Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
10s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 18:00
Static task
static1
Behavioral task
behavioral1
Sample
32d8d8e04fa3817422e864b0364933c3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
32d8d8e04fa3817422e864b0364933c3.exe
Resource
win10v2004-20231215-en
General
-
Target
32d8d8e04fa3817422e864b0364933c3.exe
-
Size
1.5MB
-
MD5
32d8d8e04fa3817422e864b0364933c3
-
SHA1
8df08b61369e1397f19b962f5db648de5b60da26
-
SHA256
72812fbf4ae87c8513fe9df88a6a28c78bb5211d13dc318e7f31e9ba22d4cd41
-
SHA512
3279745f95f7be42d8acb8529db077eb223661d06898aad4da028e7300c49276d0502c62e94c6e6e41f12208182e8264b5e229b5cf3fbe165c14f533a1ed9af6
-
SSDEEP
24576:d//ccXtciIb1yqpYxfmpFcJk8LyFuo2Zs5WKvk0bq1tz1FXae:dccdciUMlukvouZ6M1z3
Malware Config
Signatures
-
Executes dropped EXE 10 IoCs
pid Process 2548 B820A2.EXE 1492 B820A2.EXE 4832 B820A2.EXE 3028 B820A2.EXE 4776 B820A2.EXE 748 explorer.exe 4612 B820A2.EXE 1908 B820A2.EXE 3628 B820A2.EXE 2416 B820A2.EXE -
Loads dropped DLL 64 IoCs
pid Process 2136 32d8d8e04fa3817422e864b0364933c3.exe 2136 32d8d8e04fa3817422e864b0364933c3.exe 2136 32d8d8e04fa3817422e864b0364933c3.exe 2136 32d8d8e04fa3817422e864b0364933c3.exe 2136 32d8d8e04fa3817422e864b0364933c3.exe 2136 32d8d8e04fa3817422e864b0364933c3.exe 2136 32d8d8e04fa3817422e864b0364933c3.exe 2548 B820A2.EXE 2548 B820A2.EXE 2548 B820A2.EXE 2548 B820A2.EXE 2548 B820A2.EXE 2548 B820A2.EXE 2548 B820A2.EXE 1492 B820A2.EXE 1492 B820A2.EXE 1492 B820A2.EXE 1492 B820A2.EXE 1492 B820A2.EXE 1492 B820A2.EXE 1492 B820A2.EXE 4832 B820A2.EXE 4832 B820A2.EXE 4832 B820A2.EXE 4832 B820A2.EXE 4832 B820A2.EXE 4832 B820A2.EXE 4832 B820A2.EXE 3028 B820A2.EXE 3028 B820A2.EXE 3028 B820A2.EXE 3028 B820A2.EXE 3028 B820A2.EXE 3028 B820A2.EXE 3028 B820A2.EXE 4776 B820A2.EXE 4776 B820A2.EXE 4776 B820A2.EXE 4776 B820A2.EXE 4776 B820A2.EXE 4776 B820A2.EXE 4776 B820A2.EXE 748 explorer.exe 748 explorer.exe 748 explorer.exe 748 explorer.exe 748 explorer.exe 748 explorer.exe 748 explorer.exe 4612 B820A2.EXE 4612 B820A2.EXE 4612 B820A2.EXE 4612 B820A2.EXE 4612 B820A2.EXE 4612 B820A2.EXE 4612 B820A2.EXE 1908 B820A2.EXE 1908 B820A2.EXE 1908 B820A2.EXE 1908 B820A2.EXE 1908 B820A2.EXE 1908 B820A2.EXE 1908 B820A2.EXE 3628 B820A2.EXE -
Writes to the Master Boot Record (MBR) 1 TTPs 11 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 B820A2.EXE File opened for modification \??\PhysicalDrive0 B820A2.EXE File opened for modification \??\PhysicalDrive0 B820A2.EXE File opened for modification \??\PhysicalDrive0 B820A2.EXE File opened for modification \??\PhysicalDrive0 B820A2.EXE File opened for modification \??\PhysicalDrive0 32d8d8e04fa3817422e864b0364933c3.exe File opened for modification \??\PhysicalDrive0 B820A2.EXE File opened for modification \??\PhysicalDrive0 explorer.exe File opened for modification \??\PhysicalDrive0 B820A2.EXE File opened for modification \??\PhysicalDrive0 B820A2.EXE File opened for modification \??\PhysicalDrive0 B820A2.EXE -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\B3A6A3\ 32d8d8e04fa3817422e864b0364933c3.exe File opened for modification C:\Windows\SysWOW64\B3A6A3\B820A2.EXE 32d8d8e04fa3817422e864b0364933c3.exe File opened for modification C:\Windows\SysWOW64\B3A6A3\ B820A2.EXE File opened for modification C:\Windows\SysWOW64\B3A6A3\ explorer.exe File opened for modification C:\Windows\SysWOW64\D42343\ B820A2.EXE File opened for modification C:\Windows\SysWOW64\D42343\ B820A2.EXE File created C:\Windows\SysWOW64\B3A6A3\B820A2.EXE B820A2.EXE File opened for modification C:\Windows\SysWOW64\B5A29B\ 32d8d8e04fa3817422e864b0364933c3.exe File opened for modification C:\Windows\SysWOW64\B3A6A3\B820A2.EXE B820A2.EXE File opened for modification C:\Windows\SysWOW64\B3A6A3\B820A2.EXE B820A2.EXE File opened for modification C:\Windows\SysWOW64\3CA4E3\ B820A2.EXE File opened for modification C:\Windows\SysWOW64\B3A6A3\B820A2.EXE B820A2.EXE File opened for modification C:\Windows\SysWOW64\3CA4E3\ B820A2.EXE File opened for modification C:\Windows\SysWOW64\D42343\ B820A2.EXE File created C:\Windows\SysWOW64\B3A6A3\B820A2.EXE B820A2.EXE File opened for modification C:\Windows\SysWOW64\3CA4E3\ B820A2.EXE File opened for modification C:\Windows\SysWOW64\B5A29B\ B820A2.EXE File opened for modification C:\Windows\SysWOW64\D42343\ 32d8d8e04fa3817422e864b0364933c3.exe File opened for modification C:\Windows\SysWOW64\B5A29B\ B820A2.EXE File opened for modification C:\Windows\SysWOW64\B5A29B\ B820A2.EXE File opened for modification C:\Windows\SysWOW64\3CA4E3\ B820A2.EXE File opened for modification C:\Windows\SysWOW64\B3A6A3\B820A2.EXE B820A2.EXE File opened for modification C:\Windows\SysWOW64\D42343\ B820A2.EXE File opened for modification C:\Windows\SysWOW64\D42343\ explorer.exe File opened for modification C:\Windows\SysWOW64\B3A6A3\ B820A2.EXE File created C:\Windows\SysWOW64\B3A6A3\B820A2.EXE B820A2.EXE File opened for modification C:\Windows\SysWOW64\B5A29B\ B820A2.EXE File opened for modification C:\Windows\SysWOW64\B3A6A3\ B820A2.EXE File opened for modification C:\Windows\SysWOW64\3CA4E3\ B820A2.EXE File opened for modification C:\Windows\SysWOW64\3CA4E3\ B820A2.EXE File opened for modification C:\Windows\SysWOW64\B3A6A3\B820A2.EXE B820A2.EXE File created C:\Windows\SysWOW64\B3A6A3\B820A2.EXE B820A2.EXE File opened for modification C:\Windows\SysWOW64\B5A29B\ B820A2.EXE File created C:\Windows\SysWOW64\B3A6A3\B820A2.EXE 32d8d8e04fa3817422e864b0364933c3.exe File created C:\Windows\SysWOW64\B3A6A3\B820A2.EXE B820A2.EXE File opened for modification C:\Windows\SysWOW64\D42343\ B820A2.EXE File created C:\Windows\SysWOW64\B3A6A3\B820A2.EXE B820A2.EXE File opened for modification C:\Windows\SysWOW64\B3A6A3\B820A2.EXE explorer.exe File opened for modification C:\Windows\SysWOW64\B3A6A3\ B820A2.EXE File opened for modification C:\Windows\SysWOW64\B5A29B\ B820A2.EXE File created C:\Windows\SysWOW64\B3A6A3\B820A2.EXE explorer.exe File created C:\Windows\SysWOW64\B3A6A3\B820A2.EXE B820A2.EXE File opened for modification C:\Windows\SysWOW64\3CA4E3\ B820A2.EXE File opened for modification C:\Windows\SysWOW64\B3A6A3\ B820A2.EXE File opened for modification C:\Windows\SysWOW64\B3A6A3\ B820A2.EXE File opened for modification C:\Windows\SysWOW64\3CA4E3\ B820A2.EXE File created C:\Windows\SysWOW64\B3A6A3\B820A2.EXE B820A2.EXE File opened for modification C:\Windows\SysWOW64\D42343\ B820A2.EXE File opened for modification C:\Windows\SysWOW64\B3A6A3\ B820A2.EXE File opened for modification C:\Windows\SysWOW64\B3A6A3\B820A2.EXE B820A2.EXE File opened for modification C:\Windows\SysWOW64\B5A29B\ B820A2.EXE File opened for modification C:\Windows\SysWOW64\B5A29B\ B820A2.EXE File opened for modification C:\Windows\SysWOW64\D42343\ B820A2.EXE File opened for modification C:\Windows\SysWOW64\B5A29B\ B820A2.EXE File opened for modification C:\Windows\SysWOW64\B3A6A3\ B820A2.EXE File opened for modification C:\Windows\SysWOW64\B3A6A3\B820A2.EXE B820A2.EXE File opened for modification C:\Windows\SysWOW64\3CA4E3\ explorer.exe File opened for modification C:\Windows\SysWOW64\3CA4E3\ 32d8d8e04fa3817422e864b0364933c3.exe File opened for modification C:\Windows\SysWOW64\B3A6A3\B820A2.EXE B820A2.EXE File opened for modification C:\Windows\SysWOW64\B5A29B\ explorer.exe File opened for modification C:\Windows\SysWOW64\D42343\ B820A2.EXE File opened for modification C:\Windows\SysWOW64\B3A6A3\ B820A2.EXE File opened for modification C:\Windows\SysWOW64\D42343\ B820A2.EXE File opened for modification C:\Windows\SysWOW64\3CA4E3\ B820A2.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe -
Suspicious behavior: AddClipboardFormatListener 7 IoCs
pid Process 1184 explorer.exe 4360 explorer.exe 1680 explorer.exe 3008 explorer.exe 4504 explorer.exe 4000 explorer.exe 540 explorer.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2136 32d8d8e04fa3817422e864b0364933c3.exe 2136 32d8d8e04fa3817422e864b0364933c3.exe 2136 32d8d8e04fa3817422e864b0364933c3.exe 2136 32d8d8e04fa3817422e864b0364933c3.exe 2136 32d8d8e04fa3817422e864b0364933c3.exe 2136 32d8d8e04fa3817422e864b0364933c3.exe 2548 B820A2.EXE 2548 B820A2.EXE 2548 B820A2.EXE 2548 B820A2.EXE 2548 B820A2.EXE 2548 B820A2.EXE 1492 B820A2.EXE 1492 B820A2.EXE 1492 B820A2.EXE 1492 B820A2.EXE 1492 B820A2.EXE 1492 B820A2.EXE 4360 explorer.exe 4360 explorer.exe 4832 B820A2.EXE 4832 B820A2.EXE 4832 B820A2.EXE 4832 B820A2.EXE 4832 B820A2.EXE 1184 explorer.exe 1184 explorer.exe 4832 B820A2.EXE 3028 B820A2.EXE 3028 B820A2.EXE 3028 B820A2.EXE 3028 B820A2.EXE 3028 B820A2.EXE 3028 B820A2.EXE 1680 explorer.exe 1680 explorer.exe 4776 B820A2.EXE 4776 B820A2.EXE 4776 B820A2.EXE 4776 B820A2.EXE 4776 B820A2.EXE 4776 B820A2.EXE 3008 explorer.exe 3008 explorer.exe 748 explorer.exe 748 explorer.exe 748 explorer.exe 748 explorer.exe 748 explorer.exe 748 explorer.exe 4504 explorer.exe 4504 explorer.exe 4612 B820A2.EXE 4612 B820A2.EXE 4612 B820A2.EXE 4612 B820A2.EXE 4612 B820A2.EXE 4612 B820A2.EXE 4000 explorer.exe 4000 explorer.exe 1908 B820A2.EXE 1908 B820A2.EXE 1908 B820A2.EXE 1908 B820A2.EXE -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 2136 wrote to memory of 4612 2136 32d8d8e04fa3817422e864b0364933c3.exe 93 PID 2136 wrote to memory of 4612 2136 32d8d8e04fa3817422e864b0364933c3.exe 93 PID 2136 wrote to memory of 4612 2136 32d8d8e04fa3817422e864b0364933c3.exe 93 PID 2136 wrote to memory of 2548 2136 32d8d8e04fa3817422e864b0364933c3.exe 95 PID 2136 wrote to memory of 2548 2136 32d8d8e04fa3817422e864b0364933c3.exe 95 PID 2136 wrote to memory of 2548 2136 32d8d8e04fa3817422e864b0364933c3.exe 95 PID 2548 wrote to memory of 3116 2548 B820A2.EXE 96 PID 2548 wrote to memory of 3116 2548 B820A2.EXE 96 PID 2548 wrote to memory of 3116 2548 B820A2.EXE 96 PID 2548 wrote to memory of 1492 2548 B820A2.EXE 97 PID 2548 wrote to memory of 1492 2548 B820A2.EXE 97 PID 2548 wrote to memory of 1492 2548 B820A2.EXE 97 PID 1492 wrote to memory of 2808 1492 B820A2.EXE 99 PID 1492 wrote to memory of 2808 1492 B820A2.EXE 99 PID 1492 wrote to memory of 2808 1492 B820A2.EXE 99 PID 1492 wrote to memory of 4832 1492 B820A2.EXE 100 PID 1492 wrote to memory of 4832 1492 B820A2.EXE 100 PID 1492 wrote to memory of 4832 1492 B820A2.EXE 100 PID 4832 wrote to memory of 4196 4832 B820A2.EXE 102 PID 4832 wrote to memory of 4196 4832 B820A2.EXE 102 PID 4832 wrote to memory of 4196 4832 B820A2.EXE 102 PID 4832 wrote to memory of 3028 4832 B820A2.EXE 104 PID 4832 wrote to memory of 3028 4832 B820A2.EXE 104 PID 4832 wrote to memory of 3028 4832 B820A2.EXE 104 PID 3028 wrote to memory of 3192 3028 B820A2.EXE 111 PID 3028 wrote to memory of 3192 3028 B820A2.EXE 111 PID 3028 wrote to memory of 3192 3028 B820A2.EXE 111 PID 3028 wrote to memory of 4776 3028 B820A2.EXE 127 PID 3028 wrote to memory of 4776 3028 B820A2.EXE 127 PID 3028 wrote to memory of 4776 3028 B820A2.EXE 127 PID 4776 wrote to memory of 1784 4776 B820A2.EXE 106 PID 4776 wrote to memory of 1784 4776 B820A2.EXE 106 PID 4776 wrote to memory of 1784 4776 B820A2.EXE 106 PID 4776 wrote to memory of 748 4776 B820A2.EXE 135 PID 4776 wrote to memory of 748 4776 B820A2.EXE 135 PID 4776 wrote to memory of 748 4776 B820A2.EXE 135 PID 748 wrote to memory of 864 748 explorer.exe 110 PID 748 wrote to memory of 864 748 explorer.exe 110 PID 748 wrote to memory of 864 748 explorer.exe 110 PID 748 wrote to memory of 4612 748 explorer.exe 112 PID 748 wrote to memory of 4612 748 explorer.exe 112 PID 748 wrote to memory of 4612 748 explorer.exe 112 PID 4612 wrote to memory of 2304 4612 B820A2.EXE 113 PID 4612 wrote to memory of 2304 4612 B820A2.EXE 113 PID 4612 wrote to memory of 2304 4612 B820A2.EXE 113 PID 4612 wrote to memory of 1908 4612 B820A2.EXE 115 PID 4612 wrote to memory of 1908 4612 B820A2.EXE 115 PID 4612 wrote to memory of 1908 4612 B820A2.EXE 115 PID 1908 wrote to memory of 3572 1908 B820A2.EXE 117 PID 1908 wrote to memory of 3572 1908 B820A2.EXE 117 PID 1908 wrote to memory of 3572 1908 B820A2.EXE 117 PID 1908 wrote to memory of 3628 1908 B820A2.EXE 123 PID 1908 wrote to memory of 3628 1908 B820A2.EXE 123 PID 1908 wrote to memory of 3628 1908 B820A2.EXE 123 PID 3628 wrote to memory of 5000 3628 B820A2.EXE 132 PID 3628 wrote to memory of 5000 3628 B820A2.EXE 132 PID 3628 wrote to memory of 5000 3628 B820A2.EXE 132 PID 3628 wrote to memory of 2416 3628 B820A2.EXE 121 PID 3628 wrote to memory of 2416 3628 B820A2.EXE 121 PID 3628 wrote to memory of 2416 3628 B820A2.EXE 121 PID 2416 wrote to memory of 1032 2416 B820A2.EXE 122 PID 2416 wrote to memory of 1032 2416 B820A2.EXE 122 PID 2416 wrote to memory of 1032 2416 B820A2.EXE 122
Processes
-
C:\Users\Admin\AppData\Local\Temp\32d8d8e04fa3817422e864b0364933c3.exe"C:\Users\Admin\AppData\Local\Temp\32d8d8e04fa3817422e864b0364933c3.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Users\Admin\AppData\Local\Temp\32d8d8e04fa3817422e864b0364933c32⤵PID:4612
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE2⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A23⤵PID:3116
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A24⤵PID:2808
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A25⤵PID:4196
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE5⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE6⤵PID:4776
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A27⤵PID:1784
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE7⤵PID:748
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A28⤵PID:864
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE8⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A29⤵PID:2304
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE9⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A210⤵PID:3572
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE10⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3628
-
-
-
-
-
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A26⤵PID:3192
-
-
-
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4360
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1184
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1680
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3008
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4504
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4000
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
PID:540
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
PID:4244
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
PID:3076
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A21⤵PID:5000
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:4380
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE1⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A22⤵PID:1032
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE2⤵PID:4440
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A23⤵PID:2688
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A24⤵PID:3220
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE4⤵PID:3500
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A25⤵PID:5000
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE5⤵PID:4384
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A26⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:748
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE6⤵PID:2636
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A27⤵PID:2780
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE7⤵PID:3636
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A28⤵PID:1648
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE8⤵PID:3220
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A29⤵PID:5240
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE9⤵PID:5284
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A210⤵PID:5408
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE10⤵PID:5484
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A211⤵PID:5604
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE11⤵PID:5692
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A212⤵PID:5808
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE12⤵PID:5868
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A213⤵PID:5944
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE13⤵PID:6020
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A214⤵PID:6108
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE14⤵PID:3500
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A215⤵PID:5140
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE15⤵PID:5164
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A216⤵PID:5388
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE16⤵PID:5312
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A217⤵PID:992
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE17⤵PID:5992
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A218⤵PID:5248
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE18⤵PID:5936
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A219⤵PID:5780
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE19⤵PID:6084
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A220⤵PID:5228
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE20⤵PID:5552
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A221⤵PID:6120
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE21⤵PID:992
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A222⤵PID:5936
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE22⤵PID:6168
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A223⤵PID:6288
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE23⤵PID:6340
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A224⤵PID:6436
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE24⤵PID:6484
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A225⤵PID:6596
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE25⤵PID:6656
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A226⤵PID:6764
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE26⤵PID:6844
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A227⤵PID:6944
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE27⤵PID:7008
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A228⤵PID:7128
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE28⤵PID:6248
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A229⤵PID:6336
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE29⤵PID:3500
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A230⤵PID:6696
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE30⤵PID:6912
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A231⤵PID:7104
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE31⤵PID:5400
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A232⤵PID:6680
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE32⤵PID:6584
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A233⤵PID:7008
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE33⤵PID:7032
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A234⤵PID:6780
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE34⤵PID:6952
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A235⤵PID:6248
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE35⤵PID:6488
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A236⤵PID:7564
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE36⤵PID:7612
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A237⤵PID:7692
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE37⤵PID:7732
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A238⤵PID:7824
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE38⤵PID:7864
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A239⤵PID:7968
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE39⤵PID:8016
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A240⤵PID:8140
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE40⤵PID:8188
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A241⤵PID:4652
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE41⤵PID:2100
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A242⤵PID:7648
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE42⤵PID:7564
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A243⤵PID:8068
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE43⤵PID:7992
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A244⤵PID:2288
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE44⤵PID:7740
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A245⤵PID:7008
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE45⤵PID:7212
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A246⤵PID:4604
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE46⤵PID:7832
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A247⤵PID:7900
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE47⤵PID:6892
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A248⤵PID:3132
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE48⤵PID:4792
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A249⤵PID:8036
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE49⤵PID:4368
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A250⤵PID:2100
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE50⤵PID:5320
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A251⤵PID:1104
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE51⤵PID:5668
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A252⤵PID:8268
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE52⤵PID:8316
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A253⤵PID:8432
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE53⤵PID:8504
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A254⤵PID:8636
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE54⤵PID:8704
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A255⤵PID:8832
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE55⤵PID:8888
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A256⤵PID:9024
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE56⤵PID:9072
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A257⤵PID:9188
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE57⤵PID:8220
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A258⤵PID:8280
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE58⤵PID:7824
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A259⤵PID:5604
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE59⤵PID:8748
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A260⤵PID:8912
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE60⤵PID:8848
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A261⤵PID:2824
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE61⤵PID:8708
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A262⤵PID:8892
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE62⤵PID:2704
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A263⤵PID:8732
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE63⤵PID:9044
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A264⤵PID:6760
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE64⤵PID:9136
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A265⤵PID:4100
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE65⤵PID:8528
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A266⤵PID:4356
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE66⤵PID:3212
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A267⤵PID:6932
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE67⤵PID:2724
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A268⤵PID:8872
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE68⤵PID:9276
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A269⤵PID:9416
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE69⤵PID:9504
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A270⤵PID:9724
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE70⤵PID:9800
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A271⤵PID:9956
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE71⤵PID:10004
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A272⤵PID:10100
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE72⤵PID:10144
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A273⤵PID:8748
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE73⤵PID:6792
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A274⤵PID:8400
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE74⤵PID:8872
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A275⤵PID:9376
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE75⤵PID:9872
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A276⤵PID:10216
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE76⤵PID:6536
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A277⤵PID:10144
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE77⤵PID:1420
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A278⤵PID:6100
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE78⤵PID:9568
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A279⤵PID:10220
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE79⤵PID:9872
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A280⤵PID:8780
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE80⤵PID:9016
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A281⤵PID:1124
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE81⤵PID:9088
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A282⤵PID:8096
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE82⤵PID:2792
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A283⤵PID:6744
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE83⤵PID:4100
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A284⤵PID:9768
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE84⤵PID:9912
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A285⤵PID:7312
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE85⤵PID:7176
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A286⤵PID:10332
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE86⤵PID:10380
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A287⤵PID:10500
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE87⤵PID:10572
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A288⤵PID:10724
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE88⤵PID:10812
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A289⤵PID:10916
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE89⤵PID:10964
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A290⤵PID:11084
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE90⤵PID:11124
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A291⤵PID:11252
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE91⤵PID:8152
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A292⤵PID:10512
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE92⤵PID:7336
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A293⤵PID:7176
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE93⤵PID:10856
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A294⤵PID:11032
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE94⤵PID:10948
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A295⤵PID:10888
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE95⤵PID:10816
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A296⤵PID:4100
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE96⤵PID:11216
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A297⤵PID:11224
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE97⤵PID:4556
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A298⤵PID:8044
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE98⤵PID:10988
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A299⤵PID:9632
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE99⤵PID:9768
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A2100⤵PID:11216
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE100⤵PID:11232
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A2101⤵PID:10796
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE101⤵PID:11104
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A2102⤵PID:11296
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE102⤵PID:11368
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A2103⤵PID:11464
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE103⤵PID:11544
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A2104⤵PID:11688
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE104⤵PID:11768
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A2105⤵PID:11868
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE105⤵PID:11968
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A2106⤵PID:12176
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE106⤵PID:12224
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A2107⤵PID:11408
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE107⤵PID:11456
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A2108⤵PID:10932
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE108⤵PID:11788
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A2109⤵PID:11924
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE109⤵PID:10692
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A2110⤵PID:11580
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE110⤵PID:12120
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A2111⤵PID:10932
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE111⤵PID:11296
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A2112⤵PID:11772
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE112⤵PID:4148
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A2113⤵PID:12224
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE113⤵PID:9332
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A2114⤵PID:9988
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE114⤵PID:11908
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A2115⤵PID:10760
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE115⤵PID:9560
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A2116⤵PID:11580
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE116⤵PID:4852
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A2117⤵PID:12388
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE117⤵PID:12420
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A2118⤵PID:12508
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE118⤵PID:12564
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A2119⤵PID:12840
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE119⤵PID:12868
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A2120⤵PID:13048
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE120⤵PID:13084
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A2121⤵PID:13176
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE121⤵PID:13212
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A2122⤵PID:12292
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-