Analysis
-
max time kernel
5s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
15-01-2024 03:28
Static task
static1
Behavioral task
behavioral1
Sample
5c047d72336cd60473948a1c6470aab8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5c047d72336cd60473948a1c6470aab8.exe
Resource
win10v2004-20231215-en
General
-
Target
5c047d72336cd60473948a1c6470aab8.exe
-
Size
1.4MB
-
MD5
5c047d72336cd60473948a1c6470aab8
-
SHA1
4a2126daad2ff7e0a2672699765e415c2c537684
-
SHA256
03c2820bef5a47808ea77008988e18e113d27f05eb22bb60ec51cd7fc730e0d6
-
SHA512
0a97bb44086e4d5cca0772c87c1fa1578ad01e82c02f71fe13d0b5ec8cbbf849d98aeea332929b3fb7b995bd198553bcca19afa6b14401c006e9698e44376467
-
SSDEEP
24576:7UKkfJ71jmXD9Zxe5ZKFL+8nzVsPin5ICH/o+/1POEov9ZTpDGzlVep/dJOdPKl:7UxsCZKFlVsPinJhORvrFGzlV69
Malware Config
Signatures
-
Executes dropped EXE 5 IoCs
pid Process 4104 XP-AB9DB5FA.EXE 1056 XP-AB9DB5FA.EXE 2344 XP-AB9DB5FA.EXE 3600 XP-AB9DB5FA.EXE 2236 explorer.exe -
Loads dropped DLL 38 IoCs
pid Process 2096 5c047d72336cd60473948a1c6470aab8.exe 2096 5c047d72336cd60473948a1c6470aab8.exe 2096 5c047d72336cd60473948a1c6470aab8.exe 2096 XP-AB9DB5FA.EXE 2096 XP-AB9DB5FA.EXE 2096 XP-AB9DB5FA.EXE 2096 XP-AB9DB5FA.EXE 4104 XP-AB9DB5FA.EXE 4104 XP-AB9DB5FA.EXE 4104 XP-AB9DB5FA.EXE 4104 XP-AB9DB5FA.EXE 4104 XP-AB9DB5FA.EXE 4104 XP-AB9DB5FA.EXE 4104 XP-AB9DB5FA.EXE 1056 XP-AB9DB5FA.EXE 1056 XP-AB9DB5FA.EXE 1056 XP-AB9DB5FA.EXE 1056 XP-AB9DB5FA.EXE 1056 XP-AB9DB5FA.EXE 1056 XP-AB9DB5FA.EXE 1056 XP-AB9DB5FA.EXE 2344 XP-AB9DB5FA.EXE 2344 XP-AB9DB5FA.EXE 2344 XP-AB9DB5FA.EXE 2344 XP-AB9DB5FA.EXE 2344 XP-AB9DB5FA.EXE 2344 XP-AB9DB5FA.EXE 2344 XP-AB9DB5FA.EXE 3600 XP-AB9DB5FA.EXE 3600 XP-AB9DB5FA.EXE 3600 XP-AB9DB5FA.EXE 3600 XP-AB9DB5FA.EXE 3600 XP-AB9DB5FA.EXE 3600 XP-AB9DB5FA.EXE 3600 XP-AB9DB5FA.EXE 2236 explorer.exe 2236 explorer.exe 2236 explorer.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 5 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 XP-AB9DB5FA.EXE File opened for modification \??\PhysicalDrive0 XP-AB9DB5FA.EXE File opened for modification \??\PhysicalDrive0 XP-AB9DB5FA.EXE File opened for modification \??\PhysicalDrive0 XP-AB9DB5FA.EXE File opened for modification \??\PhysicalDrive0 XP-AB9DB5FA.EXE -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\XP-AB9DB5FA.EXE XP-AB9DB5FA.EXE File opened for modification C:\Windows\SysWOW64\XP-AB9DB5FA.EXE XP-AB9DB5FA.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe -
Modifies registry class 44 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 14002e80922b16d365937a46956b92703aca08af0000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe -
Suspicious behavior: AddClipboardFormatListener 3 IoCs
pid Process 4768 explorer.exe 3888 explorer.exe 1388 explorer.exe -
Suspicious use of SetWindowsHookEx 38 IoCs
pid Process 2096 5c047d72336cd60473948a1c6470aab8.exe 2096 5c047d72336cd60473948a1c6470aab8.exe 2096 XP-AB9DB5FA.EXE 2096 XP-AB9DB5FA.EXE 2096 XP-AB9DB5FA.EXE 2096 XP-AB9DB5FA.EXE 4104 XP-AB9DB5FA.EXE 4104 XP-AB9DB5FA.EXE 4104 XP-AB9DB5FA.EXE 4104 XP-AB9DB5FA.EXE 4104 XP-AB9DB5FA.EXE 4104 XP-AB9DB5FA.EXE 1056 XP-AB9DB5FA.EXE 1056 XP-AB9DB5FA.EXE 3888 explorer.exe 3888 explorer.exe 1056 XP-AB9DB5FA.EXE 1056 XP-AB9DB5FA.EXE 1056 XP-AB9DB5FA.EXE 1056 XP-AB9DB5FA.EXE 4768 explorer.exe 4768 explorer.exe 2344 XP-AB9DB5FA.EXE 2344 XP-AB9DB5FA.EXE 2344 XP-AB9DB5FA.EXE 2344 XP-AB9DB5FA.EXE 2344 XP-AB9DB5FA.EXE 2344 XP-AB9DB5FA.EXE 3600 XP-AB9DB5FA.EXE 3600 XP-AB9DB5FA.EXE 1388 explorer.exe 1388 explorer.exe 3600 XP-AB9DB5FA.EXE 3600 XP-AB9DB5FA.EXE 3600 XP-AB9DB5FA.EXE 3600 XP-AB9DB5FA.EXE 2236 explorer.exe 2236 explorer.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2096 wrote to memory of 60 2096 XP-AB9DB5FA.EXE 89 PID 2096 wrote to memory of 60 2096 XP-AB9DB5FA.EXE 89 PID 2096 wrote to memory of 60 2096 XP-AB9DB5FA.EXE 89 PID 2096 wrote to memory of 4104 2096 XP-AB9DB5FA.EXE 92 PID 2096 wrote to memory of 4104 2096 XP-AB9DB5FA.EXE 92 PID 2096 wrote to memory of 4104 2096 XP-AB9DB5FA.EXE 92 PID 4104 wrote to memory of 948 4104 XP-AB9DB5FA.EXE 93 PID 4104 wrote to memory of 948 4104 XP-AB9DB5FA.EXE 93 PID 4104 wrote to memory of 948 4104 XP-AB9DB5FA.EXE 93 PID 4104 wrote to memory of 1056 4104 XP-AB9DB5FA.EXE 95 PID 4104 wrote to memory of 1056 4104 XP-AB9DB5FA.EXE 95 PID 4104 wrote to memory of 1056 4104 XP-AB9DB5FA.EXE 95 PID 1056 wrote to memory of 4900 1056 XP-AB9DB5FA.EXE 140 PID 1056 wrote to memory of 4900 1056 XP-AB9DB5FA.EXE 140 PID 1056 wrote to memory of 4900 1056 XP-AB9DB5FA.EXE 140 PID 1056 wrote to memory of 2344 1056 XP-AB9DB5FA.EXE 139 PID 1056 wrote to memory of 2344 1056 XP-AB9DB5FA.EXE 139 PID 1056 wrote to memory of 2344 1056 XP-AB9DB5FA.EXE 139 PID 2344 wrote to memory of 3452 2344 XP-AB9DB5FA.EXE 96 PID 2344 wrote to memory of 3452 2344 XP-AB9DB5FA.EXE 96 PID 2344 wrote to memory of 3452 2344 XP-AB9DB5FA.EXE 96 PID 2344 wrote to memory of 3600 2344 XP-AB9DB5FA.EXE 97 PID 2344 wrote to memory of 3600 2344 XP-AB9DB5FA.EXE 97 PID 2344 wrote to memory of 3600 2344 XP-AB9DB5FA.EXE 97 PID 3600 wrote to memory of 1120 3600 XP-AB9DB5FA.EXE 98 PID 3600 wrote to memory of 1120 3600 XP-AB9DB5FA.EXE 98 PID 3600 wrote to memory of 1120 3600 XP-AB9DB5FA.EXE 98 PID 3600 wrote to memory of 2236 3600 XP-AB9DB5FA.EXE 149 PID 3600 wrote to memory of 2236 3600 XP-AB9DB5FA.EXE 149 PID 3600 wrote to memory of 2236 3600 XP-AB9DB5FA.EXE 149
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c047d72336cd60473948a1c6470aab8.exe"C:\Users\Admin\AppData\Local\Temp\5c047d72336cd60473948a1c6470aab8.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2096 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Users\Admin\AppData\Local\Temp\5c047d72336cd60473948a1c6470aab82⤵PID:60
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE2⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA3⤵PID:948
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2344
-
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA4⤵PID:4900
-
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3888
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4768
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA1⤵PID:3452
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE1⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA2⤵PID:1120
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE2⤵PID:2236
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:3432
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA1⤵PID:2920
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:2656
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA1⤵PID:1532
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE1⤵PID:376
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA2⤵PID:1872
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE2⤵PID:2232
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:1516
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE1⤵PID:1288
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA2⤵PID:3748
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE2⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA3⤵PID:2084
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE3⤵PID:1352
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA4⤵PID:2760
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE4⤵PID:2680
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA5⤵PID:848
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE5⤵PID:3660
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA6⤵PID:3792
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE6⤵PID:3356
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA7⤵PID:2524
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE7⤵PID:4572
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA8⤵PID:4700
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE8⤵PID:4680
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA9⤵PID:4344
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE9⤵PID:4416
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA10⤵PID:460
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE10⤵PID:396
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA11⤵PID:3660
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE11⤵PID:856
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA12⤵PID:2252
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE12⤵PID:2180
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA13⤵PID:3352
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE13⤵PID:2528
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA14⤵PID:5232
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE14⤵PID:5300
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA15⤵PID:5424
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE15⤵PID:5488
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA16⤵PID:5604
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE16⤵PID:5684
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA17⤵PID:5796
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE17⤵PID:5860
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA18⤵PID:6012
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE18⤵PID:6092
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA19⤵PID:5040
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE19⤵PID:5240
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA20⤵PID:5444
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE20⤵PID:460
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA21⤵PID:5736
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE21⤵PID:5680
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA22⤵PID:6088
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE22⤵PID:5616
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA23⤵PID:6012
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE23⤵PID:5232
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA24⤵PID:6044
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE24⤵PID:5492
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA25⤵PID:5832
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE25⤵PID:5608
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA26⤵PID:3388
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE26⤵PID:2252
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA27⤵PID:5948
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE27⤵PID:396
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA28⤵PID:6232
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE28⤵PID:6284
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA29⤵PID:6412
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE29⤵PID:6480
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA30⤵PID:6604
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE30⤵PID:6668
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA31⤵PID:6752
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE31⤵PID:6828
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA32⤵PID:6928
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE32⤵PID:6996
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA33⤵PID:7132
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE33⤵PID:3388
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA34⤵PID:5864
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE34⤵PID:6452
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA35⤵PID:6440
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE35⤵PID:6800
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA36⤵PID:6112
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE36⤵PID:6952
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA37⤵PID:4856
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE37⤵PID:6832
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA38⤵PID:5876
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE38⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA39⤵PID:6724
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE39⤵PID:6112
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA40⤵PID:6472
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE40⤵PID:6528
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA41⤵PID:2088
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE41⤵PID:6880
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA42⤵PID:7268
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE42⤵PID:7344
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA43⤵PID:7468
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE43⤵PID:7548
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA44⤵PID:7688
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE44⤵PID:7764
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA45⤵PID:7848
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE45⤵PID:7932
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA46⤵PID:8036
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE46⤵PID:8096
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA47⤵PID:7184
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE47⤵PID:6416
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA48⤵PID:6112
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE48⤵PID:7336
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA49⤵PID:7736
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE49⤵PID:7332
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA50⤵PID:7956
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE50⤵PID:8184
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA51⤵PID:4976
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE51⤵PID:7788
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA52⤵PID:7184
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE52⤵PID:7692
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA53⤵PID:6472
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE53⤵PID:6932
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA54⤵PID:7580
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE54⤵PID:6688
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA55⤵PID:6632
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE55⤵PID:6888
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA56⤵PID:1568
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE56⤵PID:7596
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA57⤵PID:7656
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE57⤵PID:5364
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA58⤵PID:4108
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE58⤵PID:8232
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA59⤵PID:8344
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE59⤵PID:8392
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA60⤵PID:8540
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE60⤵PID:8632
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA61⤵PID:8728
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE61⤵PID:8824
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA62⤵PID:8936
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE62⤵PID:8984
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA63⤵PID:9100
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE63⤵PID:9148
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA64⤵PID:7656
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE64⤵PID:4524
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA65⤵PID:8484
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE65⤵PID:8560
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA66⤵PID:8804
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE66⤵PID:8456
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA67⤵PID:8964
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE67⤵PID:9184
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA68⤵PID:8824
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE68⤵PID:6888
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA69⤵PID:8276
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE69⤵PID:8636
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA70⤵PID:8560
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE70⤵PID:8376
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA71⤵PID:6364
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE71⤵PID:9044
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA72⤵PID:8384
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE72⤵PID:3200
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA73⤵PID:9336
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE73⤵PID:9440
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA74⤵PID:9568
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE74⤵PID:9656
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA75⤵PID:9732
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE75⤵PID:9820
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA76⤵PID:9928
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE76⤵PID:10040
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA77⤵PID:10196
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE77⤵PID:9284
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA78⤵PID:8376
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE78⤵PID:9188
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA79⤵PID:9844
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE79⤵PID:9936
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA80⤵PID:9776
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE80⤵PID:9200
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA81⤵PID:9908
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE81⤵PID:9304
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA82⤵PID:10084
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE82⤵PID:3296
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA83⤵PID:9108
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE83⤵PID:8028
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA84⤵PID:9052
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE84⤵PID:7540
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA85⤵PID:9504
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE85⤵PID:9592
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA86⤵PID:3296
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE86⤵PID:4200
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA87⤵PID:8028
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE87⤵PID:5052
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA88⤵PID:7720
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE88⤵PID:6788
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA89⤵PID:3012
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE89⤵PID:2432
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA90⤵PID:10248
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE90⤵PID:10324
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA91⤵PID:10424
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE91⤵PID:10520
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA92⤵PID:10644
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE92⤵PID:10724
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA93⤵PID:10840
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE93⤵PID:10908
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA94⤵PID:11032
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE94⤵PID:11128
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA95⤵PID:11232
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE95⤵PID:3412
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA96⤵PID:10432
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE96⤵PID:10552
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA97⤵PID:7672
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE97⤵PID:10404
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA98⤵PID:9032
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE98⤵PID:10864
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA99⤵PID:7764
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE99⤵PID:8692
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA100⤵PID:10340
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE100⤵PID:8452
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA101⤵PID:10400
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE101⤵PID:9492
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA102⤵PID:10724
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE102⤵PID:5748
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA103⤵PID:10872
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE103⤵PID:6308
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA104⤵PID:7672
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE104⤵PID:10860
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA105⤵PID:10584
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE105⤵PID:8536
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA106⤵PID:10324
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE106⤵PID:5416
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA107⤵PID:5168
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE107⤵PID:11308
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA108⤵PID:11448
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE108⤵PID:11548
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA109⤵PID:11672
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE109⤵PID:11776
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA110⤵PID:11888
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE110⤵PID:11960
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA111⤵PID:12068
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE111⤵PID:12148
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA112⤵PID:10724
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE112⤵PID:10728
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA113⤵PID:11280
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE113⤵PID:11668
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA114⤵PID:11932
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE114⤵PID:11996
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA115⤵PID:3508
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE115⤵PID:11864
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA116⤵PID:11980
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE116⤵PID:11560
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA117⤵PID:7380
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE117⤵PID:11676
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA118⤵PID:7724
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE118⤵PID:10828
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA119⤵PID:7400
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE119⤵PID:6596
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA120⤵PID:11752
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE120⤵PID:12152
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA121⤵PID:11316
-
-
C:\Windows\SysWOW64\XP-AB9DB5FA.EXEC:\Windows\system32\XP-AB9DB5FA.EXE121⤵PID:11336
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-AB9DB5FA122⤵PID:12244
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-