Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250410-en -
resource tags
arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system -
submitted
12/04/2025, 01:46
Behavioral task
behavioral1
Sample
JaffaCakes118_b0b4c537ae07852a29f628197c2a5a37.exe
Resource
win10v2004-20250410-en
General
-
Target
JaffaCakes118_b0b4c537ae07852a29f628197c2a5a37.exe
-
Size
28KB
-
MD5
b0b4c537ae07852a29f628197c2a5a37
-
SHA1
84f6ea539cb109b23db9ba6e0d8a3e1a4d78254d
-
SHA256
e13e5be12cf64cf74cc9c180130104719339bd841610c871c066e627a13a47ef
-
SHA512
45e22f326e24cf24b9b8b6b6b6743603a1bed6dea3c1ea0f1839eafb8612d3578033bd53a28fb06ebbe1ee0575f26e9cb33993019fe1ab4eb45f8b0cbac9a74d
-
SSDEEP
384:1vxBbK26lj5Id8SpHx9jLhsznnVxA1WmP5w7GGCJlqqwMyNzTSZ0:Dv8IRRdsxq1DjJcqfJO
Malware Config
Signatures
-
Detected microsoft outlook phishing page 1 IoCs
flow pid Process 37 5792 java.exe -
Detects MyDoom family 5 IoCs
resource yara_rule behavioral1/memory/4572-35-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom behavioral1/memory/1808-47-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom behavioral1/memory/5792-55-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom behavioral1/memory/5792-561-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom behavioral1/memory/5792-709-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom -
Mydoom family
-
Executes dropped EXE 64 IoCs
pid Process 1624 services.exe 5792 java.exe 3592 services.exe 6020 services.exe 4180 services.exe 4572 java.exe 4676 services.exe 4724 services.exe 4780 services.exe 1960 services.exe 4908 services.exe 4408 services.exe 2628 services.exe 5284 services.exe 3604 services.exe 5900 services.exe 3032 services.exe 456 services.exe 1472 services.exe 5936 services.exe 2172 services.exe 2068 services.exe 1460 services.exe 1148 services.exe 1124 services.exe 5200 services.exe 4164 services.exe 3476 services.exe 2632 services.exe 2348 services.exe 4036 services.exe 2644 services.exe 3348 services.exe 4628 services.exe 2960 services.exe 2164 services.exe 4092 services.exe 2284 services.exe 436 services.exe 5040 services.exe 1848 services.exe 5984 services.exe 3788 services.exe 6204 services.exe 6316 services.exe 6476 services.exe 6604 services.exe 6620 services.exe 6700 services.exe 6728 services.exe 6828 services.exe 6836 services.exe 6852 services.exe 7080 services.exe 7064 services.exe 6224 services.exe 6712 services.exe 5500 services.exe 1744 services.exe 7032 services.exe 4400 services.exe 7192 services.exe 7212 services.exe 7232 services.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Users\\Admin\\AppData\\Local\\Temp\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Users\\Admin\\AppData\\Local\\Temp\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Users\\Admin\\AppData\\Local\\Temp\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Users\\Admin\\AppData\\Local\\Temp\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
resource yara_rule behavioral1/memory/1808-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x00080000000241e9-7.dat upx behavioral1/memory/1624-5-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/files/0x00080000000241ea-14.dat upx behavioral1/memory/3592-24-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/4180-31-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/4572-35-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/4676-38-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1808-47-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/1624-51-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/4908-52-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/5792-55-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/2628-60-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/5284-65-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/6020-64-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/5900-73-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/4180-68-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/3032-80-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/4676-79-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1472-85-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/4780-84-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/4908-95-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/4408-97-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2172-96-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1960-89-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1460-105-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2628-104-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/5284-107-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/3604-112-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1148-110-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/5900-116-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/4164-121-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/3476-127-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/456-126-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1472-129-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2348-136-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/5936-135-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2644-142-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2068-141-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2172-140-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/4628-146-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2164-150-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1124-149-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/4092-153-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/5200-152-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/4164-154-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/436-157-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2284-156-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2632-159-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/3788-166-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/4036-163-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/3348-164-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/5984-165-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/6204-169-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2960-171-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/6316-172-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/6476-173-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/6620-179-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2284-178-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/6604-176-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/5040-180-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/6836-183-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/3788-186-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/7064-190-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\services.exe java.exe File opened for modification C:\Windows\java.exe java.exe File created C:\Windows\java.exe java.exe File created C:\Windows\services.exe JaffaCakes118_b0b4c537ae07852a29f628197c2a5a37.exe File opened for modification C:\Windows\java.exe JaffaCakes118_b0b4c537ae07852a29f628197c2a5a37.exe File created C:\Windows\java.exe JaffaCakes118_b0b4c537ae07852a29f628197c2a5a37.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 6864 2868 WerFault.exe 739 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe -
Checks SCSI registry key(s) 3 TTPs 18 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID dwm.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe -
Modifies data under HKEY_USERS 54 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E dwm.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeCreateGlobalPrivilege 15708 dwm.exe Token: SeChangeNotifyPrivilege 15708 dwm.exe Token: 33 15708 dwm.exe Token: SeIncBasePriorityPrivilege 15708 dwm.exe Token: SeCreateGlobalPrivilege 5520 dwm.exe Token: SeChangeNotifyPrivilege 5520 dwm.exe Token: 33 5520 dwm.exe Token: SeIncBasePriorityPrivilege 5520 dwm.exe Token: SeCreateGlobalPrivilege 4960 dwm.exe Token: SeChangeNotifyPrivilege 4960 dwm.exe Token: 33 4960 dwm.exe Token: SeIncBasePriorityPrivilege 4960 dwm.exe Token: SeShutdownPrivilege 4960 dwm.exe Token: SeCreatePagefilePrivilege 4960 dwm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1808 wrote to memory of 1624 1808 JaffaCakes118_b0b4c537ae07852a29f628197c2a5a37.exe 84 PID 1808 wrote to memory of 1624 1808 JaffaCakes118_b0b4c537ae07852a29f628197c2a5a37.exe 84 PID 1808 wrote to memory of 1624 1808 JaffaCakes118_b0b4c537ae07852a29f628197c2a5a37.exe 84 PID 5440 wrote to memory of 5792 5440 cmd.exe 91 PID 5440 wrote to memory of 5792 5440 cmd.exe 91 PID 5440 wrote to memory of 5792 5440 cmd.exe 91 PID 2244 wrote to memory of 3592 2244 cmd.exe 92 PID 2244 wrote to memory of 3592 2244 cmd.exe 92 PID 2244 wrote to memory of 3592 2244 cmd.exe 92 PID 5792 wrote to memory of 6020 5792 java.exe 93 PID 5792 wrote to memory of 6020 5792 java.exe 93 PID 5792 wrote to memory of 6020 5792 java.exe 93 PID 2160 wrote to memory of 4180 2160 cmd.exe 102 PID 2160 wrote to memory of 4180 2160 cmd.exe 102 PID 2160 wrote to memory of 4180 2160 cmd.exe 102 PID 5752 wrote to memory of 4572 5752 cmd.exe 105 PID 5752 wrote to memory of 4572 5752 cmd.exe 105 PID 5752 wrote to memory of 4572 5752 cmd.exe 105 PID 2608 wrote to memory of 4676 2608 cmd.exe 106 PID 2608 wrote to memory of 4676 2608 cmd.exe 106 PID 2608 wrote to memory of 4676 2608 cmd.exe 106 PID 6104 wrote to memory of 4724 6104 cmd.exe 107 PID 6104 wrote to memory of 4724 6104 cmd.exe 107 PID 6104 wrote to memory of 4724 6104 cmd.exe 107 PID 2208 wrote to memory of 4780 2208 cmd.exe 112 PID 2208 wrote to memory of 4780 2208 cmd.exe 112 PID 2208 wrote to memory of 4780 2208 cmd.exe 112 PID 4604 wrote to memory of 1960 4604 cmd.exe 115 PID 4604 wrote to memory of 1960 4604 cmd.exe 115 PID 4604 wrote to memory of 1960 4604 cmd.exe 115 PID 2324 wrote to memory of 4908 2324 cmd.exe 120 PID 2324 wrote to memory of 4908 2324 cmd.exe 120 PID 2324 wrote to memory of 4908 2324 cmd.exe 120 PID 4876 wrote to memory of 4408 4876 cmd.exe 121 PID 4876 wrote to memory of 4408 4876 cmd.exe 121 PID 4876 wrote to memory of 4408 4876 cmd.exe 121 PID 4880 wrote to memory of 2628 4880 cmd.exe 126 PID 4880 wrote to memory of 2628 4880 cmd.exe 126 PID 4880 wrote to memory of 2628 4880 cmd.exe 126 PID 5660 wrote to memory of 5284 5660 cmd.exe 129 PID 5660 wrote to memory of 5284 5660 cmd.exe 129 PID 5660 wrote to memory of 5284 5660 cmd.exe 129 PID 3360 wrote to memory of 3604 3360 cmd.exe 132 PID 3360 wrote to memory of 3604 3360 cmd.exe 132 PID 3360 wrote to memory of 3604 3360 cmd.exe 132 PID 4244 wrote to memory of 5900 4244 cmd.exe 133 PID 4244 wrote to memory of 5900 4244 cmd.exe 133 PID 4244 wrote to memory of 5900 4244 cmd.exe 133 PID 1524 wrote to memory of 3032 1524 cmd.exe 138 PID 1524 wrote to memory of 3032 1524 cmd.exe 138 PID 1524 wrote to memory of 3032 1524 cmd.exe 138 PID 2392 wrote to memory of 456 2392 cmd.exe 142 PID 2392 wrote to memory of 456 2392 cmd.exe 142 PID 2392 wrote to memory of 456 2392 cmd.exe 142 PID 3880 wrote to memory of 1472 3880 cmd.exe 141 PID 3880 wrote to memory of 1472 3880 cmd.exe 141 PID 3880 wrote to memory of 1472 3880 cmd.exe 141 PID 5952 wrote to memory of 5936 5952 cmd.exe 149 PID 5952 wrote to memory of 5936 5952 cmd.exe 149 PID 5952 wrote to memory of 5936 5952 cmd.exe 149 PID 60 wrote to memory of 2068 60 cmd.exe 151 PID 60 wrote to memory of 2068 60 cmd.exe 151 PID 60 wrote to memory of 2068 60 cmd.exe 151 PID 860 wrote to memory of 2172 860 cmd.exe 150
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b0b4c537ae07852a29f628197c2a5a37.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b0b4c537ae07852a29f628197c2a5a37.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
PID:1624
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\java.exe1⤵
- Suspicious use of WriteProcessMemory
PID:5440 -
C:\Windows\java.exeC:\Windows\java.exe2⤵
- Detected microsoft outlook phishing page
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:5792 -
C:\Users\Admin\AppData\Local\Temp\services.exe"C:\Users\Admin\AppData\Local\Temp\services.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:6020
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3592
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:4180
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4676
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\java.exe1⤵
- Suspicious use of WriteProcessMemory
PID:5752 -
C:\Windows\java.exeC:\Windows\java.exe2⤵
- Executes dropped EXE
PID:4572
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:4780
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:6104 -
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵
- Executes dropped EXE
PID:4724
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1960
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵
- Executes dropped EXE
PID:4408
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2628
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:4908
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:3604
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:5660 -
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5284
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:3032
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:5900
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:456
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:1472
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2172
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2068
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:5952 -
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:5936
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:3412
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1148
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:1716
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:1124
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:3512
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:1460
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:1640
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:3476
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:5968
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:5200
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵PID:4468
-
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵
- Executes dropped EXE
PID:4164
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:3704
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2632
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:4332
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2348
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:5180
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2644
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:5364
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3348
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵PID:1140
-
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵
- Executes dropped EXE
PID:4036
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:3796
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:2960
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:1856
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4628
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:5224
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2164
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:1452
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4092
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6108
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1848
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:4716
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:5040
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵PID:4708
-
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2284
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:5872
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:436
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:5800
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:3788
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:2388
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:6316
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:368
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:6204
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:948
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:5984
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵PID:228
-
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵
- Executes dropped EXE
PID:6836
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:3172
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6620
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:2912
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:6852
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6112
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6728
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6168
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:6476
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6216
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:6604
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6244
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:6700
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6344
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:7064
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6432
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:6828
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6524
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:7080
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6640
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:6224
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6676
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:7224
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6740
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:7212
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6788
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:7232
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6812
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:7192
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵PID:6920
-
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵
- Adds Run key to start application
PID:7248
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6932
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6712
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7004
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:7032
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7148
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:1744
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6164
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:5500
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6420
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4400
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:3420
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:7800
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:5756
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:7844
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:5036
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:7908
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:1016
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:7952
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7172
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:7980
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7272
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:7424
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7348
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:7988
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7364
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:7456
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7392
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:7372
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵PID:7416
-
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵PID:7480
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7468
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:7320
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7704
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:7180
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7836
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:8640
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7896
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:8748
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7968
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:8740
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8032
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:9004
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8096
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:9048
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8112
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:8900
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8120
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:8864
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8016
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:9212
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8020
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:9084
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8184
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:8152
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8232
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:9196
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵PID:8296
-
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵PID:2804
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8312
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:9180
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8320
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:5692
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8584
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:8224
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8708
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:9632
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8800
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:9616
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8808
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:9932
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8852
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:9892
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8956
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:10076
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8996
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:9868
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9096
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:9940
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9156
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:10720
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9172
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:9860
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8548
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:10504
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8564
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:9624
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8832
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:10448
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9076
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:10432
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9136
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:10740
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵PID:9232
-
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵PID:9756
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9244
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:10424
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9352
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:8704
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9460
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:10748
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9684
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:10864
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9696
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:11016
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9708
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:10472
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9832
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:9976
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10000
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:11300
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10036
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:11224
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10044
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:10712
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10108
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:11292
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10136
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:10260
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:2808
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:10732
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9740
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:11368
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵PID:9980
-
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:10828
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10328
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:11852
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10344
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:11524
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10372
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:11824
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10548
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:11552
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10564
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:11944
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10604
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:11876
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10680
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:11936
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10692
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:12108
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10852
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:11472
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10888
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:12264
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10912
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:12136
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10944
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:11840
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11032
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:12360
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11136
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:11832
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10312
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:12564
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10352
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:11336
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10364
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:12720
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11284
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:12728
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵PID:11308
-
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵PID:12696
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11412
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:13040
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11424
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:12712
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11496
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:12844
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11644
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:13160
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11672
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:13168
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11688
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:12688
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11956
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:13292
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11968
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:13328
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11988
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:13308
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12004
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:12600
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12064
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:13344
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12100
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:13336
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12196
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:13452
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11204
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:13684
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11628
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:13788
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12024
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:13276
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12188
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:13692
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12208
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:13360
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12368
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:13780
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12444
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:13908
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12628
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:13848
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12800
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:13400
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12808
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:13440
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵PID:12828
-
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵PID:13540
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12896
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:14072
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12920
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:13316
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12928
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:14320
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12988
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:14312
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13136
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:14080
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13264
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:14444
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12056
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:14964
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12432
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:14556
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12592
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:14340
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13320
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:15056
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13384
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13412
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13496
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:15320
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13504
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:14808
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13528
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:14816
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13556
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:14716
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13604
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13736
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13820
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:15116
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13880
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13888
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13960
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13984
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:14684
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14048
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:15132
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14176
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14188
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:15028
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13900
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13940
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13972
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13976
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:14472
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:5052
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:13932
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵PID:3272
-
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵PID:15312
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14488
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14544
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14572
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14664
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:14932
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14764
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14872
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14884
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:15108
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:14248
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:15172
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:15340
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:14092
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵PID:4324
-
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵PID:14192
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14520
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:14420
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14980
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14888
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:13448
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13800
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14384
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:14552
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13892
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:13432
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵PID:15300
-
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵PID:14244
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13924
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:14356
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14116
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:15048
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:15268
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:16044
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:16232
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:16300
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:16324
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:2748
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:2820
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:15836
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:2868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2868 -s 1523⤵
- Program crash
PID:6864
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2868 -ip 28681⤵PID:15860
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:5404
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:15708
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:1236
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:19072
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:16776
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:9292
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:17028
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:18744
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:17140
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:18732
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:17336
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:18752
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:18284
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:18848
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:18484
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:19744
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:18672
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:19500
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:18784
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:19032
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:18832
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:19468
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:18840
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:19484
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:18940
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:19348
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:19108
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:10664
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:19248
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:20016
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:19432
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:20204
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:19192
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:18260
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:19576
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:17236
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:19604
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:19628
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:20636
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:19764
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:19784
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:19888
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:19924
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:20080
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:20132
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:20812
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:20268
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:20740
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:20448
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:20232
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:20484
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:20688
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:21048
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:21136
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:21188
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:21316
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:21256
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:20108
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:21340
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:21420
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:21468
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:17012
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:20596
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:20660
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:20652
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:20444
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:19808
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:20132
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:19244
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:20132
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11456
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:20200
-
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5520
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:5080
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:21488
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:13928
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:20656
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:20880
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:20844
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:21468
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:16888
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:2200
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:2824
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:4568
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:4996
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:16856
-
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4960
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:20148
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:4148
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:828
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:5168
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:1344
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:5476
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8132
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:16944
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:5400
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:4484
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:4696
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:1156
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:6288
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6440
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6452
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:18140
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:18244
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:7016
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:4660
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:1844
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:2464
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:21216
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:996
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7736
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:7924
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8040
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7316
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:8464
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8424
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8512
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:2448
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:220
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:848
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:2092
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:5920
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:9256
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9296
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:1896
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:6176
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:17372
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9828
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:9948
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10024
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9284
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:20416
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11196
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:396
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10096
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10440
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:10676
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10992
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:11328
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11208
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10620
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10592
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8172
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:8128
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11572
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:11748
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11816
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11900
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12172
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12224
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11700
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12040
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8672
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12416
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12572
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8784
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13084
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:13112
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8944
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9092
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12624
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:12976
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13180
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:20816
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9272
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13704
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:13904
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14068
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9760
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13396
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8472
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14436
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9928
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:19652
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:20136
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:15040
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:10288
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:4668
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:5960
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11192
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7772
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8108
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:3980
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:2616
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:5152
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12308
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:18144
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12672
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12736
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6364
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:18680
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:5268
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:19100
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13260
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7964
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:18692
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8380
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:19824
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:20224
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13352
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9524
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:19588
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9348
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:20856
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:14120
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9384
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25B
MD58ba61a16b71609a08bfa35bc213fce49
SHA18374dddcc6b2ede14b0ea00a5870a11b57ced33f
SHA2566aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1
SHA5125855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1
-
Filesize
1KB
MD51d702580eabc06e2eca088a19ab88f74
SHA13e512e479e900395ac975ffc1d3508c6cd8cc864
SHA25667a6095d3f3a08a25656e8191da19bf4a292dbc987d7171ca7c29d65d4a1bfe5
SHA51259cbb0c0ece606c68e1186e02226a70dc7c5bbbec632dabed9872bc491d146246dfa71e375bfc496fcf193e225f769b23ac7ee85493d00ffe245d4f304a9086f
-
Filesize
28KB
MD50ab51eea60e7b5629c5ae677e115cf13
SHA112b8f374756e55f19857505ff522f00ee480beb5
SHA256a7d823b372e586378fd22834143c4c1c75934dbf9ff35ca37222fe094c278a78
SHA512c9b70e37457e00892523342b5d455f5840639271918c58100fef083e0417e67ffce0820c93e8b12ca845dbfbe57efe16e3927d0dea069d2525f2db0260b18bfa
-
Filesize
1KB
MD57f25ac5d91cac70b2bac89780d0f69e9
SHA164b089e557f8ddbc10d80dda2c0ce48c7532e546
SHA256cef84299f683ec4dbc51b60eef0d31433ec9d96dcc72874d3589a891f2ed68f0
SHA5125e7e19a826394fb092ffde1a34369e118f871c38c5dc8f26c8a2c753dfa9a5a79ae71c5334a37c54aadc8cacbe15bf1a84aafb0ed5aa1ac15eebc7c6f396a2b7
-
Filesize
1KB
MD58ca1552ce1fe11209da89b1c7adfb517
SHA1e4a33952d1abb65625b6bdc4fcd421792c8fa27a
SHA2566ba98add82fff54addea1221d0b8ebac82d7c8361dbc3932b177fdb05f9ec0c3
SHA51214f8e69f505425dee7e7950d6212c37b822acc6ff392298a5a2b1ed3258253e80d3e554a9f66573749a312a573fb38bbb9e0d33c58e44b033e0c09f04ac3318d
-
Filesize
28KB
MD5b0b4c537ae07852a29f628197c2a5a37
SHA184f6ea539cb109b23db9ba6e0d8a3e1a4d78254d
SHA256e13e5be12cf64cf74cc9c180130104719339bd841610c871c066e627a13a47ef
SHA51245e22f326e24cf24b9b8b6b6b6743603a1bed6dea3c1ea0f1839eafb8612d3578033bd53a28fb06ebbe1ee0575f26e9cb33993019fe1ab4eb45f8b0cbac9a74d
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2