Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2025, 10:58
Behavioral task
behavioral1
Sample
JaffaCakes118_a9be86a2e0de1904b756e5b4cb4e58b5.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_a9be86a2e0de1904b756e5b4cb4e58b5.exe
-
Size
28KB
-
MD5
a9be86a2e0de1904b756e5b4cb4e58b5
-
SHA1
0095ac383caccba404e9cba83526e67943e6cd32
-
SHA256
3c9e45e29083fe7157ff7d101393f9a79d53d6ddc8e212dd6004acc0f8f81e9c
-
SHA512
5fdfe3d3de191d159d2f874311b3755e4a6f546a96a85c0377642458683882f7c138e759b09cddb2ad98b04ad86e1ea01f9efa3dd194b6ab3d92229273ae5dd6
-
SSDEEP
384:1vxBbK26lj5Id8SpHx9jLhsznnVxA1WmP5w7GGCJlqqwMyNw1O:Dv8IRRdsxq1DjJcqfjA
Malware Config
Signatures
-
Detects MyDoom family 5 IoCs
resource yara_rule behavioral1/memory/4584-33-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom behavioral1/memory/2760-44-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom behavioral1/memory/4108-54-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom behavioral1/memory/4108-550-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom behavioral1/memory/4108-621-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom -
Mydoom family
-
Executes dropped EXE 64 IoCs
pid Process 1648 services.exe 4108 java.exe 1900 services.exe 1020 services.exe 2508 services.exe 4584 java.exe 4820 services.exe 4784 services.exe 4876 services.exe 4028 services.exe 4964 services.exe 5016 services.exe 2272 services.exe 4880 services.exe 704 services.exe 6040 services.exe 3736 services.exe 2328 services.exe 1392 services.exe 5580 services.exe 5572 services.exe 3744 services.exe 5788 services.exe 1212 services.exe 2868 services.exe 5256 services.exe 5872 services.exe 4416 services.exe 812 services.exe 4320 services.exe 1564 services.exe 1120 services.exe 5760 services.exe 5376 services.exe 2136 services.exe 4260 services.exe 2860 services.exe 2188 services.exe 1236 services.exe 2744 services.exe 1432 services.exe 4376 services.exe 2316 services.exe 6228 services.exe 6256 services.exe 6268 services.exe 6380 services.exe 6512 services.exe 6636 services.exe 6688 services.exe 6712 services.exe 6704 services.exe 6928 services.exe 6944 services.exe 6252 services.exe 6176 services.exe 6440 services.exe 6664 services.exe 6296 services.exe 7256 services.exe 7380 services.exe 7392 services.exe 7400 services.exe 7596 services.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Users\\Admin\\AppData\\Local\\Temp\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Users\\Admin\\AppData\\Local\\Temp\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Users\\Admin\\AppData\\Local\\Temp\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
resource yara_rule behavioral1/memory/2760-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x0007000000024313-4.dat upx behavioral1/memory/1648-5-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/files/0x0008000000024314-14.dat upx behavioral1/memory/1900-24-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2508-29-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/4584-33-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/2760-44-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/1648-48-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/4964-49-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/5016-55-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/4108-54-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/1900-58-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2272-59-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/4880-66-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1020-65-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/4820-77-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/6040-73-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/704-72-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2508-71-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/4784-81-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/4876-85-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/5572-93-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/4964-92-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/4028-89-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/3744-100-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/5016-99-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/5788-105-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2272-104-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1212-109-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2868-115-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/5256-119-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/6040-112-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/704-111-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/3736-121-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2328-125-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/5580-131-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1392-130-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1120-140-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2860-147-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/5872-146-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/4416-149-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/4320-152-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/812-151-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2744-153-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1432-157-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1564-156-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1120-159-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/5760-160-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/5376-163-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/6256-166-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/4260-168-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2136-165-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2860-170-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/6512-174-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2188-173-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1236-175-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1432-180-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/6712-179-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/6688-178-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2744-177-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/6944-189-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/6928-187-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2316-186-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\java.exe java.exe File created C:\Windows\java.exe java.exe File created C:\Windows\services.exe JaffaCakes118_a9be86a2e0de1904b756e5b4cb4e58b5.exe File opened for modification C:\Windows\java.exe JaffaCakes118_a9be86a2e0de1904b756e5b4cb4e58b5.exe File created C:\Windows\java.exe JaffaCakes118_a9be86a2e0de1904b756e5b4cb4e58b5.exe File created C:\Windows\services.exe java.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 20020 19784 WerFault.exe 853 3144 4108 WerFault.exe 92 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe -
Checks SCSI registry key(s) 3 TTPs 28 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 dwm.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
description pid Process Token: SeCreateGlobalPrivilege 372 dwm.exe Token: SeChangeNotifyPrivilege 372 dwm.exe Token: 33 372 dwm.exe Token: SeIncBasePriorityPrivilege 372 dwm.exe Token: SeCreateGlobalPrivilege 19624 dwm.exe Token: SeChangeNotifyPrivilege 19624 dwm.exe Token: 33 19624 dwm.exe Token: SeIncBasePriorityPrivilege 19624 dwm.exe Token: SeCreateGlobalPrivilege 19656 dwm.exe Token: SeChangeNotifyPrivilege 19656 dwm.exe Token: 33 19656 dwm.exe Token: SeIncBasePriorityPrivilege 19656 dwm.exe Token: SeCreateGlobalPrivilege 19664 dwm.exe Token: SeChangeNotifyPrivilege 19664 dwm.exe Token: 33 19664 dwm.exe Token: SeIncBasePriorityPrivilege 19664 dwm.exe Token: SeCreateGlobalPrivilege 19772 dwm.exe Token: SeChangeNotifyPrivilege 19772 dwm.exe Token: 33 19772 dwm.exe Token: SeIncBasePriorityPrivilege 19772 dwm.exe Token: SeCreateGlobalPrivilege 20144 dwm.exe Token: SeChangeNotifyPrivilege 20144 dwm.exe Token: 33 20144 dwm.exe Token: SeIncBasePriorityPrivilege 20144 dwm.exe Token: SeCreateGlobalPrivilege 1460 dwm.exe Token: SeChangeNotifyPrivilege 1460 dwm.exe Token: 33 1460 dwm.exe Token: SeIncBasePriorityPrivilege 1460 dwm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2760 wrote to memory of 1648 2760 JaffaCakes118_a9be86a2e0de1904b756e5b4cb4e58b5.exe 85 PID 2760 wrote to memory of 1648 2760 JaffaCakes118_a9be86a2e0de1904b756e5b4cb4e58b5.exe 85 PID 2760 wrote to memory of 1648 2760 JaffaCakes118_a9be86a2e0de1904b756e5b4cb4e58b5.exe 85 PID 5416 wrote to memory of 4108 5416 cmd.exe 92 PID 5416 wrote to memory of 4108 5416 cmd.exe 92 PID 5416 wrote to memory of 4108 5416 cmd.exe 92 PID 4108 wrote to memory of 1900 4108 java.exe 93 PID 4108 wrote to memory of 1900 4108 java.exe 93 PID 4108 wrote to memory of 1900 4108 java.exe 93 PID 5412 wrote to memory of 1020 5412 cmd.exe 95 PID 5412 wrote to memory of 1020 5412 cmd.exe 95 PID 5412 wrote to memory of 1020 5412 cmd.exe 95 PID 2276 wrote to memory of 2508 2276 cmd.exe 101 PID 2276 wrote to memory of 2508 2276 cmd.exe 101 PID 2276 wrote to memory of 2508 2276 cmd.exe 101 PID 3592 wrote to memory of 4584 3592 cmd.exe 190 PID 3592 wrote to memory of 4584 3592 cmd.exe 190 PID 3592 wrote to memory of 4584 3592 cmd.exe 190 PID 4408 wrote to memory of 4820 4408 cmd.exe 107 PID 4408 wrote to memory of 4820 4408 cmd.exe 107 PID 4408 wrote to memory of 4820 4408 cmd.exe 107 PID 3168 wrote to memory of 4784 3168 cmd.exe 108 PID 3168 wrote to memory of 4784 3168 cmd.exe 108 PID 3168 wrote to memory of 4784 3168 cmd.exe 108 PID 2488 wrote to memory of 4876 2488 cmd.exe 111 PID 2488 wrote to memory of 4876 2488 cmd.exe 111 PID 2488 wrote to memory of 4876 2488 cmd.exe 111 PID 4652 wrote to memory of 4028 4652 cmd.exe 115 PID 4652 wrote to memory of 4028 4652 cmd.exe 115 PID 4652 wrote to memory of 4028 4652 cmd.exe 115 PID 4904 wrote to memory of 4964 4904 cmd.exe 119 PID 4904 wrote to memory of 4964 4904 cmd.exe 119 PID 4904 wrote to memory of 4964 4904 cmd.exe 119 PID 3400 wrote to memory of 5016 3400 cmd.exe 120 PID 3400 wrote to memory of 5016 3400 cmd.exe 120 PID 3400 wrote to memory of 5016 3400 cmd.exe 120 PID 5324 wrote to memory of 2272 5324 cmd.exe 125 PID 5324 wrote to memory of 2272 5324 cmd.exe 125 PID 5324 wrote to memory of 2272 5324 cmd.exe 125 PID 3476 wrote to memory of 4880 3476 cmd.exe 128 PID 3476 wrote to memory of 4880 3476 cmd.exe 128 PID 3476 wrote to memory of 4880 3476 cmd.exe 128 PID 4776 wrote to memory of 704 4776 cmd.exe 131 PID 4776 wrote to memory of 704 4776 cmd.exe 131 PID 4776 wrote to memory of 704 4776 cmd.exe 131 PID 5404 wrote to memory of 6040 5404 cmd.exe 132 PID 5404 wrote to memory of 6040 5404 cmd.exe 132 PID 5404 wrote to memory of 6040 5404 cmd.exe 132 PID 5204 wrote to memory of 3736 5204 cmd.exe 137 PID 5204 wrote to memory of 3736 5204 cmd.exe 137 PID 5204 wrote to memory of 3736 5204 cmd.exe 137 PID 3112 wrote to memory of 2328 3112 cmd.exe 140 PID 3112 wrote to memory of 2328 3112 cmd.exe 140 PID 3112 wrote to memory of 2328 3112 cmd.exe 140 PID 3180 wrote to memory of 1392 3180 cmd.exe 145 PID 3180 wrote to memory of 1392 3180 cmd.exe 145 PID 3180 wrote to memory of 1392 3180 cmd.exe 145 PID 3628 wrote to memory of 5580 3628 cmd.exe 146 PID 3628 wrote to memory of 5580 3628 cmd.exe 146 PID 3628 wrote to memory of 5580 3628 cmd.exe 146 PID 3584 wrote to memory of 5572 3584 cmd.exe 148 PID 3584 wrote to memory of 5572 3584 cmd.exe 148 PID 3584 wrote to memory of 5572 3584 cmd.exe 148 PID 2620 wrote to memory of 3744 2620 cmd.exe 154
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a9be86a2e0de1904b756e5b4cb4e58b5.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a9be86a2e0de1904b756e5b4cb4e58b5.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1648
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\java.exe1⤵
- Suspicious use of WriteProcessMemory
PID:5416 -
C:\Windows\java.exeC:\Windows\java.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Users\Admin\AppData\Local\Temp\services.exe"C:\Users\Admin\AppData\Local\Temp\services.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1900
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4108 -s 35083⤵
- Program crash
PID:3144
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:5412 -
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:1020
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2508
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\java.exe1⤵
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Windows\java.exeC:\Windows\java.exe2⤵
- Executes dropped EXE
PID:4584
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4876
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:4784
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:4820
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4028
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4964
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:5324 -
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:2272
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵
- Executes dropped EXE
PID:5016
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:4880
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:5404 -
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6040
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵
- Executes dropped EXE
PID:704
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:5204 -
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:3736
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2328
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5572
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵
- Executes dropped EXE
PID:5580
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1392
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:4208
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5788
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:3744
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:2312
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1212
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:3516
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2868
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵PID:3764
-
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:5872
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:2520
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:4416
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6108
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5256
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:1920
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:812
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:5176
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:1564
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:1660
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4320
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵PID:6088
-
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵
- Executes dropped EXE
PID:1120
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:656
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:5760
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:3428
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2136
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:3928
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:5376
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:4444
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4260
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:4540
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1236
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵PID:5672
-
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2860
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:4584
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:2188
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:5700
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1432
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:3596
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2744
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:4624
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4376
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵PID:3704
-
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6228
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:5316
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:2316
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:5036
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:6268
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:5748
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6380
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:2820
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6512
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:2100
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:6256
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:5728
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6688
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6164
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:6636
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵PID:6308
-
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6944
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6320
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:6712
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6360
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:6704
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6448
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:6928
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6544
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:6252
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6564
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6176
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6772
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:6440
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6784
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:7400
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6804
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:7256
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6816
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:6664
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6996
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:7380
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵PID:7024
-
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵
- Executes dropped EXE
PID:6296
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7104
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:7392
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6560
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:7596
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6584
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:7864
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6968
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:7628
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7192
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:7844
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵PID:7240
-
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵PID:7776
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7320
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:7852
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7468
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:8120
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7496
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:8112
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7512
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:8104
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7532
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:8168
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7696
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:8200
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7716
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:7528
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵PID:7812
-
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵PID:8328
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7936
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:8388
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7964
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:8604
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8004
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:8580
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8156
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:8504
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8180
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:8776
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6760
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:8856
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7424
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:8768
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7476
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:8924
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8148
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:8796
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8280
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:8376
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵PID:8396
-
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:9140
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8448
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:9060
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8552
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:9284
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8624
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:8440
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8636
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:9476
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8696
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:9296
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8844
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:9456
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8896
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:9684
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8912
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:9448
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9024
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:9780
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9048
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:9832
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9164
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:9596
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵PID:7840
-
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵PID:10020
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8864
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:10232
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9000
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:10156
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9156
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:10116
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9340
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:10128
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9368
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:3320
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9548
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:10320
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9560
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:10368
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9572
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:9524
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9664
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:10336
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9756
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:10384
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9852
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:10696
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9916
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:10440
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9924
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:10568
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵PID:10096
-
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:10800
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10224
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:10988
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8832
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:11032
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8632
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:11040
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9592
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:11064
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10172
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:10400
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9532
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:10416
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10288
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:11200
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10408
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:11464
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10428
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:11204
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10468
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:10460
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10524
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:11524
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10644
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:11492
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10676
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:11764
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10768
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:11680
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵PID:10868
-
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵PID:11832
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10880
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:11532
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11024
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:12056
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11132
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:12280
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11152
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:12064
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11168
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:12076
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10356
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:11752
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11052
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:12172
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11120
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:11300
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11176
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:12340
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11320
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:12148
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11336
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:12084
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11544
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:12688
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11568
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:12720
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11644
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:12500
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11656
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:12884
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11756
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:12644
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11848
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:13016
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵PID:11908
-
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵
- Adds Run key to start application
PID:13128
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11980
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:12652
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12140
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:13196
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12164
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:12368
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12184
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:12436
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12204
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:13180
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11508
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:13048
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12232
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:13324
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12292
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:12716
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12360
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:13460
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12380
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:13568
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12392
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:13500
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12456
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:13484
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12580
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:13452
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12732
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:13948
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12756
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:13508
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12796
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:14108
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12824
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:13940
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12968
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:13728
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13080
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:14160
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13104
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:14148
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13172
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:14128
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵PID:13212
-
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:1940
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13276
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:13992
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12808
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:13384
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12784
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:14240
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13348
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:14600
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13372
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:14628
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13420
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:14376
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13560
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:14616
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13612
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:14888
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13624
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:14648
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13640
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:15140
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13668
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:15036
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13700
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13804
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13840
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14024
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14040
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14084
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:15120
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14256
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14268
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:15128
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14280
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:15152
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14300
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13660
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:15044
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:2652
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵PID:13368
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14456
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14504
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14708
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14748
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14756
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14768
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14792
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14948
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:15280
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:15236
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:3140
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:15320
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:14820
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14500
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:15020
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14804
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:15120
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:15100
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:15128
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:15132
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:13968
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14140
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:15156
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13844
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:13840
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:15220
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:15200
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13400
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:14880
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13808
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:14568
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14452
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:14396
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14212
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:14372
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:2652
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14568
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:14572
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:3040
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:4032
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵PID:15152
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:3336
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:2036
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:5636
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:5212
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:15412
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:15436
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:15608
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:15796
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:15860
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:15880
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:16260
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:17508
-
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:372
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:2444
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:17492
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8188
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:17528
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:16424
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:17988
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:16680
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:17500
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:16952
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:17520
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:17272
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:17944
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:17120
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:16436
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:16776
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:18280
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:17568
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:19060
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:17636
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:18988
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:17668
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:18820
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:17676
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:19028
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:17700
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:19052
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:17964
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:18688
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:18084
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:18696
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:18108
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:18556
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:18320
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:18600
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:18328
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:18704
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:18448
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:18592
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:18476
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:18648
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:18776
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:18792
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:18808
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:19132
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:18940
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:19280
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:19148
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:19176
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:19188
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:19200
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13264
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:19268
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:18680
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8276
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:18768
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:18796
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:20332
-
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:19624
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:19892
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:14724
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:20064
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:14848
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:20380
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:19784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 19784 -s 2003⤵
- Program crash
PID:20020
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:20412
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8060
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:15888
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:14596
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 19784 -ip 197841⤵PID:19692
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:19656
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:20476
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:20412
-
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:19664
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:19772
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:20144
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:19720
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:20216
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:20468
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:1096
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:11108
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:3564
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:5192
-
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1460
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:20164
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:968
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:2996
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:2856
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:3528
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:2576
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:984
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:3456
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:4828
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:16588
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:2184
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:6208
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:2168
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:6352
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:5988
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6420
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:6596
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6740
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:984
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:7552
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6028
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:7976
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8032
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:7732
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7672
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:8496
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:4188
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:20132
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9412
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:9544
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9768
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:9996
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10004
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:10216
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7372
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:6456
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10244
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:10520
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10584
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:8084
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:19804
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:10936
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10824
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11128
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:10532
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6200
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8320
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9796
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7020
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:12560
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12572
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13168
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:13208
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13812
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:15252
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8420
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8740
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14464
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:11380
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9088
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:15312
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:14840
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12124
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10144
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14340
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:1628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 4108 -ip 41081⤵PID:1636
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:3688
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:12444
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10376
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:19704
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6684
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14760
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:14496
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10980
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:15084
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14752
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:14852
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:15832
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11604
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14576
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:12588
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10692
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:18768
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:7288
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9184
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:16712
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:16900
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:16292
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:18044
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:2300
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12988
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:5444
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:20052
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13608
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14168
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:18772
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:18252
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:19248
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:11976
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9076
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14136
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12020
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12536
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:4832
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:16444
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12788
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:16736
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13364
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:16996
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:1232
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10960
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14248
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11220
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:17436
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:17428
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:17772
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:15164
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:18460
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:18504
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:18760
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10548
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:20264
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12160
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10184
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:15604
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:3368
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6064
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:728
-
-
C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /R /T1⤵PID:7288
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8920
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:19996
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:16712
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
304B
MD5cde2c6ec81201bdd39579745c69d502f
SHA1e025748a7d4361b2803140ed0f0abda1797f5388
SHA256a81000fc443c3c99e0e653cca135e16747e63bccebd5052ed64d7ae6f63f227f
SHA512de5ca6169b2bb42a452ebd2f92c23bad3a98c01845a875336d6affe7f0192c2782b1f66f149019c0b880410c836fc45b2e9157dcccc7ad0d9e5953521a2151d4
-
Filesize
25B
MD58ba61a16b71609a08bfa35bc213fce49
SHA18374dddcc6b2ede14b0ea00a5870a11b57ced33f
SHA2566aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1
SHA5125855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1
-
Filesize
1KB
MD55e35863e02b57b368605c34a4aeaf526
SHA105e861de5e159e4dee002a9d18845514614b200e
SHA256b5cdcee28c0bcb0d1381784ce4a65fbc8587d3394e63026f3a35d7c9259ea5ae
SHA512e28c35f9abce1eebff5c7ffa978c0b44586fd40c32bdd3382102b454bbb73287aa9777619a5145ffac239df3649203e6576e6b1b4bc1d4ebf3c91e6175126027
-
Filesize
28KB
MD59088048df33cf3b8255a45b7ab8328b4
SHA1d211f57958ecaab26eaf54267202414ad99cb3b9
SHA2565f75964bca2f3ff6f1ebfafb7d837bee31a00fcccd92d18df3fada0a400ae4e4
SHA51296dc89ad8476c71cacf72825b0427b21ec9a4ab38204d2bd425b027fb69aa7d586f00140e89341c0809c3517a74311f9721080393bc0d8b4bcdbd90cf84925fb
-
Filesize
1KB
MD56ca31e31312685668e766b99bd958703
SHA1f76f6f2e0b491614553f6a55eb98468c5740d39d
SHA25606fb40e0f033c597f32afb377e02b5908e67cc9cc85aa0275575814ce1a3059f
SHA512c868d2f689ec6f94e0549b082b118ee244b27868bf105c615c4c6f257f1e868768568e727844f08ff00b74a33df1d119a359c5e516e5af04af98a804397c45a9
-
Filesize
1KB
MD5935330951ae74039f6a25df24e88db1a
SHA1f73cbe2592961cced631ee121c0df2fe707a9667
SHA256037329aaea65181031ccf85061dbb10308444d755858abb663a1925985ed2146
SHA5122b467bb9a0f75a01a15de4e20d2bef74f6db72d7c5fd77b8391c7fe5e6123a8eeaf6d4c31db12ea6734a4b20f8ed7ebf1feb89f2035e8388e18439d3aa366154
-
Filesize
1KB
MD59430e50565e70e1e5d25ccc6ec937dc9
SHA169e6ef980d603e50f2d05f970b90f977b2469dcd
SHA256b593d0895ba8032164865a6d6c451e74726fdbf2b33c0581c0d0e52bbbebbaf2
SHA512944183341822e8f83a0401b369425131df12da0afd3c31ac312a4f3eb96ea3a25d47254fa88228bbc987f995ac0cf033603eb7f89d04c26fb77f637db2cc611b
-
Filesize
28KB
MD5a9be86a2e0de1904b756e5b4cb4e58b5
SHA10095ac383caccba404e9cba83526e67943e6cd32
SHA2563c9e45e29083fe7157ff7d101393f9a79d53d6ddc8e212dd6004acc0f8f81e9c
SHA5125fdfe3d3de191d159d2f874311b3755e4a6f546a96a85c0377642458683882f7c138e759b09cddb2ad98b04ad86e1ea01f9efa3dd194b6ab3d92229273ae5dd6
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2