Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250410-en -
resource tags
arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system -
submitted
12/04/2025, 04:37
Behavioral task
behavioral1
Sample
JaffaCakes118_b122c28f2fbfbb87cc5d9fef5bcc63bd.exe
Resource
win10v2004-20250410-en
General
-
Target
JaffaCakes118_b122c28f2fbfbb87cc5d9fef5bcc63bd.exe
-
Size
28KB
-
MD5
b122c28f2fbfbb87cc5d9fef5bcc63bd
-
SHA1
04ccc67f882ee688cafcd9d4fb52c37b4cf636e3
-
SHA256
fd38c1faf2a43bed6a8631ffab59825b1f7185a32b5d5429e06ab2b2074df459
-
SHA512
0321a4b3cde8fa4473940709439e9818c23dc3a67121101cdb95adee5a05b8059e70be1bd0ac5fda1076728334db2c2a71eaf0ee4a4274ccdf3fc7891b6fdbf9
-
SSDEEP
384:1vxBbK26lj5Id8SpHx9jLhsznnVxA1WmP5w7GGCJlqqwMyNfa/:Dv8IRRdsxq1DjJcqfP/
Malware Config
Signatures
-
Detects MyDoom family 5 IoCs
resource yara_rule behavioral1/memory/3420-18-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom behavioral1/memory/4412-38-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom behavioral1/memory/4068-46-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom behavioral1/memory/3420-552-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom behavioral1/memory/3420-629-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom -
Mydoom family
-
Executes dropped EXE 64 IoCs
pid Process 368 services.exe 3420 java.exe 3036 services.exe 2436 services.exe 3836 services.exe 4428 services.exe 4412 java.exe 4676 services.exe 4832 services.exe 5000 services.exe 4856 services.exe 5772 services.exe 4756 services.exe 4004 services.exe 4864 services.exe 1740 services.exe 3148 services.exe 3196 services.exe 3932 services.exe 5216 services.exe 1912 services.exe 6052 services.exe 880 services.exe 3900 services.exe 5428 services.exe 1580 services.exe 2020 services.exe 4264 services.exe 3352 services.exe 5628 services.exe 5496 services.exe 244 services.exe 1932 services.exe 3828 services.exe 6108 services.exe 2368 services.exe 4416 services.exe 4884 services.exe 3292 services.exe 1000 services.exe 1068 services.exe 372 services.exe 4064 services.exe 5256 services.exe 5364 services.exe 4032 services.exe 6176 services.exe 6228 services.exe 6448 services.exe 6468 services.exe 6548 services.exe 6556 services.exe 6748 services.exe 6800 services.exe 6860 services.exe 6944 services.exe 7052 services.exe 7116 services.exe 7156 services.exe 7164 services.exe 6644 services.exe 6512 services.exe 5800 services.exe 7380 services.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" JaffaCakes118_b122c28f2fbfbb87cc5d9fef5bcc63bd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Users\\Admin\\AppData\\Local\\Temp\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Users\\Admin\\AppData\\Local\\Temp\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Users\\Admin\\AppData\\Local\\Temp\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Users\\Admin\\AppData\\Local\\Temp\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Users\\Admin\\AppData\\Local\\Temp\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Users\\Admin\\AppData\\Local\\Temp\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Users\\Admin\\AppData\\Local\\Temp\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Users\\Admin\\AppData\\Local\\Temp\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Office\OTele\officeclicktorun.exe.db OfficeClickToRun.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Office\OTele\officeclicktorun.exe.db-wal OfficeClickToRun.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Office\OTele\officeclicktorun.exe.db-shm OfficeClickToRun.exe -
resource yara_rule behavioral1/memory/4068-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x000800000002422b-4.dat upx behavioral1/memory/368-5-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/files/0x000800000002422f-14.dat upx behavioral1/memory/3036-25-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/3420-18-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/2436-28-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/4412-38-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/4068-46-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/4856-53-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/368-52-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/3036-56-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2436-62-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/4864-69-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/3836-68-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/3148-76-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1740-73-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/4428-72-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/4676-81-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/3932-88-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/4832-87-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/3196-82-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/5000-90-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1912-96-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/5772-98-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/880-105-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/4756-104-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/4004-107-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/5428-113-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1580-117-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1740-116-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2020-122-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/3148-121-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/4264-128-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/3196-127-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/5216-131-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/5496-139-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/6052-141-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/244-142-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1932-144-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/3900-145-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2020-151-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2368-148-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1580-147-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/3292-157-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/5628-156-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/3352-155-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1000-159-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/372-161-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/4064-164-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/6108-166-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/5256-167-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/3828-165-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/5364-169-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/4416-172-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/6228-175-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/4884-174-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/6448-177-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/6556-181-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/6548-180-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/6748-185-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/5256-186-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/4032-188-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/5364-187-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\java.exe java.exe File created C:\Windows\services.exe JaffaCakes118_b122c28f2fbfbb87cc5d9fef5bcc63bd.exe File opened for modification C:\Windows\java.exe JaffaCakes118_b122c28f2fbfbb87cc5d9fef5bcc63bd.exe File created C:\Windows\java.exe JaffaCakes118_b122c28f2fbfbb87cc5d9fef5bcc63bd.exe File created C:\Windows\services.exe java.exe File opened for modification C:\Windows\java.exe java.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 18764 3420 WerFault.exe 91 8592 9200 WerFault.exe 975 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe -
Checks SCSI registry key(s) 3 TTPs 18 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID dwm.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 OfficeClickToRun.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz OfficeClickToRun.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString OfficeClickToRun.exe -
Enumerates system info in registry 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS OfficeClickToRun.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily OfficeClickToRun.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU OfficeClickToRun.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentEcs\officeclicktorun\Overrides OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentEcs\all\Overrides OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages\en-US = "2" OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages\en-US = "1" OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" OfficeClickToRun.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\Expires = "int64_t|1744475932" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\FirstSession\officeclicktorun OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0 OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSTagIds0 = "5804129,7202269,17110992,41484365,39965824,7153487,17110988,508368333,17962391,17962392,3462423,3702920,3700754,3965062,4297094,7153421,18716193,7153435,7202265,20502174,6308191,18407617" OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSCategoriesSeverities = "1329 50,1329 10,1329 15,1329 100,1329 6" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentEcs\Overrides OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\TrustCenter\Experimentation OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\ExternalFeatureOverrides\officeclicktorun OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeCreateGlobalPrivilege 6640 dwm.exe Token: SeChangeNotifyPrivilege 6640 dwm.exe Token: 33 6640 dwm.exe Token: SeIncBasePriorityPrivilege 6640 dwm.exe Token: SeCreateGlobalPrivilege 14128 dwm.exe Token: SeChangeNotifyPrivilege 14128 dwm.exe Token: 33 14128 dwm.exe Token: SeIncBasePriorityPrivilege 14128 dwm.exe Token: SeCreateGlobalPrivilege 19816 dwm.exe Token: SeChangeNotifyPrivilege 19816 dwm.exe Token: 33 19816 dwm.exe Token: SeIncBasePriorityPrivilege 19816 dwm.exe Token: SeShutdownPrivilege 19816 dwm.exe Token: SeCreatePagefilePrivilege 19816 dwm.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 11652 OfficeClickToRun.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4068 wrote to memory of 368 4068 JaffaCakes118_b122c28f2fbfbb87cc5d9fef5bcc63bd.exe 84 PID 4068 wrote to memory of 368 4068 JaffaCakes118_b122c28f2fbfbb87cc5d9fef5bcc63bd.exe 84 PID 4068 wrote to memory of 368 4068 JaffaCakes118_b122c28f2fbfbb87cc5d9fef5bcc63bd.exe 84 PID 2388 wrote to memory of 3420 2388 cmd.exe 91 PID 2388 wrote to memory of 3420 2388 cmd.exe 91 PID 2388 wrote to memory of 3420 2388 cmd.exe 91 PID 3420 wrote to memory of 3036 3420 java.exe 92 PID 3420 wrote to memory of 3036 3420 java.exe 92 PID 3420 wrote to memory of 3036 3420 java.exe 92 PID 4312 wrote to memory of 2436 4312 cmd.exe 97 PID 4312 wrote to memory of 2436 4312 cmd.exe 97 PID 4312 wrote to memory of 2436 4312 cmd.exe 97 PID 32 wrote to memory of 3836 32 cmd.exe 98 PID 32 wrote to memory of 3836 32 cmd.exe 98 PID 32 wrote to memory of 3836 32 cmd.exe 98 PID 1340 wrote to memory of 4428 1340 cmd.exe 103 PID 1340 wrote to memory of 4428 1340 cmd.exe 103 PID 1340 wrote to memory of 4428 1340 cmd.exe 103 PID 3840 wrote to memory of 4412 3840 cmd.exe 106 PID 3840 wrote to memory of 4412 3840 cmd.exe 106 PID 3840 wrote to memory of 4412 3840 cmd.exe 106 PID 5980 wrote to memory of 4676 5980 cmd.exe 109 PID 5980 wrote to memory of 4676 5980 cmd.exe 109 PID 5980 wrote to memory of 4676 5980 cmd.exe 109 PID 5176 wrote to memory of 4832 5176 cmd.exe 110 PID 5176 wrote to memory of 4832 5176 cmd.exe 110 PID 5176 wrote to memory of 4832 5176 cmd.exe 110 PID 4464 wrote to memory of 5000 4464 cmd.exe 115 PID 4464 wrote to memory of 5000 4464 cmd.exe 115 PID 4464 wrote to memory of 5000 4464 cmd.exe 115 PID 4528 wrote to memory of 4856 4528 cmd.exe 116 PID 4528 wrote to memory of 4856 4528 cmd.exe 116 PID 4528 wrote to memory of 4856 4528 cmd.exe 116 PID 2228 wrote to memory of 5772 2228 cmd.exe 121 PID 2228 wrote to memory of 5772 2228 cmd.exe 121 PID 2228 wrote to memory of 5772 2228 cmd.exe 121 PID 4916 wrote to memory of 4756 4916 cmd.exe 122 PID 4916 wrote to memory of 4756 4916 cmd.exe 122 PID 4916 wrote to memory of 4756 4916 cmd.exe 122 PID 2844 wrote to memory of 4004 2844 cmd.exe 127 PID 2844 wrote to memory of 4004 2844 cmd.exe 127 PID 2844 wrote to memory of 4004 2844 cmd.exe 127 PID 4844 wrote to memory of 4864 4844 cmd.exe 130 PID 4844 wrote to memory of 4864 4844 cmd.exe 130 PID 4844 wrote to memory of 4864 4844 cmd.exe 130 PID 5808 wrote to memory of 1740 5808 cmd.exe 133 PID 5808 wrote to memory of 1740 5808 cmd.exe 133 PID 5808 wrote to memory of 1740 5808 cmd.exe 133 PID 4932 wrote to memory of 3148 4932 cmd.exe 134 PID 4932 wrote to memory of 3148 4932 cmd.exe 134 PID 4932 wrote to memory of 3148 4932 cmd.exe 134 PID 536 wrote to memory of 3196 536 cmd.exe 139 PID 536 wrote to memory of 3196 536 cmd.exe 139 PID 536 wrote to memory of 3196 536 cmd.exe 139 PID 1232 wrote to memory of 3932 1232 cmd.exe 140 PID 1232 wrote to memory of 3932 1232 cmd.exe 140 PID 1232 wrote to memory of 3932 1232 cmd.exe 140 PID 5692 wrote to memory of 5216 5692 cmd.exe 147 PID 5692 wrote to memory of 5216 5692 cmd.exe 147 PID 5692 wrote to memory of 5216 5692 cmd.exe 147 PID 452 wrote to memory of 1912 452 cmd.exe 148 PID 452 wrote to memory of 1912 452 cmd.exe 148 PID 452 wrote to memory of 1912 452 cmd.exe 148 PID 3832 wrote to memory of 6052 3832 cmd.exe 153
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b122c28f2fbfbb87cc5d9fef5bcc63bd.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b122c28f2fbfbb87cc5d9fef5bcc63bd.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:368
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\java.exe1⤵
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\java.exeC:\Windows\java.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Users\Admin\AppData\Local\Temp\services.exe"C:\Users\Admin\AppData\Local\Temp\services.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3420 -s 35603⤵
- Program crash
PID:18764
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:32 -
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:3836
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2436
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\java.exe1⤵
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Windows\java.exeC:\Windows\java.exe2⤵
- Executes dropped EXE
PID:4412
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4428
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:5176 -
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:4832
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:5980 -
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:4676
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5000
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:4856
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:4756
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5772
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4864
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4004
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:3148
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:5808 -
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1740
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:3932
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3196
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1912
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:5692 -
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:5216
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵
- Executes dropped EXE
PID:6052
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:5568
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:880
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:5368
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:3900
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:2004
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:5428
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:5156
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1580
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵PID:2576
-
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2020
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:4252
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:4264
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:1056
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:5628
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:3596
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:3352
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:5584
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5496
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵PID:3108
-
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵
- Executes dropped EXE
PID:244
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:5688
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3828
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:2632
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1932
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:4580
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:6108
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:2256
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2368
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:5220
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4416
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵PID:5336
-
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵
- Executes dropped EXE
PID:4884
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:3340
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:3292
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:4668
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4064
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:2008
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1068
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:3356
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:372
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:4716
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:1000
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵PID:5880
-
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5364
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:524
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4032
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:5596
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:5256
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:1468
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:6176
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:5392
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6228
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:3492
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:6448
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:4016
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6468
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:1328
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:6548
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵
- Executes dropped EXE
PID:6556
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6192
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:6748
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6300
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:6944
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6312
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:6860
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6324
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:6800
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6496
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:7116
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6540
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:7156
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6596
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:7164
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵PID:6632
-
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:7052
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6788
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5800
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6828
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:6644
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6904
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6512
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6952
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Executes dropped EXE
PID:7380
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7004
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:7456
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵PID:7100
-
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵PID:7388
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:4424
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:7556
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6528
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:7808
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6588
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:7580
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7232
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:7860
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7256
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:7900
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7276
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:7876
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7328
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:7892
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7468
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:7884
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵PID:7484
-
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵
- Adds Run key to start application
PID:7220
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7540
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:7868
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7636
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:8204
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7680
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:7528
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7836
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:8300
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7952
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:8532
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8012
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:8888
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8032
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:8576
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8040
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:8864
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8056
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:8504
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8088
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:8564
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8100
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:8832
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵PID:7736
-
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵
- Adds Run key to start application
PID:8856
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8124
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:8540
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8252
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:8492
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8324
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:9064
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8468
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:9176
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8556
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:9392
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8640
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:9352
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8652
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:9272
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8672
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:9244
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8724
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:9448
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8780
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:9820
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8972
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:9372
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9012
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:9732
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵PID:9020
-
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:9440
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9080
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:9496
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9188
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:10036
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8628
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:9992
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8732
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:9644
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9292
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:9332
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9344
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:9948
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9408
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:9516
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9484
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:9416
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9568
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:10212
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵PID:9580
-
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:10396
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9596
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:10368
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9608
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:10412
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9784
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:10388
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9792
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:10376
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9856
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:10404
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9964
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:10624
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10104
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:10768
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10140
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:10784
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9468
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:10732
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9676
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:10664
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10164
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:10644
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10260
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:10752
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10280
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:10676
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10320
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:10584
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10504
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:10532
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10540
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:10296
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10548
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:10868
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10556
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:11280
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10616
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:11240
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵PID:10692
-
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵
- Adds Run key to start application
PID:10612
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10740
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:10356
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10884
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:10484
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10968
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:10892
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11032
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:10516
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10116
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:12220
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11336
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:12148
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11352
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:12552
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11364
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:12568
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11372
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:12528
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11388
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:11308
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11396
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:12316
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11432
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:12592
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11520
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:12584
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11536
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:12300
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11564
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:12520
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11592
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:12560
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11644
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:12576
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵PID:11672
-
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵
- Adds Run key to start application
PID:12308
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11692
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:12544
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11764
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:12608
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11796
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:12512
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12188
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:12536
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12256
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:12504
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11500
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:13036
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11656
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:12756
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12380
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:13388
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵PID:12396
-
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵PID:13532
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12408
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:13620
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12684
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:13436
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12692
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:13604
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12704
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:13460
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12720
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:13444
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12764
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:13452
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12912
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:14236
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12924
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:14060
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12936
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:14004
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12956
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:13896
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13004
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:14016
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13016
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:2232
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13096
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:14288
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13128
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:14280
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13136
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:14140
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13148
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:13664
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12368
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:14204
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13400
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:14596
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13428
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13496
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:14512
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13572
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:14108
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13584
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:15052
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13596
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵PID:13676
-
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵PID:6120
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13708
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13828
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14024
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14068
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14116
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14268
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:15180
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13628
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13632
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:14432
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13420
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:15280
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵PID:4960
-
C:\Users\Admin\AppData\Local\Temp\services.exeC:\Users\Admin\AppData\Local\Temp\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:15172
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14364
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14372
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:15208
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14384
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:15104
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14416
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:14944
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14444
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:15200
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14460
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:15116
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14680
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14696
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14764
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:15096
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:15164
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:14244
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:15244
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\services.exe1⤵PID:15304
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:15344
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:15352
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:14136
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:5960
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:15016
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14764
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:13832
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13616
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:14472
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14364
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:13936
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:15328
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:14120
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:15028
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14328
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13816
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:15128
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:14032
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13816
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:15248
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14328
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:13428
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:15028
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:15248
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:15536
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:15768
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:15840
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:4712
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:16860
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:4584
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:17216
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7076
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:16400
-
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:6640
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:16160
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:5088
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:16532
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:17580
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:16828
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:4660
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:17124
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:17644
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:17284
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:17764
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6064
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:17340
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9980
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:11188
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9836
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:17868
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10288
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:18144
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:17504
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:17960
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:17612
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:18160
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:17692
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:18168
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:17792
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:18388
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:17900
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:18340
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:18032
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:17948
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:18256
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:18288
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:18804
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:18300
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:18756
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:18328
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:18824
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:17736
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11404
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11492
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:19172
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:18440
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:18476
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:18796
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:13592
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:18908
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:18920
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:19024
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:20152
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:19420
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:20368
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:19060
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:19176
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:19172
-
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:20388
-
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:14128
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11608
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:3884
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:19512
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:20316
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:20424
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:20436
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:20052
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:20000
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:11608
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:3860
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:18720
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:19736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3420 -ip 34201⤵PID:18724
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:19816
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:19968
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:14072
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:20304
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:19536
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:20316
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:3864
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:18740
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:19776
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:18532
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14532
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:14816
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:20276
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:14828
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:20356
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:20092
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:3504
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:3392
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:19728
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:15820
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:15928
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:16436
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:16972
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:2268
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:19444
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:18992
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:6516
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:18580
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:19584
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:18240
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:17484
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:19244
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:2464
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:4632
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:1076
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:18956
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:4952
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:3860
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:6336
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:19840
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:5396
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:3652
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:2416
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:5240
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:5816
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:3136
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:1604
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:5020
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:5300
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:6284
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6380
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:6464
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8408
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:6608
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6688
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6796
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7012
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:19632
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7144
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:6160
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7344
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:19892
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:7676
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7740
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:3268
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:18680
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:5920
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:8440
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:20096
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:8808
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8932
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:9200
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9200 -s 2083⤵
- Program crash
PID:8592
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 9200 -ip 92001⤵PID:9120
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8624
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:5492
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:9232
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9772
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10152
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10220
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9288
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9944
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:4764
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10716
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14052
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:12284
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11468
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:12468
-
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:11652
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12676
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- System Location Discovery: System Language Discovery
PID:12964
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13024
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:12664
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13232
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13316
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:13376
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13824
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:13928
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14340
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14504
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14876
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14260
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7480
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14640
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:14456
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:17936
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8444
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:8432
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:16172
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7804
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9152
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:18832
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:2388
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:20164
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9340
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:18728
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:9884
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:3348
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10020
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:15784
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14492
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:17352
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10708
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10256
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10344
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:7508
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:644
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:2316
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11208
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:16592
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:12028
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:9032
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:9552
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:17540
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:3952
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:10792
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:18012
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:11740
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13072
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13176
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:6960
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:13976
-
C:\Windows\services.exeC:\Windows\services.exe2⤵PID:14380
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:2040
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Adds Run key to start application
PID:7728
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\services.exe1⤵PID:14992
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25B
MD58ba61a16b71609a08bfa35bc213fce49
SHA18374dddcc6b2ede14b0ea00a5870a11b57ced33f
SHA2566aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1
SHA5125855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1
-
Filesize
1KB
MD54d142c83170112f2630906fcf53742d9
SHA1ef56d4bd2ae936530f7dc218c903780dc7c2768e
SHA2564e49a672ecbd062795f71af5bf6c6c1e374941d737a74340d9f098ac1a8986ae
SHA512792250380aebd903b5f9ab246c7e96b112cffbf5dac8151ff4bdf52e6eb0753adab1571f387a4ab475acf184baa5417faf1e8fb0fb817ae63584113f08a568f3
-
Filesize
28KB
MD56dd365dcbba7fba74a35be81a8fd6854
SHA18552ec078dd035629627f3cfe507c4aa63ae349b
SHA256c76ef828d27c1149cfe24b70f95fa9c0fdb4ad5c8898764e2ffb6b8742fe7952
SHA512344d974c552a693acfed1cd3bded9a8dbd08f919ac5bde3d0804e5e37f648a267a1ac89f08d3486ab62334f7ac889e06f075daa92ccd87c02f9e9c04c1adad28
-
Filesize
32B
MD5590f09216160826fa090e7720b2fdbc5
SHA1d5521a340ff5eb0989de61eaa146873b51554e25
SHA256b569e433f4bca6241dda64662d7c606576b8fd46f361057c9727e859d3c62f49
SHA512e947dc177d730e327ad67ea6f3ca34cd5232dbdc158bdcafb13e0845b886e1d91bdd28259ddd9d679fd4ea831c99793f948b6de66ca811336efd8907a1cfbb60
-
Filesize
1KB
MD55286f1fdf641f4491d7c81e8933e509d
SHA19c16d73891bb5d73e54f439a4c405d0d5b1ee281
SHA256ed5d6dc38b30df4bc1e3fe2297878a48b281dd7b57ea9399857809ecce7499cf
SHA512c381396824fa70c0088c2b2cccd8f2290b95963b188d790f24e1c0cd749fe0907964921dea9d51b74d1ba0752e041c7b748d4e95324b716b76632ea156567eab
-
Filesize
288B
MD5710635ea2747853e7b550b68b0e1dff9
SHA1307b0c6de0bcc00e44f548830ec22c41d18fad8b
SHA256d8412f0c58a3d988bfa9715da727f2f40be0341dcec6611f0225fd796927598d
SHA5123760d33c43f2bb057b9dc6df0685cec9bd6b268a734eb427055d1804136998213f9f5a1d91e5eeed1c5d550cb5160815de26a5e924f4fe106c383ea794eac8c5
-
Filesize
28KB
MD5b122c28f2fbfbb87cc5d9fef5bcc63bd
SHA104ccc67f882ee688cafcd9d4fb52c37b4cf636e3
SHA256fd38c1faf2a43bed6a8631ffab59825b1f7185a32b5d5429e06ab2b2074df459
SHA5120321a4b3cde8fa4473940709439e9818c23dc3a67121101cdb95adee5a05b8059e70be1bd0ac5fda1076728334db2c2a71eaf0ee4a4274ccdf3fc7891b6fdbf9
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2