Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250410-en -
resource tags
arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system -
submitted
11/04/2025, 23:11
Behavioral task
behavioral1
Sample
JaffaCakes118_b043123b8ba4cbc58f4412e2284408b1.exe
Resource
win10v2004-20250410-en
General
-
Target
JaffaCakes118_b043123b8ba4cbc58f4412e2284408b1.exe
-
Size
28KB
-
MD5
b043123b8ba4cbc58f4412e2284408b1
-
SHA1
c4559caf6a0a6fffdb448765877a6d626f1984e1
-
SHA256
2915a5dbc788dfa77461d0b8245b8f64c502b3cb25a9b63f66ebd82b7ddfa3a5
-
SHA512
6aa458665e2bedddd4e0b7c8f3e560032413341fe95febbc9ab5358448a24a75757bc670a6a3d599031698b87c02e9c7659edb0d317165fdf8f679158ec27777
-
SSDEEP
384:1vxBbK26lj5Id8SpHx9jLhsznnVxA1WmP5w7GGCJlqqwMyNO/n20:Dv8IRRdsxq1DjJcqfZ20
Malware Config
Signatures
-
Detects MyDoom family 6 IoCs
resource yara_rule behavioral1/memory/4912-47-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom behavioral1/memory/3528-46-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom behavioral1/memory/4656-58-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom behavioral1/memory/4656-510-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom behavioral1/memory/4656-554-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom behavioral1/memory/4656-620-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom -
Mydoom family
-
Executes dropped EXE 64 IoCs
pid Process 512 services.exe 1416 services.exe 4656 java.exe 5064 services.exe 4948 services.exe 4800 services.exe 4700 services.exe 4556 services.exe 4852 services.exe 4912 java.exe 3216 services.exe 1240 services.exe 4752 services.exe 5276 services.exe 5776 services.exe 1688 services.exe 5420 services.exe 2376 services.exe 5300 services.exe 5716 services.exe 3576 services.exe 1292 services.exe 3616 services.exe 5728 services.exe 3812 services.exe 6084 services.exe 2104 services.exe 4204 services.exe 2500 services.exe 2028 services.exe 1736 services.exe 2972 services.exe 1712 services.exe 4756 services.exe 5028 services.exe 5516 services.exe 548 services.exe 4740 services.exe 4232 services.exe 336 services.exe 1804 services.exe 4244 services.exe 5636 services.exe 2216 services.exe 2548 services.exe 6332 services.exe 6384 services.exe 6408 services.exe 6480 services.exe 6488 services.exe 6604 services.exe 6652 services.exe 6784 services.exe 6872 services.exe 6984 services.exe 7108 services.exe 7120 services.exe 3504 services.exe 6416 services.exe 7220 services.exe 7284 services.exe 7292 services.exe 7276 services.exe 7432 services.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Users\\Admin\\AppData\\Local\\Temp\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Users\\Admin\\AppData\\Local\\Temp\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Users\\Admin\\AppData\\Local\\Temp\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Users\\Admin\\AppData\\Local\\Temp\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Users\\Admin\\AppData\\Local\\Temp\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Users\\Admin\\AppData\\Local\\Temp\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
resource yara_rule behavioral1/memory/3528-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x000800000002425c-4.dat upx behavioral1/memory/512-7-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1416-15-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/files/0x000800000002425d-16.dat upx behavioral1/memory/4948-32-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/4800-34-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/4912-47-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/3528-46-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/1416-54-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/512-50-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/4656-58-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/5064-62-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/4700-71-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/4800-70-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2376-77-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/4556-76-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/4852-80-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1240-93-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/3576-89-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/3216-88-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/3616-100-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/4752-99-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/5276-102-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/3812-108-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/5776-107-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/5420-112-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1688-111-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2104-118-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2376-122-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/4204-123-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/5716-128-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/5300-127-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/3576-135-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1292-138-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/5728-142-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/5028-143-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/3812-144-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/6084-146-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2500-151-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/336-154-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1736-153-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2028-152-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/4756-159-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2548-163-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1712-158-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2972-155-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/6332-166-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/5516-165-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/548-167-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/4740-169-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/6408-170-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/4232-172-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/6488-174-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/4244-178-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/6604-179-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1804-177-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2216-182-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/5636-181-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/6872-185-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/6984-187-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/7108-189-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/6384-191-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/3504-195-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\java.exe JaffaCakes118_b043123b8ba4cbc58f4412e2284408b1.exe File created C:\Windows\services.exe java.exe File opened for modification C:\Windows\java.exe java.exe File created C:\Windows\java.exe java.exe File created C:\Windows\services.exe JaffaCakes118_b043123b8ba4cbc58f4412e2284408b1.exe File opened for modification C:\Windows\java.exe JaffaCakes118_b043123b8ba4cbc58f4412e2284408b1.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 19764 4656 WerFault.exe 94 16600 1608 WerFault.exe 1128 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe -
Checks SCSI registry key(s) 3 TTPs 24 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeCreateGlobalPrivilege 15260 dwm.exe Token: SeChangeNotifyPrivilege 15260 dwm.exe Token: 33 15260 dwm.exe Token: SeIncBasePriorityPrivilege 15260 dwm.exe Token: SeShutdownPrivilege 15260 dwm.exe Token: SeCreatePagefilePrivilege 15260 dwm.exe Token: SeCreateGlobalPrivilege 7472 dwm.exe Token: SeChangeNotifyPrivilege 7472 dwm.exe Token: 33 7472 dwm.exe Token: SeIncBasePriorityPrivilege 7472 dwm.exe Token: SeCreateGlobalPrivilege 1288 dwm.exe Token: SeChangeNotifyPrivilege 1288 dwm.exe Token: 33 1288 dwm.exe Token: SeIncBasePriorityPrivilege 1288 dwm.exe Token: SeCreateGlobalPrivilege 7680 dwm.exe Token: SeChangeNotifyPrivilege 7680 dwm.exe Token: 33 7680 dwm.exe Token: SeIncBasePriorityPrivilege 7680 dwm.exe Token: SeCreateGlobalPrivilege 14396 dwm.exe Token: SeChangeNotifyPrivilege 14396 dwm.exe Token: 33 14396 dwm.exe Token: SeIncBasePriorityPrivilege 14396 dwm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3528 wrote to memory of 512 3528 JaffaCakes118_b043123b8ba4cbc58f4412e2284408b1.exe 86 PID 3528 wrote to memory of 512 3528 JaffaCakes118_b043123b8ba4cbc58f4412e2284408b1.exe 86 PID 3528 wrote to memory of 512 3528 JaffaCakes118_b043123b8ba4cbc58f4412e2284408b1.exe 86 PID 4408 wrote to memory of 1416 4408 cmd.exe 93 PID 4408 wrote to memory of 1416 4408 cmd.exe 93 PID 4408 wrote to memory of 1416 4408 cmd.exe 93 PID 5620 wrote to memory of 4656 5620 cmd.exe 94 PID 5620 wrote to memory of 4656 5620 cmd.exe 94 PID 5620 wrote to memory of 4656 5620 cmd.exe 94 PID 4656 wrote to memory of 5064 4656 java.exe 96 PID 4656 wrote to memory of 5064 4656 java.exe 96 PID 4656 wrote to memory of 5064 4656 java.exe 96 PID 4088 wrote to memory of 4948 4088 cmd.exe 104 PID 4088 wrote to memory of 4948 4088 cmd.exe 104 PID 4088 wrote to memory of 4948 4088 cmd.exe 104 PID 5584 wrote to memory of 4800 5584 cmd.exe 107 PID 5584 wrote to memory of 4800 5584 cmd.exe 107 PID 5584 wrote to memory of 4800 5584 cmd.exe 107 PID 2672 wrote to memory of 4700 2672 cmd.exe 108 PID 2672 wrote to memory of 4700 2672 cmd.exe 108 PID 2672 wrote to memory of 4700 2672 cmd.exe 108 PID 888 wrote to memory of 4556 888 cmd.exe 110 PID 888 wrote to memory of 4556 888 cmd.exe 110 PID 888 wrote to memory of 4556 888 cmd.exe 110 PID 4488 wrote to memory of 4852 4488 cmd.exe 114 PID 4488 wrote to memory of 4852 4488 cmd.exe 114 PID 4488 wrote to memory of 4852 4488 cmd.exe 114 PID 2564 wrote to memory of 4912 2564 cmd.exe 118 PID 2564 wrote to memory of 4912 2564 cmd.exe 118 PID 2564 wrote to memory of 4912 2564 cmd.exe 118 PID 4744 wrote to memory of 3216 4744 cmd.exe 120 PID 4744 wrote to memory of 3216 4744 cmd.exe 120 PID 4744 wrote to memory of 3216 4744 cmd.exe 120 PID 4936 wrote to memory of 1240 4936 cmd.exe 121 PID 4936 wrote to memory of 1240 4936 cmd.exe 121 PID 4936 wrote to memory of 1240 4936 cmd.exe 121 PID 916 wrote to memory of 4752 916 cmd.exe 126 PID 916 wrote to memory of 4752 916 cmd.exe 126 PID 916 wrote to memory of 4752 916 cmd.exe 126 PID 4860 wrote to memory of 5276 4860 cmd.exe 130 PID 4860 wrote to memory of 5276 4860 cmd.exe 130 PID 4860 wrote to memory of 5276 4860 cmd.exe 130 PID 3992 wrote to memory of 5776 3992 cmd.exe 134 PID 3992 wrote to memory of 5776 3992 cmd.exe 134 PID 3992 wrote to memory of 5776 3992 cmd.exe 134 PID 5340 wrote to memory of 1688 5340 cmd.exe 136 PID 5340 wrote to memory of 1688 5340 cmd.exe 136 PID 5340 wrote to memory of 1688 5340 cmd.exe 136 PID 1032 wrote to memory of 5420 1032 cmd.exe 137 PID 1032 wrote to memory of 5420 1032 cmd.exe 137 PID 1032 wrote to memory of 5420 1032 cmd.exe 137 PID 4648 wrote to memory of 2376 4648 cmd.exe 139 PID 4648 wrote to memory of 2376 4648 cmd.exe 139 PID 4648 wrote to memory of 2376 4648 cmd.exe 139 PID 1280 wrote to memory of 5300 1280 cmd.exe 146 PID 1280 wrote to memory of 5300 1280 cmd.exe 146 PID 1280 wrote to memory of 5300 1280 cmd.exe 146 PID 5956 wrote to memory of 5716 5956 cmd.exe 149 PID 5956 wrote to memory of 5716 5956 cmd.exe 149 PID 5956 wrote to memory of 5716 5956 cmd.exe 149 PID 220 wrote to memory of 3576 220 cmd.exe 151 PID 220 wrote to memory of 3576 220 cmd.exe 151 PID 220 wrote to memory of 3576 220 cmd.exe 151 PID 836 wrote to memory of 1292 836 cmd.exe 153
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b043123b8ba4cbc58f4412e2284408b1.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b043123b8ba4cbc58f4412e2284408b1.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:512
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\java.exe1⤵
- Suspicious use of WriteProcessMemory
PID:5620 -
C:\Windows\java.exeC:\Windows\java.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Users\Admin\AppData\Local\Temp\services.exe"C:\Users\Admin\AppData\Local\Temp\services.exe"3⤵
- Executes dropped EXE
PID:5064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4656 -s 21563⤵
- Program crash
PID:19764
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:1416
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4948
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:5584 -
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:4800
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\java.exe1⤵
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\java.exeC:\Windows\java.exe2⤵
- Executes dropped EXE
PID:4912
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵
- Executes dropped EXE
PID:4700
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4556
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:4852
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:3216
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵
- Executes dropped EXE
PID:4752
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:1240
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:5276
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:5340 -
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:1688
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5420
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:5776
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:2376
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:5300
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:5956 -
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵
- Executes dropped EXE
PID:5716
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1292
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:2144
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:5728
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3576
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:4024
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:3616
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵PID:448
-
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3812
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:672
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4204
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:3096
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:2104
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:1496
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:6084
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:4840
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2028
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:4848
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2500
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵PID:5944
-
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1736
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:3120
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:2972
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:2864
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:1712
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:2480
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:4756
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:5204
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:548
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:3720
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:5028
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5516
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:5524
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:4740
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:3496
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:4244
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:5688
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4232
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:5236
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:336
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:2884
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:5636
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵PID:3636
-
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1804
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:5332
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2216
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:2100
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:2548
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:1276
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:6332
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6036
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6384
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵PID:4500
-
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵
- Executes dropped EXE
PID:6652
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:1040
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:6488
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:1580
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:6480
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:692
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:6408
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6172
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:6784
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6252
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:6604
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6368
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:6984
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6444
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:6872
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6468
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:7108
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6572
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:3504
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6588
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:6416
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6708
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:7120
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵PID:6816
-
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:7220
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6860
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:7276
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6936
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:7432
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6952
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:7284
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7064
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:7292
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7164
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:7524
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6352
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:7544
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6600
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:7536
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6964
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:7816
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵PID:7248
-
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵PID:7824
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7324
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:8028
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7384
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:7968
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7404
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:8020
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7516
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:8116
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7552
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:5852
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7632
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:7720
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7644
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:8176
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7652
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:2828
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7848
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:6080
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵PID:7896
-
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵PID:8304
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8004
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:8568
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8084
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:8576
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8096
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:8452
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7316
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:8800
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7368
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:8748
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8196
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:8912
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8212
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:8448
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8236
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:9208
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8276
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:9116
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8296
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:8976
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵PID:8368
-
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵
- Adds Run key to start application
PID:8972
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8540
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:9224
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8632
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:9184
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8672
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:9152
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8736
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:8364
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8784
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:8288
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8848
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:8624
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9008
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:9628
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9028
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:9636
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9160
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:9956
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9196
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:9924
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8556
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:9712
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8656
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:10220
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9072
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:10236
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9244
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:10140
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9296
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:10272
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵PID:9336
-
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵
- Adds Run key to start application
PID:10264
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9352
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:9368
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9360
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:9020
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9380
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:9288
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9704
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:10352
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9724
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:9280
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9792
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:9660
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9892
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:10336
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10020
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:10872
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10064
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:10712
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10184
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:10808
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9436
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:11108
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9764
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:11172
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10008
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:11204
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10036
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:11332
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10160
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:11472
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10168
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:11180
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10416
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:11252
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵PID:10432
-
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:11324
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10440
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:11360
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10468
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:11376
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10572
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:11260
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10604
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:11156
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10768
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:11520
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10844
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:11512
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10912
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:11896
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10980
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:11368
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11144
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:12116
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9232
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:12232
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10372
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:12216
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10508
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:11748
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10648
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:12224
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10836
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:12312
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11276
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:12320
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵PID:11440
-
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵
- Adds Run key to start application
PID:12672
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11452
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:12412
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11492
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:12352
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11504
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:12064
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11564
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:12776
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11640
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:12764
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11648
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:12720
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11668
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:12404
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11760
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:12652
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11980
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:12620
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12088
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:13224
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12160
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:13304
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12280
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:12332
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10892
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:12308
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11424
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:12252
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11536
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:13476
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12292
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:13284
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12440
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:13508
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12460
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:13648
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12500
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:13680
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12532
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:13764
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12540
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:13656
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12748
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:13876
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12788
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:13748
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵PID:12816
-
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵PID:13888
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12928
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:14084
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12936
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:13960
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12956
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:13952
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12968
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:13484
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13296
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:13872
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12848
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4580
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12732
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:14360
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12984
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:14420
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13008
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:13996
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13384
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:13584
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13396
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:14220
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13576
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:14900
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13604
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:14724
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13620
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:14648
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13736
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13800
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13812
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:14532
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13924
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:15288
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13936
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:14848
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14024
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14052
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:14868
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14076
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14064
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:14920
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵PID:14192
-
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵PID:15144
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14228
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13636
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:15100
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:3800
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14208
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13600
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14348
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14372
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14468
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14524
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14624
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:14816
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14712
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14784
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14940
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:15156
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14952
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:14740
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14976
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:14452
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:15048
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:15056
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:15052
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:15348
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13988
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:15028
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14352
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:13800
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:15196
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:13736
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13700
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14744
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:5184
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14604
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:14196
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14460
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14252
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:3664
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14668
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14452
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14032
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:5132
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:14448
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14384
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:14452
-
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:13016
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 13016 -ip 130161⤵PID:6892
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:15260
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14468
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:2284
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:232
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:15728
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:15604
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:812
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:15888
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:636
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:16120
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:6000
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:15124
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:3236
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:2044
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:6436
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:1204
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:16532
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:5980
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:13804
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:4352
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:16708
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:4524
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:16480
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6344
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:16776
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:5948
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:16892
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:16420
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:17588
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:16496
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:17736
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:16556
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:18264
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:16604
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:17976
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:16748
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:18272
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:16832
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:18084
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:16932
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:17936
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:17628
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:18468
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:17716
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:7440
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:17820
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:7300
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:18008
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:18044
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:18144
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:18320
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:18640
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:18332
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:18376
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:18880
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:18172
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:18460
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:18872
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:18528
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:18684
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:18724
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:18932
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:18944
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:19372
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:18596
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:18056
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:18116
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:18856
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:18192
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8292
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:18856
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8260
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:19528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4656 -ip 46561⤵PID:19740
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:20108
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:20240
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:20352
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:19588
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:19872
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14496
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:20268
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:14356
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:20384
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:19512
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:19772
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:5008
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:19548
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:4656
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:3852
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:15180
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:19780
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:19736
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:4452
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:19980
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:4376
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:19636
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:2596
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:4560
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:20412
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:428
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:15004
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:3964
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14076
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6092
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:4476
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:64
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:5040
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6224
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:4384
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6888
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:6980
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6944
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:7208
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7376
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7588
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:7760
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:17908
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:1056
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:8172
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:5336
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6520
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:8432
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8492
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:8664
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8744
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8944
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:16524
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9080
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9240
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:7428
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9516
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:9768
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9908
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:10016
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10044
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7892
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:9992
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9684
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:10328
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10556
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:408
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:10784
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:15712
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10960
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:11068
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11076
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:11168
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10500
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11244
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:8808
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14584
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11700
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11784
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11920
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12020
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12264
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:11800
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7332
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12452
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9872
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:9676
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7344
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13028
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:18580
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:13152
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7776
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12740
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13420
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:13548
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13688
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13944
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14296
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:4584
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14896
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:15140
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:17964
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11912
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11964
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12168
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11972
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:5992
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:16740
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:17780
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:17916
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:18344
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:18504
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:18888
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7840
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:13728
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10880
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9488
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:15296
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13260
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:5816
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:4388
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:16448
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12964
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:7472
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:1716
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1288
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:7680
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:14396
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:2968
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9760
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14304
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:1608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1608 -s 2043⤵
- Program crash
PID:16600
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14276
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:18824
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:15808
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:15828
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:15904
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:15976
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
312B
MD55431b34b55fc2e8dfe8e2e977e26e6b5
SHA187cf8feeb854e523871271b6f5634576de3e7c40
SHA2563d7c76daab98368a0dd25cd184db039cdd5d1bc9bd6e9bb91b289119047f5432
SHA5126f309dd924ba012486bcf0e3bafe64899007893ea9863b6f4e5428384ad23d9942c74d17c42a5cf9922a0e0fd8d61c287a2288a945a775586125d53376b9325c
-
Filesize
304B
MD5267ddfdbb8d492b25de208d84b290f1c
SHA19f57d9f19f25549e1232489a0c101a92e851de2f
SHA256ef1f87447ae1ab45548d2934cf0dbd15a32b86359ff9fccfa48d76c1badf6586
SHA5120709aa62d39d419d335183235dcf328e1dfe6997bd9bfbdeb01bb050df8dcab63ec2d4f46e4718ab389fa8e12af66dec2e3019c8871ac6e40927a25cb706c6b3
-
Filesize
25B
MD58ba61a16b71609a08bfa35bc213fce49
SHA18374dddcc6b2ede14b0ea00a5870a11b57ced33f
SHA2566aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1
SHA5125855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1
-
Filesize
1KB
MD5a5f655dad484b9a16d97b95d45dfa1b9
SHA112f48693c7af641e2b8c708ba04ddfc4d3a5383a
SHA25653f10fb9acb6c572e93fda523dc29b82a682fd0b15c0f6275e6fb5cc0321d82b
SHA512db60dd79f41ff78c90d02c85cf73fc9e7329dd5ded32f2756b40d4b44737697f18f183a561a1957f5bb6fa6b3fc7e4ff8026b6d2588e7e36b35838bacd4c0dca
-
Filesize
28KB
MD51b6c01b3988673da6cbbb3edaa0b4b3b
SHA117f3f69ddb7a3fdda731a52b3b1af86abee9b4d2
SHA256b561d2ba4494d50b19dbf8913318bd7831bf4fbe6897f3a90557a5c8c7251d18
SHA51289f9267fc067bb851c617ec45fb91b3fbdca2a7d718181f834e70c437f326357a1b555b3d48836303752a6a97e1fc7667aa96f32b917fe1990bb788f33a909a7
-
Filesize
1KB
MD5b3bde26e65b644a8940e3ff45532438f
SHA1e88b433401b4bfe4d504a4bec2ceb896c85074fc
SHA256ad6c7f00432468c2cfbd4a10e8f2ed36fca9957c2438d48067e38c6605b0333f
SHA512c2d904afd336c89ce779a4ed6e06351f2e3a461326b77871151ae7443c406f8e91ea82642bce0e7d7841633a0874dc356a25c046dd5fbcf1def4d96ffbf2314d
-
Filesize
1KB
MD5cf914db09e47630eb8d73afd2000a169
SHA15996ec11c387ba2bf646b1f17cbc74842d4fe30e
SHA256c0535911512b92d05405c2b8e212b8846821fe91001c089b98954c3ae39c29a6
SHA5120c8036fb84ffd9499799f6e5196fa1ba94646d37658eaf46f43be934b043b30302d75dfe7bd9e517748af8638597e56ab668c5075b5a3fcc08e3ea4f6d3fb2e1
-
Filesize
1KB
MD53b8e5ad5be2633fe9b3ddb3c91e07113
SHA101cff7f8c61585dd513516600cbe4edaf31575d1
SHA2568c2c126f3ccc3f0adff95b47152b8a398654c87baec2b2fe446b43b9f1f96608
SHA51297e01e9a7c012dc11f6fd8d9bd98cb428259fa934b19e1d2c4de5d4d36e560368ca81797800b492feb5249be57c10c34ce586d2aa36b2e2dc84f1f84eab0237d
-
Filesize
32B
MD5c0ee8c89d95efcc4614ca73ba242726e
SHA1db6c2e2903ec6ba6316587f9baba44fd40451324
SHA256a96aeed758de0d7c0d7609faa229d75f6110a0f1e7160da7f9ba346fa5edaede
SHA5126dadc66a5ad31c608f486e57e2f953e4df000649af347bda56e47bd05375e16bcc4dba7c5c7935292c847ba751fdb1ba5ae810be50b7cc1159365fb1641c95d2
-
Filesize
28KB
MD5b043123b8ba4cbc58f4412e2284408b1
SHA1c4559caf6a0a6fffdb448765877a6d626f1984e1
SHA2562915a5dbc788dfa77461d0b8245b8f64c502b3cb25a9b63f66ebd82b7ddfa3a5
SHA5126aa458665e2bedddd4e0b7c8f3e560032413341fe95febbc9ab5358448a24a75757bc670a6a3d599031698b87c02e9c7659edb0d317165fdf8f679158ec27777
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2