.exe104⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:708 -
C:\Windows\SysWOW64\wmicvrt.exe"C:\Windows\system32\wmicvrt.exe" C:\Windows\SysWOW64\wmicvrt.exe105⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3364 -
C:\Windows\SysWOW64\wmicvrt.exeC:\Windows\SysWOW64\wmicvrt.exe C:\Windows\SysWOW64\wmicvrt.exe106⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2900 -
C:\Windows\SysWOW64\wmicvrt.exe"C:\Windows\system32\wmicvrt.exe" C:\Windows\SysWOW64\wmicvrt.exe107⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:4408 -
C:\Windows\SysWOW64\wmicvrt.exeC:\Windows\SysWOW64\wmicvrt.exe C:\Windows\SysWOW64\wmicvrt.exe108⤵
- Checks computer location settings
- Modifies registry class
PID:5032 -
C:\Windows\SysWOW64\wmicvrt.exe"C:\Windows\system32\wmicvrt.exe" C:\Windows\SysWOW64\wmicvrt.exe109⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5000 -
C:\Windows\SysWOW64\wmicvrt.exeC:\Windows\SysWOW64\wmicvrt.exe C:\Windows\SysWOW64\wmicvrt.exe110⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3996 -
C:\Windows\SysWOW64\wmicvrt.exe"C:\Windows\system32\wmicvrt.exe" C:\Windows\SysWOW64\wmicvrt.exe111⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3896 -
C:\Windows\SysWOW64\wmicvrt.exeC:\Windows\SysWOW64\wmicvrt.exe C:\Windows\SysWOW64\wmicvrt.exe112⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:2100 -
C:\Windows\SysWOW64\wmicvrt.exe"C:\Windows\system32\wmicvrt.exe" C:\Windows\SysWOW64\wmicvrt.exe113⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1748 -
C:\Windows\SysWOW64\wmicvrt.exeC:\Windows\SysWOW64\wmicvrt.exe C:\Windows\SysWOW64\wmicvrt.exe114⤵
- Checks computer location settings
- Modifies registry class
PID:4300 -
C:\Windows\SysWOW64\wmicvrt.exe"C:\Windows\system32\wmicvrt.exe" C:\Windows\SysWOW64\wmicvrt.exe115⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:5084 -
C:\Windows\SysWOW64\wmicvrt.exeC:\Windows\SysWOW64\wmicvrt.exe C:\Windows\SysWOW64\wmicvrt.exe116⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4728 -
C:\Windows\SysWOW64\wmicvrt.exe"C:\Windows\system32\wmicvrt.exe" C:\Windows\SysWOW64\wmicvrt.exe117⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:4476 -
C:\Windows\SysWOW64\wmicvrt.exeC:\Windows\SysWOW64\wmicvrt.exe C:\Windows\SysWOW64\wmicvrt.exe118⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4700 -
C:\Windows\SysWOW64\wmicvrt.exe"C:\Windows\system32\wmicvrt.exe" C:\Windows\SysWOW64\wmicvrt.exe119⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1616 -
C:\Windows\SysWOW64\wmicvrt.exeC:\Windows\SysWOW64\wmicvrt.exe C:\Windows\SysWOW64\wmicvrt.exe120⤵
- Drops file in System32 directory
- Modifies registry class
PID:2492 -
C:\Windows\SysWOW64\wmicvrt.exe"C:\Windows\system32\wmicvrt.exe" C:\Windows\SysWOW64\wmicvrt.exe121⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1000 -
C:\Windows\SysWOW64\wmicvrt.exeC:\Windows\SysWOW64\wmicvrt.exe C:\Windows\SysWOW64\wmicvrt.exe122⤵
- Checks computer location settings
- Modifies registry class
PID:3964
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-