Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2024, 21:28
Static task
static1
Behavioral task
behavioral1
Sample
f8c937177a66c3eec3981b93f560e90a_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f8c937177a66c3eec3981b93f560e90a_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f8c937177a66c3eec3981b93f560e90a_JaffaCakes118.exe
-
Size
112KB
-
MD5
f8c937177a66c3eec3981b93f560e90a
-
SHA1
fee4ceae1277c5dddeb47f1931226a60ed357294
-
SHA256
593321ca07f9c6121407d4227251d28691586764486667538f93249e865e150e
-
SHA512
0d0e37f8e00cb529a19951e1dee543eabf201212af09013d62a85bddb3c6b625f399e917d20aae97e1cc1e37ac42e299c0b284c4c62d87fe743e1f9130a48f69
-
SSDEEP
1536:FMf4iKEFXvxKqHsxoLbuxhqb8Cv/661k2DU3gXRvF3I+OgqHsDKEFXvxg+:Fa/XeyPbu6vC6a3IfOgyuXH
Malware Config
Signatures
-
Drops file in Drivers directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Drivers\hideproc.sys msbootlog.exe File opened for modification C:\Windows\SysWOW64\Drivers\hideproc.sys msbootlog.exe File created C:\Windows\SysWOW64\Drivers\hideproc.sys msbootlog.exe File opened for modification C:\Windows\SysWOW64\Drivers\hideproc.sys msbootlog.exe File opened for modification C:\Windows\SysWOW64\Drivers\hideproc.sys msbootlog.exe File created C:\Windows\SysWOW64\Drivers\hideproc.sys msbootlog.exe File created C:\Windows\SysWOW64\Drivers\hideproc.sys msbootlog.exe File opened for modification C:\Windows\SysWOW64\Drivers\hideproc.sys msbootlog.exe File created C:\Windows\SysWOW64\Drivers\hideproc.sys msbootlog.exe File created C:\Windows\SysWOW64\Drivers\hideproc.sys msbootlog.exe File opened for modification C:\Windows\SysWOW64\Drivers\hideproc.sys msbootlog.exe File opened for modification C:\Windows\SysWOW64\Drivers\hideproc.sys msbootlog.exe File opened for modification C:\Windows\SysWOW64\Drivers\hideproc.sys msbootlog.exe File created C:\Windows\SysWOW64\Drivers\hideproc.sys msbootlog.exe File created C:\Windows\SysWOW64\Drivers\hideproc.sys msbootlog.exe File opened for modification C:\Windows\SysWOW64\Drivers\hideproc.sys msbootlog.exe File opened for modification C:\Windows\SysWOW64\Drivers\hideproc.sys msbootlog.exe File created C:\Windows\SysWOW64\Drivers\hideproc.sys msbootlog.exe File created C:\Windows\SysWOW64\Drivers\hideproc.sys msbootlog.exe File opened for modification C:\Windows\SysWOW64\Drivers\hideproc.sys msbootlog.exe File created C:\Windows\SysWOW64\Drivers\hideproc.sys msbootlog.exe File opened for modification C:\Windows\SysWOW64\Drivers\hideproc.sys msbootlog.exe File opened for modification C:\Windows\SysWOW64\Drivers\hideproc.sys msbootlog.exe File opened for modification C:\Windows\SysWOW64\Drivers\hideproc.sys msbootlog.exe File opened for modification C:\Windows\SysWOW64\Drivers\hideproc.sys msbootlog.exe File created C:\Windows\SysWOW64\Drivers\hideproc.sys msbootlog.exe File opened for modification C:\Windows\SysWOW64\Drivers\hideproc.sys msbootlog.exe File created C:\Windows\SysWOW64\Drivers\hideproc.sys msbootlog.exe File created C:\Windows\SysWOW64\Drivers\hideproc.sys msbootlog.exe File created C:\Windows\SysWOW64\Drivers\hideproc.sys msbootlog.exe File created C:\Windows\SysWOW64\Drivers\hideproc.sys msbootlog.exe File created C:\Windows\SysWOW64\Drivers\hideproc.sys msbootlog.exe File created C:\Windows\SysWOW64\Drivers\hideproc.sys msbootlog.exe File opened for modification C:\Windows\SysWOW64\Drivers\hideproc.sys msbootlog.exe File opened for modification C:\Windows\SysWOW64\Drivers\hideproc.sys msbootlog.exe File opened for modification C:\Windows\SysWOW64\Drivers\hideproc.sys msbootlog.exe File opened for modification C:\Windows\SysWOW64\Drivers\hideproc.sys msbootlog.exe File created C:\Windows\SysWOW64\Drivers\hideproc.sys msbootlog.exe File created C:\Windows\SysWOW64\Drivers\hideproc.sys msbootlog.exe File opened for modification C:\Windows\SysWOW64\Drivers\hideproc.sys msbootlog.exe File created C:\Windows\SysWOW64\Drivers\hideproc.sys msbootlog.exe File opened for modification C:\Windows\SysWOW64\Drivers\hideproc.sys msbootlog.exe File created C:\Windows\SysWOW64\Drivers\hideproc.sys msbootlog.exe File created C:\Windows\SysWOW64\Drivers\hideproc.sys msbootlog.exe File created C:\Windows\SysWOW64\Drivers\hideproc.sys msbootlog.exe File created C:\Windows\SysWOW64\Drivers\hideproc.sys msbootlog.exe File opened for modification C:\Windows\SysWOW64\Drivers\hideproc.sys msbootlog.exe File opened for modification C:\Windows\SysWOW64\Drivers\hideproc.sys msbootlog.exe File opened for modification C:\Windows\SysWOW64\Drivers\hideproc.sys msbootlog.exe File opened for modification C:\Windows\SysWOW64\Drivers\hideproc.sys msbootlog.exe File opened for modification C:\Windows\SysWOW64\Drivers\hideproc.sys msbootlog.exe File created C:\Windows\SysWOW64\Drivers\hideproc.sys msbootlog.exe File opened for modification C:\Windows\SysWOW64\Drivers\hideproc.sys msbootlog.exe File opened for modification C:\Windows\SysWOW64\Drivers\hideproc.sys msbootlog.exe File created C:\Windows\SysWOW64\Drivers\hideproc.sys msbootlog.exe File opened for modification C:\Windows\SysWOW64\Drivers\hideproc.sys msbootlog.exe File opened for modification C:\Windows\SysWOW64\Drivers\hideproc.sys msbootlog.exe File opened for modification C:\Windows\SysWOW64\Drivers\hideproc.sys msbootlog.exe File created C:\Windows\SysWOW64\Drivers\hideproc.sys msbootlog.exe File opened for modification C:\Windows\SysWOW64\Drivers\hideproc.sys msbootlog.exe File opened for modification C:\Windows\SysWOW64\Drivers\hideproc.sys msbootlog.exe File opened for modification C:\Windows\SysWOW64\Drivers\hideproc.sys msbootlog.exe File opened for modification C:\Windows\SysWOW64\Drivers\hideproc.sys msbootlog.exe File opened for modification C:\Windows\SysWOW64\Drivers\hideproc.sys msbootlog.exe -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation msbootlog.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation msbootlog.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation msbootlog.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation msbootlog.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation msbootlog.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation msbootlog.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation msbootlog.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation msbootlog.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation msbootlog.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation msbootlog.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation msbootlog.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation msbootlog.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation msbootlog.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation msbootlog.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation msbootlog.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation msbootlog.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation msbootlog.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation msbootlog.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation msbootlog.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation msbootlog.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation msbootlog.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation msbootlog.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation msbootlog.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation msbootlog.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation msbootlog.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation msbootlog.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation msbootlog.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation msbootlog.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation msbootlog.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation msbootlog.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation msbootlog.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation msbootlog.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation msbootlog.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation msbootlog.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation msbootlog.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation msbootlog.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation msbootlog.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation msbootlog.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation msbootlog.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation msbootlog.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation msbootlog.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation msbootlog.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation msbootlog.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation msbootlog.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation msbootlog.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation msbootlog.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation msbootlog.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation msbootlog.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation msbootlog.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation msbootlog.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation msbootlog.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation msbootlog.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation msbootlog.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation msbootlog.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation msbootlog.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation msbootlog.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation msbootlog.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation msbootlog.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation msbootlog.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation msbootlog.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation msbootlog.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation msbootlog.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation msbootlog.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation msbootlog.exe -
Executes dropped EXE 64 IoCs
pid Process 1396 msbootlog.exe 5048 msbootlog.exe 4172 msbootlog.exe 1676 msbootlog.exe 4852 msbootlog.exe 2208 msbootlog.exe 4652 msbootlog.exe 4364 msbootlog.exe 1764 msbootlog.exe 1560 msbootlog.exe 2656 msbootlog.exe 2348 msbootlog.exe 4400 msbootlog.exe 2568 msbootlog.exe 4440 msbootlog.exe 1844 msbootlog.exe 3452 msbootlog.exe 4172 msbootlog.exe 3000 msbootlog.exe 4944 msbootlog.exe 2152 msbootlog.exe 2228 msbootlog.exe 2000 msbootlog.exe 1436 msbootlog.exe 4112 msbootlog.exe 2592 msbootlog.exe 2588 msbootlog.exe 2840 msbootlog.exe 1608 msbootlog.exe 1424 msbootlog.exe 3452 msbootlog.exe 2156 msbootlog.exe 3636 msbootlog.exe 5008 msbootlog.exe 2532 msbootlog.exe 728 msbootlog.exe 3912 msbootlog.exe 2656 msbootlog.exe 1356 msbootlog.exe 3376 msbootlog.exe 1440 msbootlog.exe 3860 msbootlog.exe 5048 msbootlog.exe 1616 msbootlog.exe 2244 msbootlog.exe 3452 msbootlog.exe 2612 msbootlog.exe 2780 msbootlog.exe 2860 msbootlog.exe 2228 msbootlog.exe 2076 msbootlog.exe 1852 msbootlog.exe 4304 msbootlog.exe 1556 msbootlog.exe 4240 msbootlog.exe 2568 msbootlog.exe 3112 msbootlog.exe 4440 msbootlog.exe 4688 msbootlog.exe 4424 msbootlog.exe 4324 msbootlog.exe 2552 msbootlog.exe 4132 msbootlog.exe 4980 msbootlog.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\msbootlog.exe f8c937177a66c3eec3981b93f560e90a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msbootlog.exe f8c937177a66c3eec3981b93f560e90a_JaffaCakes118.exe File created C:\Windows\SysWOW64\setuplog.txt f8c937177a66c3eec3981b93f560e90a_JaffaCakes118.exe File created C:\Windows\SysWOW64\dfinstall.txt f8c937177a66c3eec3981b93f560e90a_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: LoadsDriver 64 IoCs
pid Process 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 768 f8c937177a66c3eec3981b93f560e90a_JaffaCakes118.exe 1396 msbootlog.exe 5048 msbootlog.exe 4172 msbootlog.exe 1676 msbootlog.exe 4852 msbootlog.exe 2208 msbootlog.exe 4652 msbootlog.exe 4364 msbootlog.exe 1764 msbootlog.exe 1560 msbootlog.exe 2656 msbootlog.exe 2348 msbootlog.exe 4400 msbootlog.exe 2568 msbootlog.exe 4440 msbootlog.exe 1844 msbootlog.exe 3452 msbootlog.exe 4172 msbootlog.exe 3000 msbootlog.exe 4944 msbootlog.exe 2152 msbootlog.exe 2228 msbootlog.exe 2000 msbootlog.exe 1436 msbootlog.exe 4112 msbootlog.exe 2592 msbootlog.exe 2588 msbootlog.exe 2840 msbootlog.exe 1608 msbootlog.exe 1424 msbootlog.exe 3452 msbootlog.exe 2156 msbootlog.exe 3636 msbootlog.exe 5008 msbootlog.exe 2532 msbootlog.exe 728 msbootlog.exe 3912 msbootlog.exe 2656 msbootlog.exe 1356 msbootlog.exe 3376 msbootlog.exe 1440 msbootlog.exe 3860 msbootlog.exe 5048 msbootlog.exe 1616 msbootlog.exe 2244 msbootlog.exe 3452 msbootlog.exe 2612 msbootlog.exe 2780 msbootlog.exe 2860 msbootlog.exe 2228 msbootlog.exe 2076 msbootlog.exe 1852 msbootlog.exe 4304 msbootlog.exe 1556 msbootlog.exe 4240 msbootlog.exe 2568 msbootlog.exe 3112 msbootlog.exe 4440 msbootlog.exe 4688 msbootlog.exe 4424 msbootlog.exe 4324 msbootlog.exe 2552 msbootlog.exe 4132 msbootlog.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 768 wrote to memory of 1396 768 f8c937177a66c3eec3981b93f560e90a_JaffaCakes118.exe 87 PID 768 wrote to memory of 1396 768 f8c937177a66c3eec3981b93f560e90a_JaffaCakes118.exe 87 PID 768 wrote to memory of 1396 768 f8c937177a66c3eec3981b93f560e90a_JaffaCakes118.exe 87 PID 1396 wrote to memory of 5048 1396 msbootlog.exe 88 PID 1396 wrote to memory of 5048 1396 msbootlog.exe 88 PID 1396 wrote to memory of 5048 1396 msbootlog.exe 88 PID 5048 wrote to memory of 4172 5048 msbootlog.exe 90 PID 5048 wrote to memory of 4172 5048 msbootlog.exe 90 PID 5048 wrote to memory of 4172 5048 msbootlog.exe 90 PID 4172 wrote to memory of 1676 4172 msbootlog.exe 91 PID 4172 wrote to memory of 1676 4172 msbootlog.exe 91 PID 4172 wrote to memory of 1676 4172 msbootlog.exe 91 PID 1676 wrote to memory of 4852 1676 msbootlog.exe 93 PID 1676 wrote to memory of 4852 1676 msbootlog.exe 93 PID 1676 wrote to memory of 4852 1676 msbootlog.exe 93 PID 4852 wrote to memory of 2208 4852 msbootlog.exe 95 PID 4852 wrote to memory of 2208 4852 msbootlog.exe 95 PID 4852 wrote to memory of 2208 4852 msbootlog.exe 95 PID 2208 wrote to memory of 4652 2208 msbootlog.exe 96 PID 2208 wrote to memory of 4652 2208 msbootlog.exe 96 PID 2208 wrote to memory of 4652 2208 msbootlog.exe 96 PID 4652 wrote to memory of 4364 4652 msbootlog.exe 97 PID 4652 wrote to memory of 4364 4652 msbootlog.exe 97 PID 4652 wrote to memory of 4364 4652 msbootlog.exe 97 PID 4364 wrote to memory of 1764 4364 msbootlog.exe 98 PID 4364 wrote to memory of 1764 4364 msbootlog.exe 98 PID 4364 wrote to memory of 1764 4364 msbootlog.exe 98 PID 1764 wrote to memory of 1560 1764 msbootlog.exe 99 PID 1764 wrote to memory of 1560 1764 msbootlog.exe 99 PID 1764 wrote to memory of 1560 1764 msbootlog.exe 99 PID 1560 wrote to memory of 2656 1560 msbootlog.exe 131 PID 1560 wrote to memory of 2656 1560 msbootlog.exe 131 PID 1560 wrote to memory of 2656 1560 msbootlog.exe 131 PID 2656 wrote to memory of 2348 2656 msbootlog.exe 101 PID 2656 wrote to memory of 2348 2656 msbootlog.exe 101 PID 2656 wrote to memory of 2348 2656 msbootlog.exe 101 PID 2348 wrote to memory of 4400 2348 msbootlog.exe 102 PID 2348 wrote to memory of 4400 2348 msbootlog.exe 102 PID 2348 wrote to memory of 4400 2348 msbootlog.exe 102 PID 4400 wrote to memory of 2568 4400 msbootlog.exe 103 PID 4400 wrote to memory of 2568 4400 msbootlog.exe 103 PID 4400 wrote to memory of 2568 4400 msbootlog.exe 103 PID 2568 wrote to memory of 4440 2568 msbootlog.exe 104 PID 2568 wrote to memory of 4440 2568 msbootlog.exe 104 PID 2568 wrote to memory of 4440 2568 msbootlog.exe 104 PID 4440 wrote to memory of 1844 4440 msbootlog.exe 105 PID 4440 wrote to memory of 1844 4440 msbootlog.exe 105 PID 4440 wrote to memory of 1844 4440 msbootlog.exe 105 PID 1844 wrote to memory of 3452 1844 msbootlog.exe 139 PID 1844 wrote to memory of 3452 1844 msbootlog.exe 139 PID 1844 wrote to memory of 3452 1844 msbootlog.exe 139 PID 3452 wrote to memory of 4172 3452 msbootlog.exe 108 PID 3452 wrote to memory of 4172 3452 msbootlog.exe 108 PID 3452 wrote to memory of 4172 3452 msbootlog.exe 108 PID 4172 wrote to memory of 3000 4172 msbootlog.exe 109 PID 4172 wrote to memory of 3000 4172 msbootlog.exe 109 PID 4172 wrote to memory of 3000 4172 msbootlog.exe 109 PID 3000 wrote to memory of 4944 3000 msbootlog.exe 112 PID 3000 wrote to memory of 4944 3000 msbootlog.exe 112 PID 3000 wrote to memory of 4944 3000 msbootlog.exe 112 PID 4944 wrote to memory of 2152 4944 msbootlog.exe 113 PID 4944 wrote to memory of 2152 4944 msbootlog.exe 113 PID 4944 wrote to memory of 2152 4944 msbootlog.exe 113 PID 2152 wrote to memory of 2228 2152 msbootlog.exe 143
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8c937177a66c3eec3981b93f560e90a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f8c937177a66c3eec3981b93f560e90a_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"8⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"9⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"11⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"12⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"14⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"18⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"20⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"21⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"22⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"23⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2228 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"24⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2000 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"25⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1436 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"26⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4112 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"27⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2592 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2588 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"29⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2840 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"30⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1608 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"31⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1424 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3452 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"33⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2156 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3636 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"35⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5008 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2532 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"37⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:728 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"38⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3912 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"39⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2656 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"40⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1356 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"41⤵
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3376 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"42⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1440 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"43⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3860 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"44⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5048 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"45⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1616 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"46⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2244 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"47⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3452 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"48⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2612 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"49⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2780 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"50⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2860 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"51⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2228 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"52⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2076 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"53⤵
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1852 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"54⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4304 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"55⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1556 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"56⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4240 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"57⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2568 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"58⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3112 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"59⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4440 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"60⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4688 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"61⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4424 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"62⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4324 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"63⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2552 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"64⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4132 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"65⤵
- Executes dropped EXE
PID:4980 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"66⤵PID:3812
-
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"67⤵PID:5044
-
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"68⤵PID:744
-
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"69⤵PID:4272
-
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"70⤵
- Checks computer location settings
PID:2892 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"71⤵PID:2448
-
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"72⤵
- Drops file in Drivers directory
PID:64 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"73⤵
- Checks computer location settings
PID:1504 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"74⤵PID:2840
-
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"75⤵PID:2316
-
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"76⤵PID:4064
-
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"77⤵PID:3768
-
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"78⤵
- Checks computer location settings
PID:2244 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"79⤵
- Checks computer location settings
PID:4324 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"80⤵PID:752
-
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"81⤵PID:1564
-
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"82⤵
- Checks computer location settings
PID:2972 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"83⤵
- Drops file in Drivers directory
PID:2104 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"84⤵
- Drops file in Drivers directory
PID:4028 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"85⤵
- Drops file in Drivers directory
- Checks computer location settings
PID:3416 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"86⤵
- Checks computer location settings
PID:2668 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"87⤵
- Checks computer location settings
PID:4504 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"88⤵PID:3424
-
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"89⤵PID:2992
-
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"90⤵
- Drops file in Drivers directory
- Checks computer location settings
PID:2588 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"91⤵
- Drops file in Drivers directory
PID:2080 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"92⤵
- Drops file in Drivers directory
PID:400 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"93⤵PID:3596
-
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"94⤵PID:3560
-
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"95⤵PID:1076
-
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"96⤵PID:3636
-
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"97⤵
- Checks computer location settings
PID:4644 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"98⤵PID:1624
-
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"99⤵PID:4832
-
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"100⤵
- Checks computer location settings
PID:2624 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"101⤵PID:3156
-
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"102⤵PID:4348
-
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"103⤵PID:2876
-
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"104⤵
- Checks computer location settings
PID:556 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"105⤵PID:1512
-
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"106⤵
- Checks computer location settings
PID:4964 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"107⤵
- Drops file in Drivers directory
- Checks computer location settings
PID:2360 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"108⤵PID:3004
-
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"109⤵
- Checks computer location settings
PID:1608 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"110⤵PID:1736
-
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"111⤵PID:2628
-
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"112⤵PID:1016
-
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"113⤵PID:1956
-
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"114⤵
- Drops file in Drivers directory
PID:4884 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"115⤵
- Checks computer location settings
PID:3284 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"116⤵
- Checks computer location settings
PID:2300 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"117⤵PID:2008
-
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"118⤵PID:768
-
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"119⤵PID:2344
-
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"120⤵
- Drops file in Drivers directory
PID:4496 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"121⤵
- Drops file in Drivers directory
PID:1440 -
C:\Windows\SysWOW64\msbootlog.exe"C:\Windows\System32\msbootlog.exe"122⤵PID:3872
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-