Analysis
-
max time kernel
149s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2025, 09:59
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_8a90117a3ca882ddd388507860b36a84.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_8a90117a3ca882ddd388507860b36a84.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_8a90117a3ca882ddd388507860b36a84.exe
-
Size
260KB
-
MD5
8a90117a3ca882ddd388507860b36a84
-
SHA1
73cabd6d3fe71d3fd2752ddeb44e30cc538ec826
-
SHA256
5cddda38dd85934cf5cd0d10dac085bbe81dedd3a38132dae3972a316f56a78b
-
SHA512
02694474f99bd55d379bd826e23ee65414acb78f20cebb434b31dff436a00a5dcc11c2f7b2ea5c7f00c87c5c0c00117773b1d31af023d141034303c225a17b56
-
SSDEEP
6144:Qd7YgTSrMaIl/jcLijfHFEHWzXvjT85R:QR9TSrMaIqLlI/H85R
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" woatui.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation JaffaCakes118_8a90117a3ca882ddd388507860b36a84.exe -
Executes dropped EXE 64 IoCs
pid Process 4580 woatui.exe 4824 woatui.exe 3420 woatui.exe 4440 woatui.exe 1944 woatui.exe 5400 woatui.exe 3340 woatui.exe 4008 woatui.exe 3136 woatui.exe 3392 woatui.exe 4112 woatui.exe 1648 woatui.exe 4336 woatui.exe 5852 woatui.exe 5600 woatui.exe 1672 woatui.exe 2656 woatui.exe 2628 woatui.exe 5500 woatui.exe 5004 woatui.exe 5972 woatui.exe 4424 woatui.exe 1112 woatui.exe 4132 woatui.exe 3668 woatui.exe 1916 woatui.exe 3936 woatui.exe 2976 woatui.exe 468 woatui.exe 1412 woatui.exe 912 woatui.exe 4320 woatui.exe 2480 woatui.exe 3884 woatui.exe 1704 woatui.exe 3992 woatui.exe 1912 woatui.exe 6116 woatui.exe 1560 woatui.exe 2200 woatui.exe 3488 woatui.exe 3532 woatui.exe 1768 woatui.exe 2932 woatui.exe 2876 woatui.exe 1316 woatui.exe 5400 woatui.exe 244 woatui.exe 4008 woatui.exe 1728 woatui.exe 3448 woatui.exe 552 woatui.exe 4612 woatui.exe 5468 woatui.exe 228 woatui.exe 5388 woatui.exe 3784 woatui.exe 3532 woatui.exe 5444 woatui.exe 5004 woatui.exe 2652 woatui.exe 836 woatui.exe 4848 woatui.exe 2540 woatui.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woatui = "C:\\Users\\Admin\\woatui.exe /i" woatui.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woatui = "C:\\Users\\Admin\\woatui.exe /O" woatui.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woatui = "C:\\Users\\Admin\\woatui.exe /N" woatui.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woatui = "C:\\Users\\Admin\\woatui.exe /t" woatui.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woatui = "C:\\Users\\Admin\\woatui.exe /Q" woatui.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woatui = "C:\\Users\\Admin\\woatui.exe /Y" woatui.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woatui = "C:\\Users\\Admin\\woatui.exe /y" woatui.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woatui = "C:\\Users\\Admin\\woatui.exe /F" woatui.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woatui = "C:\\Users\\Admin\\woatui.exe /q" woatui.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woatui = "C:\\Users\\Admin\\woatui.exe /d" woatui.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woatui = "C:\\Users\\Admin\\woatui.exe /L" woatui.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woatui = "C:\\Users\\Admin\\woatui.exe /f" woatui.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woatui = "C:\\Users\\Admin\\woatui.exe /E" woatui.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woatui = "C:\\Users\\Admin\\woatui.exe /T" woatui.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woatui = "C:\\Users\\Admin\\woatui.exe /v" woatui.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woatui = "C:\\Users\\Admin\\woatui.exe /S" woatui.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woatui = "C:\\Users\\Admin\\woatui.exe /h" woatui.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woatui = "C:\\Users\\Admin\\woatui.exe /J" woatui.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woatui = "C:\\Users\\Admin\\woatui.exe /l" woatui.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woatui = "C:\\Users\\Admin\\woatui.exe /R" woatui.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woatui = "C:\\Users\\Admin\\woatui.exe /X" woatui.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woatui = "C:\\Users\\Admin\\woatui.exe /s" woatui.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woatui = "C:\\Users\\Admin\\woatui.exe /n" woatui.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woatui = "C:\\Users\\Admin\\woatui.exe /m" woatui.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woatui = "C:\\Users\\Admin\\woatui.exe /Z" woatui.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woatui = "C:\\Users\\Admin\\woatui.exe /W" woatui.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woatui = "C:\\Users\\Admin\\woatui.exe /H" woatui.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woatui = "C:\\Users\\Admin\\woatui.exe /a" woatui.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woatui = "C:\\Users\\Admin\\woatui.exe /I" woatui.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woatui = "C:\\Users\\Admin\\woatui.exe /M" woatui.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woatui = "C:\\Users\\Admin\\woatui.exe /j" woatui.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woatui = "C:\\Users\\Admin\\woatui.exe /B" woatui.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woatui = "C:\\Users\\Admin\\woatui.exe /U" woatui.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woatui = "C:\\Users\\Admin\\woatui.exe /A" woatui.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woatui = "C:\\Users\\Admin\\woatui.exe /P" woatui.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woatui = "C:\\Users\\Admin\\woatui.exe /G" woatui.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woatui = "C:\\Users\\Admin\\woatui.exe /x" woatui.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woatui = "C:\\Users\\Admin\\woatui.exe /e" woatui.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woatui = "C:\\Users\\Admin\\woatui.exe /C" woatui.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woatui = "C:\\Users\\Admin\\woatui.exe /z" woatui.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woatui = "C:\\Users\\Admin\\woatui.exe /p" woatui.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woatui = "C:\\Users\\Admin\\woatui.exe /g" woatui.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woatui = "C:\\Users\\Admin\\woatui.exe /D" woatui.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woatui = "C:\\Users\\Admin\\woatui.exe /r" woatui.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woatui = "C:\\Users\\Admin\\woatui.exe /b" woatui.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woatui = "C:\\Users\\Admin\\woatui.exe /c" woatui.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woatui = "C:\\Users\\Admin\\woatui.exe /K" woatui.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woatui = "C:\\Users\\Admin\\woatui.exe /w" woatui.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woatui = "C:\\Users\\Admin\\woatui.exe /u" woatui.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woatui = "C:\\Users\\Admin\\woatui.exe /o" woatui.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woatui = "C:\\Users\\Admin\\woatui.exe /V" woatui.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woatui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woatui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woatui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woatui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woatui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woatui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woatui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woatui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woatui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woatui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woatui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woatui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woatui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woatui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woatui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woatui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woatui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woatui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woatui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woatui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woatui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woatui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woatui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woatui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woatui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woatui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woatui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woatui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woatui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woatui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woatui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woatui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woatui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woatui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woatui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woatui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woatui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woatui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woatui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woatui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woatui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woatui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woatui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woatui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woatui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woatui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woatui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woatui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woatui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woatui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woatui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woatui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woatui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woatui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woatui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woatui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woatui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woatui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woatui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woatui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woatui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woatui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woatui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woatui.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4580 woatui.exe 4580 woatui.exe 4580 woatui.exe 4580 woatui.exe 4580 woatui.exe 4580 woatui.exe 4580 woatui.exe 4580 woatui.exe 4580 woatui.exe 4580 woatui.exe 4580 woatui.exe 4580 woatui.exe 4580 woatui.exe 4580 woatui.exe 4580 woatui.exe 4580 woatui.exe 4580 woatui.exe 4580 woatui.exe 4580 woatui.exe 4580 woatui.exe 4580 woatui.exe 4580 woatui.exe 4580 woatui.exe 4580 woatui.exe 4580 woatui.exe 4580 woatui.exe 4580 woatui.exe 4580 woatui.exe 4580 woatui.exe 4580 woatui.exe 4580 woatui.exe 4580 woatui.exe 4580 woatui.exe 4580 woatui.exe 4580 woatui.exe 4580 woatui.exe 4580 woatui.exe 4580 woatui.exe 4580 woatui.exe 4580 woatui.exe 4580 woatui.exe 4580 woatui.exe 4580 woatui.exe 4580 woatui.exe 4580 woatui.exe 4580 woatui.exe 4580 woatui.exe 4580 woatui.exe 4580 woatui.exe 4580 woatui.exe 4580 woatui.exe 4580 woatui.exe 4580 woatui.exe 4580 woatui.exe 4580 woatui.exe 4580 woatui.exe 4580 woatui.exe 4580 woatui.exe 4580 woatui.exe 4580 woatui.exe 4580 woatui.exe 4580 woatui.exe 4580 woatui.exe 4580 woatui.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 5832 JaffaCakes118_8a90117a3ca882ddd388507860b36a84.exe 4580 woatui.exe 4824 woatui.exe 3420 woatui.exe 4440 woatui.exe 1944 woatui.exe 5400 woatui.exe 3340 woatui.exe 4008 woatui.exe 3136 woatui.exe 3392 woatui.exe 4112 woatui.exe 1648 woatui.exe 4336 woatui.exe 5852 woatui.exe 5600 woatui.exe 1672 woatui.exe 2656 woatui.exe 2628 woatui.exe 5500 woatui.exe 5004 woatui.exe 5972 woatui.exe 4424 woatui.exe 1112 woatui.exe 4132 woatui.exe 3668 woatui.exe 1916 woatui.exe 3936 woatui.exe 2976 woatui.exe 468 woatui.exe 1412 woatui.exe 912 woatui.exe 4320 woatui.exe 2480 woatui.exe 3884 woatui.exe 1704 woatui.exe 3992 woatui.exe 1912 woatui.exe 6116 woatui.exe 1560 woatui.exe 2200 woatui.exe 3488 woatui.exe 3532 woatui.exe 1768 woatui.exe 2932 woatui.exe 2876 woatui.exe 1316 woatui.exe 5400 woatui.exe 244 woatui.exe 4008 woatui.exe 1728 woatui.exe 3448 woatui.exe 552 woatui.exe 4612 woatui.exe 5468 woatui.exe 228 woatui.exe 5388 woatui.exe 3784 woatui.exe 3532 woatui.exe 5444 woatui.exe 5004 woatui.exe 2652 woatui.exe 836 woatui.exe 4848 woatui.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5832 wrote to memory of 4580 5832 JaffaCakes118_8a90117a3ca882ddd388507860b36a84.exe 90 PID 5832 wrote to memory of 4580 5832 JaffaCakes118_8a90117a3ca882ddd388507860b36a84.exe 90 PID 5832 wrote to memory of 4580 5832 JaffaCakes118_8a90117a3ca882ddd388507860b36a84.exe 90 PID 3668 wrote to memory of 4824 3668 cmd.exe 97 PID 3668 wrote to memory of 4824 3668 cmd.exe 97 PID 3668 wrote to memory of 4824 3668 cmd.exe 97 PID 4864 wrote to memory of 3420 4864 cmd.exe 100 PID 4864 wrote to memory of 3420 4864 cmd.exe 100 PID 4864 wrote to memory of 3420 4864 cmd.exe 100 PID 5032 wrote to memory of 4440 5032 cmd.exe 103 PID 5032 wrote to memory of 4440 5032 cmd.exe 103 PID 5032 wrote to memory of 4440 5032 cmd.exe 103 PID 2016 wrote to memory of 1944 2016 cmd.exe 106 PID 2016 wrote to memory of 1944 2016 cmd.exe 106 PID 2016 wrote to memory of 1944 2016 cmd.exe 106 PID 2396 wrote to memory of 5400 2396 cmd.exe 110 PID 2396 wrote to memory of 5400 2396 cmd.exe 110 PID 2396 wrote to memory of 5400 2396 cmd.exe 110 PID 2144 wrote to memory of 3340 2144 cmd.exe 113 PID 2144 wrote to memory of 3340 2144 cmd.exe 113 PID 2144 wrote to memory of 3340 2144 cmd.exe 113 PID 412 wrote to memory of 4008 412 cmd.exe 116 PID 412 wrote to memory of 4008 412 cmd.exe 116 PID 412 wrote to memory of 4008 412 cmd.exe 116 PID 2632 wrote to memory of 3136 2632 cmd.exe 119 PID 2632 wrote to memory of 3136 2632 cmd.exe 119 PID 2632 wrote to memory of 3136 2632 cmd.exe 119 PID 5996 wrote to memory of 3392 5996 cmd.exe 124 PID 5996 wrote to memory of 3392 5996 cmd.exe 124 PID 5996 wrote to memory of 3392 5996 cmd.exe 124 PID 1300 wrote to memory of 4112 1300 cmd.exe 127 PID 1300 wrote to memory of 4112 1300 cmd.exe 127 PID 1300 wrote to memory of 4112 1300 cmd.exe 127 PID 3348 wrote to memory of 1648 3348 cmd.exe 130 PID 3348 wrote to memory of 1648 3348 cmd.exe 130 PID 3348 wrote to memory of 1648 3348 cmd.exe 130 PID 5588 wrote to memory of 4336 5588 cmd.exe 133 PID 5588 wrote to memory of 4336 5588 cmd.exe 133 PID 5588 wrote to memory of 4336 5588 cmd.exe 133 PID 3952 wrote to memory of 5852 3952 cmd.exe 136 PID 3952 wrote to memory of 5852 3952 cmd.exe 136 PID 3952 wrote to memory of 5852 3952 cmd.exe 136 PID 668 wrote to memory of 5600 668 cmd.exe 139 PID 668 wrote to memory of 5600 668 cmd.exe 139 PID 668 wrote to memory of 5600 668 cmd.exe 139 PID 5316 wrote to memory of 1672 5316 cmd.exe 142 PID 5316 wrote to memory of 1672 5316 cmd.exe 142 PID 5316 wrote to memory of 1672 5316 cmd.exe 142 PID 1856 wrote to memory of 2656 1856 cmd.exe 145 PID 1856 wrote to memory of 2656 1856 cmd.exe 145 PID 1856 wrote to memory of 2656 1856 cmd.exe 145 PID 1380 wrote to memory of 2628 1380 cmd.exe 148 PID 1380 wrote to memory of 2628 1380 cmd.exe 148 PID 1380 wrote to memory of 2628 1380 cmd.exe 148 PID 4980 wrote to memory of 5500 4980 cmd.exe 151 PID 4980 wrote to memory of 5500 4980 cmd.exe 151 PID 4980 wrote to memory of 5500 4980 cmd.exe 151 PID 3380 wrote to memory of 5004 3380 cmd.exe 154 PID 3380 wrote to memory of 5004 3380 cmd.exe 154 PID 3380 wrote to memory of 5004 3380 cmd.exe 154 PID 2776 wrote to memory of 5972 2776 cmd.exe 157 PID 2776 wrote to memory of 5972 2776 cmd.exe 157 PID 2776 wrote to memory of 5972 2776 cmd.exe 157 PID 4484 wrote to memory of 4424 4484 cmd.exe 160
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8a90117a3ca882ddd388507860b36a84.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8a90117a3ca882ddd388507860b36a84.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5832 -
C:\Users\Admin\woatui.exe"C:\Users\Admin\woatui.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4580
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /f1⤵
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /f2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4824
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /z1⤵
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /z2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3420
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /E1⤵
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /E2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4440
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /X1⤵
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /X2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1944
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /w1⤵
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /w2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5400
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /s1⤵
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /s2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3340
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /Q1⤵
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /Q2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4008
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /W1⤵
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /W2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3136
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /l1⤵
- Suspicious use of WriteProcessMemory
PID:5996 -
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /l2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3392
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /Y1⤵
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /Y2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4112
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /y1⤵
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /y2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1648
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /U1⤵
- Suspicious use of WriteProcessMemory
PID:5588 -
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /U2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4336
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /T1⤵
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /T2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5852
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /v1⤵
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /v2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5600
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /Y1⤵
- Suspicious use of WriteProcessMemory
PID:5316 -
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /Y2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1672
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /f1⤵
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /f2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2656
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /S1⤵
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /S2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2628
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /H1⤵
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /H2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5500
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /A1⤵
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /A2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5004
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /u1⤵
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /u2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5972
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /P1⤵
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /P2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4424
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /o1⤵PID:4540
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /o2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1112
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /p1⤵PID:864
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /p2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4132
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /V1⤵PID:4856
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /V2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3668
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /U1⤵PID:3264
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /U2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1916
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /U1⤵PID:5708
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /U2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3936
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /v1⤵PID:1324
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /v2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2976
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /H1⤵PID:5044
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /H2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:468
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /g1⤵PID:1484
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /g2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1412
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /n1⤵PID:4076
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /n2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:912
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /E1⤵PID:2576
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /E2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4320
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /D1⤵PID:3176
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /D2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2480
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /r1⤵PID:6084
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /r2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3884
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /i1⤵PID:2816
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /i2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1704
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /r1⤵PID:3348
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /r2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3992
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /b1⤵PID:5060
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /b2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1912
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /a1⤵PID:760
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /a2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:6116
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /m1⤵PID:1116
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /m2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1560
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /E1⤵PID:6040
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /E2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2200
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /I1⤵PID:1856
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /I2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3488
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /c1⤵PID:3908
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /c2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3532
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /O1⤵PID:3184
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /O2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1768
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /z1⤵PID:4572
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /z2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2932
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /R1⤵PID:4480
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /R2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2876
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /c1⤵PID:4880
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /c2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1316
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /W1⤵PID:2752
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /W2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5400
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /N1⤵PID:1392
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /N2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:244
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /o1⤵PID:412
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /o2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4008
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /K1⤵PID:456
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /K2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1728
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /A1⤵PID:3588
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /A2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3448
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /b1⤵PID:4796
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /b2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:552
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /O1⤵PID:3520
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /O2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4612
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /F1⤵PID:760
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /F2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5468
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /M1⤵PID:2332
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /M2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:228
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /V1⤵PID:2656
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /V2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5388
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /U1⤵PID:3948
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /U2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3784
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /n1⤵PID:4380
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /n2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3532
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /a1⤵PID:368
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /a2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5444
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /l1⤵PID:1640
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /l2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5004
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /G1⤵PID:2856
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /G2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2652
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /p1⤵PID:4288
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /p2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:836
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /t1⤵PID:4160
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /t2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4848
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /x1⤵PID:5496
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /x2⤵
- Executes dropped EXE
PID:2540
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /G1⤵PID:4728
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /G2⤵PID:4436
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /j1⤵PID:4840
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /j2⤵PID:4860
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /v1⤵PID:4280
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /v2⤵PID:1224
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /P1⤵PID:4912
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /P2⤵PID:4684
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /G1⤵PID:4748
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /G2⤵PID:1276
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /v1⤵PID:2036
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /v2⤵
- System Location Discovery: System Language Discovery
PID:3656
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /R1⤵PID:3500
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /R2⤵PID:1728
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /j1⤵PID:2632
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /j2⤵PID:4988
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /R1⤵PID:1736
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /R2⤵PID:6064
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /h1⤵PID:3728
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /h2⤵PID:3644
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /D1⤵PID:5760
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /D2⤵PID:5108
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /r1⤵PID:4172
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /r2⤵PID:4796
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /a1⤵PID:884
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /a2⤵PID:3688
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /t1⤵PID:5052
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /t2⤵
- System Location Discovery: System Language Discovery
PID:5464
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /V1⤵PID:4392
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /V2⤵PID:2472
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /n1⤵PID:5812
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /n2⤵PID:5380
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /K1⤵PID:636
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /K2⤵PID:3488
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /n1⤵PID:1336
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /n2⤵PID:5680
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /T1⤵PID:5392
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /T2⤵
- System Location Discovery: System Language Discovery
PID:5264
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /D1⤵PID:5608
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /D2⤵
- System Location Discovery: System Language Discovery
PID:4116
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /m1⤵PID:100
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /m2⤵PID:4520
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /O1⤵PID:1640
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /O2⤵
- System Location Discovery: System Language Discovery
PID:5856
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /e1⤵PID:4416
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /e2⤵
- System Location Discovery: System Language Discovery
PID:6044
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /t1⤵PID:720
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /t2⤵
- System Location Discovery: System Language Discovery
PID:3068
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /B1⤵PID:2540
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /B2⤵PID:5384
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /T1⤵PID:4424
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /T2⤵PID:1228
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /o1⤵PID:2904
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /o2⤵PID:5400
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /M1⤵PID:736
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /M2⤵PID:1412
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /l1⤵PID:2144
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /l2⤵PID:3968
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /g1⤵PID:2968
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /g2⤵PID:2944
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /X1⤵PID:4420
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /X2⤵PID:3440
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /I1⤵PID:6112
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /I2⤵PID:1592
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /q1⤵PID:5112
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /q2⤵
- System Location Discovery: System Language Discovery
PID:2448
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /d1⤵PID:5996
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /d2⤵PID:3812
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /B1⤵PID:2816
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /B2⤵PID:4796
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /Z1⤵PID:5568
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /Z2⤵PID:3688
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /w1⤵PID:4500
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /w2⤵
- System Location Discovery: System Language Discovery
PID:3304
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /V1⤵PID:5492
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /V2⤵PID:2332
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /o1⤵PID:2960
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /o2⤵PID:2656
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /T1⤵PID:5276
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /T2⤵
- System Location Discovery: System Language Discovery
PID:3604
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /r1⤵PID:3320
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /r2⤵
- System Location Discovery: System Language Discovery
PID:2796
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /e1⤵PID:1688
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /e2⤵PID:5264
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /h1⤵PID:4380
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /h2⤵PID:3452
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /s1⤵PID:5320
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /s2⤵PID:5072
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /G1⤵PID:4964
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /G2⤵PID:3580
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /W1⤵PID:1612
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /W2⤵PID:4508
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /C1⤵PID:2196
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /C2⤵
- System Location Discovery: System Language Discovery
PID:5576
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /S1⤵PID:344
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /S2⤵PID:5900
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /p1⤵PID:2028
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /p2⤵PID:4824
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /X1⤵PID:4576
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /X2⤵
- System Location Discovery: System Language Discovery
PID:3264
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /P1⤵PID:4604
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /P2⤵PID:4728
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /M1⤵PID:4932
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /M2⤵PID:5696
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /S1⤵PID:4840
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /S2⤵PID:1324
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /S1⤵PID:2396
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /S2⤵PID:556
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /A1⤵PID:4008
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /A2⤵PID:1960
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /H1⤵PID:5684
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /H2⤵PID:1308
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /Z1⤵PID:6052
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /Z2⤵PID:3628
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /B1⤵PID:4952
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /B2⤵PID:1636
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /Y1⤵PID:868
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /Y2⤵PID:2860
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /e1⤵PID:2448
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /e2⤵
- System Location Discovery: System Language Discovery
PID:1652
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /X1⤵PID:6024
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /X2⤵PID:3524
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /g1⤵PID:2544
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /g2⤵PID:4796
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /g1⤵PID:552
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /g2⤵PID:3728
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /W1⤵PID:1012
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /W2⤵PID:3520
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /i1⤵PID:5568
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /i2⤵PID:4908
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /Y1⤵PID:5868
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /Y2⤵PID:5480
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /Q1⤵PID:1564
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /Q2⤵
- System Location Discovery: System Language Discovery
PID:2656
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /G1⤵PID:1116
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /G2⤵PID:4268
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /X1⤵PID:1680
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /X2⤵
- System Location Discovery: System Language Discovery
PID:2344
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /h1⤵PID:636
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /h2⤵PID:1512
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /O1⤵PID:5360
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /O2⤵PID:5556
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /O1⤵PID:5500
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /O2⤵
- System Location Discovery: System Language Discovery
PID:5220
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /I1⤵PID:1380
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /I2⤵
- System Location Discovery: System Language Discovery
PID:5280
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /J1⤵PID:4200
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /J2⤵PID:4520
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /W1⤵PID:1640
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /W2⤵
- System Location Discovery: System Language Discovery
PID:4572
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /T1⤵PID:4480
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /T2⤵
- System Location Discovery: System Language Discovery
PID:4484
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /O1⤵PID:6104
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /O2⤵PID:3116
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /p1⤵PID:4872
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /p2⤵PID:4820
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /z1⤵PID:1632
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /z2⤵PID:4880
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /A1⤵PID:1172
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /A2⤵PID:1228
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /Z1⤵PID:5948
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /Z2⤵
- System Location Discovery: System Language Discovery
PID:2616
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /z1⤵PID:400
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /z2⤵
- System Location Discovery: System Language Discovery
PID:1504
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /o1⤵PID:2500
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /o2⤵PID:4684
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /w1⤵PID:4620
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /w2⤵
- System Location Discovery: System Language Discovery
PID:4008
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /p1⤵PID:3160
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /p2⤵PID:3440
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /C1⤵PID:1444
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /C2⤵PID:1300
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /P1⤵PID:1520
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /P2⤵PID:1464
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /Z1⤵PID:4400
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /Z2⤵PID:3176
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /v1⤵PID:3392
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /v2⤵PID:3156
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /H1⤵PID:5356
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /H2⤵
- System Location Discovery: System Language Discovery
PID:2964
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /K1⤵PID:3108
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /K2⤵
- System Location Discovery: System Language Discovery
PID:5924
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /a1⤵PID:908
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /a2⤵PID:6116
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /A1⤵PID:3688
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /A2⤵PID:976
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /H1⤵PID:4908
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /H2⤵
- System Location Discovery: System Language Discovery
PID:752
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /d1⤵PID:5888
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /d2⤵
- System Location Discovery: System Language Discovery
PID:4504
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /V1⤵PID:4392
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /V2⤵PID:3408
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /W1⤵PID:4268
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /W2⤵PID:3496
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /R1⤵PID:2360
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /R2⤵PID:1680
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /I1⤵PID:2928
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /I2⤵
- System Location Discovery: System Language Discovery
PID:636
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /b1⤵PID:4960
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /b2⤵PID:5264
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /y1⤵PID:4924
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /y2⤵PID:3008
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /b1⤵PID:4512
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /b2⤵
- System Location Discovery: System Language Discovery
PID:2640
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /M1⤵PID:1380
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /M2⤵PID:100
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /I1⤵PID:5296
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /I2⤵PID:2776
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /i1⤵PID:2240
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /i2⤵PID:5972
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /N1⤵PID:5896
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /N2⤵PID:2920
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /t1⤵PID:5920
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /t2⤵
- System Location Discovery: System Language Discovery
PID:4824
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /N1⤵PID:4820
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /N2⤵PID:5884
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /D1⤵PID:3632
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /D2⤵PID:4564
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /U1⤵PID:2832
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /U2⤵PID:4436
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /P1⤵PID:5696
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /P2⤵PID:1224
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /A1⤵PID:2308
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /A2⤵
- System Location Discovery: System Language Discovery
PID:1412
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /y1⤵PID:1504
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /y2⤵PID:5096
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /p1⤵PID:1976
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /p2⤵PID:2944
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /I1⤵PID:4620
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /I2⤵PID:3440
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /V1⤵PID:1416
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /V2⤵PID:1300
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /M1⤵PID:5708
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /M2⤵PID:1464
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /W1⤵PID:4952
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /W2⤵
- System Location Discovery: System Language Discovery
PID:6064
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /p1⤵PID:2060
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /p2⤵PID:3876
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /z1⤵PID:2480
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /z2⤵PID:4208
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /n1⤵PID:3396
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /n2⤵PID:3824
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /X1⤵PID:6076
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /X2⤵PID:6060
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /c1⤵PID:4336
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /c2⤵
- System Location Discovery: System Language Discovery
PID:5460
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /Z1⤵PID:3960
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /Z2⤵PID:668
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /v1⤵PID:4292
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /v2⤵PID:228
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /w1⤵PID:5812
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /w2⤵PID:2656
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /X1⤵PID:5276
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /X2⤵PID:1220
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /H1⤵PID:3604
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /H2⤵
- System Location Discovery: System Language Discovery
PID:5764
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /b1⤵PID:4764
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /b2⤵PID:1336
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /c1⤵PID:3624
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /c2⤵
- System Location Discovery: System Language Discovery
PID:212
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /b1⤵PID:5728
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /b2⤵PID:4092
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /y1⤵PID:388
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /y2⤵PID:372
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /D1⤵PID:6068
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /D2⤵PID:3580
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /q1⤵PID:4184
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /q2⤵PID:6028
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /I1⤵PID:6036
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /I2⤵PID:5648
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /c1⤵PID:5304
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /c2⤵
- System Location Discovery: System Language Discovery
PID:4808
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /w1⤵PID:4676
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /w2⤵PID:4636
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /W1⤵PID:5496
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /W2⤵PID:2540
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /I1⤵PID:4856
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /I2⤵PID:1228
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /I1⤵PID:2904
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /I2⤵PID:2616
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /m1⤵PID:1248
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /m2⤵PID:2760
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /A1⤵PID:4036
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /A2⤵
- System Location Discovery: System Language Discovery
PID:244
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /y1⤵PID:2456
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /y2⤵PID:3988
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /i1⤵PID:2976
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /i2⤵PID:5404
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /a1⤵PID:1308
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /a2⤵PID:6112
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /d1⤵PID:1444
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /d2⤵
- System Location Discovery: System Language Discovery
PID:4112
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /h1⤵PID:1376
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /h2⤵
- System Location Discovery: System Language Discovery
PID:1728
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /S1⤵PID:3136
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /S2⤵
- System Location Discovery: System Language Discovery
PID:1352
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /L1⤵PID:5904
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /L2⤵
- System Location Discovery: System Language Discovery
PID:3336
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /o1⤵PID:2816
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /o2⤵PID:3588
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /n1⤵PID:3448
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /n2⤵
- System Location Discovery: System Language Discovery
PID:5848
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /y1⤵PID:3508
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /y2⤵PID:552
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\woatui.exe /J1⤵PID:1792
-
C:\Users\Admin\woatui.exeC:\Users\Admin\woatui.exe /J2⤵
- System Location Discovery: System Language Discovery
PID:3960
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
260KB
MD53c919d9eecf20de0823394b08a78bf10
SHA163d00e97cc112b4e57b46df65c501187192d7071
SHA256ccf7cd3e804695980fa37aeda26b334aff972d066a6a4a172d903d7795afe425
SHA51213e59e859573ec4e7082cfafd865c8511413df1c4f7281ff96d75f71b657a9947f5414f3e25857d0510d70a149543b0c64e608853135e447a5e31d04df2f5744