Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
4s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
15/01/2024, 03:28
Static task
static1
Behavioral task
behavioral1
Sample
5c047d72336cd60473948a1c6470aab8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5c047d72336cd60473948a1c6470aab8.exe
Resource
win10v2004-20231215-en
General
-
Target
5c047d72336cd60473948a1c6470aab8.exe
-
Size
1.4MB
-
MD5
5c047d72336cd60473948a1c6470aab8
-
SHA1
4a2126daad2ff7e0a2672699765e415c2c537684
-
SHA256
03c2820bef5a47808ea77008988e18e113d27f05eb22bb60ec51cd7fc730e0d6
-
SHA512
0a97bb44086e4d5cca0772c87c1fa1578ad01e82c02f71fe13d0b5ec8cbbf849d98aeea332929b3fb7b995bd198553bcca19afa6b14401c006e9698e44376467
-
SSDEEP
24576:7UKkfJ71jmXD9Zxe5ZKFL+8nzVsPin5ICH/o+/1POEov9ZTpDGzlVep/dJOdPKl:7UxsCZKFlVsPinJhORvrFGzlV69
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2788 explorer.exe 2600 explorer.exe 1256 XP-AB9DB5FA.EXE 1064 XP-AB9DB5FA.EXE -
Loads dropped DLL 28 IoCs
pid Process 2084 5c047d72336cd60473948a1c6470aab8.exe 2084 5c047d72336cd60473948a1c6470aab8.exe 2084 5c047d72336cd60473948a1c6470aab8.exe 2084 5c047d72336cd60473948a1c6470aab8.exe 2084 5c047d72336cd60473948a1c6470aab8.exe 2084 5c047d72336cd60473948a1c6470aab8.exe 2788 explorer.exe 2788 explorer.exe 2788 explorer.exe 2788 explorer.exe 2788 explorer.exe 2788 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 1256 XP-AB9DB5FA.EXE 1256 XP-AB9DB5FA.EXE 1256 XP-AB9DB5FA.EXE 1256 XP-AB9DB5FA.EXE 1256 XP-AB9DB5FA.EXE 1256 XP-AB9DB5FA.EXE 1064 XP-AB9DB5FA.EXE 1064 XP-AB9DB5FA.EXE 1064 XP-AB9DB5FA.EXE 1064 XP-AB9DB5FA.EXE -
Writes to the Master Boot Record (MBR) 1 TTPs 5 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 explorer.exe File opened for modification \??\PhysicalDrive0 XP-AB9DB5FA.EXE File opened for modification \??\PhysicalDrive0 XP-AB9DB5FA.EXE File opened for modification \??\PhysicalDrive0 5c047d72336cd60473948a1c6470aab8.exe File opened for modification \??\PhysicalDrive0 explorer.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\XP-AB9DB5FA.EXE 5c047d72336cd60473948a1c6470aab8.exe File opened for modification C:\Windows\SysWOW64\XP-AB9DB5FA.EXE 5c047d72336cd60473948a1c6470aab8.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico explorer.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe -
Modifies registry class 36 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 200000001a00eebbfe2300001000d09ad3fd8f23af46adb46c85480369c700000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_Classes\Local Settings explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_Classes\Local Settings explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f44471a0359723fa74489c55595fe6b30ee0000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe -
Suspicious use of SetWindowsHookEx 30 IoCs
pid Process 2084 5c047d72336cd60473948a1c6470aab8.exe 2084 5c047d72336cd60473948a1c6470aab8.exe 2084 5c047d72336cd60473948a1c6470aab8.exe 2084 5c047d72336cd60473948a1c6470aab8.exe 2084 5c047d72336cd60473948a1c6470aab8.exe 2084 5c047d72336cd60473948a1c6470aab8.exe 2788 explorer.exe 2788 explorer.exe 2788 explorer.exe 2788 explorer.exe 2788 explorer.exe 2788 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 1256 XP-AB9DB5FA.EXE 1256 XP-AB9DB5FA.EXE 1256 XP-AB9DB5FA.EXE 1256 XP-AB9DB5FA.EXE 1256 XP-AB9DB5FA.EXE 1256 XP-AB9DB5FA.EXE 1064 XP-AB9DB5FA.EXE 1064 XP-AB9DB5FA.EXE 1064 XP-AB9DB5FA.EXE 1064 XP-AB9DB5FA.EXE 1064 XP-AB9DB5FA.EXE 1064 XP-AB9DB5FA.EXE -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2676 2084 5c047d72336cd60473948a1c6470aab8.exe 28 PID 2084 wrote to memory of 2676 2084 5c047d72336cd60473948a1c6470aab8.exe 28 PID 2084 wrote to memory of 2676 2084 5c047d72336cd60473948a1c6470aab8.exe 28 PID 2084 wrote to memory of 2676 2084 5c047d72336cd60473948a1c6470aab8.exe 28 PID 2084 wrote to memory of 2788 2084 5c047d72336cd60473948a1c6470aab8.exe 63 PID 2084 wrote to memory of 2788 2084 5c047d72336cd60473948a1c6470aab8.exe 63 PID 2084 wrote to memory of 2788 2084 5c047d72336cd60473948a1c6470aab8.exe 63 PID 2084 wrote to memory of 2788 2084 5c047d72336cd60473948a1c6470aab8.exe 63 PID 2788 wrote to memory of 3044 2788 explorer.exe 37 PID 2788 wrote to memory of 3044 2788 explorer.exe 37 PID 2788 wrote to memory of 3044 2788 explorer.exe 37 PID 2788 wrote to memory of 3044 2788 explorer.exe 37 PID 2788 wrote to memory of 2600 2788 explorer.exe 89 PID 2788 wrote to memory of 2600 2788 explorer.exe 89 PID 2788 wrote to memory of 2600 2788 explorer.exe 89 PID 2788 wrote to memory of 2600 2788 explorer.exe 89 PID 2600 wrote to memory of 2620 2600 explorer.exe 32 PID 2600 wrote to memory of 2620 2600 explorer.exe 32 PID 2600 wrote to memory of 2620 2600 explorer.exe 32 PID 2600 wrote to memory of 2620 2600 explorer.exe 32 PID 2600 wrote to memory of 1256 2600 explorer.exe 36 PID 2600 wrote to memory of 1256 2600 explorer.exe 36 PID 2600 wrote to memory of 1256 2600 explorer.exe 36 PID 2600 wrote to memory of 1256 2600 explorer.exe 36 PID 1256 wrote to memory of 2172 1256 XP-AB9DB5FA.EXE 35 PID 1256 wrote to memory of 2172 1256 XP-AB9DB5FA.EXE 35 PID 1256 wrote to memory of 2172 1256 XP-AB9DB5FA.EXE 35 PID 1256 wrote to memory of 2172 1256 XP-AB9DB5FA.EXE 35 PID 1256 wrote to memory of 1064 1256 XP-AB9DB5FA.EXE 71 PID 1256 wrote to memory of 1064 1256 XP-AB9DB5FA.EXE 71 PID 1256 wrote to memory of 1064 1256 XP-AB9DB5FA.EXE 71 PID 1256 wrote to memory of 1064 1256 XP-AB9DB5FA.EXE 71 PID 1064 wrote to memory of 1512 1064 XP-AB9DB5FA.EXE 95 PID 1064 wrote to memory of 1512 1064 XP-AB9DB5FA.EXE 95 PID 1064 wrote to memory of 1512 1064 XP-AB9DB5FA.EXE 95 PID 1064 wrote to memory of 1512 1064 XP-AB9DB5FA.EXE 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c047d72336cd60473948a1c6470aab8.exe"C:\Users\Admin\AppData\Local\Temp\5c047d72336cd60473948a1c6470aab8.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Users\Admin\AppData\Local\Temp\5c047d72336cd60473948a1c6470aab82⤵PID:2676
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE2⤵PID:2788
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE3⤵PID:2600
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE5⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1064
-
-
-
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA3⤵PID:3044
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
PID:2768
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
PID:2640
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA1⤵PID:2620
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
PID:1336
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA1⤵PID:2172
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE1⤵PID:2464
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA2⤵PID:2228
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE2⤵PID:852
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:1088
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA1⤵PID:1648
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:940
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA1⤵PID:2088
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE1⤵PID:600
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE2⤵PID:2896
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA3⤵PID:2540
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE3⤵PID:1704
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE4⤵PID:2796
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE5⤵PID:1572
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA6⤵PID:2164
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE6⤵PID:1856
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA7⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2788
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE7⤵PID:692
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA8⤵PID:1408
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE8⤵PID:1844
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA9⤵PID:2268
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE9⤵PID:2516
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA10⤵PID:1476
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE10⤵PID:892
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA11⤵PID:3064
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE11⤵PID:2464
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA12⤵PID:852
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE12⤵PID:1732
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA13⤵PID:2220
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE13⤵PID:792
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA14⤵PID:2212
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE14⤵PID:520
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA15⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2600
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE15⤵PID:1332
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA16⤵PID:2956
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE16⤵PID:512
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA17⤵PID:1512
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE17⤵PID:2516
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA18⤵PID:2784
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE18⤵PID:1704
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA19⤵PID:1464
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE19⤵PID:1656
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA20⤵PID:2476
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE20⤵PID:520
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA21⤵PID:1600
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE21⤵PID:2304
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA22⤵PID:2788
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE22⤵PID:1348
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA23⤵PID:1760
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE23⤵PID:3144
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA24⤵PID:3176
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE24⤵PID:3256
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA25⤵PID:3296
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE25⤵PID:3388
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA26⤵PID:3416
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE26⤵PID:3480
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA27⤵PID:3516
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE27⤵PID:3604
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA28⤵PID:3656
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE28⤵PID:3756
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA29⤵PID:3784
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE29⤵PID:3872
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA30⤵PID:3916
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE30⤵PID:4040
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA31⤵PID:4080
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE31⤵PID:1464
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA32⤵PID:520
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE32⤵PID:3400
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA33⤵PID:3456
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE33⤵PID:3628
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA34⤵PID:2784
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE34⤵PID:3764
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA35⤵PID:3880
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE35⤵PID:3952
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE36⤵PID:600
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA37⤵PID:3904
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE37⤵PID:3784
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA38⤵PID:3872
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE38⤵PID:3920
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA39⤵PID:3164
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE39⤵PID:3292
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA40⤵PID:3932
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE40⤵PID:3464
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA41⤵PID:3220
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE41⤵PID:3140
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA42⤵PID:4100
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE42⤵PID:4160
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA43⤵PID:4188
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE43⤵PID:4276
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA44⤵PID:4320
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE44⤵PID:4408
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA45⤵PID:4456
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE45⤵PID:4508
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA46⤵PID:4572
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE46⤵PID:4672
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA47⤵PID:4696
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE47⤵PID:4776
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE48⤵PID:4884
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA49⤵PID:4924
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE49⤵PID:4992
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA50⤵PID:5028
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE50⤵PID:5100
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA51⤵PID:3880
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE51⤵PID:4196
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA52⤵PID:4300
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE52⤵PID:4544
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA53⤵PID:4164
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE53⤵PID:4684
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA54⤵PID:3628
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE54⤵PID:3176
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA55⤵PID:4128
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE55⤵PID:5112
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA56⤵PID:4200
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE56⤵PID:4324
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA57⤵PID:4688
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE57⤵PID:4168
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA58⤵PID:3884
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE58⤵PID:5072
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA59⤵PID:4300
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE59⤵PID:4836
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA60⤵PID:5204
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE60⤵PID:5264
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA61⤵PID:5352
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE61⤵PID:5412
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA62⤵PID:5792
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE62⤵PID:5816
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA63⤵PID:5288
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE63⤵PID:5392
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA64⤵PID:5696
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE64⤵PID:4168
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA65⤵PID:5924
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE65⤵PID:4868
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:2124
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA1⤵PID:1596
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:3040
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA1⤵PID:2700
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:2276
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA1⤵PID:2224
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:3036
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE1⤵PID:2360
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA1⤵PID:1512
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:2580
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:2200
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:1516
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:1104
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:1044
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:1616
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:332
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:1036
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:2808
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:2708
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:2960
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:1780
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:1816
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:1896
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:2220
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:2884
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:2280
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:3132
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:3236
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:3336
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:3488
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:3592
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:3724
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:3836
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:3936
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:1844
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:3284
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:3496
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:3396
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA1⤵PID:3460
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:4060
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:1348
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:3960
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:1408
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:3700
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:4132
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:4256
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:4372
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:4484
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:4644
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA1⤵PID:4800
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:4808
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:4912
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:5080
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:4308
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:4432
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:3932
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:4108
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:4216
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:3140
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:5104
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:3452
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:4896
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:4076
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:3292
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:4408
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:5180
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:5312
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:5440
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:5544
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:5836
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:6084
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:5268
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:4160
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212KB
MD5de4374d6912aa9a37db5c9c0c41609e9
SHA1dfb02bd3db018ad6619bed58541595bac45e46c1
SHA25645c9359d820ded199215895c3d12af6c10cb648d60dadd08fb2ae12a531ba6dc
SHA512592eafab6fdaad75e29aafbce0d74408f11dcb2bcb7688af90bd35d69d5c4261030f0980cf5d4621aeb779e1518b7d30f322de4905c14e42ff02b389285b04ac
-
Filesize
316KB
MD588890fa24f93b245a41d29abb80b1df4
SHA17ee95f6853612be1a460aa6211f09730d7aebd8c
SHA2562d47c02d5f636da8e25aadb9a6e7360628c6d500f7c997da62490c1ab02f418b
SHA5120ae2228ec40ecd33c3ceeeeed4d630fb79cca15981f13431bc5db78f3e5c4dd49161d14d8ee97aeae8466486d70dbbc47c9ae8c9523bcd5b7d00be7a4ddeddcc
-
Filesize
275KB
MD527f70b1219bf41eaa0372d93c96d07f1
SHA1a18ceb8569d6c1749b300b4bfe407299154a4a9f
SHA2562c77af2e689cad6ed5dc770c75e59fcfe852335fa258ab1c5e28e6980fe3fa8b
SHA512dfae7d02680420ed3871b5b466d6bf9ea3a6f65ad76e47ca81ba69b927ab6419bece5fa154d014b9a88c08c1d6ae8e315a4a05e33bb8cc7af4b2420001b3705d
-
Filesize
180KB
MD55e517b1ea1c64321ea8cc96a7ea1c7fb
SHA1d5835e2f4dd0bb9b7312f63a0c7a8270db41b042
SHA256ff08e84f2fb55bf56c525eebab6657bc090b803bc35fb619c56c94a279245580
SHA51245504afaf7769ef9f20ff7a3395537e1387e2932c8efc1ceccf2e24a2f00ccde324d1fe05ba65d4bf8c5a38e462797907bd2508f01869956935b83f918c31cf9
-
Filesize
128KB
MD582c992f7795485f2999762129e4272d3
SHA1d167d07aa60a26fee65c8703871315b7846ec72b
SHA2565c975450b0e51d8a5d409f6e62dcc84cd325112913a2643491e36a84b0229652
SHA512c2b748d9b25c6948ad0c9a98a87edb0bc0ab71f94a7374ca90a2b892ab97fb435f3a4ed528665d3c599a229862419a97f1fe05d4713161757da8a82366817bd2
-
Filesize
72KB
MD522a235d3cdf2a4895f708f3eb3a211eb
SHA144325f3de8331b2d5490cb77a5e2affd8ac68c3a
SHA25664fc2784b4c6afc1d6369cab345b500938caa06355784e949cab4d6f49bf6fb1
SHA5127eb53bb374c82f68713f163582e22f5f82369322bc2f9f73629516117095507a8d50d2c30ac84bf98d44632b6f20cffcd9affdaaa0ba9ff0f567b32f342e544f
-
Filesize
10KB
MD52aa3d265656d62a2f2d724ed8523c482
SHA102290c597de49a2f2ade3429c43cbad01fcf20e6
SHA256a032d62423e3548e6990fd74f5a9f6dedf1384d1ba5510f213a5a9ef5064629d
SHA5125f88e292ba0af61a5c68d441e6a148653fada33317bbcbd2432a6eede7d12c279926c2fb9e3e668523a4b81629b9cb669e07adedcddbdf80aabbc652b57d46d6
-
Filesize
1.4MB
MD540a2e6f5435a8ce5e753a8cfd2593fed
SHA1235254f7f579c9dc7820876a602d106f3daef07b
SHA2563c3e056cb38b20f3f14dae67a53c58b9dc3c69eeec6ab0d49e10260a1c0bee3a
SHA512a4e11e3bc641e48312836ce056c27a32f1286c2e8ad0905923281c64983eda103ab70c716478ec5428cb51226a674c3e70d92efbcf0b32e864b4c85256fbf1ef
-
Filesize
1.3MB
MD5ee65964414d57184db77cc473bdab8d2
SHA1cfe9ebd58f1952ba7295351a7523512acfdcd548
SHA256314a9e8fa1c2710eaaad067a25c584056c6765e739f9ce2ff61bfe535a9b0d2c
SHA512798b2ced8b5b868c79b3f7a70c65636cb6f4dc5cf678b6df428bb83c6add394beecb1fc946e17cb6ee90fcbbcb986281d4ee5a59c34f668877d58bb854cb21a4
-
Filesize
434KB
MD536823583734e483692ed073e57e13e73
SHA1cd1ce1b9d13a8ecba1a927df67a6c3d304aaa578
SHA256abdcef7ca241384654fc9967db8870eb862b9bbdee88da3b261a31e6c8f9cec7
SHA51201da3da869a1584196eec2cc2c712fe58af77545f24431bd04b57814ffdc6f02b131427d17cb73c882896e74fcedebb0ff9190ea2bc8eb4a2b507ecc3fc885cb
-
Filesize
351KB
MD5fb41a392770b3e937eaafaa12088c79d
SHA19dba64e09cbde7426e303992437ea9d956f0f0e2
SHA256ca8c6e7e70a6138612c9c87bbc47e7fcec8758ef903e8c78cd7e45e0af3017bc
SHA512e4c61d7baf13512c083bb4fe68ffe64360d463775a2507c725ba6974228911e7eac517960853744b7edd086722d7f37549f4bff97815d0aad5ec37167459f3ca
-
Filesize
264KB
MD557f1f3e68be9f643b40efa43bda261a3
SHA12b7d1b8a8caf1ffa3e1bf30fd93a2dfd319055a8
SHA256b3942aa50db9c8ed0c7353c75d1aa52c8c253d61503026aa793f75e7ccbac5d3
SHA5123641ef8a2c1e82e482bfebc9876e58a64af87fdde0a48d2112036a038330d5d43c9807de2c7005ea31e3e6a7e8c7853e94b457e6727361c045f94108735844f4
-
Filesize
239KB
MD54d4980fc7ecf91acb281726a4377a561
SHA1f44c81777ee98a0191296e08e4f9a8d743aefdff
SHA256e4fee4028f4d01805c668cafe708324d6b27eee09017a70c7f448f89bd0f1c4a
SHA512c5fb3d1ca348029199d5e18104619498072a85dc0fb912b47358cdf360f4c3a4dfefa9af636bda24ffb42f87154881e0e7efe00b2dcae0abb2a90c45f9d07fdc
-
Filesize
37KB
MD5290849039069b8d875c24786379e660d
SHA17bebcd9e397f7d4dc2dba2cfd62da70fef480688
SHA256b8b7404d37240e471d235612d196dab619940feb56f475d2af392e4cfb1f9793
SHA512735f64d1f1691ad774d645baa5538b553af54eca840bbdb9898329a065be51192b72a80a315fca68f4610faae595d1fed1b581288bb6008673efe3cd4c79c823
-
Filesize
112KB
MD5051d51ef3bc46ab5a090e3bec2dbffe5
SHA1d5199749b263840bb9214033d6fbbf1b886d0a34
SHA25699c7206a18a91d2f01299bfcd64b0ae9abee9a564b0af68e643c2eb5cc70fe23
SHA5129dbaa9200eb09689a1e9c2dfad8c55349363309e9427a0de978088d95eb5f9398776262576f0a543d278b094281dbac43a1cfc9bdd3352fe472dcad5e4187638
-
Filesize
54KB
MD5fcf04a12ffd650833b34551b86d7ef89
SHA1853aad8ca74cec3716b5231741d78e77b6720bb0
SHA256bf6e321cd28f19e1e2a055ab21d442af5c9319c3eda3a923412053c5ea8dd217
SHA5125f2d561c9f89d4a0a07c96608bf39c7a8ba3a57c7ce8324fd4d602549cb26623a6384c12325b57d758078a4b91ab25522cdd8aa17593c0087585c1c279a1d66e
-
Filesize
528KB
MD5c5ee5ae463f0c28152ab0dbf9498c255
SHA153662010e21a53b4937999e25179fedb88af67f2
SHA2562a43d6bbc7962ce4906b92965a5d94a8728523aa525e5c2604ccc16864266482
SHA512097e2ba161db9a212486bf4722dc35d6b595c140222cea0ed9ed458ecbcbcd9b1e12ca2b9e81fcca99d694bf90cad9cd5aad085fb67839dfc65909508ad134e1
-
Filesize
445KB
MD5335b16598c0f58e1ff402a716b152191
SHA17402a5a7ea74ceed12ba2483f326ba210ff3665a
SHA2561018aa5c5885ede235c79a0d44c885064f8a3573afbca393550730b5400c1b28
SHA512b20a8cb4ac18c1e0101f003a1f95866356101dd3fae118ba3a1553bd994044d0aa1c322dec29ca62518fdfd5b47c1f819627db69d9e83399c7013c59ab1b0a6a
-
Filesize
1.0MB
MD55c794859ffac4b19ee012a2986f53cff
SHA12f97fe128108be7145633ea8697a5132fbf71146
SHA256dd799e01c8ba36258795ec4fc896ead1ffb5ea87e765fa298cef64fd7ebfc1fd
SHA51222e91f9d5a62938674d19c4e6cbfd78098a76921888c910d8aead89765709e5947e06ccba398461eb1903e4651e2d738fdb463a5deda893a08d0eb69fd0cdbd4
-
Filesize
289KB
MD562119fb1da632e98644dd9ac2d4f018e
SHA1ebd099a19343e1f02936702fa1766943c627b845
SHA256221f0882742f05d878693276c01a0da67b3bb4f976d89762795e05cb4f400995
SHA512c2fe2e19d5353324672798cbeef5d1bba3f8f45bcbde28f20b33500999a85626057b2abf15b3bac4cba3b7f0439ab52b08d0b951576024531baa0446ba862018
-
Filesize
23KB
MD58a4d942ad76efffe770ac6328324be82
SHA1a553c37f76495617d27d46baeb2708654628cc0c
SHA2566e10f25831a57ecf14ce013649efa5a4b926e7532c1d8f063a6128dd32d6d12f
SHA51237d479245e9352fdc7b962996f8e67747ce485741d0ae050971495a74744f96c3dc6e348bafbb59c51ad38dec8215601dfd06716bca243c42294248f1808f7e7
-
Filesize
40KB
MD59900631cd16e385556a02cad93591982
SHA148daa5ac65d32607564024fad038b5388e8e1d16
SHA256b37aeaea327e7679c828a15f00a5fe823ede2ddb020449878a412124f7dd007c
SHA512e10fbba11819baf323c0eb5452109f8ad91eae7170e4cf76c7fb6fd01351a53f372320ffd6816abbef993501d55530e006cee609db0697b40660e29a4e49a051
-
Filesize
1.4MB
MD55c047d72336cd60473948a1c6470aab8
SHA14a2126daad2ff7e0a2672699765e415c2c537684
SHA25603c2820bef5a47808ea77008988e18e113d27f05eb22bb60ec51cd7fc730e0d6
SHA5120a97bb44086e4d5cca0772c87c1fa1578ad01e82c02f71fe13d0b5ec8cbbf849d98aeea332929b3fb7b995bd198553bcca19afa6b14401c006e9698e44376467
-
Filesize
640KB
MD5931f3be165c1bab8dd18de7972b81037
SHA17b6159dea106fe80dabc13e54a13ed57dddd2f23
SHA2564ab4d917be6492764e85c4548a9c2fa2e739aa3ad92d20ece23f8a88696e0b1d
SHA512928517e7dcc2d9e01ec772e605c80a1d3b41f439a5a54e764f7a5a824cfa0708949234289215dd5716b7e40b4d3a45f0b58e5c292249a65b29f3a864f730391a
-
Filesize
1.3MB
MD5b16e60da659593f3da8b9aa3f7e59d79
SHA179c28aaa7ae7fe891f88088e0d20960759f38e35
SHA256e000eb17fc3fe9b8c97dd4e206f3044dd5c29785cf6a774bd5786c8a09f0fc48
SHA5121db6f28573dd826d1f763fb346de69a4cd68aea959e639f79942c94d8640cb6a3e377a3dc0f2f119600d88aeb38756f06848144c74840ebb22ffa536beff3cef
-
Filesize
666KB
MD5283d2c1c867a7062dda269075cb32d9b
SHA1b52d5046f25c8366454fb69a5d6f5a22135ce74a
SHA256908650bb7c9d83f593cff5bd5c5b6323d9bc231037dfb191ad2d4d4e2d95c834
SHA5128d88f9cff85f84a03d1c7aca3751d4d9664dc6baa63f77e0b53f08df5d55daf94afa8fbe0b51260adc83a0805c3ba6e4e4cd61e942b8501815b1e7700a6ab5c0
-
Filesize
589KB
MD59d1cc0966c2ed8404cde45b329dd6242
SHA19bb44d5673bb6d2d05d95074ae2550047014a1dd
SHA256f4b8aae7e8c7100a1816625fccebedfa3057994a5d460e8c00f1130438b8f855
SHA512130702bad3b72e79bcac46099a2aa287a42b67df33fdc0c5d98bbaaddd0302a81cb8882ef789e7a8a773cdf75ff5fbb79255e05d6f36df28d9c7bd944585beaf
-
Filesize
333KB
MD5f00a8b2f35afbf29eb9fba87a89106f2
SHA1dd1d3ad6e6a65f68c1707a111eb2252b27878fc2
SHA2569f5286890b784d093a100b5022d02c79395dabfbc516c5d18cb91ca90b932e6c
SHA51206538aa1895c9b3e55a41a9ffb5363b4888522655cef539833488408d1b027cc9ce1883cd14e44203eb1d76656225f84d0d176b688dd39c8417fbe7882194475
-
Filesize
236KB
MD5ce5e93b3358b9e85ee56a01528e709a0
SHA1bdec98840f55a9336c8cf88cf88928813bcf308a
SHA2565dc7234038c07add400a8c0df108e35ec12c88006e1fec43cdded69b20a1d5f1
SHA51242ce75f929d1dbb8c77096735ae1818ae7a287e0b9d67bfe435cc6f91d95acd984ce248cebf02205122c0754c63dce4cb9610800ddc0dc25d460ca8e123f14b6